Suggested Categories:

IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

5 Products for "xorg-macros" with 1 filter applied:

  • 1
    Actix Analyzer
    Enables per-session and per-OTT service type analysis for finding the cause of service performance problems affecting OTT services such as Facebook, Youtube and Whatsapp; and understanding when and where network features were available and used. Provides full IP layer decode and session analysis for building tailored KPIs. Enables validation of the indoor network and its interaction with the macro network. Geo-references RF measurements and events and visualizes venue layout. Generates KPI reports to evaluate the readiness of the in-building network ahead of launch. The world’s leading chipset and handset manufacturers use Actix Analyzer to validate the performance of new devices against a reference device. Also to automate the creation of complex KPI reports and investigate performance issues in detail.
  • 2
    Sublime

    Sublime

    Sublime Security

    Sublime alleviates the pain of traditional black box email gateways with detection-as-code and community collaboration. Binary explosion recursively scans files delivered via attachments or auto-downloaded via links to detect HTML smuggling, suspicious macros, and other types of malicious payloads. Natural Language Understanding analyzes message tone and intent and leverages sender history to detect payload-less attacks. Link Analysis renders web pages using a headless browser and analyzes content using Computer Vision for impersonated brand logos, login pages, captchas, and other suspicious content. ...
  • 3
    Wangsu Network Situational Awareness
    ...Supported by massive and continuous user access trajectory data, it effectively integrates and analyzes all threat intelligence, security incidents, etc., assesses the security of intrusion threats from a macro perspective, and helps companies effectively respond to unexpected new attacks. Real-time grasp of the latest security situation of the entire network and customer business.
  • 4
    ThreatAware

    ThreatAware

    ThreatAware

    ...When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 5
    ClusterSeven

    ClusterSeven

    Mitratech

    ...Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB