+
+

Related Products

  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • ManageEngine Log360
    141 Ratings
    Visit Website
  • Graylog
    402 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website

About

The IoT edge that protects from inside. Continuously monitoring and identifying threats at every stage of development. For all your devices. Automate the analysis and identification of security vulnerabilities inside your devices. All in one place, with intelligent prioritization and proprietary rating. Get all the intel you need about the security of your device in one place: simple and convenient. Know exactly where the most dangerous vulnerabilities are, and address them in a smart way. Pulsar is a modern runtime threat detection and response engine. Designed for IoT and edge computing, Pulsar is optimized for performance, runtime cost, and edge security. Pulsar's modular architecture is written entirely in Rust, a modern and secure language. Pulsar combines its edge AI threat detection engines with deterministic security policies to achieve state-of-the-art performance.

About

Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end-user has a seamless experience when accessing their corporate data and personal apps. Our zero-trust philosophy ensures personal data protection is not bypassed while protecting the enterprise. Ijura Enterprise has 3 patents pending pertaining to securing any connected device through the telecom operator's endpoints by directly integrating with an operator through its data servers. Ijura Enterprise inspects every data packet for various vulnerabilities such as phishing, malware, botnets, etc.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies looking for a security framework for IoT, SCADA firmware systems

Audience

Enterprises in need of a cloud-deployed solution to protect end-user devices and IoT in the data network

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Exein
Founded: 2018
Italy
www.exein.io

Company Information

ijura
Founded: 2017
United States
www.ijura.com

Alternatives

Pulsar

Pulsar

Pulsar-Edit

Alternatives

Pulsar Music Player

Pulsar Music Player

Rhythm Software
Pulsar

Pulsar

Pulsar AI

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IoT Features

Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization

Integrations

Amazon Web Services (AWS)
Facebook
Google
Google Cloud Platform
Instagram
LinkedIn
Microsoft Azure
Pinterest
Salesforce
Snapchat
X (Twitter)
YouTube

Integrations

Amazon Web Services (AWS)
Facebook
Google
Google Cloud Platform
Instagram
LinkedIn
Microsoft Azure
Pinterest
Salesforce
Snapchat
X (Twitter)
YouTube
Claim Exein and update features and information
Claim Exein and update features and information
Claim ijura and update features and information
Claim ijura and update features and information