MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Mobile device managementBrowser securityEndpoint detection and responseDigital securityInformation securityMobile device forensicsComputer securityComputer security softwareEndpoint securityEnterprise mobility managementSecurity controlsCloud computing securityAntivirus softwareAutomotive securityMobile operating systemSecurity applianceNetwork securitySecurity engineeringDigital forensicsMobile app developmentInformation security managementTransmission securityMobile application managementHistory of mobile phonesData center securityIt security standardsComputer and network surveillanceSecure codingMobile webCommunications securityInternet security awarenessInformation rights managementIt lawEncryption softwareInformation assuranceIntrusion detection systemApplication securityDisk encryption softwareSmartphoneComputer access controlMobile computingData loss prevention softwareMhealthComputer forensicsInternet safetyCapability-based securityThreatHardware security moduleData securitySecurity event managerHardware-based encryptionTamperproofingFirewallNetwork access protectionDisk encryptionPassword policyTransport layer securityAssetTelecommunications equipmentOpportunistic wireless encryptionNetwork access controlLinux for mobile devicesCyber-security regulationCryptovirologyIpsecSandboxRemote monitoring and managementLegal technologyHttp strict transport securityTechnology managementContent disarm & reconstructionDevice fingerprintDatabase securityPrivacy-enhancing technologiesMobile marketingCyberattackAuthorizationPrivacy engineeringManaged security serviceGuardNetworking hardwareSecurity information managementCyber threat intelligenceAccess controlBrowser isolationPassword managerSecure access moduleSecurity operations centerPassword crackingDesktop virtualizationMac filteringPersonal communications serviceSecure electronic transactionEmail encryptionSecure telephoneContext awarenessDdos mitigationMalware analysisDigital electronicsControl-flow integrity