Safety & Security Software

Software

Mobile Platform helps organizations manage apps.

February 27, 2015

With access to cloud-based or on premise capabilities, organizations using IBM MobileFirst Platform can secure, personalize, and integrate data from multiple sources to optimize decision-making. Clients can use platform to build and deploy mobile apps, integrate apps built with third party tools, and collect in-app usage and feedback for sentiment analysis and crash analytics. With Cloudant module, organizations can store, sync, scale, and connect to data in enterprise systems. Read More

Software

Secure Network Framework counters mobile, server cyber threats.

February 27, 2015

Built around 4 main features, SafeMobile provides security framework to meet cyber threats on mobile client and main server. Cyber Secure Gateway secures mobile traffic by ensuring authentication, identity, and encryption; Cyber Secure Mobile Client enables mobile applications development using secure framework; Secure Certification offers authority and workflow designed to issue certificate for mobile environment; and Cyber Device Management provides secure mobile device storage/provisioning. Read More

Software, Computer Hardware & Peripherals

Software-Defined Storage Platform modernizes enterprise.

February 24, 2015

Bringing horizontal data services approach to modernizing enterprise, FreeStor™ delivers migration, continuity, protection, recovery, and optimization for any storage environment through single management interface. Intelligent Abstraction™ core, with scalable storage hypervisor, optimizes storage resources regardless of type, connectivity, brand, or speed into storage resource pool that can be provisioned to physical or virtual applications, along with common, unified data services across pool. Read More

Software

Security Policy Orchestration Software supports Amazon AWS.

February 19, 2015

Through automated and unified approach to security policy management across heterogeneous platforms, including traditional networks, private cloud, and public cloud, Tufin Orchestration Suite R15-1 delivers security policy orchestration. Security policy browser enables instant searching and reporting on security policies across all leading firewall and cloud platforms. With software-defined firewall policies, RESTful APIs are used to manage Check Point, Cisco, and Juniper security policies. Read More

Software

Hybrid Penetration Tester identifies mobile app vulnerabilities.

February 18, 2015

As hybrid, cloud-based solution, ThreatVigil leverages core penetration engine, using automated tools and manual assessment techniques, to facilitate security testing, remediation, and protection of mobile applications against targeted attacks. Functionality facilitates Zero False Positives and business logic testing based on industry standard frameworks while helping organizations meet regulatory requirements. Also included, reporting module provides security risk details with recommendations.
Read More

Software

Wireless Security Solution enables and enforces no-wireless zones.

February 17, 2015

As wireless intrusion detection and prevention (WIDS/WIPS) solution, AirMagnet Enterprise delivers timely, dynamic threat updates; location tracking capabilities; and alerts concerning cellular or Wi-Fi® devices. Capabilities also enable enterprises and agencies to enforce 24/7 No-Wireless zone and help meet PCI 3.0 compliance standards. Along with 802.11ac detection, location, and blocking of rogue devices, solution offers captive portal support that ensures guest wireless networks.
Read More

Software

Security Software protects businesses from DNS attacks.

February 13, 2015

Designed to ensure full DNS service availability, DNS Guardian guarantees data integrity and continuity of web services. Program protects cache and recursive functions separately, allowing uninterrupted service to be provided, even when one function is targeted by attack. By offering real-time analysis of DNS cache-recursive transactions, program enables users to detect specific DNS attack signatures, protect service by applying counter-measures, and remediate attack by identifying source. Read More

Software, Services

Cloud Data Security Management Service addresses Shadow IT issues.

February 10, 2015

Addressing data loss threats caused by employees using their own cloud services to store work documents, MobileIron Content Security Service  (CSS) separates security controls from data storage methods and allows security to be managed at document-level across multiple content repositories. Solution protects documents stored in repositories with 5 core capabilities: encryption and key management, DLP controls, secure sharing, activity trail, and EMM integration. Read More

Software

Security Software tracks customers entering safe deposit vault.

February 6, 2015

Replacing use of handwritten index cards, Vaultrax v1.0 optimizes security and accelerates sign-in process for customers accessing key-based safe deposit boxes. With touch-enabled interface running in browser on tablet or laptop, program verifies customer identity by reading driver's license or swiping ATM card, with optional security PIN entry, and photo and signature display. Centralized database allows bank executives to run reports on safe deposit activity across all branches. Read More

Software, Computer Hardware & Peripherals

P2PE Software secures payment card data.

February 6, 2015

In addition to security, True P2PE solution allows omni-channel commerce, use of multiple point-of-sale property management systems within single environment, and use of various entry devices. Solution works in tandem with TrueTokenization to completely eliminate all cardholder data from merchant environment. Because solution does not leave merchant with burden of managing encryption keys, entire cardholder data environment is limited to encrypting devices where card data is initially captured. Read More

Software

Enterprise Security Software prevents account lockout/DDoS.

February 6, 2015

Allowing safe connection of users to Lync servers from smartphones, tablets, and any other external device, LyncShield prevents unauthorized devices (mobiles/desktops) from connecting to corporate network, avoids usage of Active Directory (AD) credentials, and protects against account lockout/DDoS. Features include Two Factor Authentication/device registration, MDM client-based Lync server access, Lync mobile smart card login, RSA token authentication, and Exchange Web Services protection. Read More

Software

Mobile Card Management Application helps reduce fraud and loss.

January 21, 2015

Layered atop existing fraud rules, CardValet™ helps financial institutions improve cardholder engagement and reduce fraud loss. Cardholders, through this downloadable application, can monitor and control how, when, and where their cards are used. Functionality covers turn cards off and establishing spending limits. Also, users can decline transactions that exceed predefined thresholds or those concerning specific merchant categories. Accounts with linked access may also be monitored. Read More

Software

Redaction Software protects confidential information.

January 19, 2015

Designed to redact electronic versions of Microsoft Word and Excel files, Redact Assistant 2.0 retains functionality of document so file does not have to be converted to graphic or PDF. Software comes with useful aids that help to mask common terms to be redacted, such as Social Security numbers and credit card numbers. In addition to law firms, software is suited for government agencies, pharmaceutical and healthcare organizations, and corporations. Read More

Software

Data Backup Software protects and enables mobile workforce.

January 19, 2015

Available as standalone solution for backing-up laptops, desktops, and mobile devices, Simpana for Endpoint Data Protection empowers organizations to reduce risk by protecting against data loss and enabling enterprise-wide compliance and eDiscovery. Solution also helps increase productivity across enterprise via self-service capabilities for data restore, secure file sharing, and advanced data analytics/reporting. Capabilities can be acquired modularly to meet each application requirements. Read More

Software

Data Security Software delivers administrative flexibility.

December 19, 2014

Business security suite comprises ESET Remote Administrator, Endpoint Security for Windows®/OS X/Android®, Antivirus for Windows®/ESET Antivirus for OS X, File Security for Microsoft Windows Server®, and License Administrator. Also included, ESET Remote Administrator provides Web-based, platform-independent, remote management console that lets IT managers deploy new software, monitor and mitigate security risks, as well as satisfy reporting and audit requirements. Read More

Software

Security Software detects insider and targeted threats.

December 12, 2014

Delivering combination of dynamic community threat analysis and real-time detection of cyber attacks, X-Series Platform puts organization’s key assets at center of real-time investigations of insider and targeted threats. Organizations can identify potentially threatening individuals and hosts, understand details of any anomalous behavior, and perform quick triage and prioritization of incident response to best protect most important assets. Read More

Software

Virtualized Security Solution detects malware.

December 9, 2014

By protecting service provider's networks, M2M communications, and mobile and home devices from malware that can degrade performance, Motive Security Guardian optimizes delivery of services as well as customer experience. When malware is found on device, owner is alerted with step-by-step instructions on how to remove threat. Solution is powered by Motive Security Labs, which collects more than 120,000 new malware samples per day and maintains library of over 30 million active samples. Read More

Software

Automated Cloud Security Software works with AWS Marketplace.

November 18, 2014

Trend Micro™ Deep Security™ for Amazon Web Services (AWS) provides automated cloud security on AWS Marketplace, including intrusion prevention (IPS), anti-malware with web reputation, integrity monitoring, log inspection, and host firewall. This cloud and data center platform, integrated with such management tools as Chef, Puppet, SaltStack, AWS CloudFormation, or AWS OpsWorks, automates security provisioning for protection of instances from vulnerabilities with workload-aware security. Read More

Computer Hardware & Peripherals, Software

Virtualization Platform facilitates SDN/NFV deployments.

November 17, 2014

Based on open hardware and software architectures, Centellis™ Virtualization Platform is capable of up to 160 Gbps server interconnect for line-rate application processing and includes up to 12 dual-processor Artesyn ATCA-7480 server blades based on Intel® Xeon® E5-2600 V3 processors. OpenFlow and OpenStack software stacks support software defined networking and network function virtualization. To optimize efficiency of virtual application deployment, platform offers load-balanced switching. Read More

Software

Security Modules safeguard mobile apps and transactions.

November 13, 2014

Intended for application developers and ISVs, DIGIPASS for Apps and DIGIPASS for Mobile v4.4 safeguard mobile applications and transactions from attacks. Risk scoring driven by user, platform, and context elements are embedded into One Time Password authentication request for optimized security and server-side analytics. Encrypted secure channel for user and transaction authentication and validation adds additional layer of protection to secure delegation of OTP, signatures, and scoring. Read More