Network Security Software Tools

SelectHub is real people helping you find the best Network Security Software Tools for your unique business needs while recognizing the true solution leaders who help make your decisions possible.
49 Products found for

Network Security Software Tools

Sort by:

Clearswift SECURE Email Gateway

User Sentiment:
n/a

Clearswift offers the industry’s most effective layer of real-time email inspection to detect and completely sanitize evasive threats, delivering highly secure email without delay.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

McAfee Network Security Platform

User Sentiment:
n/a

McAfee Network Security Platform is an intelligent security solution that discovers and blocks sophisticated threats in the network. Using multiple, advanced signature-less detection techniques such as Advanced Threat Defense, real-time emulation, and endpoint integration, it moves beyond mere pattern matching to defend against unknown stealthy attacks with extreme accuracy

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Clearswift Advanced Threat Protection

User Sentiment:
n/a

Clearswift Advanced Threat Protection’s unprecedented layer of sanitization detects and removes embedded malware evading AV and sandbox analysis without delaying digital activity. Proving to be the most effective and inexpensive defense that can be immediately added-on to your existing security infrastructure. No rip and replace. Clearswift sees 70% growth in its ‘Advanced Threat Protection’ solutionHow Top Cyber Security Teams Neutralize Ransomware AttacksTECH ALERT: New email embedded malware getting through major AV scans

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Juniper Net Netscreen 5GT

User Sentiment:
n/a

The Juniper Networks NetScreen-5GT Series is a family of three feature-rich, enterprise-class network security solutions. They are ideally suited for securing remote offices, retail outlets and broadband telecommuter environments, where IT staff support is minimal and ease of configuration and management is crucial. The NetScreen-5GT Series integrates key security applications, routing protocols and resiliency features to provide IT managers a cost effective appliance that is easy to deploy and manage.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Sophos UTM

User Sentiment:
n/a

Sophos UTM's simple, intuitive user interface (UI) is designed for YOU. It lets you quickly protect your network and users. And it makes day-to-day management tasks easy. Sophos UTM is easy to use, thanks to the configurable real-time dashboard, flexible modular licensing, and intuitive reusable network object definitions.We've engineered Sophos UTM to deliver outstanding performance. We built our UTM using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. Potent, powerful and fast.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Malwarebytes Endpoint Protection

User Sentiment:
94%

Malwarebytes is a cybersecurity platform that provides users with a comprehensive suite of solutions to keep devices safe. It crushes the latest threats and malware using multiple layers of technology like anomaly detection, behavior matching and application hardening. It is the first layer of defense against viruses and hackers which shields devices, data and privacy. Its default server policies with predefined configurations simplify and improve platform security posture. It delivers various detection and remediation capabilities to home users and businesses of all sizes.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Symantec Endpoint Protection

User Sentiment:
84%

Symantec Endpoint Protection was built to protect users and enterprises from malicious actors and harmful software. It’s ideal for small or medium-sized businesses. This system comes with a standard set of protection features, as well as several non-standard, unique capabilities that help this product to stand out from its competitors. Features include intrusion prevention, firewall and anti-malware features.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda Endpoint Protection

User Sentiment:
89%

Panda Endpoint Protection provides its users with advanced, ever-evolving and dynamic cyber-security models with big data and artificial intelligence capabilities. It can detect, analyze, classify and block malware through its adaptive defense security model. Its next-gen anti-malware technologies based on behavior intelligence can replace traditional antivirus. It can safeguard the entire environment against non-malicious tools and other techniques like zero-day threats, APTs, targeted attacks and ransomware.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda Security for Desktops

User Sentiment:
n/a

Panda protects your PC, Mac® or Android™ device against all types of threats. Enjoy the best antivirus software with real-time protection against the latest malware. Browse, shop and play online with complete peace of mind.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Advanced Threat Protection

User Sentiment:
n/a

The Blue Coat Advanced Threat Protection solution integrates technologies from the Blue Coat Security and Policy Enforcement Center and the Resolution Center to deliver a comprehensive lifecycle defense that fortifies the network.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Comodo RMM

User Sentiment:
n/a

Remote Monitoring and Management (RMM) is an endpoint and network monitoring software or remote management application software that allows Managed Service Providers (MSPs) to monitor and manage endpoints, computers, mobile devices, and networks remotely from a centralized console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Carbon Black

User Sentiment:
93%

Formerly known as Bit9 + Carbon Black, Carbon Black Enterprise Protection is an endpoint protection software developed specifically to protect enterprises from advanced security threats.CBEP is comprised of three components, delivering comprehensive protection for businesses. CB Protection stops malware, ransomware and non-zero day attacks. CB Response is an advanced endpoint detection and response (EDR) tool, built around scalability and attack review. CB Defense is an antivirus combined with an EDR solution, delivered via the cloud.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Clearswift SECURE Web Gateway

User Sentiment:
n/a

Advance filtering, threat prevention and the industry's deepest level of content inspection and sanitization for a secure web, social and cloud experience.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

TRITON Enterprise

User Sentiment:
n/a

Best-in-class security with a unified architecture. Websense® TRITON™ security solutions offer point-of click protection with inline, real-time defenses from Websense ACE (Advanced Classification Engine). ACE unites seven security defenses assessment areas into a composite scoring model using predictive analysis. These unmatched real-time defenses are backed by the Websense ThreatSeeker® Network — the world's largest security intelligence network — and the expertise of Websense Security Labs™ researchers. Data theft and data loss prevention (DLP) built-in at the core. Unlike competitive offerings, TRITON solutions contain DLP in their DNA.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Web Security Gateway Anywhere

User Sentiment:
n/a

Websense® web security products provide modern, innovative defenses. They rely upon Websense ACE (Advanced Classification Engine) and the expansive Websense ThreatSeeker® Network for real-time content analysis. They include forward-thinking features such as advanced threat dashboards, forensic reporting and data capture, sandbox analysis of malware, and data-aware defenses that provide containment of sensitive information. And they are easily managed through the Websense TRITON™ Unified Security Center.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Nexcom Network Security Appliance

User Sentiment:
n/a

To protect customer's dayily operation in e-business generation, NEXCOM offers the most trustworthy and reliable network security appliance, from wireless network security, security hardware platforms, and network security appliances to network security hardware platforms. Featuring powerful networking performance and a multitude of LAN ports, NEXCOM’s network security appliances are ideal solutions for SSL VPN, link/server load balancing, IDP/IPS, bandwidth management, firewall, anti-spyware, UTM, network access control and AAA server.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Call SelectHub for a free 15-minute selection analysis: 1-855-850-3850

Palo Alto Traps

User Sentiment:
91%

Palo Alto Networks Traps provides comprehensive protection to its users against unknown malware-driven attacks and sophisticated vulnerability exploits. It blocks threats and coordinates enforcement with cloud security and networks to safeguard against cyberattacks. Organizations can detect and respond to attacks using artificial intelligence and machine learning techniques. A multi-layered approach prevents malicious executables through a combination of policy-based restrictions, WildFire inspection and analysis and malware techniques mitigation.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Cisco Network Security

User Sentiment:
n/a

Cisco provides one of the industry’s most comprehensive advanced threat protection portfolios of products and solutions. Our threat-centric and operational approach to security reduces complexity, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

WatchGuard Firewall

User Sentiment:
n/a

WatchGuard’s powerful Fireware® operating system is the fastest, most reliable, most agile platform in the industry. It’s designed to run full versions of the leading security engines in every category, so we make sure you’re always at the top of the food chain. And with built-in headroom, you can scale up whenever you need to. You get all the performance, all the protection – all on your terms.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Intel Networking Security and Appliances

User Sentiment:
n/a

Deliver the most advanced data security solutions with Intel® processors that support cryptography, compression, intrusion detection, pattern matching, and network processing unit (NPU)-type small packet processing. Take advantage of Intel® QuickAssist Technology, a set of software and hardware modules that accelerate bulk encryption, data compression, and other workloads, supported by Intel® Atom™ processors through to Intel® Xeon® processors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

DeviceLock Endpoint DLP Suite

User Sentiment:
n/a

DeviceLock Endpoint DLP Suite consists of three primary software modules - DeviceLock, NetworkLock and ContentLock for data in motion and data in use. Along with the separate DeviceLock Discovery Module for scanning data at rest, DeviceLock protects any sized organization from endpoint data leak dangers across the widest array of threat vectors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Check Point Appliances

User Sentiment:
n/a

With perimeters no longer well-defined and threats growing more intelligent every day, we need an architecture combining high-performance network security devices with real-time proactive protections for north-south and east-west traffic. Our enforcement points provide the flexibility to custom fit security enforcements in the modern enterprise.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

UTMs and Next Generation Firewalls

User Sentiment:
n/a

Cyberoam network security appliances, available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS, offering the Human Layer 8 identity-based controls and Layer 7 application visibility and controls. Cyberoam ensures high levels of network security, network connectivity, continuous availability and secure remote access with controlled network access to road warriors, telecommuters, partners, customers.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Next-Generation Firewall

User Sentiment:
n/a

By focusing on content, applications, and users - not ports and protocols - we’re delivering a truly innovative platform that offers enterprises the much needed visibility and control to safely enable modern applications, without having to absorb the risks that typically accompany them. At the core of these network security products is the Palo Alto Networks Next-Generation Firewall, which helps enterprises simplify their network security infrastructure.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Stormshield Network Protection

User Sentiment:
n/a

Because a security solution represents an investment for several years, Stormshield Network Security products offer the requisite modularity and features for keeping abreast of future changes in the information system. In a “Bring-Your-Own-Everything” world, it has become even more of a challenge keeping users in check while developing an agile corporation that moves with the times. The only way for security to be effective is when it is seamless for both users and administrators.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Juniper Security

User Sentiment:
n/a

High-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. SRX Series gateways set new benchmarks with 100GbE interfaces and feature Express Path technology, which enables up to 1 Tbps performance for the data center.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Barracuda Network Security

User Sentiment:
n/a

Barracuda’s powerful, best-of-breed security products secure your organizations threat vectors – email, web applications, remote access, web browsing, mobile Internet, and network perimeters whether on premises or in the cloud. Leveraging the benefits of hardware, cloud, and virtual technology, backed by threat intelligence from Barracuda Central — Barracuda solutions consistently deliver total threat protection from zero day, advanced malware, automated threats, and other attacks.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda GateDefender eSeries

User Sentiment:
n/a

The best antivirus products and solutions for managing your company's devices. Wherever you are, manage the protection and security of your business and its devices from the cloud.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Dell SonicWALL Firewalls

User Sentiment:
n/a

The Dell SonicWALL family of firewalls tightly integrates intrusion prevention, malware protection, and Application Intelligence and Control with real-time Visualization. The Dell SonicWALL Reassembly-Free Deep Packet Inspection engine scans 100% of traffic and massively scales to meet the needs of the most high-performance networks.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

2FA One

User Sentiment:
n/a

2FA provides a turn-key solution that is easy to evaluate, procure, deploy, manage, and use. The solution, 2FA ONE, is focused on leveraging devices that an organization may already have in place, such as building access badges, embedded fingerprint scanners, smart phones, etc.; while at the same time making life easier and more secure for end users through the use of single sign-on (SSO) technology.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

G-Yu Security Architecture

User Sentiment:
n/a

Enterprise Security architecture is a conceptual blueprint of a company’s network security architecture, related security mechanisms and related security policy. It provides the framework for the strategies and tools that need to work cohesively for the company to manage core digital assets, to troubleshoot security issues and to build a structured, meaningful security practice. One of the best ways to let our enterprise security architects begin adding value is to have them conduct a Thorough Security Assessment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Duo Two-Factor Authentication

User Sentiment:
n/a

Every user can authenticate even when they’re offline, with mobile apps, or just landlines. Users can also have multiple devices, and choose their preferred method during login.Different methods are available for different business situations.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

DATASHIELD Advanced Security Operations Center (ASOC)

User Sentiment:
n/a

DATASHIELD provides a comprehensive solution, tailored to your enterprise, that not only builds you secure data walls, but also provides you with a team of cyber experts that identify and parses threats, zeroes in on potential and real breaches, and gives you actionable intelligence to respond to those breaches before they do serious damage.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

TechVader Security Solutions

User Sentiment:
n/a

TechVader, Inc has been fortunate to be involved in over 200+ software projects in Big Data, Enterprise Security and Enterprise “Systems” Integration. We are a Colorado Veteran owned company investing in Information Security, Marketing Automation and mentoring for other young startups in industry.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Trivir LLC

User Sentiment:
n/a

With TriVir, you always get experienced experts and proven methodologies. You also gain access to the innovative software tools we have built specifically to help our clients analyze, test, design, and manage their most complex business solutions. From identity manager connectors to IdMUnit, our open source identity management testing framework, we develop tools to complete and deliver your business solutions.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

CGI Cybersecurity

User Sentiment:
n/a

Businesses and governments are transforming to better serve an increasingly digital world. With greater connection comes increased cybersecurity risk. Today’s reality is that there is no “perfect” security, and even the most diligent organizations may be compromised. Yet, citizens and customers want assurance that their data is secure. Enterprises look to CGI’s expertise to build security into every aspect of their operations: from infrastructure and networks, to mobile applications, to employee education and business continuity. We partner with our clients to assess and analyze potential cyber risks, continuously monitor for threats in real-time, put in place the necessary defenses and ensure continuity of operations, even during a cyber incident.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Real People... with Data

We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.

As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.

Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.