Newest Listing

Top Rated

Most Popular

Endpoint SecurityRSS

The Halon Email Platform

Visit the Product Site

Halon is an email software distribution. It provides a full stack, scriptable approach to functions such as delivery (SMTP/LMTP), routing, security (anti-spam, signing), automation and integration; everything you need in front of your email storage. You ...

VendorHalon Secuirty
Pricing ModelCommercial
Modified
McAfee Change Reconciliation

Visit the Product Site

McAfee Change Reconciliation creates a comprehensive inventory of changes carried out on all systems, grouping and matching them with change tickets and approvals. It flags ad hoc changes made without approvals, and reports on emergency changes that were ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Content Security Suite

Visit the Product Site

McAfee Content Security Suite bundles McAfee Web Protection, McAfee Email Protection, McAfee Network DLP Prevent, and McAfee Device Control into a one-suite purchase. This unified approach offers the right security to protect your users and data from toda ...

VendorMcAfee
Pricing ModelCommercial
Modified
vSentry

Visit the Product Site

Bromium vSentry is software that, through hardware enforced isolation, defeats advanced attacks targeting the endpoint through web, email and documents. vSentry protects desktops without requiring signatures or updates, defeating and automatically discard ...

VendorBromium
Pricing ModelCommercial
Modified

Visit the Product Site

About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...

VendorSentinel Labs
Pricing ModelCommercial
Modified
Comodo Endpoint Security Manager 3 Professional Edition

Visit the Product Site

Comodo's new CESM 3 platform provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources. CESM3 is des ...

VendorComodo
Pricing ModelCommercial
Modified
Check Point Endpoint Policy Management

Visit the Product Site

The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard d ...

VendorCheck Point
Pricing ModelCommercial
Modified
Wave Virtual Smart Card

Visit the Product Site

Wave Virtual Smart Card (VSC) uses secure hardware that already ships standard on most business-class laptops and tablets today: the Trusted Platform Module, or TPM, a hardware security chip developed by the Trusted Computing Group. Because TPM is an int ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

Visit the Product Site

Fireglass Threat Isolation Platform eliminates malware and phishing by isolating critical attack vectors including web pages, emails and documents. Transparent Clientless Rendering (TCR) technology transforms all web content into a safe visual stream and ...

VendorFireglass
Pricing ModelCommercial
Modified
LogRhythm Threat Lifecycle Management

Visit the Product Site

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

VendorLogRhythm
Pricing ModelCommercial
Modified

Visit the Product Site

Lumension Endpoint Management and Security Suite provides the functions of IT operations and security through a single console, server and agent architecture to more effectively address IT risk and systems management requirements across the enterprise. Lu ...

VendorLumension Security, Inc.
Pricing ModelCommercial
Modified