Safety & Security Software

Software, Test & Measuring Instruments

Data Logger ensures 21-CFR Part 11 compliance.

May 25, 2016

Compatible with Lascar's EL-21CFR-2-LCD Temperature, Humidity and Dew Point Datalogger, EasyLog 21-CFR v7.4 allows users to store data in compliance with 21CFR Part 11 regulations. Readings collected from logger are stored in encrypted format which cannot be edited. In addition, software provides full audit trail of activities and actions taken, with users being able to add comments to specific readings before being approved by authorized user. Electronic signatures are added to all reports. Read More

Computer Hardware & Peripherals, Safety & Security Equipment, Software

TaaSera Chosen as 2015 SINET 16 Innovator

November 3, 2015

Influential Nomination Recognizes 16 Leading Cybersecurity Pioneers CUPERTINO, Calif. and MCLEAN, Va. - TaaSera Inc., the leading provider of preemptive breach detection for cybersecurity, today announced its selection as one of the 2015 SINET 16 Innovators. Chosen from a pool of 122 candidates, TaaSera is one of 16 elite companies selected to present at the SINET Showcase. With nine out... Read More

Fluid & Gas Flow Equipment, Laboratory and Research Supplies & Equipment, Software

Hospira Announces First Installation of Plum 360(TM) Infusion System with Hospira MedNet(TM)

September 1, 2015

Next-generation infusion system offers expanded drug library and EMR interoperability LAKE FOREST, Ill. – Hospira, Inc. (NYSE: HSP), the world's leading provider of injectable drugs and infusion technologies, today announced the first installation of the Plum 360™ infusion system with Hospira MedNet™, at Shannon Medical Center in San Angelo, Texas. The Plum 360 infusion system,... Read More

Software

Rockwell Automation and Cisco Launch New Architectures to Reduce Security Risks in Industrial Automation Environments

July 1, 2015

MILWAUKEE, — As industrial markets evolve to unlock the promise of the Internet of Things (IoT), Rockwell Automation and Cisco today are announcing new additions to their Converged Plantwide Ethernet (CPwE) architectures to help operations technology (OT) and information technology (IT) professionals address constantly changing security practices. The latest CPwE security expansions, featuring... Read More

Software

Crossmatch Releases Enhanced DigitalPersona Altus Advanced Authentication Functionality

June 25, 2015

A truly flexible, easy to use and deploy authentication solution incorporating biometric "proof of presence" PALM BEACH GARDENS, Fla. -- Crossmatch(TM), a leading provider of multi-factor identity management and authentication solutions, today announced enhanced functionality of its DigitalPersona(® )Altus strong, multi-factor authentication solution.  The enhancements build on the native... Read More

Software

Patch Management Software safeguards against vulnerability.

April 21, 2015

Absolute Manage® v6.8 enables IT administrators to manage operating system patches for Mac and Windows devices, along with a wide range of third-party applications, in fully automated system that detects and downloads missing patches. This is enabled via integrated automated patch engine that provides coverage and updates for most prevalent and at-risk third-party applications. Upon administrator approval for each update, solution deploys and reports on status of each patch. Read More

Software

Access Management Software securely supports mobile devices.

April 20, 2015

Identity and Access Management Suite v9.0 includes Hitachi ID Mobile Access for Android and iOS, which enables access to all product features from phones and tablets. Along with dashboards and reports, features include ability to feed report output into requests to automate access remediation. Communication between user's device and on-premise IAM system is facilitated by cloud-hosted proxy service. To ensure security, devices must be activated via scanned QR code. Read More

Software

Fraud Prevention Software offers real-time auditing solution.

April 20, 2015

Utilizing patent-pending algorithms, SmartTouch Advanced Fraud Prevention analyzes, detects, and prevents fraudulent financial transactions. Solution examines spending habits, historical patterns, and approver activity to identify anomalies and inconsistencies in transactions. After being automatically routed to authorized reviewer, transactions suspected for fraud are halted, while legitimate transactions are approved for payment. All financial activity is recorded in audit log. Read More

Software

Purchasing Card Monitoring Software automates compliance.

April 20, 2015

Providing automated analysis and resolution of over 35 risks inherent to P-Card processes, P-Card Monitoring Solution helps expand P-Card usage while minimizing exposure to card misuse. Software includes Integrated Case Management for rectification of non-compliance, best-practice guides for controls and administration of P-Card programs, and dashboards that provide visibility into P-Card activities such as risks, root causes, and spend patterns across employees, departments, and merchants. Read More

Optics & Photonics, Software

NICE to Showcase New NiceVision Release, Suspect Search, and Situation Management at ISC West 2015

April 17, 2015

NICE expert will lead a panel discussion as part of the SIA Education program PARAMUS, New Jersey – NICE Systems(NASDAQ: NICE) today announced that it will showcase its industry-leading security solutions in booth #12101 at ISC West 2015 which takes place April 15-17. At the event, NICE will demonstrate how customers can leverage situation management to gain operational intelligence and... Read More

Software

VASCO to Showcase Authentication Solutions for Healthcare Providers and Integrators at HIMSS15

April 17, 2015

VASCO Solutions Help Healthcare Service Providers Secure Access and Comply with Regulatory Requirements CHICAGO - VASCO Data Security International, Inc. (NASDAQ: VDSI), a global leader in authentication, digital signatures and identity management, will showcase its innovative data security solutions that help protect access to patient data and satisfy regulatory compliance at The HIMSS15... Read More

Computer Hardware & Peripherals, Software

ARRIS and Conax to Demo DASH Repackaging and Multi-DRM Encryption at NAB

April 17, 2015

Conax will host a joint demonstration of ARRIS Spectrum SDC software and Conax multi-DRM in delivering next generation IP video SUWANEE, Ga. – ARRIS Group Inc. (NASDAQ: ARRS) and Conax today announced they will be demonstrating the joint capabilities of ARRIS's DASH repackaging and Conax's multi-DRM encryption at the annual NAB Show on April 13-16 in Las Vegas. The demo will... Read More

Software

Data Security Platform protects information in AWS S3 and Box.

April 17, 2015

With encryption, key management, and access controls, Cloud Encryption Gateway helps enterprises secure sensitive data residing in Amazon Web Services (AWS) Simple Storage Service (S3) and Box environments. Data is encrypted before being saved to cloud storage; encryption keys and access policies are always under enterprise control. While gateway provides encryption and policy enforcement, paired Vormetric Data Security Manager (DSM) delivers encryption key and policy management. Read More

Software

CYREN to Showcase Cyber Intelligence and Enterprise Security Solutions at 2015 RSA Conference

April 14, 2015

Demonstrations of the CYREN WebSecurity service available at booth #707 in Moscone South MCLEAN, Va. - CYREN (NASDAQ: CYRN) today announced its participation at RSA Conference 2015, where it will highlight the application of its unique cyber intelligence in the real-time threat mitigation and attack prevention capabilities of its CYREN WebSecurity service. Demonstrations will be available... Read More

Software

Data Capture Software offers cloud-based identity verification.

April 8, 2015

With idScan® cloud-based offerings, companies can capture and verify customer's identity and critical personal information to optimize efficiency, security, and quality of customer interactions. Users can capture data from identity documents such as driver's licenses, passports, and medical insurance cards. Information is processed in cloud and data is then populated into integrated third party system, helping to optimize customer onboarding and registration processes. Read More

Computer Hardware & Peripherals, Software

Session Border Controller secures IP-PBX appliances.

April 7, 2015

Optionally available for CompletePBX IP-PBX Series of all-in-one appliances, CompleteSBC™ software provides security via intrusion prevention, acting as firewall for access control and Denial of Service. Program provides NAT traversal, smart routing, and messages repair to solve interoperability problems. As B2BUA server, CompleteSBC allows implementation of additional applications such as SIP UDP/TCP/TLS gateway. Read More

Software

CYREN Cybersecurity Technology Chosen to Protect Joint Venture by Mitsubishi Heavy Industries and Siemens

April 6, 2015

MCLEAN, Va. – CYREN (NASDAQ: CYRN) today announced that UK-based Primetals Technologies, a joint venture by Mitsubishi Heavy Industries, Ltd. (MHI) and Siemens AG, selected CYREN's cloud-based cybersecurity technology to provide real-time protection from advanced cyberattacks, zero hour malware outbreaks, and hard-to-detect email threats, including viruses, phishing, spam and spyware. ... Read More

Software

Intralinks Signs Strategic Partnership Agreement to Provide Secure Content Collaboration Solutions in China

April 3, 2015

Intralinks Partners with Beijing Shenzhou Xiangyun Technology Co Ltd. to provide sales, marketing, and support services in China NEW YORK and HONG KONG – Intralinks® Holdings, Inc. (NYSE: IL), a leading global provider of secure enterprise content collaboration solutions, and Beijing Shenzhou Xiangyun Technology Co Ltd, the cloud business affiliate of Digital China (Stock Code: 00861.HK),... Read More

Software

Network Assessment Software helps defend against major breaches.

April 3, 2015

Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit in major breach, immediate risks, as well as higher-order effects to show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network changes that would prevent attacker from compromising additional systems with stolen credentials. Read More

Software

Real-Time Software solves enterprise application security challenges.

April 2, 2015

Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and operating within 7 min, solution supports Java 8 and legacy versions of Microsoft .NET. Read More