Safety & Security Software

Software

Cluster Computing Platform performs identity analytics.

March 27, 2015

Utilizing open source platforms, Astra™ performs large-scale identity-related security tasks. Program distributes comparison operations and data across multiple computing nodes, enabling rapid search of large biometric databases and execution of high volumes of biometric authentications. Astra can also perform advanced text-based search and analytics on large stores of identity data. Algorithm-independent and fault-tolerant, Astra uses browser-based dashboard for system monitoring and alerts. Read More

Software

Security Software protects distributed enterprise blind spots.

March 25, 2015

S-series sensor provides threat detection platform that extends automated, real-time cybersecurity into all corners of organization, including remote sites and internal network segments. In addition to security visibility, solution offers Detection Triage functionality that lets security teams identify and track risky behaviors that can enable/obscure network attacks. Ability to customize and track detections using local context is critical to ensure cyber attacks are not overlooked. Read More

Software

Software Development Kit simplifies database security.

March 13, 2015

With field-level encryption, Smart Encryption SDK protects sensitive information in databases at field level allowing organizations in financial services, government, and healthcare to maintain compliance. Length + Format preserving protection preserves database schemas requiring only minimal changes to applications. Feature solidifies integrity for fields containing fixed length or format specific values like Social Security or credit cards numbers without compromising referential integrity. Read More

Software

Data Privacy Software streamlines management with automation.

March 12, 2015

Data Privacy Management Platform offers Assessment Manager with automation functionality, which reduces effort required for each privacy assessment by helping privacy teams keep pace with changing business, legal, and regulatory landscape. Solution also promotes overall quality of data privacy management program. Specifically, Assessment Manager capabilities include data collection audits, compliance reviews, gap and risk analysis, and workflow management. Read More

Software

SCM Software offers distributed version control capabilities.

March 11, 2015

Available as on-premise software and as cloud service, Helix SCM and Content Collaboration Platform serves as single source of truth for all contributors on multi-disciplinary product teams. Solution includes native Distributed Version Control System engine and complete Git management with advanced repo management capabilities, pull requests, issue tracking, and web hooks. Using advanced behavioral analytics, Helix automatically detects potential IP theft across accounts, projects, and assets. Read More

Software, Services

Predictive Anti-Fraud Analytics uncover telecom frauds.

March 11, 2015

As predictive, machine learning-based fraud prevention solution, Mobileum Anti-Fraud Analytics helps telecom operators arrest revenue leakage. Solution runs on Wisdom Big Data and Analytics platform, which can mine through billions of unsuspected usage transactions in real-time to discover anomalous patterns of emerging fraudulent behaviors. This breadth helps detect deviations in known types of frauds and identify unknown frauds across voice, data, and SMS scenarios. Read More

Software

Mobile Data Security Software offers control and transparency.

March 10, 2015

AVG Zen™ lets mobile operators provide context-aware alerts, updates, and information direct to customer to give them control and transparency of security across their devices. Core features include subscription security service for families that includes AVG AntiVirus and AVG Cleaner across all devices; dedicated Location Labs by AVG products, including phone controls and location services; and platform that mobile operators can use to deliver context-aware solutions for core services. Read More

Software

Collaborative Security Platform helps fight cyber-threats.

March 4, 2015

Featuring fully decentralized, peer-to-peer architecture, Comilion facilitates compliant, cross-industry, relevancy-based sharing and security collaboration in tightly regulated markets. Closed, self-managed communities enable real-time threat identification, mitigation, and joint remediation. Leveraging customizable rule-based sharing policy, multi-jurisdictional regulation enforcement, and privacy-by-design handling, Comilion correlates trends across all vetted community members. Read More

Software

Mobile Platform helps organizations manage apps.

February 27, 2015

With access to cloud-based or on premise capabilities, organizations using IBM MobileFirst Platform can secure, personalize, and integrate data from multiple sources to optimize decision-making. Clients can use platform to build and deploy mobile apps, integrate apps built with third party tools, and collect in-app usage and feedback for sentiment analysis and crash analytics. With Cloudant module, organizations can store, sync, scale, and connect to data in enterprise systems. Read More

Software

Secure Network Framework counters mobile, server cyber threats.

February 27, 2015

Built around 4 main features, SafeMobile provides security framework to meet cyber threats on mobile client and main server. Cyber Secure Gateway secures mobile traffic by ensuring authentication, identity, and encryption; Cyber Secure Mobile Client enables mobile applications development using secure framework; Secure Certification offers authority and workflow designed to issue certificate for mobile environment; and Cyber Device Management provides secure mobile device storage/provisioning. Read More

Software, Computer Hardware & Peripherals

Software-Defined Storage Platform modernizes enterprise.

February 24, 2015

Bringing horizontal data services approach to modernizing enterprise, FreeStor™ delivers migration, continuity, protection, recovery, and optimization for any storage environment through single management interface. Intelligent Abstraction™ core, with scalable storage hypervisor, optimizes storage resources regardless of type, connectivity, brand, or speed into storage resource pool that can be provisioned to physical or virtual applications, along with common, unified data services across pool. Read More

Software

Security Policy Orchestration Software supports Amazon AWS.

February 19, 2015

Through automated and unified approach to security policy management across heterogeneous platforms, including traditional networks, private cloud, and public cloud, Tufin Orchestration Suite R15-1 delivers security policy orchestration. Security policy browser enables instant searching and reporting on security policies across all leading firewall and cloud platforms. With software-defined firewall policies, RESTful APIs are used to manage Check Point, Cisco, and Juniper security policies. Read More

Software

Hybrid Penetration Tester identifies mobile app vulnerabilities.

February 18, 2015

As hybrid, cloud-based solution, ThreatVigil leverages core penetration engine, using automated tools and manual assessment techniques, to facilitate security testing, remediation, and protection of mobile applications against targeted attacks. Functionality facilitates Zero False Positives and business logic testing based on industry standard frameworks while helping organizations meet regulatory requirements. Also included, reporting module provides security risk details with recommendations.
Read More

Software

Wireless Security Solution enables and enforces no-wireless zones.

February 17, 2015

As wireless intrusion detection and prevention (WIDS/WIPS) solution, AirMagnet Enterprise delivers timely, dynamic threat updates; location tracking capabilities; and alerts concerning cellular or Wi-Fi® devices. Capabilities also enable enterprises and agencies to enforce 24/7 No-Wireless zone and help meet PCI 3.0 compliance standards. Along with 802.11ac detection, location, and blocking of rogue devices, solution offers captive portal support that ensures guest wireless networks.
Read More

Software

Security Software protects businesses from DNS attacks.

February 13, 2015

Designed to ensure full DNS service availability, DNS Guardian guarantees data integrity and continuity of web services. Program protects cache and recursive functions separately, allowing uninterrupted service to be provided, even when one function is targeted by attack. By offering real-time analysis of DNS cache-recursive transactions, program enables users to detect specific DNS attack signatures, protect service by applying counter-measures, and remediate attack by identifying source. Read More

Software, Services

Cloud Data Security Management Service addresses Shadow IT issues.

February 10, 2015

Addressing data loss threats caused by employees using their own cloud services to store work documents, MobileIron Content Security Service  (CSS) separates security controls from data storage methods and allows security to be managed at document-level across multiple content repositories. Solution protects documents stored in repositories with 5 core capabilities: encryption and key management, DLP controls, secure sharing, activity trail, and EMM integration. Read More

Software

Security Software tracks customers entering safe deposit vault.

February 6, 2015

Replacing use of handwritten index cards, Vaultrax v1.0 optimizes security and accelerates sign-in process for customers accessing key-based safe deposit boxes. With touch-enabled interface running in browser on tablet or laptop, program verifies customer identity by reading driver's license or swiping ATM card, with optional security PIN entry, and photo and signature display. Centralized database allows bank executives to run reports on safe deposit activity across all branches. Read More

Software, Computer Hardware & Peripherals

P2PE Software secures payment card data.

February 6, 2015

In addition to security, True P2PE solution allows omni-channel commerce, use of multiple point-of-sale property management systems within single environment, and use of various entry devices. Solution works in tandem with TrueTokenization to completely eliminate all cardholder data from merchant environment. Because solution does not leave merchant with burden of managing encryption keys, entire cardholder data environment is limited to encrypting devices where card data is initially captured. Read More

Software

Enterprise Security Software prevents account lockout/DDoS.

February 6, 2015

Allowing safe connection of users to Lync servers from smartphones, tablets, and any other external device, LyncShield prevents unauthorized devices (mobiles/desktops) from connecting to corporate network, avoids usage of Active Directory (AD) credentials, and protects against account lockout/DDoS. Features include Two Factor Authentication/device registration, MDM client-based Lync server access, Lync mobile smart card login, RSA token authentication, and Exchange Web Services protection. Read More

Software

Mobile Card Management Application helps reduce fraud and loss.

January 21, 2015

Layered atop existing fraud rules, CardValet™ helps financial institutions improve cardholder engagement and reduce fraud loss. Cardholders, through this downloadable application, can monitor and control how, when, and where their cards are used. Functionality covers turn cards off and establishing spending limits. Also, users can decline transactions that exceed predefined thresholds or those concerning specific merchant categories. Accounts with linked access may also be monitored. Read More