Halon Secuirty
Commercial
Pricing Model

Halon is an email software distribution. It provides a full stack, scriptable approach to functions such as delivery (SMTP/LMTP), routing, security (anti-spam, signing), automation and integration; everything you need in front of your email storage. You ...

Modified
Commercial
Pricing Model

McAfee Change Reconciliation creates a comprehensive inventory of changes carried out on all systems, grouping and matching them with change tickets and approvals. It flags ad hoc changes made without approvals, and reports on emergency changes that were ...

Modified
McAfee Change Reconciliation
Commercial
Pricing Model

McAfee Content Security Suite bundles McAfee Web Protection, McAfee Email Protection, McAfee Network DLP Prevent, and McAfee Device Control into a one-suite purchase. This unified approach offers the right security to protect your users and data from toda ...

Modified
McAfee Content Security Suite
Commercial
Pricing Model

Bromium vSentry is software that, through hardware enforced isolation, defeats advanced attacks targeting the endpoint through web, email and documents. vSentry protects desktops without requiring signatures or updates, defeating and automatically discard ...

Modified
vSentry
Sentinel Labs
Commercial
Pricing Model

About Real time, system wide monitoring Monitoring technology knows what every process on your machine is doing at every given moment - and is specially designed to be lightweight and with a small footprint. Behavioural based detection Purely behaviou ...

Modified
Commercial
Pricing Model

Comodo's new CESM 3 platform provides a state-of-the-art anti-malware suite that proactively protects your servers, workstations, laptops and netbooks, while offering advanced, real-time management and control over critical system resources. CESM3 is des ...

Modified
Comodo Endpoint Security Manager 3 Professional Edition
Commercial
Pricing Model

The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard d ...

Modified
Check Point Endpoint Policy Management
Wave Systems Corp.
Commercial
Pricing Model

Wave Virtual Smart Card (VSC) uses secure hardware that already ships standard on most business-class laptops and tablets today: the Trusted Platform Module, or TPM, a hardware security chip developed by the Trusted Computing Group. Because TPM is an int ...

Modified
Wave Virtual Smart Card
Commercial
Pricing Model

Fireglass Threat Isolation Platform eliminates malware and phishing by isolating critical attack vectors including web pages, emails and documents. Transparent Clientless Rendering (TCR) technology transforms all web content into a safe visual stream and ...

Modified

The Threat Lifecycle Management Framework (TLM) is a series of aligned security operations capabilities. The capabilities include Security Intelligence, SIEM, Security Analytics, Log Management, Network Monitoring and Forensics & Endpoint Monitoring. It b ...

Modified
LogRhythm Threat Lifecycle Management
Lumension Security, Inc.
Commercial
Pricing Model

Lumension Endpoint Management and Security Suite provides the functions of IT operations and security through a single console, server and agent architecture to more effectively address IT risk and systems management requirements across the enterprise. Lu ...

Modified

© Computer Network Defence Limited 2021