Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to provide centralized security measures for networked client devices such as smartphones, laptops, and tablets. - Monitor devices, view activity, create reports, and run system scans - Normalize security measures for different operating systems and devices - Detect and prevent targeted attacks, malware, data breaches and other threats
138 results
Cortex XDR is the industry’s first extended detection and response platform that spans key security data sources to stop modern attacks. Cortex XDR goes beyond EDR by detecting the most complex threats using analytics across your data sources and reveals the root cause, reducing investigation time eighty eight percent compared to manual processes.
Let employees work how, when, and where they want with the power to manage every app, device, and platform in one central location with the Citrix platform. Citrix Endpoint Management is the ideal solution for customers where security and compliance are a top priority. With this solution, you manage and control all infrastructure and it includes over 300 policies for additional security and advanced mobile device management compliance for context-aware security. In addition, with Citrix Endpoint Management cloud or on-premises, you get all the same features and can manage devices from anywhere. You don’t have to sacrifice user experience either, as Citrix supports high-quality experiences on all major mobile devices.
Protect critical information at scale. Get peace of mind with award-winning solutions to maintain business security and continuity to better manage cyber threat, data loss and endpoint protection, forensic investigation and remediation.
An integrated endpoint protection, risk management, and attack forensics platform. Enhanced with user behavior risk analytics. GravityZone Business Security Premium safeguards your organization from a full spectrum of sophisticated cyber threats. With more than 30 machine learning-driven security technologies, GravityZone provides multiple layers of defense that consistently outperforms conventional endpoint security, as proven in independent tests. A single-agent, single-console solution for physical, virtual, mobile, and cloud-based endpoints and email, GravityZone Business Security Premium adds the human element into your security ecosystem, minimizing management overhead while giving you ubiquitous visibility and control.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Infoblox BloxOne™ Threat Defense protects users, devices, and systems no matter where they are to strengthen and optimize their security postures from the foundation up. BloxOne Threat Defense is cloud-native and protects your brand by securing your existing networks and digital transformation activities, including SD-WAN, IoT, and cloud adoption. BloxOne Threat Defense also coordinates threat intelligence across the security stack, automates investigation and response activities, and otherwise uplifts the security ecosystem and Security Operations to improve cybersecurity while lowering the total cost of defense.
Get real-time network visibility and prevent risky BYOD, IOT, and other devices from accessing network resources. Why you should deploy Network Access Control? With the increasing number and type of devices accessing your network, it is important to provide visibility of all devices and where they are on the network. This prevents non-compliant or risky devices from accessing your network or applications. NAC solutions enable complete policy and device life cycle management. What happens if I do not deploy a Network Access Control solution? Without a NAC, it’s difficult to have confidence that you know everything on your network, can block unauthorized access, and all devices are secure. It’s also much more challenging to demonstrate compliance with internal policies and external regulations.
Endpoint Central is a unified endpoint management solution that helps manage network endpoints like laptops, desktops, tablets, mobile devices, Smart TVs, Smart watches, servers and various point of sale devices from a single dashboard. Endpoint Central caters to the entire device management life cycle from automating regular endpoint management routines like OS deployment, installing patches, deploying software, and taking control of remote desktops to managing and monitoring assets, software licenses, software/USB device usage, and much more. Adding to device management capabilities, Endpoint Central also tightly integrates with a host of security tools like browser security, vulnerability manager, application control, device control and BitLocker encryption. Key capabilities of Endpoint Central: -Patch management -Software deployment -Mobile device management -OS imaging and deployment -IT asset management -Remote control -Modern management
The RAV Endpoint Protection platform is a next-generation antivirus solution that combines real-time monitoring of endpoints against the widest possible range of cyber threats. It is the first endpoint protection based on a multilayered machine-learning engine that equips families and individuals with the same level of cyber protection enjoyed by Fortune 500 companies. Key features include: - Behavioral & Machine Learning Analysis - Endpoint Detection & Response (EDR) - Endpoint Security Tools - Camera and Microphone Protection - Dynamic Ransomware Defense - RAV Online Security With comprehensive EDR, advanced ML automation, and multilayered protection, users receive protection against hackers, ransomware, phishing, and all other types of malware. By maintaining and continuously updating a library of malicious files, ReasonLabs offers the industry’s most powerful defense engine. RAV Endpoint Protection was granted a Gold Certification for Anti-Malware from OPSWAT in 2022.