Learn More About Security Software

Need to learn more about security software options? Run a comparison to find the best security software solution for you.

Looking to save time? Speak with an expert now.

Skip the research. We'll do it for you. With one call, our team of experts will find products that best match your business goals. Call now.

877.824.6745

TechnologyAdvice Buyer's Guide to Security Software

Introduction

IT security management is a broad discipline with lots of moving parts, and the software market is equally diverse. There are hundreds of available solutions that address different functions of IT security — from malware protection to encryption or data backup — and inconsistent terminology between vendors. All of these factors can make it difficult for a buyer to understand the market and choose the best solution for their business.

This guide will help new and veteran buyers navigate the purchasing process by identifying best security software vendors through analysis of common trends, feature sets, and case studies. 

Market Overview

Across all industries, digital growth and globalization are raising the stakes for data security. According to a recent study by IBM, the average cost of an enterprise data breach is now $3.5 million.1 With the potential damage so severe, many companies are taking proactive steps to protect their information and systems, and to seek out risks before they actualize. Gartner analysts predict that at least a third of all enterprises will have a dedicated “digital risk officer” filling this role by 2017.2

There are a number of recent trends that make it a challenge to control and monitor the flow of information, and by extension, the security of networks, data, and devices.

  • Cloud environments: As businesses depart from old-fashioned rack servers, adopt cloud-based solutions, and rely on Infrastructure-as-a-Service (IaaS) for their core business models, there is a growing need for cloud security services. In fact, 44 percent of IT decision-makers cite this need as their top security challenge.3 Cloud security management can reduce capital expenditures, administrative demands, and free up company bandwidth, but many experts are still unsure of its ability to protect the whole network.
  • Mobile endpoints: Mobile devices are now a common part of the workplace. Many of those devices see both personal and professional use, which creates a grey area for security. IT leaders are often unsure whether they should manage mobile device activity, or whether this constitutes an invasion of privacy. TechnologyAdvice performed a study on employee monitoring that revealed employees are concerned. Companies must temper this concern with the very real threat of device compromise.In their 2014 trends report, Sophos noted “exponential growth” in mobile targeted malware, especially for Android devices.4  
  • More attack surfaces: The proliferation of digital mediums (cloud, mobile, third-party portals) and the expansion of infrastructure (to remote employees and global networks) creates new vulnerabilities. Cybercriminals are doubling down on their attempts to exploit these new attack surfaces. About one in five organizations suffered a malware infection-related outage in 2014.4 Cisco alone detects 50,000 network intrusions per day through its solutions and intelligence.5
  • Third party threats: Even if their internal network is secure, many companies have limited visibility into the security of partner networks (vendors, suppliers, service providers, etc.). When the two environments overlap, it often creates a backdoor for intrusion or data breach. For example, the infamous 2013 breach of Target’s payment card system was traced to a web application the company used for transacting with its HVAC vendor.6 This vulnerability compromises the integrity of the supply chain.

Security software providers help businesses overcome many of these challenges by monitoring data and network entities, blocking intrusions, and strengthening infrastructure against anticipated attacks. The software market offers a broad spectrum of solutions, with labeling and feature sets that differ from vendor to vendor. This makes it difficult to compare security software, but also means you’re more likely to find a solution that aligns with your needs. In a general sense, there are two main classes of security software:

  1. Best-of-breed: offers discrete functionality for specific tasks within IT security, such as firewall protection or anti-virus; less expensive, but limited in scope
  2. Integrated/product suite: offers broad functionality for a range of functions; often intended to serve as an all-in-one solution for enterprise security needs, covering hardware, applications, web activity, data, and networks.

Software pricing is usually calculated by the number of “nodes” (devices that communicate on the network) and whether the solution is on-premise (upfront license) or hosted off-site (typically an annual or semi-annual subscription).  

Common Features

Before you consider specific solutions, it’s good to have a working knowledge of what features are available. Along with an internal needs assessment, this step can help you shape your business goals and decide which products are the most relevant. Here are some common functional areas of business-grade security software:

  • Malware protection: The phrase, “anti-virus” is often used interchangeably with “anti-malware,” but this is a bit of a misnomer. A virus is only one type of malware, among others (spyware, adware, nagware, trojans, scareware, ransomware, worms). Malware protection identifies these threats and prevents them from causing harm to a device or network. In some cases, protection may also extend to advanced persistent threats (APTs) when combined with a security information and event management (SEIM) tool.7  
  • Firewall protection: One of the more traditional components of IT security, a firewall is a mechanism for filtering traffic as it passes into and out of a network. Using pre established rules set up by an administrator, the firewall either accepts or rejects data packets as they move at the network level or at the application level. Firewalls can be used to protect email and web servers, extranets, file repositories, and data centers.
  • Data encryption: Data encryption uses complex algorithms to render data indecipherable to unauthorized parties. The “scrambled” version of the data is referred to as ciphertext and requires a unique decryption key to translate. Encryption can be applied to specific files, device storage, or across an entire network.
  • Access control: Network access controls let administrators limit which employees have access to specific systems, files, etc., based on their login credentials and permission level. Role-based access control is often an important part of compliance for a number of different industry regulations (HIPAA, or PCI-DSS, for example). According to Forrester Research, 61 percent of data breaches are caused by malicious insiders or employee mistakes.8
  • Data backup: In the event of a catastrophic event (fire, flood, electrical storm), irrevocable system failure, or a large scale breach, data backup can be the difference between recovery and implosion. Businesses sometimes practice their own, internal backup procedures, but most third-party services are hosted in the cloud — referred to as “backup-as-a-service,” or BaaS. This service is especially valuable to smaller businesses, considering less than 50 percent regularly backup their data.9
MAJOR CATEGORIES
Endpoint Security Software

Endpoint security software protects a TCP/IP network by monitoring activity and gating access requested by devices (endpoints) on the network. An endpoint could include an employee laptop, smartphone, an office printer, or specialized hardware such as barcode readers and POS terminals.

Endpoint security software ensures that each endpoint meets certain criteria before it is granted access to the network. This process almost always entails malware and threat detection, and often extends to real-time activity monitoring, including web filters. Administrators manage endpoint software from a central server component that monitors the client components. The goal is to ensure that all devices are in sound condition before they exchange information. Some solutions also include vulnerability assessment features that seek out endpoint weaknesses and deliver “patches” to fix them.

Product Examples: Symantec, Kaspersky, McAfee (Intel Security), F-Secure, PandaSecurity

Data Loss Prevention Software

Data loss prevention (DLP) software is designed to detect and prevent data breaches in order to preserve the integrity of information that is in use, at rest, or in motion.10 DLPs solutions can  monitor network egress points, endpoints, storage databases, and network and device drives (depending on the solution) to prevent intentional or accidental data leakage.

Backup service is often a key component of DLP solutions, but there are also standalone backup services that provide less sophisticated DLP capabilities. Encryption and access control are important features for most products in this category, since they pertain directly to data security.

Product Examples: CheckPoint, Digital Guardian, Symantec

Unified Threat Management (UTM) Software

UTM products are usually part of an end-to-end IT security management suite, although their core component is almost always a hardware-based firewall. Other functions may include malware protection, spam filtering, intrusion detection, virtual private networks (VPNs), content filtering, load balancing, DLP, application control, web filtering, and reporting.

As you can see, UTMs are the most robust of the available products — intended, in most cases, to serve as an all-in-one security solution. Many small and medium-sized businesses favor UTMs because they eliminate the need for multiple, disparate systems.

Product Examples: MyDigitalShield, Endian, Sophos, Fortinet

Mobile Device Management Software

Mobile device management (MDM) software — sometimes referred to as enterprise mobility management — is the enterprise security answer to “bring your own device.” MDM extends data control and visibility to work-use mobile devices and gives employees secure access to corporate content and applications.

Administrators can use MDM solutions to enforce passcode and encryption policies, block unknown devices, distribute native malware protection and web filters, and remotely lock devices or erase company data in the event of loss or theft. Some solutions also support “containerization” techniques, which partition an encrypted area of the device as a contained environment for corporate use. Some MDMs are sold as standalone tools, while others are included in an IT management suite.

Product Examples: AirWatch, OpenPeak, GoodTechnology

Security Software Case Study

Company: Wayne State University11

Solution: Symantec Data Protection

Wayne State University is a public research college located in midtown Detroit, with 32,000 students across 13 schools and 400 degree programs. In 2012, they launched an initiative to centralize IT operations across the university, hoping to bring greater efficiency and remove the burden of administration from researchers and professors. Initially, they hired a new director to manage delivery of shared services and transition to an all-cloud environment: the university virtualized 250 of its 300 servers in the data center.

Wayne State couldn’t afford to increase their data management staff, but they needed a solution to protect their ever-growing stores of hosted data. “A traditional approach to backup simply won’t work any longer,” said Robert Hogle, director of computer operations support. “You simply cannot conduct a weekly or monthly full backup with daily incrementals.”

Hogle started by upgrading to Symantec’s NetBackup 7.5, which allowed the school to divide the backup window into manageable pieces and balance loads between servers. He also implemented NetBackup Data Protection Optimization to reduce duplication in departmental file share backups, as well as Symantec’s endpoint protection and analytics tools. Wayne State reported a number of key benefits in operational efficiency and cost savings:

  • $135,000 worth of drive space reclaimed by deduplication
  • 160 staff hours per year saved by faster system retores
  • Projected 40 percent reduction in recovery labor costs
  • Saved $20,000 during the first year and about $6,000 per year thereafter from minimized tape operations
  • Accommodated doubled size of hosted data without increasing IT staff
How to Choose the Best Security Software Vendor

At TechnologyAdvice, our goal is to connect businesses with the technology that best meets their needs. We’ve compiled product information, reviews, case studies, features lists, video walkthroughs, and research articles on hundreds of leading IT solutions, all to make the buying process more straightforward for decision makers like you.

If you’re curious about any of the security software listed in this guide, we’d love to talk to you. Call one of our experts for a free consultation, or use the Product Selection Tool on our site to get a personalized recommendation based on your industry and desired features.

Have Questions?

Our team of experts is ready to help!                                  877.720.3289


Sources

  1. “Ponemon Institute Releases 2014 Cost of Data Breach: Global Analysis.” Ponemon Institute. Last modified May 5, 2014. http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis
  2. Messmer, Ellen. “Gartner: Top trends in IT security technology.” NetworkWorld. Last modified June 23, 2014. http://www.networkworld.com/article/2365757/network-security/gartner-top-trends-in-it-security-technology.html
  3. “The Future of Network Security.” SophosLabs. Accessed June 23, 2015. https://www.sophos.com/en-us/security-news-trends/security-trends/network-security-survey.aspx
  4. “Trends to Watch in 2014.” SophosLabs. Accessed June 23, 2015. https://www.sophos.com/en-us/security-news-trends/security-trends/network-security-top-trends.aspx
  5. “Cisco 2014 Annual Security Report.” Cisco. Accessed June 23, 2015. http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf
  6. Olavsrud, Thor. “5 Information Security Trends That Will Dominate 2015.” CIO. Last modified December 10, 2014. http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will-dominate-2015.html?page=3
  7. “Advanced persistent threat.” Wikipedia. Last modified June 20, 2015. https://en.wikipedia.org/wiki/Advanced_persistent_threat#Mitigation_strategies
  8. Nardone, Stephen. “What to Look for in a Managed Security Services Partner.” CIO. Last modified November 22, 2014. http://www.cio.com/article/2846078/security0/what-to-look-for-in-a-managed-security-services-partner.html
  9. “5 Data Security Risks Every Small Business Should Know About.” TrendMicro. Accessed June 23, 2015. http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/sb_5-reasons-why-small-business-lose-critical-data.pdf
  10. “Data loss prevention software.” Wikipedia. Last modified June 7, 2015. https://en.wikipedia.org/wiki/Data_loss_prevention_software#Types_of_DLP_systems
  11. “Doubling the Data Protected Without Adding Staff, Using Solutions from Symantec.” Symantec. Accessed June 23, 2015. https://www.symantec.com/content/en/us/enterprise/customer_successes/b-wayne_state_university-CS.en-us.pdf

All Security Products

Last Updated: November 11, 2016

CompanyResultsRatingMost Reviewed
Codeproof

Codeproof

(1 reviews)

Codeproof provides a cloud-based platform for mobile device management (MDM) to companies in any industry. Read the full product review here.

Dropbox

Dropbox

(1 reviews)

Dropbox is a file hosting service based in San Francisco. Operated by Dropbox, Inc., they primarly focus on providing cloud storage, file synchronization, and c...

SoftLayer - IBM

SoftLayer - IBM

(1 reviews)

SoftLayer's unified platform gives you cloud computing any way you want it, deployed on demand, billed hour-to-hour or month-to-month, with a single pane of gla...

Copy

Copy

5(2 reviews)

Powered by Barracuda, Copy.com allows you to store, protect, and share your data across all devices for a reasonable cost. Serving needs for individuals, big bu...

pCloud

pCloud

5(1 reviews)

pCloud's cloud-based file storage and backup service offers robust encryption and Swiss-based servers.

Memopal

Memopal

5(1 reviews)

Memopal Online Backup is a secure cloud storage provider with three service tiers that allow you to scale your investment along with your data.

Nomadesk

Nomadesk

(1 reviews)

Nomadesk provides businesses with a secure way to collaborate on files from any location, and offers encrypted cloud backup services. Nomadesk's platform can al...

Azure - Microsoft

Azure - Microsoft

4(1 reviews)

Azure is Microsoft's cloud platform, "the cloud for modern business." Their offerings are scalable, and can be implemented into existing infrastructure.

Zoolz

Zoolz

(1 reviews)

Zoolz intuitive design combines enterprise level features such as scalability, centralized management, reliability, data tiering and more at a very affordable p...

Absolute

Absolute

(0 reviews)

Absolute Software is a mobile device management company that offers on-premise or cloud-based solutions to help professionals and businesses manage IT assets.

Acronis

Acronis

(0 reviews)

Acronis specializes in easy to use Disaster Recovery, Backup, Storage Management and Data Protection solutions. See reviews and more here.

ADrive

ADrive

(0 reviews)

ADrive provides online cloud storage solutions that can fit virtually any need.

Agnitum

Agnitum

(0 reviews)

Agnitum's Outpost Security Suite Pro is a comprehensive IT security solution for small businesses or home users; it can be white-labeled for commercial sales

Airwatch

Airwatch

(0 reviews)

Airwatch provides mobile device management solutions to protect valuable enterprise-level data including employee content, applications, and email.

AltDrive

AltDrive

(0 reviews)

AltDrive provides unlimited and secure online backup of files for home users and small businesses. The company was founded by a Seattle-based entrepreneur with ...

Amazon Glacier

Amazon Glacier

(0 reviews)

Amazon Glacier provides users with a cost-efficient storage system for data archiving and backup. Glacier is a part of Amazon's Web Services suite of cloud comp...

Amtel

Amtel

(0 reviews)

Amtel is a cloud-based mobile life cycle and mobile device management (MDM) solution company that works with a variety of different companies of all sizes.

Appblade

Appblade

(0 reviews)

Appblade is a mobile device management provider that allows administrators to distribute, secure, and manage applications on iPhones, Androids, and Blackberrys.

ARALOC

ARALOC

(0 reviews)

ARALOC helps organizations secure digital content, in the cloud or on-premises, with digital rights management, collaboration tools, and native mobile apps.

Backblaze

Backblaze

(0 reviews)

Backblaze is a cloud storage company that boasts a strong track record and has been the winner of multiple awards. The company has received attention from some ...

Backup Genie

Backup Genie

(0 reviews)

Backup Genie is a file backup service based in the United Kingdom with four data centers located worldwide. Boasting 100% secure file storage, Backup Genie is c...

Barracuda Networks

Barracuda Networks

(0 reviews)

Barracuda Networks offers solutions that are designed to fixed mainstream IT problems. Their products work across three markets: 1) content security, 2) network...

Bitcasa

Bitcasa

(0 reviews)

Bitcasa specializes in cloud storage and offers infinite and secure storage across all devices. A small company that employs less than 50 customers, Bitcasa was...

Bitdefender GravityZone is a solution aimed squarely at managing and securing mobile devices by offering protection specifically designed personal devices.

Box

Box

(0 reviews)

Box provides customers with a content-sharing platform that is used by more than 34 million people and 45,000 businesses to manage content-related workflows

BoxTone

BoxTone

(0 reviews)

BoxTone prides itself on scalability and its enterprise solutions. Boxtone’s MDM offering is designed to help track and easily coordinate large numbers of dif...

Carbonite

Carbonite

(0 reviews)

Carbonite provides online backup solutions for individuals and small businesses. The company has subscribers in more than 100 companies across the globe and has...

Casper Suite

Casper Suite

(0 reviews)

The JAMF Software-produced Casper Suite is designed to provide mobile device management for iOS products in business, government, and education sectors.

Cellrox

Cellrox

(0 reviews)

Cellrox is a unique mobile device management system that combines traditional security systems and management systems with the idea of separate user profiles.

Centrify

Centrify

(0 reviews)

Centrify's mobile device management solution, a component of its larger Centrify User Suite package, offers a centralized authentication process.

Comodo Backup

Comodo Backup

(0 reviews)

Comodo Backup is a file storage and computer backup company that touts its ease of use and lifetime license features. In addition to their storage capabilities,...

CrashPlan

CrashPlan

(0 reviews)

CrashPlan is a file backup service that uses Peer 2 Peer sharing to keep its users' files safe. Developed by Code 42 Software, CrashPlan doesn't operate solely ...

Cubby

Cubby

(0 reviews)

Cubby is a cloud storage service powered by LogMeIn, Inc. Users are able to upload, share and sync files and collaborate in real-time - on or off the cloud. Cub...

CX

CX

(0 reviews)

CX is a white label, media-centric cloud service that allows users to store, share and sync, and collaborate on their files on the cloud. They offer several dif...

Desktop Central

Desktop Central

(0 reviews)

Desktop Central 8 is a mobile device management platform produced by ManageEngine, and designed for the management of iOS and Android mobile devices only.

DeviceLink

DeviceLink

(0 reviews)

DeviceLink is a cloud-based solution that is specifically targeted toward the mobile device management of small businesses, schools, and government agencies.

Diino

Diino

(0 reviews)

Diino Systems is a technology platform that provides online backup and file storage on a global scale. Based in Stockholm, Sweden, Diino has offices in Atlanta,...

DollyDrive

DollyDrive

(0 reviews)

DollyDrive is a backup and storage service for Apple products that allows users to backup their Time Machine files onto the cloud.

Egnyte

Egnyte

(0 reviews)

Egnyte is a hybrid cloud storage service that caters to all types of users - from individuals to small businesses and enterprises. Over 1 billion files have bee...

ElephantDrive

ElephantDrive

(0 reviews)

ElephantDrive is a cloud storage service that caters to individuals and small businesses. Their mission is to provide “individuals and businesses simple but p...

EVault - Seagate

EVault - Seagate

(0 reviews)

EVault is a full-service cloud backup and recovery company. They work to leverage the best cloud-connected technology and infrastructure. EVault is currently us...

Excitor DME

Excitor DME

(0 reviews)

Excitor DME is intended to address security concerns with bring-your-own-device setups by creating a personal portal and a professional portal for its users.

FancyFon

FancyFon

(0 reviews)

FancyFon Mobility Center, or FAMOC, is a mobile device management system that is designed primarily for larger enterprises such as government organizations.

Feenics

Feenics

(0 reviews)

Keep™ by Feenics is a comprehensive, cloud or on-premise access control system that doesn't require proprietary hardware, integrates with SMS, and much more.

Filewave

Filewave

(0 reviews)

FileWave specializes in assisting business, education, and government agencies with mobile device management for all iOS devices and supports Apple's platform.

Fixmo

Fixmo

(0 reviews)

Fixmo offers mobile security and mobile device management platforms to identify, mitigate, and manage risks for large government and enterprise organizations.

Good Technology

Good Technology

(0 reviews)

Good technology is an IT solutions company that offers an on-premise mobile device management platform for iOS or Android devices.

HighTail

HighTail

(0 reviews)

Formerly known as YouSentIt, HighTail is a storage service that has been working on the cloud before the term existed. According to the company, they currently ...

Horizon Suite, a mobile management solution developed by VMware, allows the centralized and cloud-based management of devices, desktops and applications.

IASO

IASO

(0 reviews)

IASO Backup is an online backup software that caters to small businesses and enterprises. This program can be used on Windows, Unix and Linux platforms. IASO wo...

iDrive

iDrive

(0 reviews)

IDrive is a privately held company specializing in online data backup, cloud storage, file syncing, remote access and secure backup. They serve all kinds of cus...

Iron Mountain

Iron Mountain

(0 reviews)

IronMountain is a info management and storage company. With more than 1,000 offices in 35 countries, IronMountain serves more than 156,000 customers across the ...

iTech Workshop

iTech Workshop

(0 reviews)

iTech Workshop's expEDIum is a complete medical practice management, billing, and data integration solution for chiropractors or any other specialty.

JungleDisk

JungleDisk

(0 reviews)

Jungle Disk is an online backup solution that uses Amazon S3 and cloud files to store its users data. Based in Atlanta, GA, they serve customers in more than 10...

JustCloud

JustCloud

(0 reviews)

JustCloud is an online file storage platform that offers unlimited cloud storage and access from multiple platforms and mobile devices. Their service is designe...

Kaseya

Kaseya

(0 reviews)

Kaseya's mobile device management solution allows companies to use other Kaseya offerings, and monitor multiple data streams through one unified dashboard.

Keeper

Keeper

(0 reviews)

Keeper Security is a cloud-based password management application that relies on an encrypted vault to manage logins, passwords, credit card numbers, & much more

Keep Vault

Keep Vault

(0 reviews)

KeepVault is a cloud storage backup service that uses real-time, continuous monitoring to backup selected files as changes occur. Their software allows for back...

KineticD

KineticD

(0 reviews)

KineticD is an online backup vendor that caters to business operations. They claim to have never lost a file in their 10 years of operation, and offer backup so...

LANDesk

LANDesk

(0 reviews)

LANDesk offers a complete service management platform that is completely modular, so implement the total solution or just the enterprise mobility module.

LiveDrive

LiveDrive

(0 reviews)

LiveDrive is an online cloud backup and file storage service based in London and Pennsylvania. Its product is compatible on Windows and Macintosh systems, and A...

MaaS360

MaaS360

(0 reviews)

MaaS360 is a product of Fiberlink, an IBM company, that reduces liability levels and increase productivity through the management of employee mobile devices.

McAfee's Enterprise Mobility Management solution provides both security and administrative control over a mobile device system.

MediaFire

MediaFire

(0 reviews)

MediaFire is an online storage company with a focus on file sharing, and collaboration between users. In addition to file storage and backup, MediaFire offers o...

Meraki - Cisco

Meraki - Cisco

(0 reviews)

Meraki, Cisco's mobile device management system, provides centralized diagnostics on all devices hooked into the system, covering hardware and software usage.

Mezeo

Mezeo

(0 reviews)

Mezeo Software is a storage service that targets enterprise-level companies. Based in Houston, Texas, Mezeo uses an on-premise cloud platform to store large amo...

MFormation

MFormation

(0 reviews)

Mformation provides cloud-based mobile device management solutions for enterprises, small and medium-sized businesses, carriers, and managed service providers.

MobiControl

MobiControl

(0 reviews)

MobiControl allows companies to securely launch enterprise mobility or bring-your-own-device (BYOD) campaigns regardless of the industry.

Mobile IT

Mobile IT

(0 reviews)

MobileIron’s Mobile IT platform is designed to help IT departments track, manage, and secure mobile devices throughout an organization.

Symantec’s Odyssey platform streamlines device enrollment, management, and security features, enabling IT administrators to efficiently monitor large networks...

MobileSpaces

MobileSpaces

(0 reviews)

MobileSpaces provides a combination of mobile application management and information management services. MobileSpaces was acquired by Pulse Secure in late 2014

Mobiquant

Mobiquant

(0 reviews)

Mobiquant’s mobile device management solution helps ensure the security of data, mobile access to enterprise services, and management of devices cross-platfor...

Mozy

Mozy

(0 reviews)

Mozy is a cloud storage platform by EMC designed to simplify file management and data security. It refers to itself as a "flak jacket for your files," and encry...

NotifyMDM - Globo

NotifyMDM - Globo

(0 reviews)

NotifyMDM, recently purchased by Globo, is a mobile device management platform that includes real-time visibility and remote control over any device.

OpenPeak

OpenPeak

(0 reviews)

OpenPeak’s ADAM offers comprehensive mobile device management solutions that can be implemented as stand-alone services, providing scalability for businesses.

Pulse Secure

Pulse Secure

(0 reviews)

Pulse Secure offers organizations a number of security software applications, including mobile device management, VPNs, and secure containerization solutions.

PureStorage

PureStorage

(0 reviews)

Pure Storage is an enterprise storage company that specializes in flash memory products. They offer a full guarantee stating that if clients don't love their pr...

Real-Link

Real-Link

(0 reviews)

Real-Link is a complete asset management solution for managing physical security at your organization. Track security guards, locations, and more.

SAFE - Samsung

SAFE - Samsung

(0 reviews)

SAFE by Samsung is a mobile device management solution, ideal for large organizations in the education, automotive, healthcare, logistics and retail industries.

SafeSync provides an automated backup platform that securely stores data in the cloud. Files can be accessed from mobile devices, and media files can be shared ...

SecPod

SecPod

(0 reviews)

Saner Business, from SecPod Technologies, is an integrated endpoint security and threat management solution, designed for businesses of any size.

SmartVault

SmartVault

(0 reviews)

SmartVault is an online document storage service built for business use. Their platform is designed to help businesses go paperless, and facilitate secure file ...

Sophos

Sophos

(0 reviews)

The Sophos Mobile Control platform appeals to businesses seeking a secure solution for enterprise-wide mobile device management systems.

SOS Security

SOS Security

(0 reviews)

SOS Online Backup provides full BYOD backup solutions for businesses, with the ability to recover data to any device. Their remote controls allow companies to s...

SpiderOak

SpiderOak

(0 reviews)

SpiderOak is a cloud storage provider known for their security and emphasis on privacy. They offer what they call a "Zero-Knowledge privacy environment" wherein...

StoragePipe

StoragePipe

(0 reviews)

Storagepipe offers disaster recovery, regulatory compliance, and business continuity solutions designed to help companies retain their data in any situation. Th...

Strongspace

Strongspace

(0 reviews)

Strongspace captures full snapshots of your data every hour and thinning out to daily weekly snapshots - freezing a consistent image of all the files and folder...

SugarSync

SugarSync

(0 reviews)

SugarSync offers active cloud backup solutions for individuals and businesses. By constantly monitoring folders and files for document changes, SugarSync provid...

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud

(0 reviews)

Symantec Backup Exec.cloud is considered a next-generation backup system that lets companies choose how to best store their data. With hybrid solutions, users c...

Syncplicity

Syncplicity

(0 reviews)

Syncplicity is a backup solutions provider that offers file sharing and collaborative work features. In addition to automatic file backup, Syncplicity allows us...

SyncShield is Capricode's patented mobile device management system that offers either on-premise or cloud-based security solutions.

Tangoe

Tangoe

(0 reviews)

Tangoe provides mobile device management services to enterprises and carriers that wish to optimize mobile infrastructure and reduce IT costs.

Tarmac 2

Tarmac 2

(0 reviews)

Tower One’s Tarmac 2 provides enterprise-level mobile device management services for iPads and iPhones, ideal for companies mobilizing the workforce with Appl...

Tresorit

Tresorit

(0 reviews)

Tresorit's cloud-based file backup and sharing service offers zero-knowledge encrypted storage on Swiss privacy law-protected servers based in the EU.

Unitrends

Unitrends

(0 reviews)

Unitrends is a US-based company that provides backup solutions and disaster recovery services. They offer two types of cloud-based protection, a public cloud se...

Vaultize

Vaultize

(0 reviews)

Vaultize is a data storage, backup and synchronization company that specifically targets enterprises, from SMEs to the biggest companies in the world.

Wuala

Wuala

(0 reviews)

Wuala Business was developed specifically for teams, work groups, and SOHOs. It provides a storage space where uploaded documents belong to the company itself, ...

XenMobile - Citrix

XenMobile - Citrix

(0 reviews)

XenMobile, produced by Citrix, allows companies to manage mobile devices, apps, and data in a bring-your-own-device environment to ensure uniform compliance.

Zetta

Zetta

(0 reviews)

Zetta is an online backup service that caters to many high-profile organizations/institutions, including UCLA, Mint, Mazda, and Livescribe. Based in Sunnyvale,...

ZipCloud

ZipCloud

(0 reviews)

ZipCloud is an online storage company that offers personal and business platforms for data backup. The service works by installing a their ZipCloud application,...