Product categories
- Application Security
- Automotive Cyber Security
- Cloud Access Security Broker
- Cloud Security
- Cyber Security Services
- Data Security
- Endpoint Security
- Forensics
- Governance Risk Management & Compliance
- Infrastructure Security
- Mobile Security
- Network Security
- Password Manager
- Patch Configuration and Management
- Secure File Transfer
- Secure Web Gateway
- Security Information and Event Management
- Security Training Software
- Unified Threat Management
- User Security
- VAPT
-
Accops HySecure: ZTNA-based Application Access Gateway
ZTNA-based Access Gateway to reduce attack surface even in a perimeter-less hybrid work environment.Rated 2.20 out of 5Accops HySecure: ZTNA-based Application Access Gateway
ZTNA-based Access Gateway to reduce attack surface even in a perimeter-less hybrid work environment. -
Impero Connect
$12.00 – $35.00 / yearImpero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
Rated 2.67 out of 5Impero Connect
Impero Connect (Formerly Netop Remote Access)- Remote Access for Retail, POS
- Remote Support and Secure Access for ATMs and Banks
- Remote Access for Production Technology
- Remote Control for BPO
- Remote Support for large organizations
- 256-bit AES encryption
- Centralized multi-factor authentication
- Multi-factor authentication through Microsoft Azure, RADIUS, RSA SecurID and Smartcards
- MAC or IP list-enabled machine access
- Complete logging with customizable audit trails and session recordings
- Exceeds PCI, GDPR, ISO & HIPAA compliance requirements for authentication & encryption
- Integration with Directory Services
- Access parameters for specific end users or devices
- Granular control over all user permissions through individual or group definitions
- Closed User Group license keys
- Customizable security roles
- Automatic locking or logging of remote machines in case of abnormal disconnection
- Restrict user access with application white-listing
$12.00 – $35.00 / year -
Network Configuration & Firewall Rules Review
$100.00Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.Rated 2.00 out of 5Network Configuration & Firewall Rules Review
Category: Network Access Control Network Behavior Analysis and Anomaly Detection Network Firewall (includes Next Generation Firewalls) Network Monitoring and Forensics |Network architecture security review helps in identifying weaknesses & gaps of existing security controls and to comparing their alignment with the organization’s security objectives. Firewall Security audit checks for vulnerabilities, firewall configuration, and security policy.