Endpoint Security

Filter by:
More filters Fewer filters
Display
1123 matches

DriveLock Device Control checks which internal and external devices and drives have been connected to external devices by users and prevents data transfer to unencrypted or unauthorised media. Besides basic rules for all kinds of devices, whitelists with their own individual criteria and exceptions can be established. The possibilities for differentiation here are extensive: users, groups, time of day and even the network location. There are almost no limits. Settings can be shared rapidly thanks to windows group policies or configuration files, making DriveLock Device Control extremely easy to introduce.

9 products match your filter criteria

DriveLock Application Control protects you from malware and ransomware. The administrative effort is minimal thanks to self-learning whitelists and self services for end users. The flexibility to combine blacklist and whitelist rules makes application control both easy to use and effective from a security perspective.

9 products match your filter criteria

DriveLock BitLocker Management enables a centralised Active Directory (AD) independent configuration and the enterprise-wide implementation of encryption rules. It supports all regular Bitlocker authentication methods via TPM and password. The compliance dashboard offers you an easy glance at the encryption status of individual devices. Bitlocker recovery keys are managed centralised and securely.

9 products match your filter criteria

G Data Cyber Defense

4 products match your filter criteria

BeyondTrust Priviledge Management for Desktops, powered by Acecto

2 products match your filter criteria

Architecture: 32/64 bit, Duration: 36 month(s), Product language: German, English, Operating system: Windows, Windows Server, Segment: Corporate

from 21.99

Gross price: SFr. 23.68 incl. SFr. 1.69 VAT

6 products match your filter criteria

Architecture: 32/64 bit, Duration: 12 month(s), Product language: German, English, Operating system: Windows, Windows Server, Segment: Corporate

from 38.99

Gross price: SFr. 41.99 incl. SFr. 3.00 VAT

8 products match your filter criteria

Architecture: 32/64 bit, Duration: 12 month(s), Product language: German, English, Operating system: Windows, Windows Server, Segment: Corporate

from 26.99

Gross price: SFr. 29.07 incl. SFr. 2.08 VAT

9 products match your filter criteria

Architecture: 32/64 bit, Duration: 12 month(s), Product language: German, English, Operating system: Windows, Windows Server, Segment: Corporate

from 42.99

Gross price: SFr. 46.30 incl. SFr. 3.31 VAT

3 products match your filter criteria

Architecture: 32/64 bit, Duration: 12 month(s), Product language: German, English, Operating system: Windows, Windows Server, Segment: Corporate

from 35.99

Gross price: SFr. 38.76 incl. SFr. 2.77 VAT

7 products match your filter criteria

Duration: 24 month(s), Product language: German, English, Spanish, French, Italian, Dutch, Polish, Russian, Turkish, Licensing model: Trend Micro Standard Licences, Operating system: Windows, Segment: Corporate

from 0.13

Gross price: SFr. 0.14 incl. SFr. 0.01 VAT

853 products match your filter criteria

Duration: 12 month(s), Product language: German, English, Spanish, French, Italian, Dutch, Polish, Russian, Turkish, Licensing model: Trend Micro Standard Licences, Operating system: Windows, Segment: Corporate

from 8.99

Gross price: SFr. 9.68 incl. SFr. 0.69 VAT

32 products match your filter criteria

Trend Micro PortalProtect protects your collaboration systems with a dedicated layer of protection against malware, malicious links and other threats that most SharePoint administrators are unaware of. Web reputation technology protects your web portals from malicious links, while powerful content filters check both file-based and web-based components of SharePoint.

from 2.36

Gross price: SFr. 2.54 incl. SFr. 0.18 VAT

49 products match your filter criteria

Trend Micro Mobile Security doesn''t only protect your company PCs, but also mobile devices and data for smartphone and tablet platforms that are being increasingly used by employees. The integrated solution for the management and security for mobile devices is embedded in a security system that encompasses physical and virtual PCs as well as mobile devices.

from 5.99

Gross price: SFr. 6.45 incl. SFr. 0.46 VAT

27 products match your filter criteria

Available 24/7, Business Support is an easy, reliable and punctual service ready to solve all your queries.

13 products match your filter criteria

The focus is on local devices. Webmail has not yet been checked. Enhanced device control. Enabling the serial number of USB sticks to be released

from 0.13

Gross price: SFr. 0.14 incl. SFr. 0.01 VAT

28 products match your filter criteria

Get the industry''s most reliable protection against viruses, spyware, and rootkits while simplifying and automating server security operations. ServerProtect scans systems, detects malware in real time, and integrates cleanup capabilities to remove malicious code and repair system damage. With a single, centralised management console, malware protection can be run, managed, and updated on all corporate servers.

from 4.99

Gross price: SFr. 5.37 incl. SFr. 0.38 VAT

33 products match your filter criteria

ESET knows that IT infrastructures need powerful performance to reach optimum results. This was a special focus during development of ESET''s range of products for Linux/FreeBSD. ESET Mail Security, File Security and ESET Gateway Security use minimal server resources to achieve unprecedented malware protection.

from 30.99

Gross price: SFr. 33.38 incl. SFr. 2.39 VAT

4 products match your filter criteria

ESET PROTECT

from 10.99

Gross price: SFr. 11.84 incl. SFr. 0.85 VAT

18 products match your filter criteria

Software as a key security component.

Predatory data theft can put your entire business at risk. Many companies are even required to notify government authorities of serious IT security incidents. Specific security standards have become mandatory to keep the inherent risks of a networked society under control. While an effective security strategy involves far more than just a security suite, it’s important to implement cutting-edge software in all areas of your business. Even if you can’t guarantee one hundred percent security, your company should build its protective barriers as high as possible.

 

Security software to combat intrusion and data theft.

In today’s business world, data is shared around the globe in various ways—in the cloud, by e-mail and via mobile devices—each requiring its own type of security. Even sensitive data is stored externally to enable access from anywhere. Rapid growth in the digital age wouldn’t be possible without such open structures but, unfortunately, this also gives rise to devious schemes. It’s therefore essential to protect yourself, and our Bechtle online shop carries effective solutions by leading manufacturers—from Symantec, Trend Micro, Kaspersky and Gemalto to G Data, Tenable and many more. We offer hundreds of software solutions, covering infrastructure, data centres and endpoints.

 

Security as the primary means of data protection.

Incorporating notebooks, tablets and smartphones into your network opens up new opportunities for hackers to penetrate your systems. Devices must therefore also be integrated into your company’s security structure—endpoint security management is the name of the game. Nevertheless, each aspect of security is closely linked with all the others. For example, data sharing on mobile devices is also addressed by mobile security and cloud security solutions. Highly specialised software is available from providers such as Kaspersky, which offers Kaspersky Security for Mobile. Also available are security suites, which combine multiple protection programs and usually include antiviruses and firewalls. Additional measures to protect yourself from cyber criminality include network and gateway security. And it’s crucial to raise awareness among your employees. Special attention should be paid to data security and data deletion, requiring excellent management and reporting.