DragonSoft DVM Description

The DVM detection initiative encompasses the identification of security vulnerabilities, audits for vulnerabilities, and assessments of accounts and settings, while also providing functions for risk evaluation and statistical analysis. Additionally, it features a database scanner designed to facilitate database vulnerability detection and assess security risks. The D-GCB system can identify the information and communication software utilized by government entities, ensuring that endpoint devices align with TW GCB configuration standards, which helps mitigate the risk of internal cyberattacks and addresses information security issues. Furthermore, Hyper EDR is capable of recognizing over 5000 types of prevalent APT malware and hacking tools, operating in a threat-aware mode that eliminates the need for any Kernel Driver interventions, thereby utilizing minimal CPU resources. Overall, these tools collectively enhance the security posture of organizations by enabling proactive risk management and vulnerability assessment strategies.

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
DragonSoft Security Associates
Year Founded:
2002
Headquarters:
United States
Website:
www.dragonsoft.com

Media

Recommended Products
AI-powered service management for IT and enterprise teams Icon
AI-powered service management for IT and enterprise teams

Enterprise-grade ITSM, for every business

Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free

Product Details

Platforms
Web-Based
Customer Support
Business Hours
Online Support

DragonSoft DVM Features and Options

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Software

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

DragonSoft DVM User Reviews

Write a Review
  • Previous
  • Next