ThomasNet News Logo
Sign Up | Log In | ThomasNet Home | Promote Your Business
Industry Market Trends ®
Fluid & Gas Flow Journal
Machining Journal
Procurement Journal
Tech Trends Journal
 Industry News
Latest New Product News
Association & Government News
Thought Leaders
 Product News
Adhesives and Sealants
Agricultural and Farming Products
Architectural and Civil Engineering Products
Automatic ID
Chemical Processing and Waste Management
Cleaning Products and Equipment
Communication Systems and Equipment
Computer Hardware and Peripherals
Construction Equipment and Supplies
Controls and Controllers
Display and Presentation Equipment
Electrical Equipment and Systems
Electronic Components and Devices
Explosives, Armaments and Weaponry
Fasteners and Hardware
Fluid and Gas Flow Equipment
Food Processing and Preparation
Green & Clean
Health, Medical and Dental Supplies and Equipment
Labels, Tags, Signage and Equipment
Laboratory and Research Supplies and Equipment
Machinery and Machining Tools
Material Handling and Storage
Materials and Material Processing
Mechanical Components and Assemblies
Mechanical Power Transmission
Mining, Oil Drilling & Refining
Mounting and Attaching Products
Non-Industrial Products
Optics and Photonics
Packaging Products & Equipment
Paints and Coatings
Plant Furnishings and Accessories
Portable Tools
Printing and Duplicating Equipment
Retail and Sales Equipment
Safety and Security Equipment
Sensors, Monitors and Transducers
Test and Measuring Instruments
Textile Industry Products
Thermal and Heating Equipment
Timers and Clocks
Transportation Industry Products
Vision Systems
Waste Handling Equipment
Welding Equipment and Supplies
 Press Releases
Products in the News
Company News
Mergers & Acquisitions
People in the News
Literature & Websites
News Delivery Options
Newsletter Archive
Browse Categories
Browse Companies
Mobile Edition
PR Resources
Call for Contributors, Guest Writers and Submissions
How to Write an effective Press Release
Trade Associations
Software -> Safety & Security Software

Safety & Security Software

(Showing headlines 1 - 20)   more ....

Security Software manages network segmentation.

Tufin Technologies    Chatham, NJ 07928
Jul 02, 2014 Extending Unified Security Policy™ into SecureChange® Network Change Automation platform, Tufin Orchestration Suite™ vR14-2 brings best of breed management, visibility, and automation to enterprise network security policies. Program includes central violation and exception management resulting in comprehensive auditability and minimized network exposure, delivering automation for controlling organization's desired segmentation during network change process.

Signature Verification Software reduces instances of fraud.

Top Image Systems, Ltd    Tel Aviv 69710  Israel
Jun 26, 2014 Used to reduce fraud, eFLOW® Signature Verification automatically analyzes incoming signatures on any document against existing samples collected during previous instances. Signatures flagged as potentially fraudulent are passed to operators through GUI for further analysis to highlight where problem areas exist. Via this functionality, solution helps increase speed and accuracy of processes and enables staff to be redeployed.

Security Software targets hybrid cloud environments.

Trend Micro, Inc.    Cupertino, CA 95014
Jun 25, 2014 Available for VMware's vCloud® Hybrid Service™, Deep Security solution offers platform for security controls and policies managed across physical, virtual, and cloud environments. Interoperability with VMware vCloud Director and other VMware technologies lets administrators automatically detect virtual machines and apply context-based policies to them for consistent security across datacenter and into public cloud. Users also benefit from virtual patching, which shields VMs from vulnerabilities.

Data Security Software offers web protection capabilities.

GFI Software USA, Inc.    Cary, NC 27513
Jun 16, 2014 Offering advanced Web Protection features based on GFI WebMonitor solution, GFI MAX RemoteManagement allows MSPs to protect customers' networks from web-based threats by limiting access to malicious websites, enforcing corporate browsing policies, and monitoring bandwidth utilization. By deploying this feature set alongside GFI MAX RemoteManagement's managed antivirus and patch management capabilities, MSPs have ability to offer clients complete endpoint security.

Cyber Security Solutions boost automation system protection.

Metso Automation    Shrewsbury, MA 01545-8044
Jun 13, 2014 Designed to counteract emerging threats and avoid disrupted production, Security Business Solution includes assessments of security of installations with security audits to identify vulnerabilities. Risk mitigation techniques, including firewalls and VPNs, are supplemented with virus-protection software custom configured to automation system. To ensure highest level of protection, security follow-up provides security updates, including antivirus software, virus definitions, and security patches.

Security Software helps implement STIG-compliant environment.

SteelCloud Inc.    Herndon, VA 20171
Jun 12, 2014 Designed for DoD and government customers as well as organizations that support them, GoldDisk Plus™ STIG-hardened Windows 2008 R2 Amazon Machine Image implements .NET, IIS, and Internet Explorer, and has pre-installed DoD Certs and Microsoft EMET. ACAS/Nessus scans and completed DISA STIG Checklist are also included. With patent-pending technology, ConfigOS™ automates remediation of production servers using XML policy signature, cutting STIG policy update and testing process down to 5 min.

UTM/NGFW Appliances deliver wired and wireless network security.

UTM/NGFW Appliances deliver wired and wireless network security.

WatchGuard Technologies, Inc.    Seattle, WA 98104
Jun 06, 2014 Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances let users deploy, configure, and manage wired and wireless network security through one appliance and single-pane view. Enabled via Fireware® v11.9 OS, wireless functionality eliminates need for additional wireless network management solutions and provides unified Web interface for managing and monitoring network in real-time. OS also includes such services as: antivirus, antispam, application control, ATP, and DLP.

Virtual Storage Encryption Appliance secures critical workloads.

AFORE Solutions Inc.    Ottawa Ontario K2B 8J9  Canada
Jun 05, 2014 CloudLink® SecureVSA lets businesses moving to cloud deployments bring their own encryption to VMware® vCloud® Hybrid Service™ and renders data inaccessible to other tenants, cloud administrators, and outsiders. Without requiring any changes to workloads and applications, agentless solution addresses data privacy and regulatory compliance concerns via its security policy that automates encryption management and enables VMware customers to have exclusive control of encryption keys.

Endpoint Protection Software tackles advanced malware.

IBM (Corporate Headquarters)    Armonk, NY 10504-1783
May 30, 2014 Providing automated threat analysis, Trusteer Apex Software blocks attempts to exploit vulnerabilities on endpoint that lead to data breaches. Program prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from performing high-risk activities. If phishing email is opened, Trusteer Apex can identify malware and stop it from exploiting endpoint. Program also prevents employees from re-using corporate credentials on untrusted sites.

Cloud Security Software supports MS Office 365 for Education.

Milton Security Group, Inc    Fullerton, CA 92835
May 23, 2014 With Cloud Authentication & Security, educational organizations can use current Microsoft Office 365 for Education accounts for authentication purposes. Combination of CAS and ICEGuard adaptive network access control appliance gives each school ability to know who, what, when, where, and how of every user attempting to access network.

Content Security Software targets small businesses.

Trend Micro, Inc.    Cupertino, CA 95014
May 14, 2014 With option of cloud management, Worry- Free™ Business Security v9.0 equips small businesses with enterprise-grade security capabilities that address and mitigate threats across endpoints, from desktops to mobile devices. Program features Remote Wipe and Device Access control capabilities to securely remove all data from BYOD devices in event of theft or data breach. To facilitate mobile device management, software integrates with Microsoft Exchange ActiveSync.

Security Software/Service help organizations protect critical data.

IBM (Corporate Headquarters)    Armonk, NY 10504-1783
May 13, 2014 Leveraging security intelligence and behavioral analytics, IBM Threat Protection System disrupts attacks across entire attack chain from break-in to exfiltrate. End-to-end architecture of analytic and forensics software helps organizations continuously prevent, detect, and respond to ongoing and sophisticated cyber attacks. In some cases, threat can be eliminated before damage occurs. Critical Data Protection Program, based on Data Centric Security Model, helps safeguard critical data.

Network Cyber Security System uses bio-inspired technology.

Chemring Technology Solutions    Poole, Dorset   United Kingdom
May 08, 2014 Using bio-inspired technology that mimics and applies autonomic fight-or-flight fear response mechanism of mammals to cyber defense, Perception™ provides neural network architecture designed to combat unknown and emerging threats. Network security system, while able to identify malicious activity and new attacks as they emerge, can also monitor for and detect any slow, unauthorized data exfiltration — even when obfuscation techniques are used to evade rules-based detection techniques.

Security Software addresses flexible deployment and management.

Trend Micro, Inc.    Cupertino, CA 95014
Apr 25, 2014 Granting blended offering of on-premise and SaaS deployments without having to switch environments, Complete User Protection solution provides security across endpoints using cloud, hybrid, or on-premise deployment. In addition to application control, browser exploit detection, and cloud-based secure Web gateway deployment, features include endpoint encryption, user-centric visibility of Control Manager central console, proactive vulnerability protection capabilities, and hosted email security.

FCRM Software helps prevent electronic payments fraud.

FISERV, Inc.    Brookfield, WI 53045
Apr 23, 2014 With real-time electronic payments monitoring capabilities, Financial Crime Risk Management Platform protects clients from threat of payments fraud. ACH Fraud Prevention uses detection and interdiction scenarios to evaluate ACH files, batches, and transactions, looking for unusual behavior and other variables that indicate fraud risk. Wire Fraud Prevention capability prevents wire fraud losses with minimal impact to organizations, while SWIFT Sanctions Screening supports all MT formats.

Mobile Forensic Software adds permission management.

Cellebrite USA Corp.    Glen Rock, NJ 07452
Apr 15, 2014 With Universal Forensic Extraction Device software, forensic lab administrators can enforce policies around manner and circumstances under which UFED Touch and UFED 4PC users extract mobile device data. Part of UFED v3.0, UFED Permission Management offers granular administrative support at any extraction level: logical, file system, or physical. It enables administrators to create user profiles and assign data extraction permissions according to predefined SOPs or other internal policies.

Security Authentication Software controls access to corporate apps.

AGAT Software Solutions    Asseret   Israel
Apr 15, 2014 AppShield enables organizations to define dedicated application credentials and allow mobile access to apps requiring Active Directory authentication. Software provides network protection by blocking DDoS and brute-force attacks. Addressing critical authentication issues, product lets businesses give workers safe access to internal applications from corporate and privately owned devices.

APT Management Software provides real-time visibility.

WatchGuard Technologies, Inc.    Seattle, WA 98104
Apr 11, 2014 Available on WatchGard UTM and NGFW appliances, APT Blocker v11.9 delivers real-time threat visibility and protection in minutes. Program identifies and submits suspicious files to cloud-based sandbox using full-system-emulation environment for detecting advanced persistent threats and zero day malware. Solution integrates with WatchGuard Dimension™, providing instant, single view of advanced threats, along with other top trends, applications, and threats covered by WatchGuard technologies.

Access Management Software increases IT admin productivity.

Thycotic Software    Washington, DC 20036
Apr 10, 2014 By offering session monitoring and SSH Proxy capabilities as well as support for Microsoft .NET Framework 4.5.1, Secret Server delivers greater insight into protection of privileged accounts. Functionality removes complexities associated with password management while promoting security and productivity for enterprise IT administrators. Additional capabilities include discovery, automatic password changing, and Heartbeat features; SSH logging; as well as session recording retention.

Network Threat Detection Software promotes visibility, security.

Lancope    Alpharetta, GA Georgia 30022
Mar 31, 2014 Behavioral-based security monitoring platform, StealthWatch® System v6.5 helps organizations identify and thwart attacks that bypass perimeter defenses. Security analytics for network visibility and threat detection are complemented by intuitive Web-based interface and security alarming capabilities. Features include Operational Network & Security Intelligence (ONSI) dashboard, data hoarding alarms, StealthWatch Labs Security Updates, and Active Directory integration in UI.

(Showing headlines 1 - 20)   more ....

Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by        Browse ThomasNet Directory

Copyright © 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy