168 résultats
Filtrer les résultats (168)
Types de licence
Déploiement
Catégories connexes
- Logiciels DLP (Data Loss Prevention)
- Logiciels de cryptage
- Logiciels de cybersécurité
- Logiciels de gestion informatique
- Logiciels de renseignements sur les menaces
- Logiciels de sécurité dans le cloud
- Logiciels de sécurité informatique
- Logiciels de sécurité réseau
- Logiciels pour la sécurité du réseau
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Enables endpoint security control providing behavior-based detection and analysis of malware.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Hypori is a highly secure virtual BYOD smartphone solution with 100% separation of personal and enterprise data and zero footprint.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of personal and enterprise data. Hypori is centrally managed, cost-effective, and keeps all apps running in the data center. Hypori makes truly secure BYOD a reality.
Hypori Virtual Mobility is a highly secure virtual smartphone solution that lets users perform business tasks on their mobile devices while leaving zero footprint and guaranteeing 100% separation of...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Enable administrator to oversee and centrally manage inventory, software distribution, settings and security for Macintoshes.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining software, enabling different system environment for various teaching scenarios, eliminating security threats, distributing settings, and analyzing inventory data etc.
It enables administrators to oversee and centrally manage up to 1000 Macintoshes at one time.
OS-Easy MMS is a comprehensive management system for iMac and Macbook. With MMS, IT Technicians can manage the software environment of all macOS computers. This includes deploying and maintaining...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Reduce the challenges of todays IT environment and improve working practices to protect critical information with Endpoint DLP.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable devices can connect to a company network. The second is to regulate what company data (or files) can be copied to removable media, and encrypt it (if necessary). The third is a data at rest scanning capability which locates where critical information is stored across a network.
The Clearswift Endpoint Data Loss Prevention (DLP) solution offers three key components that can be deployed together or individually. The first is to gain visibility and control of what removable...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Identifiez les menaces et appliquez la stratégie mobile dans l'environnement d'entreprise avec Mobile Defense Enterprise Console.
Identifiez les menaces et appliquez la stratégie mobile dans l'environnement d'entreprise avec Mobile Defense Enterprise Console.
Identifiez les menaces et appliquez la stratégie mobile dans l'environnement d'entreprise avec Mobile Defense Enterprise Console.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Network security platform that helps businesses prevent malware, ransomware, and other network attacks from impacting firms.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running.
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Safely open files, emails, and web sites you don't trust in a secure quarantine environment that can be accessed on your computer.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
MyDiamo
(0)
The best choice for enterprises or SMB/SMEs looking for an all-inclusive, high-performing, and GDPR-compliant encryption solution
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for enterprises and even non-profit organizations. MyDiamo column-level encryption comes with access control functions, allowing users to monitor and audit data easily, without any code modification required.
MyDiamo is a comprehensive encryption solution for opensource databases like MySQL, MariaDB, Percona, and PostgreSQL. The free version, as well as commercial license, are both available for...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Absolute
(0)
Produit local
Plateforme basée sur le cloud qui offre visibilité, contrôle et sécurité de tous vos points de terminaison, données et utilisateurs.
Plateforme basée sur le cloud qui offre visibilité, contrôle et sécurité de tous vos points de terminaison, données et utilisateurs.
Plateforme basée sur le cloud qui offre visibilité, contrôle et sécurité de tous vos points de terminaison, données et utilisateurs.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Mobile information management solution that offers endpoint data protection, backup, access, control, and sharing.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
End point & mobile security powered by deep learning. Unmatched prevention technology in a single platform. Any file type, any device.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Silverbolt
(0)
Produit local
Un service de cybersécurité optimisé par IA (intelligence artificielle) et de protection des points de terminaison.
Un service de cybersécurité optimisé par IA (intelligence artificielle) et de protection des points de terminaison.
Un service de cybersécurité optimisé par IA (intelligence artificielle) et de protection des points de terminaison.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
REVE Endpoint Security software provides advanced protection for all endpoints of an organization.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.
REVE Endpoint Security software provides advanced protection for all endpoints of an organization, which are the Launchpad of malware attacks.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Cybersecurity platform that helps managed service providers with threat hunting, forensic details, endpoint detection, and response.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Humming Heads Evolution DLP (data loss prevention) includes:
1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization.
2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing.
3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted.
4. Operation History: Records every detailed user and program action on all PCs.
Humming Heads Evolution DLP (data loss prevention) includes:
1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization.
2. Whitelist Protection: Advanced...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Ziften
(0)
Cloud-delivered endpoint protection platform, simplifying your Endpoint Protection + Visibility.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection, (2) complete investigation, (3) the most flexible response, plus (4) security posture analysis.
The result is simplified endpoint protection to easily stop cyber-attacks with the people and budget you already have.
Unlike products with complex endpoint technologies that fail to stop attacks, and provide little to no investigation and response capabilities, Zenith delivers (1) best-in-class zero-day protection,...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Securden
(0)
L'un des logiciels de cybersécurité les plus sécurisés conçus pour les grandes entreprises.
L'un des logiciels de cybersécurité les plus sécurisés conçus pour les grandes entreprises. Grâce à une approche inédite, Securden offre un contrôle complet des accès privilégiés, une visibilité intégrale et une gouvernance d'accès supérieure dans les environnements cloud, physiques et virtuels.
L'un des logiciels de cybersécurité les plus sécurisés conçus pour les grandes entreprises. Grâce à une approche inédite, Securden offre un contrôle complet des accès privilégiés, une visibilité...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
DX Cloud
(0)
Instart Web Security provides advanced protection from sophisticated cyber attacks to secure your web apps.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps can be protected and secured with Instart Web Security. Instart provides protection across the entire traffic path for your application from inside the browser where customers and attackers interact with your site, to the edge, all the way to your cloud or physical application infrastructure.
Instart Web Security is designed to secure your web apps from the dangers of the public web. All entry points into your application servers, whether it be your website, your APIs, or your web apps...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Multi-layer endpoint solution, enabling manufacturers to secure and monitor high-value IoT devices, including 3rd party components.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices.
Sternum's EIV (Embedded Integrity Verification) prevents cyber-attacks instantly with detecting vulnerability exploitation, including ones originated in 3rd party components.
With seamless integration to a variety of development environments, EIV is a highly scalable solution that gives manufacturers the ability to secure their IoT devices from end-to-end.
Like the Sternum bone in the human body, Sternum's goal is to provide reliable on-device and real-time protection to IoT endpoint devices.
Sternum's EIV (Embedded Integrity Verification) prevents...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Prevent cyber attacks against your endpoints with the use of multi-engine agent, machine learning, and behavioral analytics.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
La solution de sécurité des points de terminaison, adaptée aux petites et grandes entreprises, permet de protéger les données contre les logiciels malveillants, les ransomwares, etc.
La solution de sécurité des points de terminaison, adaptée aux petites et grandes entreprises, permet de protéger les données contre les logiciels malveillants, les ransomwares, etc.
La solution de sécurité des points de terminaison, adaptée aux petites et grandes entreprises, permet de protéger les données contre les logiciels malveillants, les ransomwares, etc.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
enSilo
(0)
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Protect endpoints, stops data breaches in real-time and automatically orchestrates incident investigation and response.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Endpoint management suite that helps businesses manage device data, automate deployments and resolve user issues on a unified platform.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Security and risk management software to find solutions.
Security and risk management software to find solutions.
Security and risk management software to find solutions.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.
Password lock your USB Drive on Android & Windows computers.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Cloud-hosted managed service for monitoring and threat hunting
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with unparalleled digital security, forensic investigation capabilities and trained investigators who continuously scan for suspicious activity and provide a hands-on analysis of potential threats undetectable by automated tools.
Discover and react to cyber risks that have bypassed other layers of defense with tiered managed services. Instant Response protects intellectual property, customers, employees and stakeholders with...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
The first software-only solution for high-trust operations from insecure IoT devices. Secure any key, anywhere.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and one on a remote server. This ensures that keys on endpoint devices always remain secure -- even in the presence of malware or a malicious actor fully controlling the device.
Unbounds CoT protects any local key on an endpoint device by eliminating the single point of compromise. Key material is never whole; each key exists as two random key shares one on the device and...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
SAM
(0)
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.
Helps to protect routers from unauthorized use with virtual hot-patching.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
zIPS
(0)
zIPS secures BYOD and corporate-owned mobile devices while protecting user privacy so that employees can safely access enterprise data.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure.
It provides comprehensive protection against Devices, Networks, Applications, and Phishing vectors.
It provides visibility into and protection against vulnerabilities, threats, and attacks on mobile devices.
KEY PARTNERS: Google, Microsoft, Oracle, McAfee, MobileIron, Samsung, Motorola, VMWare, Blackberry.
Zimperium zIPS is a Mobile Threat Defense (MTD) platform that helps enterprises ensure that mobile devices and mobile apps accessing their data and systems are safe and secure.
It provides...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Validator
(0)
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Enables IT admins to implement Group Policy Objects in a more reliable and efficient manner.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Capsule8
(0)
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Helps businesses protect their Linux infrastructure.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
ConfigOS
(0)
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
ConfigOS is a domain-independent software application for authoring, remediating, & reporting on STIG and CIS compliance policies.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.
Web application security software product to protect web sites and web applications from attacks.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
It is an endpoint protection solution that helps users detect malware, block applications, identify phishing activities and more.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Silo
(0)
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Web isolation platform that offers local IP address access, data collection, data policy embeds, secure web access, and more.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
SEAP
(0)
Behavioral-based In-App Protection solution designed to protect web and mobile apps from the inside.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP provides a unique, integrated powerful solution to manage fraud and security risks of online digital services. The solution aims to collect information, identify security threats by analyzing the context, the user interaction with the device, and the environment within the application.
SEAP (Smart Endpoint Application Protection) is the XTN's Behavioral-based In-App Protection solution. Extending anti-fraud controls at the endpoint level for both web and mobile channels, SEAP...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
aiden
(0)
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fully-automated patch management, software deployment, and endpoint security solution for Microsoft networks.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Web-based security solution that helps businesses monitor devices, create event logs, set security parameters for entire VPN & more.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Endpoint protection solution that helps businesses select security parameters to encrypt and protect web applications.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Endpoint protection solution that helps create whitelists, block malicious applications, and provide temporary access to certain apps.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
MyUSBOnly
(0)
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Endpoint protection solution that enables businesses to guard official data and protect it against viruses and spyware.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Crowdsec
(0)
CrowdSec is a security automation engine, using local IP behavior detection & leveraging our community-driven IP reputation database.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds of attacks. The solution also enables users to protect each other. Each time an IP is blocked, all community members are informed so they can also block it. The solution is being used in 100+ countries across all 6 continents.
CrowdSec is a free & open-source massively multiplayer firewall, relying on both IP behavior analysis and IP reputation. CrowdSec analyzes visitor behavior & provides an adapted response to all kinds...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
SIW
(0)
Produit local
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
System information tool that analyzes the computer and gathers system information based on software, hardware, network, and more.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Endpoint protection solution that enables businesses to monitor, view, and manage network-connected endpoints in real-time.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
IGEL OS
(0)
Endpoint OS for simple, smart, secure access to cloud workspaces.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to use and for the IT team to manage and control. IGEL OS is designed for secure, high-fidelity user access to cloud workspaces from any compatible x86-64 device located anywhere -- on the corporate LAN, from home, or anyplace else via an Internet connection.
Endpoint device OS for simple, smart, secure access to virtualized apps, desktops, and cloud workspaces. Linux based, modular, read-only next-gen edge operating system that is easy for end-users to...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Archon
(0)
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Protect & monitor endpoints anywhere your users work. Enterprise-grade cybersecurity built exclusively for Managed Service Providers.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Workplace
(0)
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising data security or regulatory compliance.
Our Workplace solution is the world’s most turnkey secure unified workspace, designed for regulated and security-minded organizations with networks of independent reps and agents.
Workplace by OS33 empowers employees to securely log in and work anytime and anywhere, with any app or device. It’s the freedom for a company to enable a flexible workforce - without compromising...
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.
Endpoint protection solution that helps businesses control encryption keys and secure data to prevent decryption of files.
Fonctionnalités
- Cryptage
- Liste blanche et liste noire
- Suivi des activités
- Gestion des appareils