Security Management Software - メーカー・企業と製品の一覧 | イプロス

Security Management Softwareの製品一覧

1~3 件を表示 / 全 3 件

表示件数

Platform "Forescout eyeSight"

You can gain our unique insights into the overall picture of the device without interrupting the business process!

"Forescout eyeSight" is a platform that continuously monitors and discovers, classifies, and evaluates connected devices in an agentless manner the moment they connect, without interrupting critical operations. It detects various IP-connected devices in an extended enterprise network in an agentless manner. Detected connected devices are automatically classified by this product and evaluated against the organization's policies. By effectively combining the three functions of detection, classification, and evaluation, it promotes the visualization of devices and the execution of appropriate policies/actions. 【Features】 ■ Provides a real-time integrated inventory of network-connected devices in an agentless manner ■ Acquires contextual information necessary for creating proactive security/compliance policies through accurate profiling of devices ■ Identifies unauthorized, vulnerable, and non-compliant devices, and builds risk mitigation policies, etc. *For more details, please download the PDF or contact us.

  • Other security systems
  • Security Management Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Software "Docker Business"

Providing a trusted and secure developer experience for businesses! We protect your business.

"Docker Business" is software that enables management and security at an enterprise scale. It uses image access management to control access to approved content, providing a secure developer experience trusted by enterprises. With a centralized management plane, SAML SSO, premium support, and add-on features like IP whitelisting, IT leaders can efficiently manage all Docker development environments. This allows teams to securely build, share, and run cloud-native applications. 【Features】 - Controls access to approved content using image access management - Provides a secure developer experience trusted by enterprises - Protects the software supply chain - Offers the necessary tools to enhance business security - Includes image access management and unlimited hub vulnerability scanning *For more details, please refer to the related links or feel free to contact us.

  • 企業:B7
  • 価格:Other
  • Other Software
  • Security Management Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Censys Attack Surface Management

Customizable risk severity levels globally or by asset!

We offer "Censys Attack Surface Management," which discovers, inventories, and monitors all resources publicly available on the internet. Every day, every hour, or on demand, the attacker's perspective on all those resources is refreshed, providing near real-time visibility and context, allowing you to manage and communicate your cybersecurity posture. 【Features and Characteristics】 ■ Discovery Path ■ Workspace ■ Risk Prioritization ■ Interactive Reports ■ API Integration ■ Censys Academy *For more details, please download the PDF or feel free to contact us.

  • others
  • Security Management Software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録