2020-05-19T23:58:44+00:00
- Artificial intelligent based Network detection & Response “AI Based NDR”
- Intelligent, AI-driven threat detection and response
- Automatic data classification
- Congito detect
- Congito Stream
- Congito Re-call
2020-05-20T00:08:46+00:00
- Secure and controlled remote access
- NAC “Network access control”
- ZeroTrust access checklist
- Endpoint compliance management
- PulseConnect secure VPN
- PulseSecure In Case of Emergency (ICE) license
- Pulse Profiler NAC
- Pulse access suite
2020-05-07T12:34:15+00:00
- Workflow and content automation.
- Automation Workflows for Human Resources Processes.
- Automation Workflows for Customer Service Processes.
- Automation Workflows for Operations Processes.
- Automation Workflows for Finance Processes.
- Automation Workflows for IT Redundant Processes.
- SharePoint/Office 365 Workflow.
- SharePoint/Office 365 Forms.
- Mobile Forms.
- Connectors with MS Dynamics, Sales Force and LinkedIn.
2020-05-11T13:30:20+00:00
- Employee user activity monitoring
- Where ever the employee is working inside the organization or remotely
- Remote support tools for IT to be able to support employees inside the organization or remotely
- Employee endpoint security and control
- Endpoint DLP “Data Loss Prevention” to control the data on the employee endpoint
- TeraMind Starter
- TeraMind UAT “User activity Monitoring”
- TeraMind DLP “Data Loss Prevention”
2020-05-07T12:40:17+00:00
- Static and dynamic application security testing to find and fix vulnerabilities before they can be exploited.
- Intelligent security operations software that provide broad visibility to find and mitigate threats more effectively.
- Data security and encryption; Protect, manage, and control access to sensitive data.
- ArcSight Express.
- ArcSight Investigate.
- Application Defender.
- DevInspect.
- Fortify on Demand.
- Fortify Static Code Analyzer.
- Fortify WebInspect.
2020-05-11T12:51:54+00:00
- Privileged Access Management
- Discover, manage, audit, and monitor privileged accounts,
- Privilege sessions recording, control and monitoring, Manage privilege accounts passwords
- Zero trust privilege approach on endpoints, Unify Least Privilege & Endpoint Security to Condense the Threat Surface
- Provide instant, secure, reliable remote support to end-users and customers—on or off your network—using Windows, Mac, iOS, Android, and more. Focus on fixing issues, not fixing connection
- Privileged Password Management
- Endpoint Privilege Management
- Manage privileges on Windows, Mac, Linux, and Unix endpoints
- Secure Remote Access
- Centrally manage and secure remote access for service desks and vendors
2020-05-07T14:01:04+00:00
- VISIBILITY & MONITORING.
- CHANGE MANAGEMENT.
- POLICY COMPLIANCE.
- FIREWALL CLEANUP & AUDIT.
- FIREWALL MIGRATION & UPGRADE
- SECURITY MANAGER.
- POLICY PLANNER.
- POLICY OPTIMIZER.
- RISK ANALYZER.
- IMMEDIATE INSIGHT.
2020-05-07T13:06:25+00:00
- Drive adoption of BYOD with management and security industry best practices.
- Provide a layered defense-in-depth approach to security, ensuring a trusted endpoint environment with capabilities such as patch and remediation, configuration management, application control, device control, disk encryption and more.
- HEAT Desktop & Server Management (DSM).
- HEAT PatchLink.
- HEAT Endpoint Management & Security Suite (EMSS).
- HEAT Endpoint Security Suite (ES).
2020-05-11T13:22:28+00:00
- Microsoft infrastructure auditing and governance
- MS Active Directory auditing and governance
- File Servers auditing and governance
- MS Exchange auditing and governance
- ActiveDirectory enterprise password enforcer
- Privilege Access Management
- Next Generation Privilege access management for privileges sessions management, Monitoring and recording
- Threat Detection
- Detect and respond to abnormal behavior and advanced attacks against Active Directory and File Systems
- StealthINTERCEPT
- REAL-TIME POLICY ENFORCEMENT and change audit for Microsoft Infrastructure
- StealthAUDIT
- REPORTING & GOVERNANCE for Microsoft Infrastructure
- StealthDEFEND
- REAL-TIME THREAT DETECTION AND RESPONSE for FileServer and Active Directory
- Stealthbits Privileged Activity Manager
- Next Generation PRIVILEGED ACCESS MANAGEMENT
- StealthINTERCEPT Enterprise Password Enforcer
- Extend Microsoft Active Directory password policy with granual controls and prevent the use of compromised dictionary passwords and weak detectable passwords
2020-05-07T12:43:45+00:00
- Comprehensive multi-vector discovery and risk mitigation of advanced threats and targeted attacks.
- Multi-layered endpoint protection platform, based on true cyber-security technologies.
- Border-less security engineered for hybrid cloud
Proactive detection of cross-channel fraud in Real Time.
- Kaspersky Anti Targeted Attack Platform.
- Threat Prevention and Advanced Endpoint Control.
- Kaspersky Fraud Prevention Cloud/Mobile/endpoints.