DragonSoft DVM

DragonSoft DVM

DragonSoft Security Associates
+
+

Related Products

  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • PathSolutions TotalView
    43 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ManageEngine Log360
    157 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    203 Ratings
    Visit Website
  • Cloudflare
    1,948 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Unimus
    31 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website

About

The DVM detection project includes security vulnerability detection, vulnerability audit detection, account and setting audit detection, and supports risk assessment and statistics functions. It also has a database scanner to support database vulnerability detection and security risk assessment. D-GCB can detect the information and communication software of government agencies and units to test whether the endpoint device conforms to the TW GCB configuration settings, thereby reducing the risk of internal computer attacks and avoiding information security concerns. Hyper EDR can detect more than 5000 kinds of popular APT malware and hacking tools. This threat-aware mode does not require any Kernel Driver operation and consumes almost no extra CPU resources.

About

With the pervasiveness of mobile devices, the Internet of Things, and 5G, your network has to be ready for what’s next. BIG-IP Policy Enforcement Manager (PEM) is a policy enforcement function that gives you the network flexibility and control you need while delivering a reliable customer experience. Implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns, then use BIG-IP PEM to enforce those plans and services. Ultimately, your customers need your network to be fast, reliable, and available. Through smarter traffic steering, more sophisticated policy management, and improvements in network functions, BIG-IP PEM leads to happier customers. And because happy customers are stickier customers, you’ll see reduced churn and better revenue.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Network security solution for IT teams

Audience

IT departments interested in a solution to improve network performance through effective policy management

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DragonSoft Security Associates
Founded: 2002
United States
www.dragonsoft.com

Company Information

F5
Founded: 1996
United States
www.f5.com/products/big-ip-services/policy-enforcement-manager

Alternatives

Alternatives

beSECURE

beSECURE

Beyond Security (Fortra)

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Claim DragonSoft DVM and update features and information
Claim DragonSoft DVM and update features and information
Claim F5 BIG-IP Policy Enforcement Manager and update features and information
Claim F5 BIG-IP Policy Enforcement Manager and update features and information