Software > IT Security > Cybersecurity

Cybersecurity Software

In this SoftGuide section you will find an overview of solutions for cyber security and Internet security. Security software usually includes solutions for securing against denial-of-service attacks (attack to overload or paralyze a computer), protection against eavesdropping (eavesdropping on a data communication), spoofing (manipulation, concealment or faking of identity) or tampering (malicious manipulation of hardware products). Software for cyber security and internet security also often offers solutions against clickjacking (redirection of users by manipulated clicks), privilege escalation (unintentional or unscheduled gaining of higher user rights) and phishing (illegal gaining of access data). Often the security software is also used to secure backdoor access and to set up encryption.

Are you looking for a suitable software for cyber security or internet security?
show 1 to 8 (of 8 software programs)
Magic xpi
Solution for integration, enterprise process management and data synchronization
Solution for integration, enterprise process management and data synchronization Connect and control all data flows and interfaces from a single platform, the Magic xpi integration platform. Maximize the productivity, efficiency and continuity of your business. Automate processes and benefit from the secure solution through smooth process flow.
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Z1 SecureMail Gateway
The market-proven server solution for central e-mail encryption and digital signatures
The market-proven server solution for central e-mail encryption and digital signatures The Z1 SecureMail Gateway is scalable for every company: From a simple stand-alone system to a high-availability data center cluster. With the Z1 SecureMail Gateway, you can use the central server solution for efficient encryption and signing of all your e-mail traffic. The software solution not only includes the encryption and decryption of incoming and outgoing emails, but also signature verification and the management of all keys. All invisible to your employees. Automatic certificate management relieves the IT administra...
SECURITY ASSISTANT (MR.KNOW)
Workflows on the topics of ISMS, cybersecurity and NIS2
Workflows on the topics of ISMS, cybersecurity and NIS2 Workflows for NIS2...
BIC GRC Solutions
Value-oriented governance, risk and compliance management for your company's success
Value-oriented governance, risk and compliance management for your companys success A professional GRC strategy forms the optimal basis for successful corporate management. BIC supports you with a unique combination of state-of-the-art technology, intuitive user interface and fast implementation. This is what makes working with BIC GRC so easy - in all GRC areas.
CrypToken
USB token for security solution providers
USB token for security solution providers The CrypToken is the perfect foundation for professional authentication solutions in the eBusiness and eCommerce sector. The CrypToken is available with either JCOP or MULTOS operating system. Both systems offer Common Criteria certification for maximum security and the ability to load customer-specific applets.
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
Z1 SecureHub
Exchange large files spontaneously, easily and securely in compliance with the GDPR
Exchange large files spontaneously, easily and securely in compliance with the GDPR Z1 SecureHub ensures secure data exchange, even for large files such as plans, graphics, videos, etc. Simple and intuitive to use via browser and GDPR-compliant, files can be exchanged using Z1 SecureHub. The data exchange solution is quick to install, easy to scale virtually and very convenient to maintain.
show 1 to 8 (of 8 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 359 Software categories