ERICOM SOFTWARE LTD.

 ERICOM SOFTWARE LTD. contact information is shown below
Owner:ERICOM SOFTWARE LTD.
Owner Address:Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byERICOM SOFTWARE LTD.

Brand:

ERICOM CONNECT

Description:

Downloadable computer software for use in providing access to, delivering, deploying, and managing software applications, virtual and physical desktops, and data over computer networks and to remote users; downloadable computer software for use in accessing and using remote computer systems, networks, and software; downloadable computer software for use in enabling remote access to hosted software applications, data, and virtual and physical desktops from any end-user device, including devices requiring native installation as well as installation-free devices, all accessible via an organization's data center, on its premises or via a cloud-based service; downloadable computer software for use in administering, optimizing, monitoring, and auditing computer systems, networks and software; downloadable computer software for use in securing and encrypting data communications; downloadable computer software for use in accessing internet portals; downloadable computer software for use in operating system software that facilitates application deployment, management, and access across enterprise and global computer networks;CONNECT;Non-downloadable computer software for use in providing access to, delivering, deploying, and managing software applications, virtual and physical desktops, and data over computer networks and to remote users; non-downloadable computer software for use in accessing and using remote computer systems, networks, and software; non-downloadable computer software for use in enabling remote access to hosted software applications, data, and virtual and physical desktops from any end-user device, including devices requiring native installation as well as installation-free devices, all accessible via an organization's data center, on its premises or via a cloud-based service; non-downloadable computer software for use in administering, optimizing, monitoring, and auditing computer systems, networks and software; non-downloadable computer software for use in securing and encrypting data communications; non-downloadable computer software for use in accessing internet portals; non-downloadable computer software for use in operating system software that facilitates application deployment, management, and access across enterprise and global computer networks;

Category: DOWNLOADABLE COMPUTER SOFTWARE USE
Brand:

TRUE SEAMLESS WINDOWS

Description:

COMPUTER SOFTWARE AND COMPUTER PROGRAMS;TRUE, SEAMLESS or WINDOWS;

Category: COMPUTER SOFTWARE COMPUTER PROGRAMS
Brand:

ZERO TRUST EDGE

Description:

Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior;

Category: DOWNLOADABLE COMPUTER SOFTWARE AUTHENTICATING
Brand:

ZTBROWSER

Description:

Computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies; and for protecting computer systems, networks, data, and software from viruses, malware, and web-based threats; segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;ZT BROWSER;Cloud Computing Software as a service (SaaS) for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies; and for protecting computer systems, networks, data, and software from viruses, malware, and web-based threats; segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;

Category: COMPUTER SOFTWARE AUTHENTICATING USERS
Brand:

ZTEDGE

Description:

Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;ZT EDGE;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior;

Category: DOWNLOADABLE COMPUTER SOFTWARE AUTHENTICATING