We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Point Security Solutions.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Point Security Solutions - List of Manufacturers, Suppliers, Companies and Products

Point Security Solutions Product List

1~2 item / All 2 items

Displayed results

Endpoint security solution CROWDSTRIKE

Covering the lifecycle of security measures with a single agent!

We would like to introduce "CROWDSTRIKE," which we handle. It is designed with the premise of collaboration between the cloud and endpoints. It allows for the aggregation, analysis, and sharing of everyone's (Crowd) data. Additionally, through the threat hunting service "OVERWATCH," it provides access to logs from all users around the world, discovering threats that machines could not find and registering alerts in the system. 【Features】 ■ Cloud-native ■ Lightweight single agent ■ Threat hunting service "OVERWATCH" *For more details, please refer to the related links or feel free to contact us.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Endpoint security solution "Cybereason"

Dramatically improve your security environment! Targeted cyber attack countermeasure solution.

"Cybereason" is a cloud-based security solution that analyzes vast amounts of endpoint log data using proprietary analytical expertise powered by AI to detect signs of cyberattacks in real-time and address the challenges organizations face in their cybersecurity measures. This enables immediate detection and response to the increasingly diverse targeted cyberattacks and ransomware that have been on the rise recently. [Features] - Easy implementation and smooth operation - Instant identification of the overall picture of attacks - User-friendly management interface with visualized data - Real-time detection of malicious behaviors *For more details, please download the PDF or feel free to contact us.

  • Software (middle, driver, security, etc.)
  • Other security and surveillance systems
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration