Safety & Security Software|
Safety & Security Software
(Showing headlines 1 - 20) more ....
Enterprise Software protects against threats on all fronts.
Mahwah, NJ 07430
Mar 06, 2014
As holistic security architecture combining distributed detection and mitigation elements, Attack Mitigation Network (AMN) expands detection coverage across all enterprise resources and automates mitigation by selecting most effective tools and locations in data center, at perimeter, or in cloud. Security solution synchronizes traffic baselines and attack information among all mitigation tools across private and cloud IT infrastructure, promoting accurate and efficient attack mitigation.
Data Protection Software prevents, detects, and analyzes threats.
Trend Micro, Inc.
Cupertino, CA 95014
Mar 06, 2014
With unified threat defense as well as centralized visibility and control, Trend Micro™ Smart Protection Platform guards against known threats while also detecting and immediately responding to new targeted attacks to prevent further intrusion. Trend Micro™ Smart Sensor solution, included, consists of context-aware endpoint monitoring solution that lets threat investigators detect and assess nature and extent of targeted attacks on endpoints and servers, accelerating remediation.
Virtual Appliance detects advanced database threats.
Carlsbad, CA 92010
Mar 05, 2014
Based on Core Intrusion Detection System platform, Model IDS-6300v enables cloud providers and managed security service providers to deliver security SaaS offerings based on behavioral analysis technology. Virtual appliance delivers advanced and Zero-Day SQL injection attack detection as well as continuous database monitoring that alerts of attacks and behavioral anomalies in real-time. Product addresses compliance requirements within PCI DSS, HIPAA, GLBA, and NIST spec 800-53 regulations.
Authentication Software includes biometric capabilities.
Addison, TX 75001
Mar 04, 2014
With 3M™ Cogent biometric fingerprint capture and verification technology, Entrust IdentityGuard 10.2 Feature Pack 1 offers organizations 16 unique authenticators, all within single platform. Program also provides support for mobile one-time-passcodes; enhancements to Entrust Mobile Smart Credential, including ability to log in to Entrust's self-service module and expiry notifications; additional support for Thales nShield® Hardware Security Modules; and FIPS 201 support.
Security Policy Software manages network segmentation.
Chatham, NJ 07928
Mar 04, 2014
With Tufin Orchestration Suite™ R14-1, IT organizations can enforce security policy across complex, multi-vendor enterprise networks. Unified Security Policy enables users to map out and manage their desired network security architecture, while in-depth information about zone-to-zone traffic and policy restrictions optimizes change management. In addition to monitoring application connectivity, SecureApp provides one-click repair of broken application connections to minimize downtime.
Threat Intelligence Software solves enterprise vulnerabilities.
Emerging Threats Pro LLC
Lafayette, IN 47901
Mar 04, 2014
Part of IQRisk™ Suite, ETPro Ruleset offers layer of protection at network level to provide complete malware protection on SNORT® and Suricata platforms. IQRisk Rep List consists of IP reputation list that is ingested into most firewalls and UTMs to identify and block malicious threats from entering network. Delivering information through Web-based portal, IQRisk Query includes up to 3 years of historical data of IP and domain behavior, threat categorization, scoring, and geo location.
Mobile Authentication Solution offers native app integration.
Vasco Data Security Inc.
Oakbrook Terrace, IL 60181
Mar 03, 2014
Native authentication integration solution for MYDIGIPASS.COM in-the-cloud authentication platform lets application developers protect their end-users' online identities. Users securely log on from mobile app by clicking one button and are automatically redirected to MYDIGIPASS.COM mobile application to enter PIN code. Once this is validated, user is automatically switched back to mobile app and gains instant access to secured content. Authentication process is entirely done in back-end.
Web Application Scanner works with complex workflows.
Irvine, CA 92616
Feb 27, 2014
NTOSpider enables automated security testing of complex application workflows, including shopping carts and registration sequences. Capable of automatically understanding workflow sequence and expected results, solution enables automatic creation of relevant session states and discovery of web application security vulnerabilities. Functionality respects workflow order, allowing attack payloads to be delivered into application code where it can discover security vulnerabilities.
Threat Management Software uses contextual intelligence.
Mountain View, CA 94043
Feb 26, 2014
With ThreatOptics™, incident response times to Advanced Persistent Threats and malware attacks can be reduced. Software automatically turns threat reports received by Palo Alto Networks’ WildFire service into protection in multi-vendor, large scale environments. Using threat scores, administrators can identify high priority incidents based on severity and malware confidence rating. Reporting capabilities show attacks over time, recurring internal offenders, and frequent sources of attacks.
Advanced Threat Detection Software offers analysis, remediation.
Alpharetta, GA Georgia 30022
Feb 25, 2014
StealthWatch® System v6.5 features StealthWatch Labs security updates, which offer capabilities to detect, analyze, and remediate security threats targeting enterprise networks. Through StealthWatch Labs Intelligence Center™ (SLIC) delivers global intelligence on top threats, and SLIC Threat Feed provides enhanced detection capabilities for botnets and other advanced malware. Via collection and analysis of flow data, system helps deal with such attacks as APTs, insider threats, and DDoS.
Cloud Security Automation Software enforces compliance.
Catbird Networks, Inc.
Scotts Valley, CA 95066
Feb 21, 2014
Bringing automation and agility of cloud to security automation and compliance enforcement, SDN-ready Catbird v6.0 offers extended support for VMware® and Microsoft® hypervisors while also supporting VMware NSX® and Cisco ACI®. Continuous monitoring capabilities include extensive configuration checks based on Security Content Automation Protocol. Catbird v6.0 API includes ACL and alert operations, asset searching and enumeration, compliance state retrieval, and event operations.
Security Packs protect multiple devices.
San Diego, CA 92101
Feb 17, 2014
Providing comprehensive proactive protection across multiple devices and operating systems, ESET® Multi-Device Security Packs are suited for families or single users with more than one device. With one license, customers can activate any ESET product, desktop or mobile, depending on needs. With 3+3 option, customers can protect 3 PCs, Macs, and Android devices, while 5+5 option lets customers protect up to 10 devices across mix of products.
Antivirus SDK fosters malware defense integration.
ThreatTrack Security, Inc.
Clearwater, FL 33755
Feb 10, 2014
Able to be integrated into solution offerings of OEMs, VIPRE Antivirus SDK for Windows v7.0 helps improve threat detection and more effectively eliminate malware from their customers' networks. OEM partners can choose which features and capabilities to add to their own solutions, including core threat engine for antivirus defense, active protection for real-time malware detection, firewall, Web filtering, and email security.
Software Development Tool enables security testing.
Irvine, CA 92616
Feb 06, 2014
Integrating with Selenium browser automation tool, NTOSpider helps companies bridge gap between software development and web application security testing. With this integration, security teams can automatically detect security defects earlier in software development lifecycle, such as during nightly build process. NTOSpider's integration with Selenium can also be used to automate complex authentication solutions, as well as specific application workflows, such as shopping cart sequences.
Cybersecurity Solution prevents mass retail data breaches.
Colorado Springs, CO 80918
Feb 03, 2014
With CertainStore data vault, it is mathematically improbable if not impossible to hack data on mass level. Sensitive data elements are removed from original location, replaced with MicroToken, and MicroEncrypted using customer-specific encryption algorithms. MicroEncrypted data is scattered throughout dozens of servers, becoming unavailable to any form of unauthorized access. While above is occurring, perimeter defenses create 7 or more levels of disruptive force to stop unauthorized access.
IT Security Software offers in-depth detection capabilities.
St. Louis, MO 63105
Dec 19, 2013
Offering context-rich intelligence, cloud-based Norse IPViking™ v2.0 can detect malware in its development phase as well as identify mobile and desktop devices, appliances, servers, and satellites attempting to connect to networks via malicious IP addresses. Pre-attack malware detection and malicious-device-type identification capabilities reduce risk of falling victim to compliance violations, compromises, and data breaches. Automation eliminates delays caused by manual processes.
Computing Platform supports Intel-based workloads.
Blue Bell, PA 19422
Dec 10, 2013
Using fabric-based architecture, Forward!™ brings mission-critical security, availability, and scalability to workloads running on Intel-based servers. Secure partitioning software technology creates secure container of dedicated resources for each application workload. In addition to running cloud and big data workloads, Forward! is suited for boosting performance of ERP applications, addressing server sprawl by consolidating data center resources, and migrating from legacy systems that use Unix.
Real-Time Operating System includes full security suite.
RoweBots Research Inc.
Kitchener K2K 2P4 Canada
Dec 04, 2013
Combining 10 security components, Posix-compliant Unison RTOS enables secure Internet of Everything or machine-to-machine development. Security suite provides network communication security using TLS, virtual private network security using IPSec, secure login and system interaction using SSH, secure file transfer using SFTP, and secure boot using encrypted and checked image. It also offers secure email, web server, and management, plus filtering and encryption/decryption for data and logging.
Employee Well-Being Software helps optimize workflows.
Denver, CO 80202
Dec 02, 2013
Employee health, safety, and wellness software solution, ReadySet™ improves productivity through workflow optimization and employee engagement. Through included Supervisor Portal feature, supervisors and managers can track compliance status of direct reports. Portal specifically lets supervisors check on pending and overdue job-related health, certification, and safety requirements without accessing protected medical information.
Tablet Anti-Virus Software includes anti-theft features.
Orlando, FL 32810
Nov 26, 2013
With Anti-Theft remote lock service activated, AVG AntiVirus PRO for Android™ Tablets v3.4.1 will utilize Camera Trap feature to take secret photo of anyone that enters password incorrectly 3 consecutive times. SIM Lock feature can lock tablet if SIM card is replaced. In addition to anti-theft features, program includes privacy-focused App Backup, which saves apps to device's SD card to be restored when necessary, and App Locker, which can lock apps to protect privacy and safety.
(Showing headlines 1 - 20) more ....
Latest Products in the News
Indexing Technologies Inc. - March 6, 2014
After-Sales Support and Customer Services
Coxreels - March 5, 2014
COXREELS® Re‐Engineered a Superior Full‐Flow Fluid Path for the 1175 and 1185 Series
Emerson Power Transmission Corporation / Gearing Division - March 5, 2014
New LifeCycle Engineering Services Unit Formed to Increase OEE of Customers' Critical Systems
Michelman - March 5, 2014
Michelman Offers Global Priming Solutions for Biaxially Oriented Polypropylene and Polyethylene Film and Paper Substrates Printed on HP Indigo Presses
Future Electronics - March 5, 2014
Future Electronics Offers Greenliant's eMMC NANDrive(TM) to Replace Industrial SD Cards
Labthink International,Inc. - March 5, 2014
Permeability Testing Instruments Utilizes Labthink Patent Design
KVMSwitchTech - March 5, 2014
KVMSwitchTech Adds 4Kx2K HDMI Solutions and Incorporates Power Over Ethernet into HDBaseT Matrix Switchers
Doran Manufacturing Co. - March 5, 2014
Doran 360(TM) TPMS integration with Omnitracs(TM) for Truck Fleets
Caliente, LLC - March 5, 2014
Caliente Announces UL Approval for Controller
Lee Spring Co. - March 5, 2014
Lee Spring Expands Bantam(TM) Mini Springs Offering with Metric Sizes
More Products in the News...