Endpoint Security

    (31 items)

                      • CylanceENDPOINT Pro
                        Cylance

                        CylanceENDPOINT Pro

                        CylanceENDPOINT Pro enables you to break chains of attack as early as possible. Replace your heterogeneous security landscape with multi-vendor EPP, EDR and CWPP products and protect your organisation with a single, lightweight solution that leverages preventative Cylance AI on your endpoints--offline and online, on-premise and in the cloud.

                        2 products match your filter criteria

                        Kč 227.00
                        from

                        Gross price: Kč 274.67 incl. Kč 47.67 VAT

                        Select products
                      • Trend Micro Sonstige Lizenzen
                        Trend Micro

                        Trend Micro Sonstige Lizenzen

                        Trend Micro Other Licenses

                        9 products match your filter criteria

                      • BlackBerry Cyber Suite
                        Cylance

                        BlackBerry Cyber Suite

                        BlackBerry Cyber Suite

                        2 products match your filter criteria

                        Kč 460.00
                        from

                        Gross price: Kč 556.60 incl. Kč 96.60 VAT

                        Select products
                      • Digital Signature (E-Signature) - OneSpan Sign Subscription 12 Months/1000 Transactions (Envelopes) - easy and ready to use e-signature solution
                        OneSpan

                        Digital Signature (E-Signature) - OneSpan Sign Subscription 12 Months/1000 Transactions (Envelopes) - easy and ready to use e-signature solution

                        Operating system: Cross-platform
                        Type: Subscription
                        Product language: Danish, English, Spanish, French, Portuguese, Italian, Dutch, German
                        Users: 1
                        Segment: Corporate
                        Product no.: 107389162 Manufacturer no.: 5414602900067
                        Kč 5,052.00

                        Gross price: Kč 6,112.92 incl. Kč 1,060.92 VAT

                        Delivery from 24. July.
                        Available.
                      • Multifactor Authentication - OneSpan Token Bundle, 12 months runtime
                        OneSpan

                        Multifactor Authentication - OneSpan Token Bundle, 12 months runtime

                        Product language: English
                        Users: 10
                        Segment: Corporate
                        Type: Licence, perpetual
                        Architecture: 64 bit
                        Product no.: 107389161 Manufacturer no.: 5414602306487
                        Kč 694.00

                        Gross price: Kč 839.74 incl. Kč 145.74 VAT

                        Delivery from 24. July.
                        Available.
                      • BeyondTrust Priviledge Management for Desktops, powered by Acecto
                        BeyondTrust Corporation

                        BeyondTrust Priviledge Management for Desktops, powered by Acecto

                        BeyondTrust Priviledge Management for Desktops, powered by Acecto

                        2 products match your filter criteria

                        Kč 893.00
                        from

                        Gross price: Kč 1,080.53 incl. Kč 187.53 VAT

                        Select products
                      • Trend Micro Data Protection
                        Trend Micro

                        Trend Micro Data Protection

                        The focus is on local devices. Webmail has not yet been checked. Enhanced device control. Enabling the serial number of USB sticks to be released

                        6 products match your filter criteria

                        Kč 1.00
                        from

                        Gross price: Kč 1.21 incl. Kč 0.21 VAT

                        Select products
                      • Thales Product Range
                        Thales Deutschland GmbH

                        Thales Product Range

                        Thales Product Range

                        2 products match your filter criteria

                      • ESET Cyber Security
                        ESET

                        ESET Cyber Security

                        No doubt there are far fewer viruses and less malware for Mac and Linux-based operating systems in circulation than for Windows platforms. But no system exists in a vacuum—the developers of malicious programs are constantly seeking weak points and working on cross-platform exploits. ESET Cybersecurity neutralises all attacks, even brand-new ones—whether they're aimed at Linux, Windows or Mac OS systems. And because unprotected Macs used for cross-platform sharing within a network can carry andy transmit malware, ESET Cybersecurity's comprehensive protection of your sensitive data and your identity is a must-have.

                        3 products match your filter criteria

                      • ESET NOD32 Antivirus
                        ESET

                        ESET NOD32 Antivirus

                        ESET NOD32 Antivirus is the ideal protection for both at home and the office: antivirus, antispyware, anti-rootkit, anti-phishing, web protection, e-mail protection, HIPS, storage media scans and cloud-based reputation service.##Features and benefits:##- High detection rate: it detects and removes viruses, worms, trojans, adware and spyware, and much more#- Breakneck speed: minimum response time for new threats#- Minimal system resources requirements: high detection rate while using minimal system resources#- Protection against unknown threats: cutting-edge technology like the advanced heuristics and generic signatures#- Updates included for one year#- Free support: professional technical support

                        3 products match your filter criteria

                      Software as an essential building block of security.

                      You’re constantly adding new PCs, tablets and smartphones to your company network, but you don’t want just anyone to have access. Improper network access permissions can easily lead to the theft of sensitive data. Fortunately, there are several ways to counter this threat—for instance by providing employee training, good firewalls and virus scanners, as well as encrypted remote connections such as SSL VPNs. A sophisticated endpoint security management strategy ensures adequate protection to keep your company successful for many years to come. And it also helps you comply with data-protection regulations.

                       

                      Endpoint security by leading providers.

                      Our Bechtle online shop offers a broad selection of endpoint security solutions from trusted manufacturers, such as Symantec, Sophos, Kaspersky, Microsoft, G Data and Malwarebytes. Use them to block applications and centrally configure client firewalls, for instance. Microsoft provides software to monitor and secure end devices, including virtual and mobile clients. US-based Symantec offers proven Norton security technology to protect everything from Windows to Apple. And Ivanti's endpoint management solutions let you implement consistent patch management, which is highly recommended. Simply select what you need and lay the foundation for solid security in your company.

                       

                      Weighing up features and services.

                      Which software you select depends on various factors. What solutions are you already using? What requirements must your endpoint security meet? Most manufacturers offer different degrees of protection in each of their solutions. G Data Antivirus Business, for instance, includes a virus monitor, exploit protection and mobile device management, while its Endpoint Protection Business adds device, application and web protection. A solution with more extensive features is therefore recommended if you want to protect your infrastructure from spyware and viruses without restricting remote user access. Our product managers will be happy to assist you with any questions you may have.