This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here

Hide
Jump to navigation

Security Products

IT Governance, as a leading supplier of products and services for information security, are now offering a market-leading range of data protection tools. Below you can find information on this range including products and services from Sophos, Symantec, 3M and ESET.

Sophos

Sophos Logo

Sophos are a leading supplier of data-leakage prevention (DLP) tools. They offer a range of different solutions to suit any particular environment or platform. Their mantra is to help you stop threats and protect your data without making your job more complicated.

IT Governance are a Sophos Gold Partner.




SafeGuard Enterprise

SafeGuard Enterprise is the modular enterprise-wide solution in the Sophos encryption suite of tools. It is a highly configurable and easily manageable solution that can be deployed centrally or remotely across an organisation of any size. It offers the following features and benefits:

  • Encryption that's certified to the highest standards
  • Great performance for your encrypted computers
  • One console to manage all your encryption activities
  • Plug in the encryption features you need

For more information on SafeGuard Enterprise and for pricing, please call +44 (0)845 070 1750 or email us.




Sophos Endpoint Protection

Sophos Endpoint Protection is an endpoint protection solution. It includes anti-virus, application and device control, firewall, Web protection and patch assessment, and data protection with integrated data control. It is an easily manageable solution.

For more information on Sophos Endpoint Protection and for pricing, please call +44 (0)845 070 1750 or email us.




Symantec

Symntac Logo

Symantec helps organisations secure and manage their information by offering a leading range of full disk encryption tools that meet the requirements laid down in the PCI Data Security Standard (PCI DSS).

IT Governance are a Symantec partner – for more information, please phone +44 (0)845 070 1750 or email us.



Endpoint Encryption Full Disk Edition

Endpoint Encryption Full Disk Edition offers advanced data and file encryption for desktop, laptops and removable media. It is highly scalable and can be deployed across an entire organisation. It can be centrally managed and deployed with ease.

For more information on Endpoint Encryption Full Disk Edition and for pricing, please call +44 (0)845 070 1750 or email us.
 



ESET

Eset Logo

ESET have developed a leading range of security solutions that detect and disable all forms of malware. Their extensive line-up of security solutions protect across all types of environments and platforms, from workstations and servers to mobile devices. ESET security solutions offer superior detection capabilities and low resource requirements.

ESET offer the following types of security solution:

  • Antivirus
  • File security
  • Mail server security
  • Secure authentication
  • Gateway security
  • Mobile security

IT Governance is an authorised reseller of ESET.
 



ESET Endpoint Antivirus

ESET Endpoint Antivirus is design to be deployed on networks both large and small. It delivers state-of-the-art malware protection for workstations. It allows you to concentrate on running your business rather than your antivirus.

Whereas some antivirus (AV) solutions suffer from system slow-downs, false positives, and other issues that impact on users and tie up IT, ESET Endpoint Antivirus doesn't suffer from these pitfalls.

ESET Endpoint Antivirus offers the following features benefits:

  • Antivirus and antispyware protection
  • Central administration console
  • Available for Windows, Mac and Linux environments
  • Incredible speed and stability

ESET Endpoint Antivirus is recommended for endpoints sitting behind a firewall. Using ESET Endpoint Antivirus will ensure a small footprint and minimal usage of system resource for your workstations.

For more information on ESET Endpoint Antivirus and for pricing please call +44 (0)845 070 1750 or email us.
 



ESET Mobile Security - Business Edition

ESET Mobile Security - Business Edition is a suite of anti-malware security solutions that are available on the Android, Symbian and Windows Mobile operating systems for mobile phones and tablets. The suite offers:

  • SMS/MMS anti-spam filter
  • Real-time protection
  • Security audit check
  • On-demand and on-access scanning
  • Remote lock and wipe functionality
  • Remote administration

Please note that not all of the above features are available on tablet computers.

For more information on ESET Mobile Security - Business Edition and for pricing please call +44 (0)845 070 1750 or email us.
 



ESET Mail Security

ESET offer a leading range of anti-malware solutions for email security. Installed on a server they eliminate all types of email-borne threats and unsolicited email, with harmful content filtered away at the server level - before it can do any damage.

ESET offer email security solutions for the following platforms: Windows, Linux, Kerio Connect and Lotus Domino.

For more information on ESET email security solutions and for pricing please call +44 (0)845 070 1750 or email us.



N-Stalker

N-Stalker Logo

N-Stalker Web Application Security Scanner X is a sophisticated online security assessment tool for web applications. It incorporates N-Stealth HTTP Security Scanner with its 39,000 web attack signature database.

Web Application Security Scanner X will scan your web applications for vulnerabilities and help you ensure your applications are secure.

As a distributor of N-Stalker software, IT Governance can offer two commercial editions of the software. These are:

Infrastructure Edition – This edition includes all the tools needed to scan and assess the security of your web server infrastructure.

Enterprise Edition - Uses all of N-Stalker’s latest technology that will allow you to complete security assessments that will enhance the overall security of your web applications against a wide range of vulnerabilities and sophisticated hacker attacks.

For more information on N-Stalker and for pricing please call +44 (0)845 070 1750 or email us.




Nessus

Nessus is the one of the world’s most widely used vulnerability and compliance assessment products. Nessus is a free download and has the following features:

  • High-speed discovery,
  • Configuration auditing,
  • Asset profiling,
  • Sensitive data discovery,
  • Patch management integration,
  • And vulnerability analysis of your security posture

Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across separate networks. Organisations that wish to use the Nessus vulnerability scanner need to purchase a Nessus ProfessionalFeed subscription, available from IT Governance.

A Nessus ProfessionalFeed subscription enables an organisation to scan their network (unlimited IP addresses allowed), obtain support, receive updates to their database of vulnerability checks, and perform compliance auditing.

For more information on Nessus and for pricing, please call +44 (0)845 070 1750 or email us




Core Security

Core Security offers a leading range of penetration testing software. As a distributor of Core Security products, IT Governance is able to offer the entire range of Core Security penetration testing products.

Core Impact Pro

Core Impact Pro is a tool for assessing and testing for security vulnerabilities throughout your entire organisation. Core Impact Pro enables you to replicate multi-staged attacks that pivot across systems, devices and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

CORE Impact Pro’s vulnerability validation capabilities provide you with actionable data for efficient remediation.

For more information on the Core Security range and for pricing, please call +44 (0)845 070 1750 or email us




3M Logo

3M

3M are a leading solutions provider in the field of visual security. They offer many different sizes and types of privacy filters for laptops, desktops, mobile phones and tablets. 3M privacy filters employ micro-louvre black-out privacy technology to prevent anyone viewing your screen from either side whilst allowing you to continue to view your screen with ease.

For more information on 3M privacy filters and for pricing, please call +44 (0)845 070 1750 or email us




Boldon James Logo

Boldon James

Boldon James information classification software allows you to apply relevant classifications (visual & metadata labels/protective markings) to information (files) of many different types. These labels/markings can be used to enforce user policies, raise user awareness of security and orchestrate multiple on-demand security technologies such as encryption.

For more information on Boldon James information classification software and for pricing, please call +44 (0)845 070 1750 or email us




SafeXs

SafeXs Logo

SafeXs is a leading range of hardware-encrypted USB sticks and USB management software that is employed more than any other in the UK’s National Health Service (NHS). The devices in the SafeXs range are FIPS 140-2 certified or CESG approved and FIPS 197 certified.

The management console software within the SafeXs range is highly configurable. It includes such features as remote kill, continuous incremental backup, device and file audit and extensive reporting.

For more information on the SafeXs range and for pricing, please call +44 (0)845 070 1750 or email us

BUY IT Security Books

IT Induction and Information Security Awareness

Buy now

+44 (0) 845 070 1750
live chat support software