Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to administrate firewall and computer network protections. - Create and maintain centralized network access policies and enforcement rules - Scan infrastructure to detect miscalculations in network and device configurations - Automate network audits and use workflow for managing firewalls and compliance - Record policy changes and keep network security operations visible and up to date
39 results
An award-winning cybersecurity platform that uses network context to deliver unparalleled network visibility, reduce complexity, prioritize risk and maintain compliance. RedSeal Network is agentless and ingests configuration data, on-premises and in the cloud, through its patented Netmap & ThreatMap Analysis Engine to automatically identify all assets, gaps into previously hidden parts of your network, and analyze attack paths to prioritize risk with the most impact to the organization. With automation from RedSeal Network, enterprises can meet external & internal compliance mandates within budget and on time.
La compliance applicata alle piattaforme garantisce che le pagine social aderiscano alle politiche e alle procedure aziendali, nonché alle leggi e ai regolamenti che regolano un determinato settore. Per ottenere questo risultato abbiamo creato le Social Media Policy, un documento utile a ogni azienda da abbinare ai contratti di lavoro e di collaborazione, il quale tutela la sua reputazione, quella dei suoi dipendenti, dei clienti e di tutte le persone che interagiscono con i social media del brand. Sono l’insieme delle norme di comportamento da adottare all’interno delle pagine social aziendali.
Administre la seguridad de las aplicaciones de cualquier plataforma, reduzca sus costos operativos, configure fácilmente el acceso a sus aplicaciones críticas y gestione de forma ágil la seguridad con nuestro Framework de Seguridad
Innovative cloud security platform that easily surfaces risks in the most complex cloud environments. The solution accurately calculates all attack paths to critical resources even when using 3rd party firewall vendors at the perimeter or hosted in the cloud. RedSeal Cloud is agentless and uses cloud and 3rd party vendor APIs to ingest configuration data, surface the attack paths to critical resources, and provide evidence to DevOps teams to remediate risk. Security teams can also establish, monitor, and meet industry standard and custom compliance checks. The platform automatically organizes cloud resources with network and cloud relationship context.
Cognitive Trust is Elisity’s cloud-native and cloud-delivered solution for identity-based microsegmentation and least privilege access of users, applications, and devices. It makes network security easy and reduces the attack surface to the maximum, limiting the blast radius of ransomware attacks, advanced persistent threats, and other business-impacting exploits. With Elisity’s innovative approach to network security, there’s no longer a need to micro-manage expensive East-West firewalls, NACs, ACLs, VLANs, PVLANs, VRFs, and VPNs anymore. Furthermore, Elisity’s customers praise the non-disruptive nature of the solution deployment and operation: there is no need for IP re-addressing and network grooming, and regular lifecycle infrastructure and system upgrades can occur without security being a major impediment.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Los productos de seguridad de Cisco son una solución confiable y eficaz para proteger su red y mantener su información segura. Ya sea que esté buscando proteger un pequeño negocio o una gran organización, Cisco tiene la solución adecuada para sus necesidades de seguridad.
Infoshield is a comprehensive solution meticulously designed and crafted to address the full spectrum of cybersecurity awareness and training requirements. It features a Learning Management System (LMS) developed in direct response to the escalating frequency and severity of cyberattacks and breaches in the digital realm. Infoshield is strategically dedicated to systematically disseminating vital cybersecurity knowledge and insights, accompanied by thorough guidance on appropriate courses of action when confronted with cyber threats. This exceptional program, tailored to cater to the Arabian market, places a significant emphasis on addressing the Arabic language requirements, ensuring that content is effectively delivered to diverse audience segments and individuals within an organization.
SNSKIES offers comprehensive security device management, ensuring peak performance and availability. Our tailored solutions encompass: 1. **Firewall Management:** Control lifecycle, rule base, and network settings effortlessly. 2. **IDPS:** Real-time warnings and prevention measures against cyber threats. 3. **Web Gateway:** Proactive cloud endpoint protection with real-time threat features. 4. **Web App Firewall:** Continuous protection for web-based applications, blocking data loss. 5. **Network & Email DLP Management:** 24/7 monitoring for enhanced device performance and security. **Unique Features:** - Backup/Restore as per policy - Efficient Network Routing Table Management - Periodic Patch Management - Comprehensive Network Security Profile Management Choose SNSKIES for unparalleled expertise, customization, and proactive security measures.
Spidernext is a cyber defense platform in vSOC (Virtual Security Operations Center) format that is supported by Artificial Intelligence and that allows the detection, response and automated management of security incidents in a simple way. It integrates the ability to identify a possible cyberattack before it occurs, recover intelligence information, detect attacks on an organization's reputation, respond to and manage security incidents. What features does Spidernext have? • Intuitive platform • Real-time monitoring of hundreds of information sources • Sending personalized alerts • Automated reports • Grouping of information by needs (Security, Intelligence and Reputation) • Non-intrusive (No need to install anything)
Dealerships range in size but are never under eight devices. There are Routers, Computers, Printers, and Laptops. This means you must manage a Firewall, WiFi, and the devices to talk to the internet. Some dealerships have telephones, video cameras, and significant servers running their business.