Several hundred million malware programs are circulating worldwide, and new variants are discovered every day. Unwanted applications can encrypt our devices, leak information, click on advertisements, generate uncontrolled traffic or steal our identities.
, you can save yourself time-and costly consuming hardware purchases as well as technical knowledge. We protect your end devices, email gateways and mobile devices with our powerful cloud services.
As a FireEye Platinum Partner, we have also implemented FireEye’s hardware and security services in the areas of Endpoint Protection, Network Protection, Mail Security and Security Operations Center in the IKARUS data centre. Benefit from global threat intelligence with local data processing in Austria!Read More
Merkur Versicherung takes a bold step into the future
„We know each other by now and we appreciate the professional cooperation. Robert Picher, Head of IT at Merkur Versicherung
Head of IT Operations at Merkur
“We are using Mobile Device Management for the first time and quality, reliability and security are particularly important to us," says Gerhard Eber, ICT Manager at SUZUKI AUSTRIA.
ICT-Manager SUZUKI AUSTRIA ( Lukas Dostal)
AMTC FireEye/IKARUS Security Software
“In the end, the decision was made, knowing that the comprehensive know-how of the internationally active group FireEye was combined with IKARUS as a regional partner for implementation and service.“ Christoph Pertl, IT Security Officer at AMTC
IT Security Officer ÖAMTC
IKARUS anti.virus protects Windows laptops, desktops and servers from Malware and third-party access.
IKARUS mobile.management is a comprehensive solution for private and mobile devices in corporate environments.
IKARUS mail.security with ATP scans emails and attachments, detects and blocks Malware, Spam and zero day attacks, even before they reach the network.
Step-by-step instructions: Order and install IKARUS anti.virus
Request a demo via IKARUS Security Software Sales-Hotline:
IKARUS managed.defense enables the central management of security incidents of your entire infrastructure from endpoints, networks and mail gateways to operational technologies and industrial control systems.