Results for: dictionary attack - Page 9

Suggested Categories:

Attack Surface Management Platforms
Attack surface management (ASM) platforms enables organizations to monitor and manage their attack surface risk. Attack surface management software allows companies to view cyber risks and attack vectors related to external digital assets outside of their firewall. These platforms continuously scan and assess an organization’s digital infrastructure, including networks, systems, applications, and endpoints, to detect vulnerabilities, misconfigurations, and exposed assets that could be exploited by attackers.
Breach and Attack Simulation (BAS) Software
Breach and attack simulation (BAS) software is a cybersecurity tool designed to simulate real-world cyberattacks and security breaches within an organization's IT infrastructure. These platforms help organizations assess the effectiveness of their security controls, identify vulnerabilities, and improve their defense mechanisms. BAS software typically automates attack simulations, such as phishing, malware deployment, or exploitation of system weaknesses, to test the resilience of networks, endpoints, and applications. By providing continuous, real-time testing, these tools allow businesses to proactively identify and address potential security gaps before they are exploited by malicious actors. BAS software helps organizations strengthen their overall security posture by providing actionable insights into their security environment.
External Attack Surface Management (EASM) Software
External Attack Surface Management (EASM) tools are cybersecurity solutions designed to discover, monitor, and manage an organization's internet-facing assets and vulnerabilities.
Cyber Asset Attack Surface Management (CAASM) Software
Cyber Asset Attack Surface Management (CAASM) tools are designed to help organizations manage and reduce their attack surface.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Metadata Management Software
Metadata management software enables users and organizations to manage, identify, fetch, and analyze metadata. Metadata management software streamlines the processes involved with managing metadata.
Data Governance Software
Data governance software helps organizations ensure the quality, consistency, security, and accessibility of their data across the enterprise. These platforms provide tools for defining data policies, standards, and processes, ensuring that data is properly classified, managed, and protected throughout its lifecycle. Data governance software often includes features like data cataloging, lineage tracking, metadata management, and role-based access controls. It supports compliance with data protection regulations such as GDPR and HIPAA, helping businesses maintain regulatory compliance and avoid potential legal risks. By using data governance software, organizations can improve data integrity, enhance decision-making, and foster better collaboration across teams.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
DDoS Protection Services
DDoS protection services safeguard websites and online resources from Distributed Denial of Service (DDoS) attacks that flood networks with malicious traffic to disrupt access. These services use advanced filtering, traffic analysis, and rate-limiting to detect and mitigate large volumes of unwanted traffic, ensuring legitimate users can still access the site. DDoS protection often includes real-time monitoring, alerts, and automated responses to handle attacks swiftly and minimize downtime. By deploying DDoS protection, businesses maintain website performance and uptime, protecting user experience and brand reputation. Overall, these services provide a critical layer of defense against cyber threats that can otherwise lead to financial and operational losses.
Cyber Insurance Companies
Cyber insurance companies provide cyber security insurance and cyber liability coverage to organizations, which covers data breaches, hacks, and cyber attacks. Cyber insurance is essential for organizations that want to make sure they're covered against potentially costly cyber attacks and cybersecurity incidents. Cyber insurance brokers can assist organizations in finding the right coverage tailored towards their risks and needs.
View more categories (11) for "dictionary attack"

289 Products for "dictionary attack" with 1 filter applied:

  • 1
    Catalogic DPX

    Catalogic DPX

    Catalogic Software

    Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication...
  • 2
    XONA

    XONA

    XONA

    XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device. With integrated multi-factor authentication, user-to-asset access controls, user session...
  • 3
    Jihosoft Android Data Recovery
    ..., broken or lock screen, virus attack and etc. And then you can selectively recover deleted files from the Android phone's internal memory and memory card, including contacts, SMS messages, call logs, gallery photos, videos, music, audios, WhatsApp and Viber chat history, and other document files. All the contact information you have recorded on your SIM card or internal memory, phone number, name, email, company, job title, etc. can be recovered in VCF/CSV/HTML file.
    Starting Price: $49.95 one-time payment
  • 4
    ijura

    ijura

    ijura

    Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end...
  • 5
    Advanced File Recovery

    Advanced File Recovery

    Tweaking Technologies

    Advanced File Recovery is a program that can help you recover deleted video, music, documents, & other file types. Not only this, but Advanced File Recovery also displays a preview of contents for deleted or lost files, allowing you to recover what you need. Don't panic if you've lost media files from an SD card, USB device, hard drive, SSD, or Recycle Bin due to an OS crash, reformat, or virus attack. Advanced File Recovery is a program that can help you recover deleted video, music, documents...
  • 6
    wao.io

    wao.io

    wao.io

    ... the security and performance of your website. Watch your successes and configure the optimization features in your personal control panel. wao.io optimizes page size, images, and code structure of your website. Download and render times improve immediately. And all of that without any code changes. wao.io adds a layer of security to your website to avoid vulnerabilities. You and your users will benefit from the additional protection from attacks.
    Starting Price: €29 per month
  • 7
    EmailAuth.io

    EmailAuth.io

    EmailAuth

    ... email is caught and rejected by global recipients of the world. It even extracts the IP of the sender, so this threat intelligence can be used to block the attacker across your cyber security fabric (SOAR capable). #StopGettingPhished #BeSpoofProof
  • 8
    Shoviv Office 365 Backup Tool
    To protect the data against accidental deletion, malicious attack and inaccessibility in the case of network unavailability, Microsoft Office 365 backup becomes necessary. For this situation, Office 365 backup tool, i.e. Shoviv Office 365 Backup and Restore Tool, comes in handy. This Office 365 email backup tool helps in case of urgent accessibility of emails during downtime for any reason. It is a multipurpose, multi-feature advanced tool. This tool allows users to take backup in the prominent...
    Starting Price: $5 per month
  • 9
    DMARC Report

    DMARC Report

    DuoCircle

    A DMARC reporting solution for MSPs, service providers, and businesses who need to monitor and manage a large number of domains for DMARC compliance. Block malware and phishing attacks. Monitor domain security and boost deliverability with one easy-to-use platform. With DMARC Report, it’s super easy to monitor email configurations for suspicious activity and stop non-compliant emails before they hit inboxes. This high-volume tool can secure multiple domains for your clients or your...
    Leader badge
    Starting Price: $100/month/2 million emails
  • 10
    GBS iQ.Suite
    The use of collaboration tools and meeting platforms from vendors such as Microsoft and CISCO is constantly increasing, and with it the security measures that need to be taken. As more and more channels, more complex IT infrastructures and a large part of the platforms run entirely in the cloud, new gateways and attack vectors are emerging. While most organizations are constantly increasing their email security measurements, they often tend to overlook protection against malicious files...
  • 11
    MailRoute

    MailRoute

    MailRoute

    Stop Ransomware, spam and phishing, other viruses and threats for SMB, Enterprise, Healthcare, and Government agencies and contractors. API-level integration for Microsoft Office 365 & GCC High, Google Workplace, other email hosts and all servers. MailRoute stops email-instigated attacks on your information and hardware, with cost-effective, multi-layered protection. We offer CMMC, NIST 800-171, HIPAA, DFARS compliant and DISA accepted email security services. No single point of failure. Wholly...
    Starting Price: $2 per user per month
  • 12
    Sendmarc

    Sendmarc

    Sendmarc

    At Sendmarc, we understand the importance of DMARC compliance and have built a platform specifically designed to implement it quickly and seamlessly across your entire organisation. Our platform's interoperability allows for the easy assessment and proactive monitoring of data from multiple email service providers, ensuring that your company's entire email ecosystem is secure. By following our well-defined process, you can achieve full protection from email impersonation and spoofing attacks...
    Starting Price: $39
  • 13
    OpenSSH

    OpenSSH

    OpenSSH

    OpenSSH is the premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks. In addition, OpenSSH provides a large suite of secure tunneling capabilities, several authentication methods, and sophisticated configuration options. Remote operations are done using ssh, scp, and sftp. Key management with ssh-add, ssh-keysign, ssh-keyscan, and ssh-keygen. The service side consists of sshd, sftp...
    Starting Price: Free
  • 14
    Cubed Mobile

    Cubed Mobile

    Cubed Mobile

    ..., and advanced attacks. Strengthen security, smooth communication coordination, and ease management of BYOD with a new approach that anyone can set it up in two minutes! Create workspaces with different settings, apps, and access-rights based on user parameters. Let your admins invite and remove users, edit personal details, settings, and virtual lines, and filter lists of associated devices. Anytime you can remotely backup, restore, and wipe entire workspaces immediately.
    Starting Price: Free
  • 15
    OX Security

    OX Security

    OX Security

    .... Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.
    Starting Price: $25 per month
  • 16
    Osirium

    Osirium

    Osirium

    ... systems. For example, they can access valuable corporate IP, reveal personally identifiable information (PII), or control how customers, staff, and partners do their work. It's also worth considering the need to protect other accounts such as the corporate Facebook, Instagram, and LinkedIn accounts as improper use could cause significant reputational damage. It’s no surprise that these accounts are the most prized targets for cyber attackers as they are so powerful.
  • 17
    Raise Data Recovery

    Raise Data Recovery

    SysDev Laboratories

    ... or disk formatting, or a virus attack, a few clicks will be more than enough to get your data restored. It can recover a wide variety of files, including documents, videos, photos, images, audio files, PDF and other. As a cross-platform software, Raise Data Recovery can be easily installed on Windows, macOS or Linux and helps to access and recover data from all sorts of storage media formatted with FAT/FAT32, ExFAT, NTFS, ReFS, HFS+, APFS, Ext2-Ext4, ReiserFS, UFS and other file systems.
    Starting Price: $34.95/lifetime license
  • 18
    RecoverXData

    RecoverXData

    RecoverXData

    .../camera) SD card. Supports recovery of data lost due to deletion, formatting, partition loss, system problems, application crash, virus/malware attacks, power issues, slight hardware destruction, etc. on Windows 10, 8(.1), 7, Vista, and XP computers. Embedded with six data recovery modes, RecoverXData helps recover lost files from the PC desktop, recycle bin, hard drive, and external HDD/SD memory card/USB flash drive/camera as well as deleted or lost partitions efficiently.
    Starting Price: $29.96 per month
  • 19
    BDRCloud

    BDRCloud

    Vembu Technologies

    ... reducing setup and maintenance efforts. BDRCloud helps businesses keep their data secure and ensures it is easily recoverable in the event of data loss or ransomware attacks. With BDRCloud, you can achieve reliable data protection and maintain business continuity – all at an affordable price.
    Starting Price: $1.2/users/month
  • 20
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and new...
    Starting Price: Free
  • 21
    Securden Unified PAM MSP
    ... control. Reduce the attack surface by eliminating external and internal threats. Automate privileged access provisioning to reduce helpdesk load and eliminate unnecessary downtime. Deploy robust privileged access workflows and realize an increase in efficiency instantly.
  • 22
    Nutanix Unified Storage
    ..., cloud, or edge. Consumption-based model to tackle exponential growth in unstructured data while meeting performance requirements. Integrated data security and analytics provide deep data insights to prevent, detect, and recover from ransomware and cyber-attacks. Simplify management, automation, and availability with a consolidated data services platform. Extend Unified Storage platform across core, edge, or cloud while supporting multiple protocols to accommodate all your workloads and users.
  • 23
    PhishTitan

    PhishTitan

    TitanHQ

    Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity. Our proprietary large learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether...
  • 24
    RecoveryTools for SQL Server
    ... an object-level recovery instead of a full database backup. The checks performed by Microsoft SQL Server DBCC CHECKDB may fail due to issues such as file system corruption, driver issues, hardware failures, SQL Server engine issues, or page-level corruption in memory. The SQL Server database file becomes unusable due to a ransomware attack on the victim's system and is encrypted with a .wallet file extension.
    Starting Price: $249 one-time payment
  • 25
    Admin By Request

    Admin By Request

    Admin By Request

    With rapid provisioning of Just-In-Time privilege elevation across your entire workforce. On-board and manage workstations and servers via a user-friendly portal. To reveal risky users and assets through thread and behavioral analytics to identify malicious software and prevent data breaches and malware attacks. By elevating applications - not users. Delegate privileges based on the user or groups to save time and monetary resources. Whether a developer in the IT department, a tech newbie in HR...
  • 26
    Continuous Hacking

    Continuous Hacking

    Fluid Attacks

    Learn about security issues in your applications and systems through our platform. Learn details about each vulnerability, such as severity, evidence and non-compliant standards, as well as remediation suggestions. Assign users to remediate reported vulnerabilities easily and track progress. Request reattacks to confirm that vulnerabilities have been successfully fixed. Review your organizational remediation rate whenever you want. Integrate our DevSecOps agent into your CI pipelines to...
  • 27
    StepSecurity

    StepSecurity

    StepSecurity

    If you are using GitHub Actions for CI/CD and are worried about the security of CI/CD pipelines, StepSecurity platform is for you. Implement network egress control and CI/CD infrastructure security for GitHub Actions runners. Discover CI/CD risks and GitHub Actions security misconfiguration. Standardize GitHub Actions CI/CD pipeline as code files by automated pull requests. Provides runtime security to help you prevent SolarWinds and Codecov CI/CD security attacks by blocking egress traffic...
    Starting Price: $1,600 per month
  • 28
    Barracuda MSP

    Barracuda MSP

    Barracuda MSP

    Our portfolio of solutions enables you to build comprehensive security services that include prevention, detection, and response across attack surfaces such as email, endpoint, network, and more, creating layers of security around your customers’ data, users, and reputation. When partnering with us, you have one number to call when a security event occurs, although, we may call you first. Our team takes a proactive approach, enabling quick response and reducing the damage an event can have...
  • 29
    Codesphere

    Codesphere

    Codesphere

    ... end-to-end. Deploy anything from simple frontends to multi-service production landscapes and LLMs, including zero config autoscaling, replicas, and managed services. Codesphere has a 99,9% uptime, making your production ready before your 1st deploy. We work with enterprise teams around the globe to get their software teams to the next level. Codesphere utilizes a rootless zero-trust architecture, limiting exposure to attacks.
    Starting Price: $1 per month
  • 30
    Veritas Alta
    ... performance, availability, and cross-cloud mobility for the always-on business. Capture and visualize everything. Archive anywhere, and discover what matters most. Our flexible, cloud-native architecture combines artificial intelligence, automation, and elasticity to deliver the most cost-effective, resilient, and self-defending cloud data protection available. For ultimate cloud control, Veritas Alta provides visibility across your entire environment while reducing the attack surface.