Cloud Security

    (57 items)

                  • Keeper Connection Manager, Subscription 12 Months
                    Keeper Security

                    Keeper Connection Manager, Subscription 12 Months

                    Operating system: Mac OS, Linux, Windows, Apple iOS, Android
                    Product language: English, Spanish, Polish, French, Portuguese, Italian, Dutch, German
                    Architecture: 32/64 bit
                    Segment: Corporate
                    Duration: 12 month(s)
                    Product no.: 109462470 Manufacturer no.: KEEPER-CONNECTION-MANAGER
                    Price on request
                    Delivery from 3. July.
                    Available.
                  • Keeper Password Manager
                    Keeper Security

                    Keeper Password Manager

                    Type: Support, Duration: 1 year(s), Operating system: Mac OS, Linux, Windows, Apple iOS, Android, Product language: English, Spanish, Polish, French, Portuguese, Italian, Dutch, German, Segment: Corporate

                    8 products match your filter criteria

                  • Keeper Secrets Manager
                    Keeper Security

                    Keeper Secrets Manager

                    Segment: Corporate, Duration: 12 month(s), Product language: English, Spanish, Polish, French, Portuguese, Italian, Dutch, German, Operating system: Mac OS, Linux, Windows, Apple iOS, Android, Type: Subscription

                    2 products match your filter criteria

                  • Quest On Demand Products
                    Quest

                    Quest On Demand Products

                    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners, and MSPs move faster, tighten security, and stay in control.

                    2 products match your filter criteria

                    CHF 18.99
                    from

                    Gross price: CHF 20.53 incl. CHF 1.54 VAT

                    Select products
                  • Trellix (McAfee & FireEye) Endpoint Security & EDR
                    Trellix (McAfee & FireEye)

                    Trellix (McAfee & FireEye) Endpoint Security & EDR

                    The MVISION integrated and centrally managed platform for endpoint protection requires only one agent for multiple technologies, including threat protection, firewall, web control, adaptive threat defence, etc., designed to simplify protection in complex environments. MVISION EDR picks up where anti-virus technologies and traditional EDR solutions leave off. The integrated endpoint security solution simplifies the management of large volumes of alerts, monitoring and capturing activity data from endpoints that may indicate threats, and provides the visibility and context needed.

                    43 products match your filter criteria

                  • Keeper EPM - Keeper Enterprise Base, Advanced Reporting and Alerts, BreachWatch, Compliance Reporting, 1TB Total pooled storage, Subscription 12 Months
                    Keeper Security

                    Keeper EPM - Keeper Enterprise Base, Advanced Reporting and Alerts, BreachWatch, Compliance Reporting, 1TB Total pooled storage, Subscription 12 Months

                    Operating system: Mac OS, Linux, Windows, Apple iOS, Android
                    Type: Subscription
                    Duration: 12 month(s)
                    Architecture: 32/64 bit
                    Segment: Corporate
                    Product no.: 4730645 Manufacturer no.: KEEPER-PAM-BUNDLE
                    Price on request
                    Delivery from 3. July.
                    Available.

                  Software as a key security component.

                  Predatory data theft can put your entire business at risk. Many companies are even required to notify government authorities of serious IT security incidents. Specific security standards have become mandatory to keep the inherent risks of a networked society under control. While an effective security strategy involves far more than just a security suite, it’s important to implement cutting-edge software in all areas of your business. Even if you can’t guarantee one hundred percent security, your company should build its protective barriers as high as possible.

                   

                  Security software to combat intrusion and data theft.

                  In today’s business world, data is shared around the globe in various ways—in the cloud, by e-mail and via mobile devices—each requiring its own type of security. Even sensitive data is stored externally to enable access from anywhere. Rapid growth in the digital age wouldn’t be possible without such open structures but, unfortunately, this also gives rise to devious schemes. It’s therefore essential to protect yourself, and our Bechtle online shop carries effective solutions by leading manufacturers—from Symantec, Trend Micro, Kaspersky and Gemalto to G Data, Tenable and many more. We offer hundreds of software solutions, covering infrastructure, data centres and endpoints.

                   

                  Security as the primary means of data protection.

                  Incorporating notebooks, tablets and smartphones into your network opens up new opportunities for hackers to penetrate your systems. Devices must therefore also be integrated into your company’s security structure—endpoint security management is the name of the game. Nevertheless, each aspect of security is closely linked with all the others. For example, data sharing on mobile devices is also addressed by mobile security and cloud security solutions. Highly specialised software is available from providers such as Kaspersky, which offers Kaspersky Security for Mobile. Also available are security suites, which combine multiple protection programs and usually include antiviruses and firewalls. Additional measures to protect yourself from cyber criminality include network and gateway security. And it’s crucial to raise awareness among your employees. Special attention should be paid to data security and data deletion, requiring excellent management and reporting.