Safety & Security Software|
Safety & Security Software
(Showing headlines 1 - 20) more ....
Authentication Software supports mobile banking platforms.
Boston, MA 02210
Sep 09, 2014
Delivered through SDK integration for iOS and Android applications, BioCatch Mobile offers frictionless authentication and threat detection to mobile Apps. Authentication function creates cognitive biometric signature which takes into account physiological factors such as left/right handedness, press-size, and hand tremor. Utilizing cognitive behavioral analysis, threat detection capability identifies signs of account takeover and live malware manipulation attacks on mobile applications.
Cybersecurity Software protects data across multiple platforms.
McLean, VA 22102
Sep 03, 2014
As adaptive solution, CyberSecurity Edge™ offers data security and mitigates vulnerabilities to protect against hackers, viruses, and malware. Holistic, agile, and adaptive approach to securing data leverages architecture designed to help thwart operational disruption, intellectual property loss and fraud, as well as loss of public trust resulting from cyberattacks. Repeatable and scalable solution is tailored to meet customer compliance requirements and is aligned with best practices.
Counterveillance Software protects financial applications.
Nashua, NH 03062
Aug 29, 2014
Embedded in any financial application such as mobile banking, mobile payment, or mobile wallet applications, Privacy Shield™ provides trusted connection so that information such as passwords or account numbers can be transmitted securely. Software is designed to shield financial applications from eavesdropping by malicious apps on device and to prevent cybercriminals in close proximity from intercepting transmission of sensitive information.
Healthcare Provider Software fosters secure access management.
Bellevue, WA 98004
Aug 28, 2014
Promoting security and compliance by safeguarding patient health information, Caradigm® Identity and Access Management (IAM) helps healthcare organizations control access to applications and patient data. Subscription-based model includes integration to unlimited number of applications. Product portfolio includes Caradigm Provisioning, which provides role-based user identity management, as well as Caradigm Single Sign-On (SSO) and Caradigm Context Management (CM).
Data Management Software helps adopt cloud architecture.
CommVault Systems, Inc.
Oceanport, NJ 07757-0900
Aug 26, 2014
Designed to speed cloud adoption and data center modernization, Simpana Solution Sets include Simpana for VM Backup, Recovery and Cloud Management which enables users to build, protect, and optimize virtualized and cloud infrastructure. Simpana for Endpoint Data Protection helps protect and enable mobile workforce by backing up devices, while Simpana for Email Archive minimizes compliance risk and optimizes insights by integrating self-service access, eDiscovery, and legal hold.
Cyber Security Software enables secure transfer of data.
Ottawa, Ontario K1P 5L4 Canada
Aug 15, 2014
Integrated into ShareProtect secure file transfer application, ValidianProtect v2.1 provides secure access to, and transfer of, confidential digital information and data. Validian-enabled ShareProtect will help eliminate points of cyber attack by preventing, not just detecting, hacking or improper access of confidential digital information; encrypting data for transfer from point-of-inception to point-of-final-reception; and dynamically changing all information and crypto policies.
VPD System provides cloud key management security.
Ramat Hasharon Israel
Aug 06, 2014
Combining data encryption with split-key encryption and homomorphic key management technologies, Porticor Virtual Private Data System protects critical data in public, private, and hybrid cloud environments. By supporting Microsoft SQL Server Transparent Data Encryption, product secures Microsoft's database in cloud infrastructures. Software-defined key management solution eliminates risks of storing SQL Database Encryption Keys on database server, where they can be compromised or stolen.
IT/Cybersecurity Analysis Software reports business impact risks.
Spokane, WA 99202
Aug 05, 2014
With what if analysis, root cause analysis, and issue management capabilities, RiskCalibrator v2.0 automatically generates reports that provide insight needed to make risk management decisions. This specifically addresses IT and cybersecurity risk mitigation investment allocation, cybersecurity insurance requirements assessment, communication of risk and compliance issues, deriving financially driven risk appetite statements, as well as quantification of capital reserves and other set-asides.
Data Security Software unifies network and endpoint analysis.
New York, NY 10019
Aug 04, 2014
By passively monitoring internal network traffic, LightCyber Magna identifies deviations that may indicate security breach. Magna Pathfinder provides actionable insight into security incidents via agentless endpoint analysis, while Magna Cloud provides actionable information via cloud-based subscription service, applying threat intelligence on malicious domains/files. With Magna Manager, users can react to breaches directly from console, isolating breached endpoints and compromised credentials.
Security Software manages network segmentation.
Chatham, NJ 07928
Jul 02, 2014
Extending Unified Security Policy™ into SecureChange® Network Change Automation platform, Tufin Orchestration Suite™ vR14-2 brings best of breed management, visibility, and automation to enterprise network security policies. Program includes central violation and exception management resulting in comprehensive auditability and minimized network exposure, delivering automation for controlling organization's desired segmentation during network change process.
Signature Verification Software reduces instances of fraud.
Top Image Systems, Ltd
Tel Aviv 69710 Israel
Jun 26, 2014
Used to reduce fraud, eFLOW® Signature Verification automatically analyzes incoming signatures on any document against existing samples collected during previous instances. Signatures flagged as potentially fraudulent are passed to operators through GUI for further analysis to highlight where problem areas exist. Via this functionality, solution helps increase speed and accuracy of processes and enables staff to be redeployed.
Security Software targets hybrid cloud environments.
Trend Micro, Inc.
Cupertino, CA 95014
Jun 25, 2014
Available for VMware's vCloud® Hybrid Service™, Deep Security solution offers platform for security controls and policies managed across physical, virtual, and cloud environments. Interoperability with VMware vCloud Director and other VMware technologies lets administrators automatically detect virtual machines and apply context-based policies to them for consistent security across datacenter and into public cloud. Users also benefit from virtual patching, which shields VMs from vulnerabilities.
Data Security Software offers web protection capabilities.
GFI Software USA, Inc.
Cary, NC 27513
Jun 16, 2014
Offering advanced Web Protection features based on GFI WebMonitor solution, GFI MAX RemoteManagement allows MSPs to protect customers' networks from web-based threats by limiting access to malicious websites, enforcing corporate browsing policies, and monitoring bandwidth utilization. By deploying this feature set alongside GFI MAX RemoteManagement's managed antivirus and patch management capabilities, MSPs have ability to offer clients complete endpoint security.
Cyber Security Solutions boost automation system protection.
Shrewsbury, MA 01545-8044
Jun 13, 2014
Designed to counteract emerging threats and avoid disrupted production, Security Business Solution includes assessments of security of installations with security audits to identify vulnerabilities. Risk mitigation techniques, including firewalls and VPNs, are supplemented with virus-protection software custom configured to automation system. To ensure highest level of protection, security follow-up provides security updates, including antivirus software, virus definitions, and security patches.
Security Software helps implement STIG-compliant environment.
Herndon, VA 20171
Jun 12, 2014
Designed for DoD and government customers as well as organizations that support them, GoldDisk Plus™ STIG-hardened Windows 2008 R2 Amazon Machine Image implements .NET, IIS, and Internet Explorer, and has pre-installed DoD Certs and Microsoft EMET. ACAS/Nessus scans and completed DISA STIG Checklist are also included. With patent-pending technology, ConfigOS™ automates remediation of production servers using XML policy signature, cutting STIG policy update and testing process down to 5 min.
UTM/NGFW Appliances deliver wired and wireless network security.
WatchGuard Technologies, Inc.
Seattle, WA 98104
Jun 06, 2014
Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances let users deploy, configure, and manage wired and wireless network security through one appliance and single-pane view. Enabled via Fireware® v11.9 OS, wireless functionality eliminates need for additional wireless network management solutions and provides unified Web interface for managing and monitoring network in real-time. OS also includes such services as: antivirus, antispam, application control, ATP, and DLP.
Virtual Storage Encryption Appliance secures critical workloads.
AFORE Solutions Inc.
Ottawa Ontario K2B 8J9 Canada
Jun 05, 2014
CloudLink® SecureVSA lets businesses moving to cloud deployments bring their own encryption to VMware® vCloud® Hybrid Service™ and renders data inaccessible to other tenants, cloud administrators, and outsiders. Without requiring any changes to workloads and applications, agentless solution addresses data privacy and regulatory compliance concerns via its security policy that automates encryption management and enables VMware customers to have exclusive control of encryption keys.
Endpoint Protection Software tackles advanced malware.
IBM (Corporate Headquarters)
Armonk, NY 10504-1783
May 30, 2014
Providing automated threat analysis, Trusteer Apex Software blocks attempts to exploit vulnerabilities on endpoint that lead to data breaches. Program prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from performing high-risk activities. If phishing email is opened, Trusteer Apex can identify malware and stop it from exploiting endpoint. Program also prevents employees from re-using corporate credentials on untrusted sites.
Cloud Security Software supports MS Office 365 for Education.
Milton Security Group, Inc
Fullerton, CA 92835
May 23, 2014
With Cloud Authentication & Security, educational organizations can use current Microsoft Office 365 for Education accounts for authentication purposes. Combination of CAS and ICEGuard adaptive network access control appliance gives each school ability to know who, what, when, where, and how of every user attempting to access network.
Content Security Software targets small businesses.
Trend Micro, Inc.
Cupertino, CA 95014
May 14, 2014
With option of cloud management, Worry- Free™ Business Security v9.0 equips small businesses with enterprise-grade security capabilities that address and mitigate threats across endpoints, from desktops to mobile devices. Program features Remote Wipe and Device Access control capabilities to securely remove all data from BYOD devices in event of theft or data breach. To facilitate mobile device management, software integrates with Microsoft Exchange ActiveSync.
(Showing headlines 1 - 20) more ....