Trusted Knight Protector Endpoint

Trusted Knight Protector Endpoint

Trusted Knight Corporation
+
+

Related Products

  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • Guardz
    117 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,263 Ratings
    Visit Website
  • ManageEngine Log360
    163 Ratings
    Visit Website
  • EasyDMARC
    201 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website

About

SuperTokens is the most secure solution for user session management - enabling robust prevention and detection of attacks. SuperTokens mitigates against all types of attacks (XSS, MITM, session fixation, CSRF, etc) and is unique in its ability to reliably detect session theft (as per the official OAuth 2.0 specifications in RFC 6819). The library has solved the scalability, race conditions, and failure issues usually associated with this. It can be rapidly integrated within a few days.

About

Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Endpoint further protects internal and external endpoints by actively disabling the keylogging and data-stealing capabilities of the malware, preventing the theft of critical corporate or user credentials and other sensitive information that is used by cybercriminals to commit fraud or gain privileged access to the corporate network. Protector Endpoint was designed to provide a solution-focused on defeating crimeware attacks. Crimeware has become so sophisticated that traditional detect-and-remove strategies of anti-virus are no longer a viable approach and conventional endpoint protection products are often clunky and hard to manage. Instead of attempting to detect and remove crimeware, Protector Endpoint disables crimeware functions to eliminate its ability to collect information. Without browser-entered data, cybercriminals are unable to perpetrate crime.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Developers and CTOs searching for a powerful Cybersecurity solution

Audience

Endpoint Protection solution for IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.7 / 5
ease 5.0 / 5
features 4.7 / 5
design 4.7 / 5
support 5.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SuperTokens
Founded: 2019
India
supertokens.io

Company Information

Trusted Knight Corporation
Founded: 2010
United States
www.trustedknight.com/protector-endpoint-protection/

Alternatives

Alternatives

Trusted Knight Protector Air

Trusted Knight Protector Air

Trusted Knight Corporation
SpaceCREST

SpaceCREST

BigBear.ai
Secuve TOS

Secuve TOS

Secuve
Trusted Knight Protector Web

Trusted Knight Protector Web

Trusted Knight Corporation

Categories

Categories

Integrations

BoxyHQ
Jovu

Integrations

BoxyHQ
Jovu
Claim SuperTokens and update features and information
Claim SuperTokens and update features and information
Claim Trusted Knight Protector Endpoint and update features and information
Claim Trusted Knight Protector Endpoint and update features and information