Results for: dictionary attack - Page 6

Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
View more categories (11) for "dictionary attack"

289 Products for "dictionary attack" with 1 filter applied:

  • 1
    PrefixNE

    PrefixNE

    Prefix IT

    ..., providing protection from malware attack and data theft, without resorting to a blanket lock-down on USB ports. PrefixNE is the most cost-effective complete solution for the IT professional on the market. Providing all the functionality you need to secure and control your network assets rolled into one easy to use application, PrefixNE saves you time and boosts productivity at a highly affordable price.
    Starting Price: $394.94 one-time payment
  • 2
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection...
    Starting Price: $58.95/one-time/user
  • 3
    Lansweeper

    Lansweeper

    Lansweeper

    Discover your IT with Lansweeper, build your centralized IT Asset System of Record. With the Lansweeper Deepscan IP Scanner engine, you can audit all assets in your company network without installing software on them. Build an accurate network inventory of all your hardware, software and users. Scan Windows, Linux, and Mac devices. Keep track of your licenses, serial numbers and warranties of major brands like Dell, IBM, HP, Toshiba and many more. Detect Unauthorized Local Admins, unify...
    Starting Price: $495.00/year
  • 4
    Deskcenter Management Suite

    Deskcenter Management Suite

    DeskCenter Solutions

    ..., the future has become reality. Just one tool allows you to manage the monitoring, security, licensing, and software processes of your IT infrastructure. IT security is essential to IT management. You won’t have to worry about hacker attacks, unauthorized access, or data loss because Deskcenter Management Suite helps you take the right steps to address these issues quickly and in compliance with regulations.
  • 5
    N-able Mail Assure
    ... the Intelligent Protection and Filtering Engine. This combined with real-time pattern threat recognition leveraging a variety of filtering technologies help protect against spam, viruses, phishing attacks, impersonation, spoofing, malware, and other email-borne threats.
  • 6
    Invicti

    Invicti

    Invicti Security

    Application security is noisy and overly complicated. The good news: you can relieve that unnecessary noise and dramatically reduce your risk of attacks with Invicti. Keeping up with security is more manageable with accurate, automated testing that scales as your needs shift and grow. That's where Invicti shines. With a leading dynamic application security testing solution (DAST), Invicti helps teams automate security tasks and save hundreds of hours each month by identifying
  • 7
    Uptycs

    Uptycs

    Uptycs

    ... boundaries, delivering a more cohesive security posture. If you're looking for a powerful security solution that eliminates silos and tool sprawl, Uptycs is the answer. Looking for acronym coverage? We have you covered, including CNAPP, CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Start with your Detection Cloud, Google-like search, and the attack surface coverage you need today. Be ready for what’s next. Shift up with Uptycs.
  • 8
    Kentik

    Kentik

    Kentik

    Kentik delivers the insight and network analytics you need to run all of your networks. Old and new. The ones you own and the ones you don't. Monitor your traffic from your network to the cloud to the internet on one screen. We provide: - Network Performance Analytics - Hybrid and Multi-Cloud Analytics (GCP, AWS, Azure) - Internet and Edge Performance Monitoring - Infrastructure Visibility - DNS Security and DDoS Attack Defense - Data Center Analytics - Application Performance...
  • 9
    OnDMARC

    OnDMARC

    Red Sift

    OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but, combined with machine learning and excellent customer support, gets users to full protection quickly but sustainably. Some of our unique features include: - Investigate - View changes to your DNS live instead of waiting...
    Starting Price: $35.00/month
  • 10
    Xopero

    Xopero

    Xopero

    ... is data-driven companies are particularly threatened by this kind of cyber-attacks. Once it's happened even well-established companies rank big losses. Are you an MSP or Reseller looking for reliable Backup and Disaster Recovery? Boost recurring revenues, build a desirable cybersecurity services portfolio, and manage everything remotely. Professional backup and recovery solution #1 that protects your GitHub and Bitbucket repos and metadata.
  • 11
    Vinchin Backup & Recovery
    ... or migration, backup verification, cloud archive, offsite copy, ransomware protection and other data protection features. It prevents the loss of critical business data due to human misoperation, viruses, attacks, hardware failures, natural disasters, wars, etc.
  • 12
    ALTOSPAM
    ...-phishing and protection against denial-of-service attacks. In addition, this externalized antispam and antivirus software ensures a very high availability of you email services. Altospam is a full-service corporate email protection, integrating multiple security levels for your emails. ALTOSPAM not only blocks most unwanted emails, but mostly its antispam software has been designed to minimize false positives.
    Starting Price: $7 per user per month
  • 13
    Zoho Mail
    ... the visibility and authenticity it deserves. Zoho Mail's powerful Control Panel is the admin's go-to place for all settings, configuration, and customization. Add users, manage group aliases, set up policies to moderate business email content, and more. Retain emails across your organization for a specified period to comply with company standards and to counter legal attacks. e-Discovery helps discover such retained emails quickly.
    Leader badge
    Starting Price: $2.00/month/user
  • 14
    TrueDataShare

    TrueDataShare

    TrueDataShare

    TrueDataShare™ virtual data room combines advanced security and high speed with a beautiful and simple design. Built especially for corporate finance advisors, regulated industries and international companies. TrueDataShare™ is 40% faster than other leading virtual data room providers. You can access its functionalities in seconds and from different devices. TrueDataShare™ protects your data against cyber attacks and other external threat factors. Its strict control mechanisms ensure maximum...
  • 15
    Akamai

    Akamai

    Akamai Technologies

    Akamai keeps digital experiences closer to users than anyone — and keeps attacks and threats farther away. Powering the next frontier in digital transformation, the Akamai Intelligent Edge Platform is the defensive shield that can surround and protect everything — sites, users, devices, data centers, clouds. It is the technology that eliminates friction and enables immersion. A quarter of a million edge servers, deployed in thousands of locations around the world ingest 2.5 exabytes of data per...
  • 16
    SpamHero

    SpamHero

    iSparks

    Sender behaviors are tracked in real-time. The sender's reputation is weighed during the filtering process. Using spam traps around the world we are able to detect new spam attacks as they occur and adapt to them instantly. Never miss an important email. All spam is stored in a searchable quarantine. The process usually takes less than 5 minutes to get set up! In fact, you don’t even have to tell SpamHero what email addresses on your domain are valid. During your trial period, Spam...
    Starting Price: $5 per month
  • 17
    Checkpoint Anti-Spam and Email Security

    Checkpoint Anti-Spam and Email Security

    Check Point Software Technologies

    ...-based detection. Email IPS protection against Denial of Service (DoS), buffer over-flow attacks. Simplified configuration and management of mail security. Simple configuration with low management-overhead. Full user control with no user installation required. Real-time detection and updates provide immediate protection from outbreaks. Integrated into the Check Point Infinity Architecture. Activate Anti-spam and email security on any check point security gateway.
  • 18
    Nasuni

    Nasuni

    Nasuni

    The industry’s first ‘in-line’ edge detection combined with rapid ransomware recovery patent capabilities gives IT confidence to effectively mitigate cyber attacks. Nasuni is disrupting the file storage market with a cloud-based approach that replaces traditional on-premises primary and secondary file storage. Nasuni delivers a file storage platform that leverages object storage delivering a simpler, lower cost, and more efficient SaaS solution that scales easily to handle rapid unstructured...
  • 19
    DocRAID

    DocRAID

    AvailabilityPlus

    ... vulnerabilities and to harden critical infrastructures. Built-in cooperation with the German Federal Office for Information Security (BSI). Fragmentation, encryption and redundant distribution reduce your attack surface. DocRAID® is leading in CloudRAID technology. Fragmentation, encryption and redundant distribution protect your files during transport and at rest. Redundant distribution of encrypted data fragments to multiple jurisdictions adds an extra layer of protection.
    Starting Price: $24 per month
  • 20
    BackupAssist

    BackupAssist

    BackupAssist

    BackupAssist keeps you in business when disaster strikes. Survive cyber attacks, ransomware, natural disasters, hardware failures and user accidents with the right backup and a clear path to recovery. We specialize in only business-grade backup and data protection software for Microsoft Windows Server environments and Office 365. Provider of Cyber Resilience and Cyber Security solutions since 2002, to people and organizations in over 165 countries to properly backup and protect Windows Servers...
  • 21
    Unitrends MSP
    Attack the downtime problem without the hassle and anxiety of legacy backup. Switch to a solution built on 30 years of innovation with no upfront cost – making the promise of cloud economics achievable for every MSP. The Unitrends MSP Portal is built to give you complete visibility into your entire backup universe so you can monitor and manage everything from one place. Who has time to manage backups all day? The Unitrends MSP Portal is tightly focused on helping you address problems so you can...
  • 22
    SonicWall Email Security
    Protect against today’s advanced email threats using a cloud email security service. Email is the most common threat vector used by cyber criminals. Deploy the cloud-based service that protects your organization from advanced email threats such as targeted phishing attacks, ransomware, business email compromise (BEC) and email fraud. SonicWall solution reduces administrative overhead through easy deployment, management and reporting. The massively expanding, distributed IT reality is creating...
  • 23
    prooV

    prooV

    prooV

    ... and stakeholders. Red Cloud is the most comprehensive solution for red team testing new software. It is a tailored, cloud-based environment that gives you the flexibility to carry out complex cybersecurity attacks on any type of software you are testing.
  • 24
    Imperva Application Security Platform
    Imperva's Application Security Platform offers comprehensive protection for applications and APIs, addressing modern threats without compromising performance. The platform integrates Web Application Firewall (WAF), Advanced Bot Protection, API Security, DDoS Protection, Client-Side Protection, and Runtime Protection to safeguard against vulnerabilities and attacks. By leveraging advanced analytics and automated threat mitigation, Imperva ensures that applications remain secure across cloud, on...
  • 25
    Quixxi

    Quixxi

    Quixxi Security

    ... and recommendations to identify and fix vulnerabilities. SHIELD (RASP), on the other hand, is an application shielding tool that provides baseline security controls to protect the intellectual property in mobile apps and shield them against malicious attacks by third parties with one click. SUPERVISE is a runtime application monitoring tool that enables remote disabling, messaging, security logs, and customer analytics for better app management.
    Starting Price: $29 for One-Off plan
  • 26
    SKOUT

    SKOUT

    SKOUT Cybersecurity

    Cyber-as-a-Service for MSPs. Cyber risk is hard to explain, difficult to see, and expensive to manage for MSPs. SKOUT makes it easy to see your risk, makes cyber affordable, and we help MSPs sell it. SKOUT is a cloud-native, streaming data analytics platform built to deliver effective and affordable cybersecurity products for SMBs, delivered through MSPs. Cyber-attacks don't stop after 5pm. The SKOUT Security Operations Center is available 24x7, 365 days a year to help our MSP partners keep...
  • 27
    InterScan Messaging Security
    Trend Micro™ InterScan™ Messaging Security provides the most comprehensive protection against both traditional and targeted attacks. Using the correlated intelligence from Trend Micro™ Smart Protection Network™ and optional sandbox execution analysis, it blocks spam, phishing, and advanced persistent threats (APTs). The included hybrid SaaS deployment option combines a powerful gateway virtual appliance with a SaaS prefilter that stops majority of threats and spam in the cloud
  • 28
    BC-3

    BC-3

    RiskLogic

    Whether you’re hit by a cyber-attack or a natural disaster, how you manage business continuity will have a direct impact on your people , customers, brand, reputation, regulatory compliance and financial stability. To minimise disruption to your organisation, it is critical that you have a business continuity program that is up to date, well maintained and provides access to critical information. RiskLogic’s multi-award winning, online business continuity software – BC-3, will empower you...
  • 29
    Zorro VPN

    Zorro VPN

    WiFi Map

    Browse without any limitations all your favorite services. Shield your personal data from the prying eyes of authorities and hackers. Bypass geo-restrictions, closedowns, and digital censorship. Connect to everything in completely privacy. Using VPN for iPhone or iPad is a simple action in order to allow your device to connect to the Internet through secure VPN servers and to avoid a direct Internet connection. These actions provide security and protect you from cyber-attacks. No matter where...
    Starting Price: $6.49 per user per month
  • 30
     Acronis Cyber Protect Cloud
    Avoid downtime and data loss for your clients at a lower cost. Acronis Cyber Protect Cloud is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down. Next-generation cybersecurity. Advanced AI-based behavioral detection engine for zero-day attack prevention. Reliable backup and recovery. Full-image and file...