Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to monitor incoming and outgoing web content to prevent threats. - Create and enforce organizational web safety policies - Detect and block malware, viruses, and other malicious content - Restrict access to dangerous or fraudulent web content
33 results
Akamai's Enterprise Threat Protector (ETP) is a secure web gateway (SWG) that proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks, ensuring users and devices can safely connect to the Internet.
Afin de répondre aux enjeux critiques de confidentialité, d’intégrité, de traçabilité et de disponibilité toujours plus élevés, il est primordial d’accompagner votre transformation digitale au travers de trois axes : protéger, auditer, connecter. Nos solutions de sécurité pour la mobilité assurent la protection des données sensibles des smartphones et tablettes. Nos solutions pour la sécurité du cloud permettent de contrôler l’accès ou la propreté des données. Les « security analytics » rendent l’entreprise plus proactive et mieux défendue en collectant et reliant tous les événements de sécurité. NXO certifié ExpertCyber, assure votre cyberdéfense.
Accops HySecure is a Zero Trust-based Application Access Gateway that allows your workforce to safely log in to corporate applications and desktops, and access private applications they need to be efficient and productive. HySecure removes barriers in terms of device, network and location, and lets your employees explore endless possibilities with utmost agility. Users can easily switch devices, move from trusted LAN to untrusted WAN, connect to internet or mobile network, and choose among browser, desktop client or mobile app to suit their requirements. With HySecure, organizations can identify malicious login attempts based on geolocation details which imply unrealistic and impossible travel activity by users. HySecure also helps in identification of suspicious activities by providing real-time geographical heat maps.
Users access countless websites and shadow IT, each destination challenging data protection, threat protection, and user productivity. Only Bitglass’ SmartEdge on-device Secure Web Gateway delivers security, performance, privacy and low overhead for the distributed workforce.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Monitoring and Control of Every Web Session: LayerX analyzes web sessions at the utmost granular elements to prevent attacker-controlled webpages from performing malicious activities and users from putting enterprise resources at risk, without disrupting their legitimate interactions with websites, data and applications
AmZetta zGateway provides highly secure remote access to virtual apps and user data from any device or network. With a simple deployment process and a rich feature set that includes elements such as geofencing, zGateway offers secure access without the need of complex networking configurations. Deliver a simple and seamless experience to workers while maintaining complete control and security of all corporate applications and resources with zGateway.
Reblaze provides full protection for APIs: web services and microservices, mobile/native APIs, and more. How? A client-side SDK ensures mobile/native application traffic is TLS encrypted and continuously authenticated. All communications include an HMAC signature to harden communications between the application and the endpoint, ensuring that only requests from legitimate users are accepted. API schema ingestion, validation, and enforcement provides automated protection. Reverse-engineering prevention stops API attacks in their earliest stages. Dynamic and adaptive traffic recognition allows Reblaze to reshape its security posture in response to changes in traffic structure. As an API evolves, Reblaze creates new rulesets automatically, and administrators can accept, reject, or modify them as needed. Cloud-native platform includes a full API for programmatic control of Reblaze itself, enabling IaC and other forms of automation
Allow the good. Block the rest. About the product: Reblaze includes full bot mitigation in its comprehensive web security platform. Hostile traffic is blocked in the cloud, before it reaches the protected network. Web applications and API servers receive only legitimate requests. They remain secure, responsive, and performant. Multivariate Bot Detection allows incoming web traffic to be subjected to a series of increasingly stringent challenges. Failure of any challenge results in that requestor being immediately blocked from network access. How? 1. a. Profiling ACLs b. Profiling Browser Environments 2. Primary Filtering 3. Dynamic Filtering 4. Biometric Behavioral Analysis Reblaze also includes a full positive security model, and ingests web and API schemas for enforcement. A full API provides programmatic control, allowing rapid schema additions or revisions in DevOps and DevSecOps environments.
C4ISTAR Gateway The C4ISTAR gateway supports and automates your data management as your trusted portal for import and export of data. Supporting automated and manual release and import of data, it’s built on hardware-based Data Diode technology which guarantees continued network separation with no possible backflow. The Gateway has the highest Cyber Security certification in the world, Common Criteria EAL7+ Accredited for NATO SECRET and EU SECRET. The Ruggedized version is built to operate in the battlefield under the most challenging conditions. All units are 1U 19”/2 and a full gateway is only 3U (UPS and power supply excluded) equipped with NATO standard connectors and designed for vehicle mount. The C4ISTAR Gateway is designed as a platform, enabling customisation of security profiles, filters and add-ons. The robust and open API of the Gateway allows you to program and build your own national security profile independent from any contractor support, offering paramount security.