Software > IT Security > Cybersecurity

Cybersecurity Software

In this SoftGuide section you will find an overview of solutions for cyber security and Internet security. Security software usually includes solutions for securing against denial-of-service attacks (attack to overload or paralyze a computer), protection against eavesdropping (eavesdropping on a data communication), spoofing (manipulation, concealment or faking of identity) or tampering (malicious manipulation of hardware products). Software for cyber security and internet security also often offers solutions against clickjacking (redirection of users by manipulated clicks), privilege escalation (unintentional or unscheduled gaining of higher user rights) and phishing (illegal gaining of access data). Often the security software is also used to secure backdoor access and to set up encryption.

Are you looking for a suitable software for cyber security or internet security?
show 1 to 6 (of 6 software programs)
BIC GRC Solutions
Value-oriented governance, risk and compliance management for your company's success
Value-oriented governance, risk and compliance management for your companys success A professional GRC strategy forms the optimal basis for successful corporate management. BIC supports you with a unique combination of state-of-the-art technology, intuitive user interface and fast implementation. This is what makes working with BIC GRC so easy - in all GRC areas.
CrypToken
USB token for security solution providers
USB token for security solution providers The CrypToken is the perfect foundation for professional authentication solutions in the eBusiness and eCommerce sector. The CrypToken is available with either JCOP or MULTOS operating system. Both systems offer Common Criteria certification for maximum security and the ability to load customer-specific applets.
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
Magic xpi
Solution for integration, enterprise process management and data synchronization
Solution for integration, enterprise process management and data synchronization Connect and control all data flows and interfaces from a single platform, the Magic xpi integration platform. Maximize the productivity, efficiency and continuity of your business. Automate processes and benefit from the secure solution through smooth process flow.
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
SECURITY ASSISTANT (MR.KNOW)
Workflows on the topics of ISMS, cybersecurity and NIS2
Workflows on the topics of ISMS, cybersecurity and NIS2 Workflows for NIS2...
show 1 to 6 (of 6 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories