Lookout

Lookout

Our mission is to secure and empower productivity in a privacy-focused world, where work and play can happen anywhere. With everything now in the cloud, it’s critical that cybersecurity follows you wherever you go, securing your data from the endpoint all the way to the cloud.

Mobility and cloud technology have become essential, as most of us now work and manage our personal lives digitally. With a platform that integrates endpoint and cloud security technologies, Lookout solutions can be tailored for any industry and any company size, from individual users to large global enterprises and governmental organizations.

Fast forward to today, Lookout is the leader in delivering integrated endpoint-to-cloud security. With a cloud-delivered platform, we secure data for the world’s leading enterprises and ensure they comply with regulations while respecting the privacy of their team who now work anywhere. We are also trusted by millions of individuals around the world to protect their digital identity and mobile devices.

Apri/Chiudi tutte le descrizioni

Lookout Mobile Endpoint Security

Secure IOS, Android And ChromeOS Endpoints

We protect your smartphone, tablet and Chromebook because they are at the intersection of the personal you and the professional you. Our mission is to secure and empower your digital future in a privacy-focused world where these devices are essential to all we do for work and play.

The broad adoption of mobile devices have created new and endless ways for cybercriminals to convince you to willingly use your mobile device for their unlawful gain.

The most common start of a cyberattack is a phishing link and mobile devices have enabled new ways to send them to you. Phishing risks no longer simply hide in email, but in messaging, social media, and even dating apps. Because we use these devices for both, protecting against phishing is critical for our personal and professional lives.

We protect your data from known and unknown threats without violating your privacy and trust. Lookout uses artificial intelligence to analyze telemetry data from nearly 200 million devices and over 120 million apps.

With a lightweight app for your smartphone, tablet or Chromebook, Lookout protects you against the full spectrum of threats.

The app stays connected with our platform in the cloud to deliver efficient protection on the device that cannot be subverted and optimizes for processor speed and battery life

Lookout Secure Access Service Edge

Secure Your Digital Transformation With SASE

Current cybersecurity architectures were designed with the data center as the focal point. But accelerating digital transformation has driven the adoption of software as a service (SaaS) and infrastructure as a service (IaaS) and work-from-anywhere initiatives. This has turned security requirements inside out where most users, endpoints, applications and data now sit outside enterprise perimeters.

A Secure Access Service Edge (SASE) solution transforms legacy perimeter security into a set of cloud-delivered, converged network and security capabilities that are available when and where they are needed. The core network component is a Software-defined Wide Area Network (SD-WAN). The core security components, commonly referred to as Security Service Edge (SSE) consists of Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), and Secure Web Gateway (SWG).

Lookout Zero Trust Accesso alla rete

ZTNA Securely Connects Users Directly To Apps

Your workers want easy access to what they need. Lookout ZTNA provides seamless connection to your apps – whether they reside in data centers, on public clouds or in hybrid environments – without putting your data at risk. To do so, we only grant access to specific apps that your users require for work. We also continuously monitor the identity and risk level of users and endpoints to restrict access accordingly.

To ensure your infrastructure is secure, Lookout ZTNA can hide your apps from the public internet, ensuring that only authorized users have access. We also extend cloud app security benefits to your legacy apps by providing integration with multifactor authentication and identity access management.

Lookout Cloud Access Security Broker

Secure Cloud Apps And Protect Data With CASB

Cloud apps have empowered us to stay productive from anywhere. It no longer matters where we’re at or what device we use – we now have easy access to the data we need for work.

But all this is happening outside your control as your employees use devices and networks you don’t manage. Productivity may have skyrocketed, but so has the risk your data is exposed to. Discover how Lookout Cloud Access Security Broker (CASB) can help.

Collaboration in the cloud means your data is going wherever it’s needed. It’s handled by a complex web of cloud apps for various purposes. It’s also transmitted over unsupervised networks to both managed and unmanaged devices and accessed by not just your employees, but also contractors and partners.

But you no longer have the visibility and control you had within your perimeter. You can’t spot suspicious activity without understanding how your users behave. You also risk exposing your intellectual property or violating regulations if you don’t know who is accessing your data and how it’s being handled. Lookout Cloud Access Security Broker (CASB) protects your apps and data from new risks.

Lookout Secure Web Gateway

Protect Your Data With Secure Internet Connectivity For Any Device Anywhere

Lookout Secure Web Gateway (SWG) includes an intuitive and easy-to-use cloud-portal for implementing security policies, and configuring routing and SD-WAN services. With a unified console, Lookout enables organizations to have centralized visibility and granular control over internal, inbound and outbound web traffic.

‍Lookout SWG continuously inspects TLS-SSL encrypted internet traffic in real time, to proactively enforce security policies and meet regulatory compliance. The solution provides visibility into threats and user activity, and blocks malware, threat and malicious or inappropriate content. Lookout SWG uses shared threat intelligence across cloud apps and services to remediate issues based on the context of the access attempt.

Our dependency on the internet and cloud has made it an expansive attack surface exploited by cyberattackers. Defending against an evolving threat landscape is of utmost importance, Given the high number of security breaches and ransomware recorded every year, defending against an evolving threat landscape is of utmost importance given the annual increases in data breaches and ransomware attacks. With Lookout SWG, organizations can protect data by preventing access to malicious websites and content, protecting users from online cyberattacks. It provides full-strength threat protection with detailed insights into apps, users, threats and events, giving IT teams consistent awareness of potential harm. Remote Browser Isolation (RBI) contains web browsing activity inside an isolated cloud environment to protect users from malware or malicious code that may be hidden on a website.

Lookout SWG protects users in real time against malware and advanced persistent threats in dynamic web content. It provides safe web browsing to prevent users from visiting compromised websites.

 

Keeper

Keeper

Creators of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. The Keeper leadership team is committed to customer success. We have deep expertise in cybersecurity software, cloud computing and mobile device technologies.

Keeper

Cybersecurity starts with password security. Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

Keeper manages your passwords to prevent data breaches, improve employee productivity, cut helpdesk costs and meet compliance standards.

Best-in-Class Security
Keeper uses a proprietary zero-knowledge security architecture and is the most audited and certified product on the market. Keeper protects your business and client data with the privacy, security and confidentiality requirements of your industry.

Ease of Use
Keeper has an intuitive user interface for computers, smartphones and tablets that can be deployed rapidly with no upfront equipment or installation costs.

Ultimate Flexibility
Keeper’s configurable roles, role-based permissions and admin privileges align with your organizational structure and policies. Keeper scales for businesses of all sizes.

Mitigates Risk of Data Breaches
Keeper creates random, high-strength passwords for all your websites and applications then stores them in a secure vault on all your devices.

Bolsters Password Security and Privacy
Each employee gets a private, encrypted vault for storing and managing their passwords, credentials, files and private client data.

Boosts Employee Productivity
Saves employees time, frustration and eliminates the need for them to reset, reuse and remember passwords.

Strengthens Compliance Standards
Supports role-based controls, 2FA, auditing, event reporting and industry compliance with HIPAA, DPA, FINRA, GDPR and more.

Open/Close all the descriptions

Keeper Business

Secure business passwords to prevent data breaches, improve employee productivity and meet compliance standards

  • Encrypted vault for every user
  • Folders and subfolders
  • Shared team folders
  • Access from unlimited devices
  • Policy engine and enforcements
  • Security Audit
  • Activity reporting
  • Team management
  • Basic Two-Factor Authentication (SMS, TOTP, smartwatch and FIDO U2F)

Open/Close all the descriptions

Keeper Enterprise

Keeper Enterprise Password Manager supports large and complex enterprise deployments.
Keeper can be deployed at enterprise scale with advanced features including automated user provisioning, Active Directory sync, Single Sign-On (SAML 2.0) authentication, SCIM and developer APIs. Keeper maps your corporate structure using hierarchical organizational units and delegated administration.

  • Everything in Keeper Business, plus:
  • Single Sign-On (SAML 2.0) authentication
  • Automated Team Management
  • Advanced Two-Factor Authentication (DUO & RSA)
  • Active Directory and LDAP sync
  • SCIM and Azure AD provisioning
  • Email auto-provisioning
  • Command line provisioning
  • Developer APIs for password rotation and backend integration

Open/Close all the descriptions

BrachWatch add-on

It is essential that you know when one of your passwords has been subject to a data breach. BreachWatch monitors the dark web for breached accounts and alerts you so you can take action to protect your online identity. BreachWatch is fully integrated with your Keeper Password Manager.

Lansweeper

Lansweeper

Lansweeper originated in Belgium in the mid 2000s Lansweeper SA designs and develops application software. The Company offers a security platform that provides IP range scanning, network and IT asset management, license compliance audits, and automated software deployment solutions. Lansweeper serves customers worldwide

IT Asset Management Software That Finds & Manages All Assets Across Your Enterprise. Track Hardware, Software, and Users. Agentless Network Discovery.

Open/Close all the descriptions

Cross-Platform IT Asset Discovery

Discover all IT assets in your network without having to install any software on your machines. Lansweeper finds & gathers information on all assets, listing hardware specs, installed software, user details, and much more. Eliminate one of the biggest hurdles in IT, getting complete end-to-end visibility of your network, and save valuable time and resources.

Create a complete and up-to-date inventory thanks with Lansweeper’s Network Discovery. Scan Windows, Linux, and MAC devices. Find and organize printers, routers and switches and track assets not yet deployed or disconnected from your network. Discover SNMP-enabled devices on your network to create a detailed network inventory.

Open/Close all the descriptions

One Centralized IT Inventory

All your Hardware, Software, and Users, all in one place. Lansweeper consolidates all asset details in a centralized web-based, System of Record. It offers corporations complete visibility into their distributed IT environments, informing them which assets they own, where they are located, who is using them, and much more. Clicking on an individual asset record lets you see all the granular information Lansweeper has collected.

Hardware Inventory

Build a comprehensive hardware inventory from scratch. Lansweeper scans your entire network to collect information about computers and their hardware components.

Software Inventory

Automatically scan software on Windows, Linux and Mac devices, and get a complete software inventory and license audit of your IT environment.

User Inventory

Manage a complete inventory of users in your IT estate. Get a complete overview of local users, AD users, and assets they are related to.

Open/Close all the descriptions

Get Answers Through Analytics

Get the answers you need in no time. Need a quick overview on all the printers in the office or serial numbers of all your PCs? Need a run-down of all new devices that were found in the last 24 hours? Choose from over 400 ready-made, out of the box network reports or build custom reports within minutes.

Netwrix

Netwrix

Netwrix Corporation is a software company focused exclusively on providing IT security and operations teams with pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT infrastructures to protect data regardless of its location. Over 10,000 organizations worldwide rely on Netwrix to detect and proactively mitigate data security threats, pass compliance audits with less effort and expense, and increase the productivity of their IT teams.

Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

Open/Close all the descriptions

Netwrix auditor - it is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage.

Netwrix Auditor delivers visibility and control across the broadest variety of on-premises and cloud-based IT systems in a unified way. Coupled with our cross-system reporting, this broad coverage provides a single pane of glass for understanding what’s going on across your entire hybrid cloud IT infrastructure.

Detect Data Security Threats – On Premises and in the Cloud
Delivers security intelligence about critical changes, configurations and data access and enables investigation of suspicious user behavior before data is compromised.

Pass Compliance Audits with Less Effort and Expense
Provides the evidence required to prove that your organization’s IT security program adheres to PCI DSS, HIPAA, SOX, ISO/IEC 27001, GDPR and other standards.

Increase the Productivity of Security and Operations Teams
Relieves IT departments of manual crawling through log data to get the information about who changed what, when and where a change was made, or who has access to what.

Snow Software

Snow Software

Snow Software is the largest dedicated developer of Software Asset Management (SAM) solutions, designed to ensure that the hundreds of billions spent on enterprise software is money well spent – ensuring organizations have the appropriate licenses for the software they use – not too many, not too few.

With more local offices and regional support centers than any other SAM solutions provider, more than 4,500 organizations around the world rely on Snow Software’s on-premise and cloud-based SAM solutions to manage software licensing across more than 11 million devices, from mobile to desktop, datacenter to the cloud.

Open/Close all the descriptions

Snow License Manager - The world’s leading Software Asset Management solution for software, SaaS and IaaS, with cloud & on-premise delivery options

Snow License Manager is designed to reduce the risk, cost and complexity associated with software assets and licensing. Thousands of organizations around the world rely on Snow License Manager to help them avoid overspending on software entitlements and cloud resources while ensuring that they are fully compliant with licensing rules.

Snow License Manager is the hub of Snow’s advanced Software Asset Management (SAM) platform – providing a unified view of all the software, cloud and hardware assets, license entitlements and application usage metrics.

Multiple stakeholders from across the organization can access tailored reports that enable them to instantly:

  • Create Effective License Positions (ELPs) for all software vendors, including Microsoft, IBM, Adobe and more
  • Track software and cloud usage and expenditure
  • Identify and monitor usage of deployed assets and cloud subscriptions
  • Identify opportunities to reduce licensing & support costs.
Snow Inventory - Discover devices, software and cloud services on all platforms, audit software installs and track usage

Whether you work in IT Operations, IT Service Management, Procurement or SAM, Snow Inventory shines a light on all hardware, devices, cloud services and software assets.

Snow Inventory discovers all assets including hardware configuration, software deployments and usage. This insight gives stakeholders such as Software Asset Management, IT Asset Management, Service Desk, Security and IT Operational teams the overview and detailed information they need to inform critical business decisions.

Snow Inventory supports all major enterprise computing platforms, including:

  • Cloud SaaS
  • Cloud IaaS
  • Windows
  • Mac
  • Linux
  • UNIX
  • iOS
  • Windows Phone
  • Thin Client
  • VDI
  • Android

Snow Inventory provides complete asset discovery as well as revealing blind spots on the network and in cloud software and infrastructure. From computers to servers, mobile and tablets to all connected network devices such as routers, printers, and firewalls, all device types are discovered and reported in Snow. Even devices that are not connected to the network at point of audit are included, as are devices with no client agent on them.

VMware

VMware

VMware has grown from five technologists working in a small apartment, to a leading innovator in enterprise software. Today the company’s compute, cloud, mobility, networking, and security offerings provide a dynamic and efficient digital foundation to over 500,000 customers globally. VMware technologies have fundamentally changed IT, and with it, the possibilities open to business. Now VMware and its customers have the freedom to build their own digital futures.

Digital Workspace
Make it easy for employees to work anywhere, any time, on any device, without compromising security.

Open/Close all the descriptions
>

Workspace ONE

Intelligence-driven digital workspace platform that delivers and manages any app on any device

Deliver an Engaging Employee Experience with an Intelligence-driven Digital Workspace Platform
Simply and securely deliver and manage any app on any device with VMware Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment.

What Workspace ONE Delivers

Engaging Employee Experiences From Onboarding to Offboarding
Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device.
Unified Endpoint Management
Consolidate management silos across mobile devices, desktops (including Windows 10 and macOS), rugged devices and “things”. Reduce costs and improve security with real-time, over-the-air modern management across all use cases (including BYO).
Intelligence Across the Digital Workspace
Aggregate and correlate data across your entire digital workspace to drive insights, analytics and powerful automation of common IT tasks that improve user experience, strengthen security and reduce IT cost.
Virtual Desktops and Apps
Radically transform traditional VDI and published apps with integrated VMware Horizon and VMware Horizon Cloud, which provides unprecedented simplicity, flexibility, speed and scale – all at a lower cost. A common control plane across the “multi-cloud” enables an architecture and cost model to meet your requirements.
Secure and Simple Application Access
Boost productivity and delight employees with secure, password-free single sign-on (SSO) to SaaS, mobile, Windows, virtual and web apps on any phone, tablet or laptop — all through a single app catalog.
Simplify Zero Trust Security
Combine intrinsic security across device, users, and apps to simplify the enablement of Zero Trust access control. Industry-leading modern management of all devices and access management across all applications makes zero trust access models a reality.

Workspace ONE UEM Powered by AirWatch

Unified endpoint management (UEM) technology that powers Workspace ONE
Manage Every Device and Every Use Case with Unified Endpoint Management
Reduce costs and improve security with modern, over-the-air management of every endpoint – including desktops, mobile, rugged, and IoT – and ensure enterprise security at every layer with Workspace ONE UEM, powered by AirWatch technology.

What Workspace ONE Unified Endpoint Management (UEM) Does
Unifies Endpoint Management
Manage the full lifecycle of any endpoint – mobile (Android, iOS), desktop (Windows 10, macOS, Chrome OS), rugged and even IoT (Linux and others) – in a single management console. Support all your mobility use cases: corporate-owned, BYOD, purpose-built or shared devices.
Modernizes Desktop Management
Optimize desktop OS (Windows 10, macOS, Chrome OS) lifecycle management for a mobile world. The most complete, modern management technology simplifies deployment, provides 100% cloud policy management, streamlines app delivery, automates patching and ensures security.
Automates Processes and Delivers Intelligent Insights
Leverage powerful insights and rules-based automation to optimize employee digital experience, ease the strain on IT and get to a proactive management and security model. Learn more about our intelligence-driven digital workspace platform.
Protects Corporate Apps and Data on Any Network
Provide an intrinsic and comprehensive security approach that encompasses the user, endpoint, app, data and network. Conditional access and granular compliance policies protect company data and ensure hands-free, instant remediation against modern day security threats.
Improves Employee Productivity
Deliver frictionless and secure access to all your business apps – mobile, desktop, SaaS, virtual. The apps include VMware Workspace ONE secure mobile productivity apps – catalog, email, calendar, contacts, web browser, notes, content and more.
Powers Your Digital Workspace
Unified Endpoint Management technology is an essential element in delivering on the promise of a complete digital workspace that reduces IT costs, bolsters security and proactively improves employees’ digital experience.

Workspace ONE UEM Key Highlights

  • Cloud-first, multitenant model to support and better control growing business requirements
  • Real-time desktop modern management from cloud, enhanced with Intelligence automation
  • Automate Windows 10 modern management migration with Workspace ONE AirLift
  • Special purpose mobility with support for ruggedized devices, wearables and IoT
  • Secure Microsoft Office 365 with MAM and conditional access policies across all OS
  • Remote wipe compromised devices instantly to remove sensitive company data
  • Enterprise-grade security fit for government agencies and regulated industries
  • Unified app catalog for one-touch, secure access to any app across any device
  • Robust API framework to support enterprise systems, services, identity, apps, content

VMware Carbon Black Cloud

Transform your security with intelligent endpoint and workload protection that adapts to your needs.

Transform your security with intelligent endpoint and workload protection that adapts to your needs.

Advanced Cybersecurity Fueled by Behavioral Analytics

Cloud native endpoint, workload, and container protection platform that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single, easy-to-use console. By analyzing more than 1 trillion security events per day, VMware Carbon Black Cloud proactively uncovers attackers’ behavior patterns and empowers defenders to detect and stop emerging attacks.

Modernize Your Endpoint Protection
Legacy approaches to prevention leave organizations exposed. Cybercriminals constantly update tactics and obscure their actions within common tools and processes. You need an endpoint platform that helps you spot the minor fluctuations that hide malicious attacks and adapt prevention in response.

Attackers Bypass Traditional Endpoint Security
Most of today’s cyberattacks now encompass tactics such as lateral movement, island hopping and destructive attacks. Advanced hacking capabilities and services for sale on the dark web compound the issue. These realities pose a tremendous risk to targets with decentralized systems protecting high-value assets, including money, intellectual property, and state secrets.

Recognizing the Good, the Bad and the Gray
While other endpoint security products only collect a dataset related to what is known bad, we continuously collect endpoint activity data because attackers intentionally try to look normal to hide their attacks. Analyze attackers’ behavior patterns to detect and stop never-seen-before attacks.

Simplify Your Security Stack
VMware Carbon Black Cloud consolidates multiple endpoint security capabilities using one endpoint agent and console, cutting the management headaches and console thrashing required when responding to potential incidents. Minimize downtime responding to incidents and return critical CPU cycles back to the business.

Wandera

Wandera

The Wandera team are proven innovators in enterprise cloud services and security. The team founded ScanSafe (now part of Cisco), pioneer of the cloud secure web gateway market and trusted provider to thousands of global enterprises.
The same passion for innovation and focus on customer experience is behind Wandera and the design of our unique transparent gateway architecture. They are excited to help their customers navigate the next generation of enterprise mobility challenges beyond traditional EMM. Recognized by Gartner as a Cool Vendor, and by Computing for Mobile Security Vendor Excellence.

 

Wandera

Open/Close all the descriptions

Security & Management for your Mobile Data

The explosion of billions of mobile devices has created the largest technology footprint for hackers to steal corporate and personal data. At the same time, the escalation of app creation and video content, together with the adoption of 4G, means the demand for data has grown exponentially. Businesses are suffering because they cannot protect, predict or control mobile data.
Wandera helps enterprises prevent threats, enforce policy, all while reducing mobile data usage.

The true strength of the architecture is the ability for administrators to take action using automated policy controls,
including alerts, filters, blocks, caps, and device quarantining to prevent security threats, ensure compliance and manage usage.

The core solution is Wandera’s industry leading protection against the full spectrum of mobile attacks. From device configuration risks, insecure app vulnerabilities, malicious infrastructure and traditional network attacks, Wandera prevents threats in real-time.

Wandera + Airwatch Integration

Wandera and Airwatch partner to provide seamlessly integrated mobile threat prevention

Wandera’s Mobile Data Gateway (MDG) and Enterprise Mobility Management (EMM) suites are becoming central components in enterprise mobility strategies. These two entities combined provide the most comprehensive device and data management capabilities for mobile environments to date. With each picking up where the other leaves off, the two systems work in conjunction with each other to provide unmatched device management, visibility, security, and control.
EMM suites focus on device-level management, which is more persistent in nature. This includes the ability to set policies for password requirements, identity management, network enablement and app distribution.

Wandera’s EMM Connect solution enables deep integration between the Wandera Mobile Data Gateway and AirWatch. By linking the two entities together, an enterprise can realize maximum management efficiency, unified threat outbreak response, and multi-level policy based controls

Wandera Private Access

Wandera introduces ZTNA security solution that’s four times faster than VPNs.

Wandera Private Access (WPA) is a cloud-delivered service that provides secure remote access to applications hosted in the datacenter or in the cloud, using Zero Trust Network Access (ZTNA) principles.

Wandera Private Access empowers secure remote work and offers a seamless and consistent user experience from any connected device (running iOS, Android, Windows 10, and Mac) to any application wherever it is hosted. It eliminates the broad discoverability and reachability of data and apps that users shouldn’t have access to, and dramatically increases visibility for admins as well as their ability to take action.

Further, WPA provides teams the flexibility to work any time, anywhere by connecting them to the applications they need. Streamlined authentication processes improve security and enable fast seamless remote working.

WPA is a cloud-based service that requires no on-premise equipment and the service edge dynamically scales to handle unlimited client connections.

 

PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.
Today PKWARE is revolutionizing data security with PK Protect, the world’s most advanced suite of data protection solutions.

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform

PK Protect

Powered by PKWARE e Dataguise technology

The PK Protect product suite comprises everything customers need to secure their most sensitive data and meet their compliance goals by finding sensitive data in structured, unstructured, and semi-structured content supporting detection, remediating sensitive data exposure for risk and compliance obligations, and tracking how and where sensitive data is being accessed.

Make sensitive data discovery and protection easier with a solution that’s intuitive to implement and use, and saves you time, resources, compliance costs, and complication. With the PK Protect Suite, businesses are empowered to work safely with sensitive data to make better business decisions, gain greater customer insights, move to the cloud, and generate new revenue streams.

Meet requirements under GDPR, CCPA, PCI-DSS, HIPAA, ITAR and other regulatory and industry mandates.

Protect data with a mix of masking and encryption based on who needs access and how the data will be used/viewed.

The suite encompasses the following solutions:

  • PK Discovery

Without requiring a single line of code, PK Discovery delivers fine-grained, aggregated optics into what sensitive data you have and where it resides. Find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. Integration with other PK Protect Suite capabilities can then trigger automatic encryption, masking, redaction, or other remediation for sensitive information.

  • PK Classification

Keeping a fast, dynamic and continuous record of the types of sensitive data an organization has. Data classification solutions are an essential component of helping organizations categorize data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.

  • PK Encryption

Dynamically encrypting data in motion or at rest on the broadest platform in the industry

Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. PK Encryption empowers both persistent encryption that applies protection directly to the data, or transparent data encryption for protecting stored data on enterprise servers.

  • PK Masking

Maintain control of sensitive data by masking it consistently across data stores. Static masking options can keep the data masked at rest, while dynamic masking options only mask data when it is in use. Automatically mask sensitive data in a DBMS to fully leverage the entire data set for more accurate and meaningful insight and measurement without compromising data security

  • PK Privacy

Control your company’s data privacy at the data, enterprise, and individual level with powerful PK Privacy engineering solutions, powered by Dataguise technology.

Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

This right-to-know discovery solution indexes identities and the data about those identities. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information as requested. Continuous monitoring for privacy data makes it easy to respond to a DSAR with the right policy.

Enable pseudonymization, anonymization, and de-identification of private personal data.

WinZip

WinZip

Developed by WinZip Computing now acquired by Corel Corporation

Winzip Standard e Winzip Pro

Zip, protect, manage and share your files with WinZip.

  • Zip and unzip instantly.
  • Manage all your files in one place.
  • Share directly to cloud, social media and IM.
  • Convert to PDF, add watermarks and resize photos.
  • Connect and share on the go with ZipShare

 

 

StarNet

StarNet

StarNet Communications Corporation was founded in 1989 and incorporated in 1990 by engineers working part-time out of their home. The  corporate mission was to create and market powerful, yet affordable PC-X server products for corporate, education and government markets.

The first X Server product, MicroX, was launched in 1991. It enabled users of 286 and 386-based Intel systems to access the X Window System from their personal computers. Quite possibly, StarNet was the first company to base its entire business model on the Internet, because in 1991, the Internet was mostly used by universities and government agencies. As a result, and aided by its low cost, simplicity and focus on the X server functionality, X-Win32 quickly became popular in these sectors.

StarNet has grown its market share by bringing a steady stream of innovations to the market, starting in 2000 with integrating SSH and most recently with FastX which allows users to access their remote Linux and Unix desktop through standard PC browsers. FastX also offers the ability to Suspend/Resume sessions.

 

Open/Close alle the descriptions

X-WIN32

The Best PC X Server for X Windows Display on Your LAN

After nearly 25 years of development, X-Win32 is the most versatile PC X Server for displaying remote Unix and Linux desktops and individual X applications. X-Win32 is widely used in demanding engineering design sectors such as defense/aerospace, molecular biology, and IC design with applications like Cadence Virtuoso.

Best Security

X-Win32 comes with an integrated SSH that encrypts all data between the client and the server, making remote x terminal connections from home and elsewhere very secure.

Fastest 3D/Rendering

The hardware acceleration on the local PC and the implementation of 65 OpenGL extensions allow X-Win32 to offer the fastest OpenGL support in the industry. 3D applications like Catia and Eclipse work like they were running locally.

Text/Graphics
Copy & Paste

X-Win32 is the only PC X Server that offers integrated copying of both text and graphics from X applications into Windows.

Multiple X Desktop

With X-Win32, open remote Unix and Linux desktops from several different hosts at the same time. You can Alt-Tab between Unix, Linux and Windows desktops, even copy data from one host to another.

Dynamic Window Scaling

X-Win32 is the first PC X server having activated the RandRextension, you can now scale the remote desktop simply by grabbing the corner of the window and dragging it to the desired size. You can also scale the window to be larger than your actual monitor.

 

FastX

The First Remote Linux Solution in the Cloud

FastX is the first and only remote Linux solution that allows users to connect to their sessions from any device with a web browser, even from your smart phone.

Linux in a browser

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.

Fastest Remote Linux Display

FastX displays your remote Linux or Unix desktops or individual X applications faster than any other solution over both LAN and WAN connections. You can work on demanding graphic applications (EDA tools) when connecting over VPN to servers even thousands of miles away.

An Affordable Solution

FastX costs a fraction of what commercial competitors charge. the combination of a lower cost, better performance and security, and advanced end-user and admin features make FastX the best X Windows emulator on the market.
Admin tools

FastX offers an array of administrator tools to keep your team running securely and efficiently. Server monitoring, scripted installation and theme support, to name a few.

Load Balancing

Only FastX gives you the option of using any standard web browser to connect you to your remote Linux sessions (Firefox, Chrome, Internet Explorer or Safari). FastX also works on mobile browsers, so you can check in from your smart phone or tablet.