Cisco Umbrella

Modern cybersecurity simplified

Flexible cloud security for your users on and off the network

Manufacturer

Principais features

Proteção Contra Malware
Filtragem de Conteúdo
Segurança em Nuvem
Análise de Ameaças
Conexão Segura

Descripción completa

Request a quote

Simplifique, filtre y escale su seguridad con Cisco Umbrella

Cisco Umbrella ofrece seguridad flexible basada en la nube. Combina varias funciones de seguridad en una sola solución, por lo que puede ampliar la protección de datos de dispositivos distribuidos, usuarios remotos y ubicaciones en cualquier lugar. Umbrella es la forma más sencilla de proteger eficazmente a sus usuarios en cuestión de minutos.

Aprovechamos la resiliencia de la seguridad

  • Vea: Visibilidad en todos los dispositivos, puertos y servicios en la nube remotos o locales

  • Proteger: Prevención contra ataques de phishing, malware y ransomware

  • Aprenderlo: Inteligencia para descubrir y defenderse de las amenazas actuales y emergentes

Ciberseguridad a la medida de tus necesidades

  • Seguridad DNS: Simple de implementar, fácil de administrar

Los servidores de nombres de dominio (DNS) están en el centro de la conexión para todas las solicitudes de Internet. Asegurar la capa DNS significa bloquear dominios maliciosos, direcciones IP y aplicaciones en la nube antes de que se establezca una conexión. Únase a las más de 24 000 organizaciones que usan Umbrella para brindar una experiencia de Internet rápida, segura y confiable.

  • SASE: Donde la seguridad y las redes se encuentran en la nube

La ciberseguridad evoluciona hacia un futuro SASE. Al consolidar capacidades previamente dispares, como la puerta de enlace web segura, el firewall entregado en la nube, el agente de seguridad de acceso a la nube y la seguridad de DNS en una arquitectura basada en la nube, las organizaciones pueden optimizar su ciberseguridad y mejorar su resiliencia de seguridad.

Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

Productos relacionados

Trend Micro Internet Security protects your home computers while you browse the Internet and exchange emails.

Manufacturer

StegoHunt is an industry-leading software tool, comprising the StegoAnalyst and StegoBreak tools, which can be used to discover the presence of hidden data activity in files and applications.

  • Quickly identify data obfuscation activity in an investigation by scanning files, captured memory images, and, for active systems, active processes;
  • Find evidence of steganography programs using YARA WetStone rules and hash sets provided in the monthly dataset releases;
  • Identify suspicious carrier files by detecting program data, signatures, and structural and static anomalies;
  • Use multiple operational discovery modes for transport file discovery, including directories, drives, files, and drive images;
  • Relate and capture evidence for presentations to management or the court.


Serv-U MFT software is a powerful tool that allows you to support file transfer and secure file sharing from your own data center.

Increase security and control of transfers in and out of your organization

Main features

  • Reliable FTP server software for secure file transfer
  • Ad hoc file sharing for easy file sending and requesting
  • Transfer files anytime, anywhere from the web and mobile devices
  • Upload and download large files quickly and easily
  • Centralized file transfer and automation
  • maintain regulatory compliance


Kiwi Syslog software receives, logs, displays, forwards, and alerts syslog, SNMP trap, and Windows event log messages from devices such as routers, switches, Linux and Unix hosts, and Windows servers.

Centralize and simplify log message management across network devices and servers

Main features

  • Centrally manage Syslog messages, SNMP traps, and Windows event logs;
  • Receive real-time alerts based on critical events;
  • Automatically respond to Syslog messages;
  • Store and archive records to aid regulatory compliance;
  • View Syslog data anywhere with secure web access.


Invicti protects all websites, web applications, and APIs. Even if you have thousands of them.


Category

Manufacturer

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

en_US