Threat Prevention

Summary

  • 41 Companies
  • 2 Patents
  • 1 Use Cases
  • 5 Case Studies
  • 10 Science Papers
  • $700 000 Total Funding

Companies

#Organisation NameIndustriesHeadquarterDescriptionFounded YearCompany TypeNum of Employees
1
Software
Santa Clara, California
Netskope, the SASE leader, safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network. With CASB, SWG, and ZTNA built natively in a single platform, the Netskope Security Cloud provides the most granular context, via patented technology, to enable conditional access and user awareness while enforcing zero trust principles across data protection and threat prevention everywhere. Unlike others who force tradeoffs between security and networking, Netskope’s global security private cloud provides full compute capabilities at the edge. Netskope is fast everywhere, data-centric, and cloud-smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership.
2012
Privately Held
2 001
2
Software
Bucuresti, Romania
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com.
2001
Privately Held
1 969
3
Software
Tampa, Florida
OPSWAT protects critical infrastructure. Our goal is to eliminate malware and zero-day attacks. We believe that every file and every device pose a threat. Threats must be addressed at all locations at all times—at entry, at exit, and at rest. Our products focus on threat prevention and process creation for secure data transfer and safe device access. The result is productive systems that minimize risk of compromise. That’s why 98% of U.S. nuclear power facilities trust OPSWAT for cybersecurity and compliance. OPSWAT. Trust no file. Trust no device. www.opswat.com Visit us on Twitter, Facebook, Instagram, and YouTube. http://www.twitter.com/opswat http://www.facebook.com/opswat https://www.instagram.com/opswat https://www.youtube.com/user/opswat1
2002
Privately Held
557
4
Cybersecurity
Seongnam-si, Gyeonggi-do/Bundang-gu
Founded in 1995, AhnLab, Inc., the global cybersecurity company, delivers comprehensive protection for endpoints, networks, transactions, and essential services. AhnLab delivers best-of-breed threat prevention that scales easily for high-speed networks by combining cloud analysis with endpoint and server resources. AhnLab's multidimensional approach combines with exceptional service to create truly global protection against attacks that evade traditional security defenses. That’s why more than 25,000 organizations rely on AhnLab’s award-winning products and services to make the internet safe and reliable for their business operations.
1995
Public Company
521
5
Cybersecurity
East Greenbush, New York
The Center for Internet Security, Inc. (CIS®) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit, responsible for the CIS Controls® and CIS Benchmarks™, globally recognized best practices for securing IT systems and data. We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats. Our CIS Hardened Images® provide secure, on-demand, scalable computing environments in the cloud. CIS is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®), the trusted resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center® (EI-ISAC®), which supports the rapidly changing cybersecurity needs of U.S. elections offices. To learn more, visit CISecurity.org
2000
Nonprofit
348
6
Consumer Services
Marbella, Malaga
AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech. We believe that people should enjoy the good moments in life, with a peace of mind that their PC, laptop, smart phone, wearable or any Internet-connected device will not ruin their day. Therefore, our friendly, native-speaking, certified technicians are available 24/7, 365 days a year providing fast technical support to help with any issues that users may experience on their devices. Our mission is to provide world’s best service level with a strong focus on compliance, consumer protection and satisfaction together with first-class IT security technology. As a compliment to the exceptional service that we deliver, we deploy proprietary threat prevention technology, called AnyTech365 IntelliGuard, to proactively protect and secure our end users’ devices. As part of our security solutions portfolio, we offer AnyTech365 Security, powered by one of the world’s most renowned anti-malware engines. Our online back-up product helps fight ransomware threat and ensures our customers can always store their files safely. One of our main hardware products, AnyTech365 Secure Router, helps encrypt and secure network traffic for an enhanced end user privacy. Founded in 2014 by cybersecurity veterans, AnyTech365 is headquartered in Marbella, Spain – offering an array of European native-speaking talent to help service the needs of more than 25 countries in more than 15 languages in Europe and across the world. Currently, the company has offices in Marbella and Torremolinos (Spain), Casablanca (Morocco), Copenhagen (Denmark) and San Francisco (California, US) and we employ more than 400 staff. https://anytech365.com/ #AnyTech365 #homeoffice #iotsecurity
2014
Privately Held
248
7
Cybersecurity
Theale, Nr. Reading, Berkshire
Why Clearswift? Clearswift is trusted by government, defense and financial organizations around the world to prevent cyber threats and protect critical information. Its Adaptive Cyber Security and Data Loss Prevention solutions provide an unparalleled layer of inspection, sanitization and threat prevention, enabling secure collaboration through across email, web, endpoint and cloud applications. What Makes Clearswift Unique? Embedded deep at the core of its products is a robust Deep Content Inspection (DCI) engine that inspects information flowing in and out of the network, identifies risks and applies the appropriate levels of security actions. The DCI engine will deconstruct a document or file, remove information that breaks policy (rules), then reassemble the contents and continue it safely on its way, minimizing impact on the business. New Optical Character Recognition (OCR) technology and anti-steganography features keep Clearswift ahead of the curve in detecting threats based in digital image files. Cyber Security Products Whether it’s to help secure email, the web, the cloud, Office 365 or the endpoint, Clearswift solutions offer an unparalleled level of content threat protection for businesses operating in the critical infrastructure space. The product suite includes: •Secure Email Gateway •Secure Exchange Gateway •Secure Web Gateway •Secure ICAP Gateway •Argon for Email •Secure Archiving •Email Encryption •Endpoint DLP •Information Governance Server The products can be deployed as standalone solutions, or be used to enhance existing systems in place, whether on premise or in a cloud-based email platform such as Microsoft Office 365 or Gmail. Clearswift Around the Globe Clearswift operates from offices in Europe, Australia, Japan and the United States, enabling it to offer its customers a ‘follow-the-sun’ level of support. More information is available at www.clearswift.com
1982
Privately Held
131
8
Information Technology
Lowell, MA
Since 1968, CSPi has been partnering with our customers to help them meet their most demanding performance, availability, and security requirements by maximizing and enhancing the use of their network infrastructure, applications, and services. CSPi operates two divisions: High-Performance Products (including ARIA Cybersecurity Solutions) and Technology Solutions. Each division delivers unique expertise in designing and implementing technology solutions to help our customers drive business success. High-Performance Products Better Cybersecurity Starts with a Smarter Approach ARIA Cybersecurity Solutions for enterprise-wide network security and data protection. nVoy Security Appliances threat Analytics, threat Detection and threat Prevention. Myricom network adapters for high-performance packet capture and application offloading. All of our solutions are designed to help our customers protect their most critical information and comply with increasingly stringent data privacy regulations. Technology Solutions Helping Clients Achieve Desired Business Outcomes Through Technology Vital Managed IT Services provides 24/7 proactive support at a predictable price. Professional IT Services assess, architect, design, and implement new technologies. Cloud Services offers alternative IT consumption and cost models to help optimize the way businesses are run. We provide the IT expertise, proven results, flexible approach, and service scope our clients need to quickly adopt new technology and accelerate their time to market.
1968
Public Company
106
9
Information Technology
New Barnet, Hertfordshire
We simplify your IT. Choose your support package. Choose your add-ons. Consolidate your IT in one, monthly payment. YOUR IT. Simplified. IT Support | Threat Prevention & Analysis | Disaster Recovery | Storm Private Cloud | Telecoms | Project Work | IT Audit | Network Security
2003
Privately Held
9
10
Information Technology
Shelbyville, IN
Tubesock is a premier provider of cloud services, disaster recovery, network and threat prevention and technology consulting. We have been in business for over 22 years and have worked with hundreds of businesses around the world. With a staff of industry experts and years of experience, businesses can count on us to handle the most critical technology need.
1997
Privately Held
9

Patents

#NumberTitleAbstractDateKindAssigneeInventor
1
10 003 608
Automated insider threat prevention
Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider threat prevention includes monitoring network communications at a network device; detecting an anomalous activity based on the monitored network communications associated with a user based on a behavior profile for the user; and performing an action in response to the detected anomalous activity based on a policy.
B2
Palo Alto Networks, Inc.
Gregory Grzegorzyk, Cyrus Ziaeian, Tim Treat
2
9 641 544
Automated insider threat prevention
Techniques for automated insider threat prevention are disclosed. In some embodiments, a system, process, and/or computer program product for automated insider threat prevention includes monitoring network communications at a network device; detecting an anomalous activity based on the monitored network communications associated with a user based on a behavior profile for the user; and performing an action in response to the detected anomalous activity based on a policy.
B1
Palo Alto Networks, Inc.
Gregory Grzegorzyk, Tim Treat, Cyrus Ziaeian

Patents by Year

Inventors

Assignees

Assignees

Science

Data limited by 2021

Top 10 cited papers

#Paper TitlePaper AbstractAuthorsFields of StudyYearCitation Count
1
Threat prevention mechanisms of Ukraine’s economic security
Introduction. The article grounds the necessity to introduce and implement organisational and economic threat prevention mechanisms of economic security of Ukraine’s national economy. It is emphasised that the issues related to the provision of the economic security of the national economy have already arisen. Such mechanisms should eliminate and neutralise negative impacts on the national economy. The purpose of the article is to suggest and describe threat prevention mechanisms relevant to the economic security of the national economy, which involves the introduction of tactical measures of a preventive nature. Methods. The theory of the governmental economic policy of growth is the basis of the fundamental research methodology. Methods of theoretical generalisation were applied to study and systematise public policy concepts to ensure economic security. The authors used functional and conceptual approaches. The system structural analysis was applied in the study of priorities in ensuring the economic security of the national economy. Results. The organisational and economic threat prevention mechanism of the economic security of the national economy presented in the article allows rapid adjustment of state economic policy. Based on the information about its effectiveness with regard to the feedback received from civil society, the relevant mechanism is of particular importance in the integration of the national economy into the global economy. Conclusions. The abovementioned mechanism is formed on the basis of advanced control by using methods of scenario modelling. It enables us to choose the best and most effective ways of forecasting possible consequences and aims to prevent the destructive impact of potential threats on the economic security system of the national economy.
Political Science, Economics
2016
32
2
Security Breaches and Threat Prevention in the Internet of Things
Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.
Business, Computer Science
2017
13
3
Artificial Intelligence Based Threat Prevention and Sensing Engine: Architecture and Design Issues
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computing systems based on intelligent techniques that support continuous monitoring and controlling plant activities. Intelligence improves an individual's ability to make better decisions. The base of the research is the Artificial Intelligence coming in a help to build a modern Intelligent Threat Prevention and Sensing Engine where two factors form the critical points one is intelligent packet inspection because of lack of time for full packet inspection in nowadays huge dataflow. And second is intelligent first reaction against the hacker activities, because later would be too late.
Computer Science
2008
5
4
Context-aware web security threat prevention
This paper studies the feasibility of an early warning system that prevents users from the dangerous situations they may fall into during web surfing. Our approach adopts behavioral Hidden Markov Models to explore collective intelligence embedded in users' browsing behaviors for context-aware category prediction, and applies the results to web security threat prevention. Large-scale experiments show that our proposed method performs accuracy 0.463 for predicting the fine-grained categories of users' next accesses. In real-life filtering simulations, our method can achieve macro-averaging blocking rate 0.4293 to find web security threats that cannot be detected by the existing security protection solutions at the early stage, while accomplishes a low macro-averaging over-blocking rate 0.0005 with the passage of time. In addition, behavioral HMM is able to alert users for avoiding security threats by 8.4 hours earlier than the current URL filtering engine does. Our simulations show that the shortening of this lag time is critical to avoid severe diffusions of security threats.
Computer Science
2012
5
5
A biological threat prevention strategy : complicating adversary acquisition and misuse of biological agents : a report of the CSIS Defense and National Security Group
A contradiction sits at the core of U.S. biological threat prevention policy. Despite the U.S. government accepting the scientific and industrial costs of a domestic biosecurity system, it has not committed the diplomatic and financial resources needed to successfully promote the global adoption of similar systems. While the safety and security of biological pathogens within the United States are important national goals, their pursuit has the potential to impede another crucial goal: a robust research and commercial enterprise. To make matters worse, domestic policies are insufficient to fully protect U.S. citizens, since they provide limited protection from attacks launched with pathogens brought into the United States from abroad. Biosecurity has become a global problem. With the rapid spread of technology and know-how, attacks that originate from less-regulated locales outside the United States are becoming increasingly serious risks to U.S. national security. This means that the United States is bearing the full costs of domestic bio threat prevention without attaining the benefits of a thorough global prevention system.
Political Science
2013
2
6
A Multi-Tiered Framework for Insider Threat Prevention
As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.
Business, Computer Science
2021
2
7
A Model-based Checklist for Insider Threat Prevention
There are some psychology measures for the organization to evaluate the mental status of the employees in Taiwan, but those measures cannot detect the insiders. The purpose of this study is to develop a checklist for the supervisors or unit heads that can apply to ensure the organization safety. Based on the model for causes of specific precursor and organization safety that structured by this study and analysis of the insider threat events by literature review, before the insiders try to execute the major malicious activity, there are some precursors. And those precursors are caused by different factors. If those precursors can be detected and be handled before the insider takes further acts, hazard will not happen. At first, this study implements Chinese Basic Personality Inventory (CBPI) to figure out the similarities and differences of mental condition between the employees in certain company and the others, and takes place the structured interview to understand if the employee in certain company have stress what the strategies the supervisors will take. Then, the model for causes of specific precursor and organization safety is structured and the checklist is developed based on this model. The checklist is divided into two parts. One part is the strategies those are took to prevent risk happen, and the other part is the precursors those insider threats appear. Then, the structured interview with experts is taken place to modify those strategies and precursors in the checklist and to possess expert validity. Finally, the questionnaire is implemented to evaluate the reliability of the checklist. The experts are recruited to evaluate this checklist to possess content validity. According to the high Cronbach’s alpha of the questionnaire (0.961), the reliability is acceptable. This checklist can be applied to the organization departments to help the supervisors to have a concept of the relationship between the precursors and the organization safety. It is helpful for the supervisors to check if there are potential insiders in their organization. Some strategies can be taken to ensure the safety of the organization. This study focuses on how to develop a checklist for insider threat prevention and applying this checklist is necessary for the further study.
Business, Psychology
2010
0
8
An Intelligent Threat Prevention Framework with Heterogeneous Information
Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects' intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect's further actions towards critical assets. However, in the literature, these three issues are seldomly considered together in a sensor network based intelligent surveillance framework. To address this problem, in this paper, we propose a multi-level decision support framework for in-time reaction in intelligent surveillance. More specifically, based on a multi-criteria event modeling framework, we design a method to predict the most plausible intention of a suspect. Following this, a decision support model is proposed to rank each suspect based on their threat severity and to determine resource allocation strategies. Finally, formal properties are discussed to justify our framework.
Computer Science
2014
0
9
Design of a priori threat prevention embedded in in-house application / Faiqah Hafidzah Halim
As application grow in size, complexity, and heterogeneity in response to growing computational needs, it is increasingly difficult to build a system that satisfies all requirements and design constraints that it will encounter during its lifetime. Furthermore, many of these systems are required to run continuously, disallowing downtimes while code is modified. As a result, it is important for an application to adapt in response to new requirements and environmental conditions after it has been deployed. Due to their high complexity, adaptive and autonomic systems are generally difficult to specify, design, verify and validate. Embedded Audit Module (EAM) is modules code built into application programs that are designed to captureaudit-related information on an ongoing basis. EAM provides the ability to capture data changes within a system. The implementation of the audit module in in-house developed information system can lift the burden from IT auditor and database administrator in managing the sensitive data and to track and monitor any unauthorized database transaction. This study, therefore, offers an attempt to design a priori threat prevention embedded in in-house application system. In order to achieve the aim of this research, the verified requirements for Embedded Audit Module were generalized. Lastly, the design of EAM was proposed. The processes involved were identifying and planning the research, data collection and lastly design the EAM according to the requirements captured. This research has produced the Software Design Document to communicate the design of EAM. The design of EAM produced can be used in order to lessen the threat towards the in house developed information system and reduce the work to be done by IT Auditor and DBA.
Computer Science, Engineering
2014
0
10
Modelling domain-specific knowledge for optimizing threat prevention in multiplex networks
COST STSM Reference Number: COST-STSM-IC1404-35588 Period: 2016-11-07 to 2016-12-06 COST Action: IC1404 STSM Applicant: Dr Krzysztof Michalak, Wroclaw University of Economics, Wrocław (PL), [email protected] STSM Topic: Modelling domain-specific knowledge for optimizing threat prevention in multiplex networks Host: Yamir Moreno, Institute for Biocomputation and Physics of Complex Systems (BIFI), Universidad de Zaragoza, Zaragoza (ES), [email protected]
2016
0

Top 10 cited authors

#AuthorPapers countCitation Count
1
1
55
2
1
55
3
1
55
4
1
55
5
1
55
6
1
45
7
1
45
8
1
33
9
1
33
10
1
32

Science papers by Year

Clinical Trials

  • Researches Count 0
  • Ongoing Studies 0
  • Total Enrollment

Use Cases

#TopicPaper TitleYearFields of studyCitationsUse CaseAuthors
1
Threat Prevention
Security Threat Prevention For Voip Networks
2015
Business, Computer Science
0
voip networks

Case Studies

#TitleDescriptionPDFYearSource Ranking
1
Check Point Comune Di Avezzano Threat Prevention Mobile ...
Jan 1, 2020 — L'Aquila, in Abruzzo. However, Avezzano has recently faced natural disasters being located in an earthquake prone area.
yes
2020
1 030
2
How to Prevent Insider Threat Incidents: A SunTrust Case Study
Apr 26, 2018 — As if those numbers weren't enough of an eye-opener, just this week, regional banking giant SunTrust experienced a major potential malicious ...
no
2018
190
3
Check Point AUSL Piacenza Healthcare Threat Prevention ...
has 2,000 users and supports 30 external services. The computing power of AUSL. Piacenza is provided by two data centers located on one campus.
yes
1 030
4
Check Point Samsung Mobile Threat Prevention Customer ...
Check Point Samsung Mobile Threat Prevention Customer Case Study. 3 of 4. Download. Check Point Samsung Mobile Threat Prevention Customer Case Study ...Missing: e ‎| Must include: e
no
1 030
5
Vology & Sky Advanced Threat Prevention Case Study
As the magnitude of cybercrime increases, managed IT services provider Vology recognized that traditional, reactive security technologies would not protect ...
no
440

Experts

Twitter

#NameDescriptionFollowersFollowingLocation
1
CyberMDX
CyberMDX, a pioneer of #MedDeviceSecurity, delivers unmatched visibility and threat prevention #cybersecurity for #medicaldevices and clinical assets.
1 186
573
New York, NY
2
Trinity Cyber
Advanced network threat prevention. Gartner Cool Vendor for Network 2020. Protecting your world better, differently—and with a near zero false detection rate.
493
212
-
3
Ofir I
Father | Cyber security enthusiast | VP Threat Prevention Products @CheckPointSW. Opinions are my own.
152
214
Tel-Aviv, Israel
4
Cyber Chasse Inc
Cyber Chasse’s security solutions help in threat prevention, detection and response.#CyberSecurity
113
123
Florida

Youtube Channels

#NameDescriptionReg DateViewsCountry
1
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, business, and government environments, Bitdefender is the industry’s trusted expert for eliminating threats, protecting privacy and data, and enabling cyber resiliency. With deep investments in research and development, Bitdefender Labs discovers 400 new threats each minute and validates 30 billion threat queries daily. The company has pioneered breakthrough innovations in anti-malware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 150 of the world’s most recognized technology brands. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world. For more information, visit https://www.bitdefender.com
Sun, 12 Oct 2008
46 596 325
2
HEY! JUST BECAUSE WE'RE BUSY MAKING THE VERY BEST ANTIVIRUS SOFTWARE ON THE PLANET DOESN'T MEAN WE DON'T HAVE SOME TIME FOR SOME FUN! BitDefender is the creator one of the industry's fastest and most effective lines of internationally certified security software. Since our inception in 2001, BitDefender has continued to raise the bar and set new standards in proactive threat prevention. Every day, BitDefender protects hundreds of millions of home and corporate users across the globe—giving them the peace of mind of knowing that their digital experiences will be secure. BitDefender solutions are distributed by a global network of value-added distribution and reseller partners in more than 100 countries worldwide.
Sat, 13 Sep 2008
143 147
3
Egnyte provides the only unified cloud content governance solution for collaboration, data security, compliance, and threat prevention for multicloud businesses. More than 17,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere. Investors include GV (formerly Google Ventures), Kleiner Perkins, Caufield & Byers and Goldman Sachs. For more information, visit www.egnyte.com.
Tue, 10 Aug 2010
121 812
United States
4
Established in 2009, Qilootech is a manufacturer of security scanner systems. Our products include full body scanner, baggage scanner, and specialy body parts systems including stomach, limb, and shoes. Qilootech is focused in fields of micro-dose x-ray, nuclear quadrupole resonance, microwave detection, and 3D face recognition technologies. Qilootech is dedicated in providing contraband detection and threat prevention solutions for our global clients.
Mon, 8 Nov 2021
159
5
1. THREAT PREVENTION - Heimdal™ Threat Prevention - Network - Heimdal™ Threat Prevention - Endpoint 2. PRIVILEGES AND APPLICATION CONTROL - Heimdal™ Privileged Access Management - Heimdal™ Application Control 3. VULNERABILITY MANAGEMENT - Heimdal™ Patch & Asset Management 4. EMAIL PROTECTION - Heimdal™ Email Fraud Prevention - Heimdal™ Email Security 5. ENDPOINT DETECTION - Heimdal™ Next-Gen Antivirus & MDM - Ransomware Encryption Protection 6. SERVICES - Endpoint Prevention Detection and Response (EPDR) - Extended Detection and Response (XDR)
Sun, 23 May 2021
63