Logo cloodo.com
Logo cloodo.com
Airlock

Airlock

This project was last updated September 29, 2022 byCloodo

Rating Cloodo

0 Reviews - Trustscore 0

ProfileReviewsGalleryFAQ

About Up Airlock

Apozy Airlock. The browser endpoint detection and response platform that neutralizes web attacks in one click.

The Internet is a dangerous place. It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience.

Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time.

Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
WR
Rating Cloodo

Reviews 0

Filter by:

Excellent
0%
Great
0%
Average
0%
Poor
0%
Bad
0%

About Up Airlock

Computer Security

Sandbox

About Airlock Project on Cloodo

Projects Statistics

Latest update

September 29, 2022

License
Platform
OS
Reviews

0

Other listing with the same category with Airlock

You may want to download some other project

Logo Project 3wRecon
Rating of Project 3wRecon on Cloodo

0 Reviews

3wRecon

The 3wRecon Solution is 3wSecurity’s Attack Surface Management software combined with managed security service options. Our proprietary technology combines advanced data reconnaissance and analytic intelligence to streamline workloads, better understand your attack surfaces, and manage your internet risk in one place. ​“3wRecon”, is a comprehensive security software solution that enables companies to manage their internet facing systems and reduce their overall risk. ​​ "3wRecon" solution compliments our external penetration testing services by providing a holistic and continuous approach to your organization’s external network awareness and compliance reporting needs.

This project was last updated September 29, 2022 byCloodo

Logo Project Acronis Cyber Protect Cloud
Rating of Project Acronis Cyber Protect Cloud on Cloodo

0 Reviews

Acronis Cyber Protect Cloud

Avoid downtime and data loss for your clients at a lower cost. Acronis Cyber Protect Cloud is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down. Next-generation cybersecurity. Advanced AI-based behavioral detection engine for zero-day attack prevention. Reliable backup and recovery. Full-image and file-level backup, disaster recovery, and metadata collection for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, and patch management for greater control. The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces.

This project was last updated September 29, 2022 byCloodo

Logo Project ACID Cyber Intelligence
Rating of Project ACID Cyber Intelligence on Cloodo

0 Reviews

ACID Cyber Intelligence

ACID’s Cyber Intelligence solution is based on proprietary multiple designated robots that perform comprehensive, optimized, round-the-clock website monitoring of a large number of targeted sources, including: • Social networks • Criminal sites • IRC chats • Deep Web • Dark Net and more… The searches are conducted based on a virtually unlimited number of client-defined keywords, which are automatically translated into multiple languages. These searches cover multiple identifier that potentially places the organization at risk: • Leaked user names & passwords • E-mails • Domain names • Credit card data • Cyber operations • Intellectual property • Key personnel and more… Alerts are displayed in real-time on the smart, user-friendly ACID dashboard, and are also automatically sent to the client via e-mail, without delay. Any further information is shared immediately, as it becomes available.

This project was last updated September 29, 2022 byCloodo

Logo Project ACSIA
Rating of Project ACSIA on Cloodo

0 Reviews

ACSIA

ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection

This project was last updated September 29, 2022 byCloodo

Logo cloodo.com

Cloodo helps to accellerate Digital Transformation for any business with Know-How Agencies supported by Smart Project Management Apps and Secured Payment for Final Result

Cloodo is a trademark of Cloodo Inc, an Atlas company with registered address at Suite 206, 651 N Broad St , MiddleTown, NewsCattle, Delaware, US

Get it on Google Play
Logo icon cloodo.com

Cloodo Inc. Copyright ©2011-2021 All Rights Reserved.