Search results: “software”

14 Products

Filters
  • Tenable

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.

  • A technology called document-signing software enables online document signing. There is no need for paper, printing, scanning, or faxing your documents because it employs an electronic signature.

  • cyber security

    Adobe Document Signing Certificates offered by Sectigo enable organizations to secure Adobe Acrobat documents with digital signatures. Certification originates from the Adobe Certified Document Services (CDS) or the Certificate Authorities that are members of the Adobe Approved Trust List (AATL).

  • cyber security - 76 % Off
    $ 350.00$ 610.00

    Sectigo OV Multi-Domain Wildcard SSL Certificates are unparalleled for their versatility. Because they feature both Multi-Domain and Wildcard functionality, you can encrypt your entire web portfolio with just a single certificate.

    Select options This product has multiple variants. The options may be chosen on the product page
  • cyber security - 50 % Off
    $ 250.00$ 687.00

    Sectigo Multi-Domain are Organization Validated (or OV) SSL certificates that enable encryption and turn on web browser trust indicators while offering validation of the identity of the organization that controls the certificate.

    Select options This product has multiple variants. The options may be chosen on the product page
  • cyber security - 50 % Off
    $ 400.00$ 1'100.00

    Sectigo Wildcard SSL are Organization Validated (or OV) SSL certificates that enable encryption and turn on web browser trust indicators while offering validation of the identity of the organization that controls the certificate.

    Select options This product has multiple variants. The options may be chosen on the product page
  • - 16 % Off
    $ 420.00$ 1'170.00

    Code Signing Certificates are used by software developers to digitally sign applications, drivers, executables and software programs as a way for end-users to verify that the code they receive has not been altered or compromised by a third party.

    Select options This product has multiple variants. The options may be chosen on the product page
  • Zero Trust Access for any user, from any device, and to any corporate resource     Secure Access Cloud Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access […]

  • Fortinet Identity and Access Management Fortinet Identity and Access Management Securely connect every identity to your resources and simplify management with enhanced user experience Overview Today’s business identity environments are made up of various systems of record ranging from networking devices, servers, directory services, and cloud applications. Managing an identity […]

  • Fortinet Premier Network Access Control (NAC) Fortinet Premier Network Access Control is a zero-trust network access solution that provides users with enhanced network visibility   Overview What is Network Access Control (NAC)? Network access control, or NAC, is a zero-trust network access solution that provides users with enhanced visibility into the Internet […]

  •  AWS Backup & Restore Build scalable, durable, and secure data-protection solutions with AWS backup & restore Benefits of backing up to the AWS Cloud Data durability Protect backups with 99.999999999% data durability. Copies of all data uploaded to Amazon S3 and Amazon S3 Glacier are created and stored across […]

  • trend micro

    Trend Micro Endpoint Security with Apex One Trend Micro endpoint security offers advanced automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of modern techniques provides highly tuned endpoint protection that maximizes performance and effectiveness. Protections Insightful Get actionable insights, expanded […]

  • Kaspersky Endpoint Security for Business Adaptive protection against advanced threats targeting your business The Product Secure diverse environments Kaspersky Endpoint Security for Business technologies have won more awards than any other vendor, and whether it’s from the cloud or on-premise, we deliver flexible management and security. Built-in firewalls and behavioral […]

  • Veeam Backup & Replication Single Platform for Modern Data Protection Modernize your data protection and eliminate downtime with Veeam Backup & Replication™, the simple, flexible & reliable solution for protecting your Cloud, SaaS, Virtual and Physical workloads. Veeam Backup & Replication is the foundation of the Veeam Platform, providing backup, […]