Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to deploy decoys to protect against attacks on computer systems and information. - Use attack data to identify and fix vulnerabilities within native IT assets - Deploy and manage traps, lures, and emulations to monitor behavior of attackers - Trigger alerts and automated analysis of malware to gain insights on internal vulnerabilities - Reveal navigation paths and protect against zero-day and other attacks with threat intelligence
11 results
The AXCELIOS Cyber-Insight solution empowers “Mission-Critical” business data in a secure, Air-Gapped 'VAULT' environment for recovery or analysis purposes. The Cyber-Insight Vault (CI Vault) is physically fully isolated from the production system or the network. AXCELIOS Cyber-Insight solution has been intelligently designed to monitor data replication processes from the production network to the isolated vault. This keeps the Network connection open “conditionally & dynamically” during data replication activities. This occurs automated secure Airgap network for business-critical data. During idle times, the AXCELIOS Cyber-Insight vault is secured with the network disconnected. Having a “Clean Backup” image is mandatory before any expected Cyber-Attacks and Ransomware catastrophic disasters. This enables businesses to run safe recovery processes. The entire activities should be instant, planned, and well-organized. Download AXCELIOS datasheet now: https://bit.ly/3NIMONc
Labyrinth Deception Platform changes an attack surface providing adversaries with an illusion of real infrastructure vulnerabilities. Each part of the imitated environment reproduces the services and content of a real network segment. The solution is based on Points - smart imitation hosts that mimic special software services, content, routers, devices, etc. Points detect all malicious activities inside a corporate network providing comprehensive coverage of all the possible attack vectors.
Thẻ tín dụng doanh nghiệp Bizzi x Shinhan là thẻ tín dụng thanh toán dành cho Doanh nghiệp tích hợp nền tảng quản lý chi phí thông minh do ngân hàng Shinhan phát hành hợp tác với Bizzi. Thẻ tín dụng doanh nghiệp Bizzi x Shinhan ngoài các chức năng thông thường, chủ thẻ sẽ nhận được các quyền lợi Shinhan và gói ưu đãi đặc quyền Bizzi.
Lupovis provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio. Gain targeted, contextual intelligence specific to your company. Stay steps ahead with insights that pinpoint insider threats, and pre-breach events such as leaked credentials. Dive into actionable intelligence without the distractions.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Inteligencia Artificial aplicada al Punto de venta: surtido, espacio y promociones. De la mano de nuestro partner tecnológico Pervasive Technologies y nuestro conocimiento del punto de venta hemos desarrollado una solución de IA orientada al reconocimiento de productos y materiales PLV en el punto de venta. El reconocimiento de imágenes en el punto de venta, te asegura: - Fiabilidad y objetividad en el dato. - Rapidez en la toma de información. - Más tiempo en funciones más estratégicas Aplicaciones: - En la gestión diaria del Punto de Venta. Para la toma de datos de presencia, precios, facings, altura o cuota de lineal. - En el control y chequeo de promociones vinculadas a incentivos, podemos asegurar con total fiabilidad el cumplimiento del acuerdo de manera objetiva. Permitiendo que el pago de incentivos o premios se base en los resultados realmente obtenidos. Webinar: https://www.youtube.com/watch?v=gdSfhXcXP4Y&t=6s.
DNSSense is a DNS Layer Security Platform focused on actively protecting all devices in the network against any type of malicious activity including phishing, ransomware, and zero-day attacks. DNSSense provides a detailed internet traffic analysis of all devices in the network including IoTs. Rule-Based SIEM integration provides filtered, enriched, and understandable DNS logs & threat intelligence to SOC teams which also decreases DNS EPS costs. DNSSense’s own threat database updates itself 24/7 by crawling the entire internet and categorise the entire internet’s domains by using its own AI with immense accuracy. Many Firewall vendors around the world benefit DNSSense’s threat database. Today, DNSSense is receiving the DNS traffic of more than 7000 companies and 1 million unique users from 76 countries, each day.
Fortify EDN is network-based threat deception that lures covert threat actors and insiders into engaging and revealing themselves. Fortify EDN deception technology deploys decoy systems, credentials, and data to lure in-network attackers and insiders into revealing themselves. The decoy systems mimic production assets and engage with attackers, recording their every action while feeding them fake data. Misdirections present fake results to AD queries. Fortify EDN deception deploys lures to endpoints that lead attackers to the decoy systems, misdirecting them away from production systems. Identify Active Compromise by snaring adversaries and insiders lurking anywhere in the network as they move laterally and interact with decoy assets and lures. See the Bigger XDR Picture by implementing ITDR and deception technologies that are complementary and integral to your organization’s EDR/XDR strategy.
R-Vision TDP – комплекс технологий цифровой имитации элементов ИТ-инфраструктуры для раннего обнаружения и предотвращения кибератак. С помощью набора ловушек и приманок R-Vision TDP детектирует присутствие злоумышленника, замедляет его продвижение внутри сети и дает возможность ИБ-специалистам остановить развитие атаки. Преимущества от использования: • обнаружение атак, которые невозможно детектировать другими средствами (целенаправленные атаки, угрозы нулевого дня и другие); • снижение скорости продвижения злоумышленника внутри сети за счет создания дополнительного слоя из эмулированных элементов; • возможность предотвращения атак на ранних стадиях до наступления значительного ущерба; • выявление слабых мест в защите, понимание инструментов и действий атакующего в отношении инфраструктуры организации.