THE SPAMHAUS EXPLOITS BLOCK LIST (XBL)
The Spamhaus Exploits Block List (XBL) là database gồm địa chỉ IP của các máy tính bị tấn công bởi các khai thác bất hợp pháp của bên thứ 3, bao gồm proxy mở (HTTP, socks, AnalogX, wingate, etc), virus có công cụ spam tích hợp, và các loại khai thác trojan-horse.
XBL chủ yếu bao gồm – cũng như phân phối chính cho – dữ liệu CBL (www.abuseat.org) và các danh sách khác về nguồn thư rác do máy tính khai thác hoặc các thiết bị khác.
THE SPAMHAUS BLOCK LIST (SBL)
The Spamhaus Block List (“SBL”) là cơ sở dữ liệu gồm các địa chỉ IP mà Spamhaus không khuyến nghị chấp nhận thư điện tử.
SBL có thể truy vấn được trong thời gian thực bởi các hệ thống thư qua Internet, cho phép quản trị viên máy chủ thư xác định, gắn thẻ hoặc chặn các kết nối đến từ các địa chỉ IP mà Spamhaus coi là có liên quan đến việc gửi, lưu trữ hoặc khởi tạo Email Spam. Cơ sở dữ liệu SBL được duy trì bởi một nhóm các nhà điều tra và chuyên viên CNTT chuyên nghiệp ở 10 quốc gia, làm việc 24 giờ mỗi ngày để thu thập, liệt kê các vấn đề Spam và hỗ trợ sau đó.
FLEXERA VULNERABILITY RESEARCH
Sprint ahead of software vulnerability threats. Access trusted vulnerability research covering more than 55,000 applications. Provide timely alerts on potential risks. Empower your IT team to manage proactively. Optimized vulnerability management starts with vulnerability intelligence.
Software vulnerability issues? Solved.
FLEXERA VULNERABILITY MANAGER
Your Complete Software Vulnerability Management Platform
Shut the window of opportunity for cybercriminals. Track down vulnerable software across Windows, Mac OSx and Linux systems. Prioritize the most critical security patches. Integrate with WSUS and SCCM to patch Non-Microsoft applications. With Flexera Software Vulnerability Manager (formerly CSI), you optimize your work and leave no room for incidents.
- Assess, prioritize and fix software vulnerabilities before risk increases
- Gain visibility over your software vulnerability management processes
- Automate patch management tasks to speed remediation processes and save time
FLEXERA APPRISK MODULE FOR ADMINSTUDIO
Applications are under attack. Ninety percent of cyberattacks target their vulnerabilities. You can fend off most app attacks with preemptive actions. App Risk Module for AdminStudio keeps you aware of application vulnerabilities from packaging to deployment. So you can harden them to keep the bad guys out. Stay safe.
Don’t let application vulnerabilities open the door to business risk. Add App Risk Module to your AdminStudio implementation to:
- Take a proactive approach to your cybersecurity defenses to protect your business from the next big cybersecurity threat
- Make early vulnerability assessment and remediation integral to your Application Readiness process
- Stay on top of vulnerabilities with regularly scheduled, automatic scans against Flexera’s list of more than 20,000 application titles
- Keep up on the fixes and patches available for known vulnerabilities so you can implement them early to minimize risk
DEVICELOCK CORE MODULE FOR WINDOWS
DeviceLock Core module enforces fine-grained contextual controls over data access and transfer operations locally on the protected computer.
DEVICELOCK ENDPOINT DLP SUITE FOR WINDOWS
DeviceLock Endpoint DLP Suite is a Data Loss Prevention solution, which means it is designed to prevent corporate data from leaking out of the corporate network or off corporate-controlled BYOD laptops/devices through deliberate malicious intent, negligence, or through an unintentional mistake.
OPENTEXT SECURITY
Security Suite overview
OpenText Security Suite, powered by OpenText™ EnCase™, provides 360-degree visibility across laptops, desktops and servers for proactive discovery of sensitive data, identification and remediation of threats and discreet, forensically-sound data collection and investigation.
With agents deployed on more than 40 million endpoints, clients including 78 of the Fortune 100 and more than 6,600 EnCE certified users, Security Suite delivers the industry gold standard for incident response and digital investigations.
LOCKPATH KEYLIGHT
Bắt đầu với phần mềm quản lý rủi ro Lockpath Rush ngay hôm nay.
Chọn giải pháp phù hợp với công ty của bạn.
TRANSWARE ACTIVE VAULT SS
Transware Active vault SS là một dịch vụ lưu trữ email dựa trên công nghệ điện toán đám mây. Active vault SS có thể xây dựng, sắp xếp và tính chất lọc để ngăn chặn virus. Lưu trữ dữ liệu email của bạn an toàn với 5 tính năng độc đáo với chi phí tối ưu nhất.
TRANSWARE ACTIVE GATE SS
Transware Active gate SS là một giải pháp bảo mật email nước ngoài dựa trên công nghệ điện toán đám mây. Nhà quản trị hệ thống có thể kiểm soát các email doanh nghiệp của bạn một cách dễ dàng. Mã hoá, bảo vệ bằng mật khẩu và trang web tải về file đính kèm. Xây dựng khả năng email linh hoạt theo yêu cầu bảo mật. Ngăn chặn rò rỉ thông tin, mang đến giải pháp an ninh toàn diện cho doanh nghiệp.
FORTINET DEVELOPER NETWORK
Fortinet Developer Network (FNDN)
- Developers-only portal provides official API documentation
- Exclusive articles and how-to content for automation and customization
- Community-built tools, scripts, and sample code
- Direct interaction with Fortinet experts in private forums
FORTIWLC/FORTIWLM
Dedicated WLAN Controller Wireless Access Product Details
The FortiWLC and FortiWLM platforms deliver seamless mobility and superior reliability with optimized client distribution and channel utilization. Both single- and multi-channel deployment options are supported, maximizing efficiency to make the most of available wireless spectrum.
FORTIWEB
FortiWeb Overview
Unprotected web applications are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb’s AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. When combined with our Web Application Security Service from FortiGuard Labs you’re protected from the latest application vulnerabilities, bots, and suspicious URLs, and with dual machine learning detection engines your applications are safe from sophisticated threats such as SQL injection, cross-site scripting, buffer overflows, cookie poisoning, malicious sources, and DoS attacks.
FORTITOKEN CLOUD
FortiToken Cloud
Secure Cloud Management of Two-Factor Authentication for FortiGate
- Manage two-factor deployments from provisioning to revocation
- Service subscription Includes end-user friendly FortiToken Mobile app
IDENTITY AND ACCESS MANAGEMENT
Identity and Access Management
Establishing identity through secure authentication is key in the implementation of an effective security policy. Many of today’s most damaging security breaches have been due to compromised user accounts and passwords exacerbated by users being provided with inappropriate levels of access.
FORTISIEM
FortiSIEM Overview
Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate – Infrastructure, Applications, VM’s, Cloud, Endpoints and IoT means the attack surface grows exponentially. Coupled with a skills shortage, and resource constraints, security becomes everybody’s problem but visibility, event correlation and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in realtime – but also with context – what devices represent a threat, what is their capability so you manage the threat the business faces, not the noise multiple security tools create.
Security management only gets more complex. Endpoints, IoT, Infrastructure, Security Tools, Applications, VM’s and Cloud – the number of things you need to secure and monitor grows constantly. FortiSIEM – Fortinet’s Multivendor Security Incident and Events Management solution brings it all together. Visibility, Correlation, Automated Response and Remediation in a single, scalable solution. Using a Business Services view, the complexity of managing network and security operations is reduced, freeing resources, improving breach detection. Worldwide 80% of breaches go undetected because of skills shortage and event information ‘noise’. FortiSIEM provides the cross correlation, applies machine learning and UEBA to improve response, to stop breaches before they occur.
FORTISANDBOX
FortiSandbox
With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats.
While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation.
FORTIPRESENCE
FortiPresence
- Combines Wi-Fi locationing and analytics to understand presence and behavior
- Includes analytics, reports, and customer influence engine (for retail)
FORTIPORTAL
FortiPortal: Cloud-Based Security Policy Management and Analytics
- Customizable self-service portal for MSSPs, Enterprises, Education & Government customers
- Delegate configuration and visibility to customers and end-users