Safety & Security Software

Software

Patch Management Software safeguards against vulnerability.

April 21, 2015

Absolute Manage® v6.8 enables IT administrators to manage operating system patches for Mac and Windows devices, along with a wide range of third-party applications, in fully automated system that detects and downloads missing patches. This is enabled via integrated automated patch engine that provides coverage and updates for most prevalent and at-risk third-party applications. Upon administrator approval for each update, solution deploys and reports on status of each patch. Read More

Software

Access Management Software securely supports mobile devices.

April 20, 2015

Identity and Access Management Suite v9.0 includes Hitachi ID Mobile Access for Android and iOS, which enables access to all product features from phones and tablets. Along with dashboards and reports, features include ability to feed report output into requests to automate access remediation. Communication between user's device and on-premise IAM system is facilitated by cloud-hosted proxy service. To ensure security, devices must be activated via scanned QR code. Read More

Software

Purchasing Card Monitoring Software automates compliance.

April 20, 2015

Providing automated analysis and resolution of over 35 risks inherent to P-Card processes, P-Card Monitoring Solution helps expand P-Card usage while minimizing exposure to card misuse. Software includes Integrated Case Management for rectification of non-compliance, best-practice guides for controls and administration of P-Card programs, and dashboards that provide visibility into P-Card activities such as risks, root causes, and spend patterns across employees, departments, and merchants. Read More

Software

Fraud Prevention Software offers real-time auditing solution.

April 20, 2015

Utilizing patent-pending algorithms, SmartTouch Advanced Fraud Prevention analyzes, detects, and prevents fraudulent financial transactions. Solution examines spending habits, historical patterns, and approver activity to identify anomalies and inconsistencies in transactions. After being automatically routed to authorized reviewer, transactions suspected for fraud are halted, while legitimate transactions are approved for payment. All financial activity is recorded in audit log. Read More

Software

Data Security Platform protects information in AWS S3 and Box.

April 17, 2015

With encryption, key management, and access controls, Cloud Encryption Gateway helps enterprises secure sensitive data residing in Amazon Web Services (AWS) Simple Storage Service (S3) and Box environments. Data is encrypted before being saved to cloud storage; encryption keys and access policies are always under enterprise control. While gateway provides encryption and policy enforcement, paired Vormetric Data Security Manager (DSM) delivers encryption key and policy management. Read More

Software

Data Capture Software offers cloud-based identity verification.

April 8, 2015

With idScan® cloud-based offerings, companies can capture and verify customer's identity and critical personal information to optimize efficiency, security, and quality of customer interactions. Users can capture data from identity documents such as driver's licenses, passports, and medical insurance cards. Information is processed in cloud and data is then populated into integrated third party system, helping to optimize customer onboarding and registration processes. Read More

Software, Computer Hardware & Peripherals

Session Border Controller secures IP-PBX appliances.

April 7, 2015

Optionally available for CompletePBX IP-PBX Series of all-in-one appliances, CompleteSBC™ software provides security via intrusion prevention, acting as firewall for access control and Denial of Service. Program provides NAT traversal, smart routing, and messages repair to solve interoperability problems. As B2BUA server, CompleteSBC allows implementation of additional applications such as SIP UDP/TCP/TLS gateway. Read More

Software

Network Assessment Software helps defend against major breaches.

April 3, 2015

Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit in major breach, immediate risks, as well as higher-order effects to show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network changes that would prevent attacker from compromising additional systems with stolen credentials. Read More

Software

Real-Time Software solves enterprise application security challenges.

April 2, 2015

Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and operating within 7 min, solution supports Java 8 and legacy versions of Microsoft .NET. Read More

Software

Cyber Threat Detection Platform protects enterprise blind spots.

April 2, 2015

S-series sensor extends real-time cybersecurity into all corners of organization, including such blind spots as remote sites and internal network segments, to automatically see indicators of cyber attack anywhere in network. Detection Triage functionality, included, lets security teams identify and track risky behaviors that can enable or obscure network attacks. Ability to customize and track detections of such behaviors using local context ensures cyber attacks are not overlooked. Read More

Software

Cluster Computing Platform performs identity analytics.

March 27, 2015

Utilizing open source platforms, Astra™ performs large-scale identity-related security tasks. Program distributes comparison operations and data across multiple computing nodes, enabling rapid search of large biometric databases and execution of high volumes of biometric authentications. Astra can also perform advanced text-based search and analytics on large stores of identity data. Algorithm-independent and fault-tolerant, Astra uses browser-based dashboard for system monitoring and alerts. Read More

Software

Security Software protects distributed enterprise blind spots.

March 25, 2015

S-series sensor provides threat detection platform that extends automated, real-time cybersecurity into all corners of organization, including remote sites and internal network segments. In addition to security visibility, solution offers Detection Triage functionality that lets security teams identify and track risky behaviors that can enable/obscure network attacks. Ability to customize and track detections using local context is critical to ensure cyber attacks are not overlooked. Read More

Software

Software Development Kit simplifies database security.

March 13, 2015

With field-level encryption, Smart Encryption SDK protects sensitive information in databases at field level allowing organizations in financial services, government, and healthcare to maintain compliance. Length + Format preserving protection preserves database schemas requiring only minimal changes to applications. Feature solidifies integrity for fields containing fixed length or format specific values like Social Security or credit cards numbers without compromising referential integrity. Read More

Software

Data Privacy Software streamlines management with automation.

March 12, 2015

Data Privacy Management Platform offers Assessment Manager with automation functionality, which reduces effort required for each privacy assessment by helping privacy teams keep pace with changing business, legal, and regulatory landscape. Solution also promotes overall quality of data privacy management program. Specifically, Assessment Manager capabilities include data collection audits, compliance reviews, gap and risk analysis, and workflow management. Read More

Software

SCM Software offers distributed version control capabilities.

March 11, 2015

Available as on-premise software and as cloud service, Helix SCM and Content Collaboration Platform serves as single source of truth for all contributors on multi-disciplinary product teams. Solution includes native Distributed Version Control System engine and complete Git management with advanced repo management capabilities, pull requests, issue tracking, and web hooks. Using advanced behavioral analytics, Helix automatically detects potential IP theft across accounts, projects, and assets. Read More

Software, Services

Predictive Anti-Fraud Analytics uncover telecom frauds.

March 11, 2015

As predictive, machine learning-based fraud prevention solution, Mobileum Anti-Fraud Analytics helps telecom operators arrest revenue leakage. Solution runs on Wisdom Big Data and Analytics platform, which can mine through billions of unsuspected usage transactions in real-time to discover anomalous patterns of emerging fraudulent behaviors. This breadth helps detect deviations in known types of frauds and identify unknown frauds across voice, data, and SMS scenarios. Read More

Software

Mobile Data Security Software offers control and transparency.

March 10, 2015

AVG Zen™ lets mobile operators provide context-aware alerts, updates, and information direct to customer to give them control and transparency of security across their devices. Core features include subscription security service for families that includes AVG AntiVirus and AVG Cleaner across all devices; dedicated Location Labs by AVG products, including phone controls and location services; and platform that mobile operators can use to deliver context-aware solutions for core services. Read More

Software

Collaborative Security Platform helps fight cyber-threats.

March 4, 2015

Featuring fully decentralized, peer-to-peer architecture, Comilion facilitates compliant, cross-industry, relevancy-based sharing and security collaboration in tightly regulated markets. Closed, self-managed communities enable real-time threat identification, mitigation, and joint remediation. Leveraging customizable rule-based sharing policy, multi-jurisdictional regulation enforcement, and privacy-by-design handling, Comilion correlates trends across all vetted community members. Read More

Software

Mobile Platform helps organizations manage apps.

February 27, 2015

With access to cloud-based or on premise capabilities, organizations using IBM MobileFirst Platform can secure, personalize, and integrate data from multiple sources to optimize decision-making. Clients can use platform to build and deploy mobile apps, integrate apps built with third party tools, and collect in-app usage and feedback for sentiment analysis and crash analytics. With Cloudant module, organizations can store, sync, scale, and connect to data in enterprise systems. Read More

Software

Secure Network Framework counters mobile, server cyber threats.

February 27, 2015

Built around 4 main features, SafeMobile provides security framework to meet cyber threats on mobile client and main server. Cyber Secure Gateway secures mobile traffic by ensuring authentication, identity, and encryption; Cyber Secure Mobile Client enables mobile applications development using secure framework; Secure Certification offers authority and workflow designed to issue certificate for mobile environment; and Cyber Device Management provides secure mobile device storage/provisioning. Read More