Logo cloodo.com
Logo cloodo.com
Airlock

Airlock

This project was last updated September 29, 2022 byCloodo

Rating Cloodo

0 Reviews - Trustscore 0

ProfileReviewsGalleryFAQ

About Up Airlock

Apozy Airlock. The browser endpoint detection and response platform that neutralizes web attacks in one click.

The Internet is a dangerous place. It doesn’t have to be. Airlock fills the gap in your EPP/EDR by protecting the browser, delivering a safe, clean, and lightning-fast internet experience.

Powered by the very first visually-aware native browser isolation platform with over 6 petabytes of visual data, Airlock prevents web attacks in real time.

Airlock stops spearfishing in its tracks. With a visual model database of over 67.83 billion pages which analyzes over 12.20 trillion links per year, our technology protects anyone clicking on a malicious link by sandboxing the threat.
WR
Rating Cloodo

Reviews 0

Filter by:

Excellent
0%
Great
0%
Average
0%
Poor
0%
Bad
0%

About Up Airlock

Computer Security

Sandbox

About Airlock Project on Cloodo

Projects Statistics

Latest update

September 29, 2022

License
Platform
OS
Reviews

0

Other listing with the same category with Airlock

You may want to download some other project

Logo Project Acronis Cyber Protect Cloud
Rating of Project Acronis Cyber Protect Cloud on Cloodo

0 Reviews

Acronis Cyber Protect Cloud

Avoid downtime and data loss for your clients at a lower cost. Acronis Cyber Protect Cloud is the only solution that natively integrates cybersecurity, data protection and management to protect endpoints, systems and data. This synergy eliminates complexity, so service providers can protect customers better while keeping costs down. Next-generation cybersecurity. Advanced AI-based behavioral detection engine for zero-day attack prevention. Reliable backup and recovery. Full-image and file-level backup, disaster recovery, and metadata collection for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, and patch management for greater control. The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces.

This project was last updated September 29, 2022 byCloodo

Logo Project ACSIA
Rating of Project ACSIA on Cloodo

0 Reviews

ACSIA

ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection

This project was last updated September 29, 2022 byCloodo

Logo Project Akamai
Rating of Project Akamai on Cloodo

0 Reviews

Akamai

Akamai keeps digital experiences closer to users than anyone — and keeps attacks and threats farther away. Powering the next frontier in digital transformation, the Akamai Intelligent Edge Platform is the defensive shield that can surround and protect everything — sites, users, devices, data centers, clouds. It is the technology that eliminates friction and enables immersion. A quarter of a million edge servers, deployed in thousands of locations around the world ingest 2.5 exabytes of data per year and interact with 1.3 billion devices and 100 million IP addresses every day. Residing within one network hop of over 90% of the world’s Internet users — it is the only global, massively distributed, intelligent edge platform, with the scale, resiliency and security that businesses demand. Advanced threat intelligence to help manage security risks and protect against cyberattacks.

This project was last updated September 29, 2022 byCloodo

Logo Project Amazon Macie
Rating of Project Amazon Macie on Cloodo

0 Reviews

Amazon Macie

Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. As organizations manage growing volumes of data, identifying and protecting their sensitive data at scale can become increasingly complex, expensive, and time-consuming. Amazon Macie automates the discovery of sensitive data at scale and lowers the cost of protecting your data. Macie automatically provides an inventory of Amazon S3 buckets including a list of unencrypted buckets, publicly accessible buckets, and buckets shared with AWS accounts outside those you have defined in AWS Organizations. Then, Macie applies machine learning and pattern matching techniques to the buckets you select to identify and alert you to sensitive data, such as personally identifiable information (PII).

This project was last updated September 29, 2022 byCloodo

Logo cloodo.com

Cloodo helps to accellerate Digital Transformation for any business with Know-How Agencies supported by Smart Project Management Apps and Secured Payment for Final Result

Cloodo is a trademark of Cloodo Inc, an Atlas company with registered address at Suite 206, 651 N Broad St , MiddleTown, NewsCattle, Delaware, US

Get it on Google Play
Logo icon cloodo.com

Cloodo Inc. Copyright ©2011-2021 All Rights Reserved.