ThomasNet News Logo
Sign Up | Log In | ThomasNet Home | Promote Your Business
Industry Market Trends ®
Fluid & Gas Flow Journal
Machining Journal
Procurement Journal
Tech Trends Journal
 Industry News
Latest New Product News
Association & Government News
 Product News
Adhesives and Sealants
Agricultural and Farming Products
Architectural and Civil Engineering Products
Automatic ID
Chemical Processing and Waste Management
Cleaning Products and Equipment
Communication Systems and Equipment
Computer Hardware and Peripherals
Construction Equipment and Supplies
Controls and Controllers
Display and Presentation Equipment
Electrical Equipment and Systems
Electronic Components and Devices
Explosives, Armaments and Weaponry
Fasteners and Hardware
Fluid and Gas Flow Equipment
Food Processing and Preparation
Green & Clean
Health, Medical and Dental Supplies and Equipment
Labels, Tags, Signage and Equipment
Laboratory and Research Supplies and Equipment
Machinery and Machining Tools
Material Handling and Storage
Materials and Material Processing
Mechanical Components and Assemblies
Mechanical Power Transmission
Mining, Oil Drilling & Refining
Mounting and Attaching Products
Non-Industrial Products
Optics and Photonics
Packaging Products & Equipment
Paints and Coatings
Plant Furnishings and Accessories
Portable Tools
Printing and Duplicating Equipment
Retail and Sales Equipment
Safety and Security Equipment
Sensors, Monitors and Transducers
Test and Measuring Instruments
Textile Industry Products
Thermal and Heating Equipment
Timers and Clocks
Transportation Industry Products
Vision Systems
Waste Handling Equipment
Welding Equipment and Supplies
 Press Releases
Products in the News
Company News
Mergers & Acquisitions
People in the News
Literature & Websites
News Delivery Options
Browse Categories
Browse Companies
Mobile Edition
PR Resources
Call for Contributors, Guest Writers and Submissions
How to Write an effective Press Release
Trade Associations
Software -> Utilities & Tools

Utilities & Tools

Drivers Utilities

(Showing headlines 1 - 20)   more ....

Mobile Forensic Software adds permission management.

Cellebrite USA Corp.    Glen Rock, NJ 07452
Apr 15, 2014 With Universal Forensic Extraction Device software, forensic lab administrators can enforce policies around manner and circumstances under which UFED Touch and UFED 4PC users extract mobile device data. Part of UFED v3.0, UFED Permission Management offers granular administrative support at any extraction level: logical, file system, or physical. It enables administrators to create user profiles and assign data extraction permissions according to predefined SOPs or other internal policies.

Security Authentication Software controls access to corporate apps.

AGAT Software Solutions    Asseret   Israel
Apr 15, 2014 AppShield enables organizations to define dedicated application credentials and allow mobile access to apps requiring Active Directory authentication. Software provides network protection by blocking DDoS and brute-force attacks. Addressing critical authentication issues, product lets businesses give workers safe access to internal applications from corporate and privately owned devices.

APT Management Software provides real-time visibility.

WatchGuard Technologies, Inc.    Seattle, WA 98104
Apr 11, 2014 Available on WatchGard UTM and NGFW appliances, APT Blocker v11.9 delivers real-time threat visibility and protection in minutes. Program identifies and submits suspicious files to cloud-based sandbox using full-system-emulation environment for detecting advanced persistent threats and zero day malware. Solution integrates with WatchGuard Dimension™, providing instant, single view of advanced threats, along with other top trends, applications, and threats covered by WatchGuard technologies.

Access Management Software increases IT admin productivity.

Thycotic Software    Washington, DC 20036
Apr 10, 2014 By offering session monitoring and SSH Proxy capabilities as well as support for Microsoft .NET Framework 4.5.1, Secret Server delivers greater insight into protection of privileged accounts. Functionality removes complexities associated with password management while promoting security and productivity for enterprise IT administrators. Additional capabilities include discovery, automatic password changing, and Heartbeat features; SSH logging; as well as session recording retention.

Network Threat Detection Software promotes visibility, security.

Lancope    Alpharetta, GA Georgia 30022
Mar 31, 2014 Behavioral-based security monitoring platform, StealthWatch® System v6.5 helps organizations identify and thwart attacks that bypass perimeter defenses. Security analytics for network visibility and threat detection are complemented by intuitive Web-based interface and security alarming capabilities. Features include Operational Network & Security Intelligence (ONSI) dashboard, data hoarding alarms, StealthWatch Labs Security Updates, and Active Directory integration in UI.

Liveness Detection Software enhances mobile device security.

NexID Biometrics    Potsdam, NY 13676
Mar 25, 2014 Residing in fingerprint sensor or main processor, Mobile Live Finger Detection (LFD) software endows mobile devices with liveness detection. Technology-agnostic solution enhances convenience and security of mobile users by detecting whether captured image from fingerprint sensor is from live person finger or falsified. Able to achieve authentication rates as high as 94%–97%, software works with all fingerprint sensors and mobile devices.

Threat Management Software prevents data breaches in real-time.

NetCitadel, Inc.    Mountain View, CA 94043
Mar 25, 2014 NetCitadel ThreatOptics™ surrounds detected threats with context and intelligence and can automatically contain them in real-time, reducing incident response times to Advanced Persistent Threats (APTs) and targeted malware attacks. Addressing analysis, intelligence, and enforcement needs of Incident Response teams, threat management platform integrates with existing security enforcement devices and lets organizations reduce response time by enabling automated or semi-automated response.

Mobile App streamlines plant design review and approval.

AVEVA    Cambridge CB3 0HB  United Kingdom
Mar 21, 2014 As Windows 8.1 app for project decision makers in power, process plant, and mining industries, AVEVA E3D Insight enables mobile users to view, comment on, and approve AVEVA Everything3D (AVEVA E3D) designs from tablet device. Authorized users gain secure, direct access to see AVEVA E3D model and its associated information as well as inspect, manipulate, and measure model to check for potentially critical issues. Key decisions are recorded without forcing users to collate multiple comments.

Native SDN Solution aids DDoS attack detection and mitigation.

Radware Inc.    Mahwah, NJ 07430
Mar 11, 2014 DefenseFlow™ AMN Cyber Control and Intelligence Application v1.0 is available for NEC ProgrammableFlow Controller. Utilizing NEC controller that programs NEC ProgrammableFlow SDN switches as part of DoS/DDoS protection service, solution lets network operators provision DoS/DDoS protection service per virtual tenant network or per customer. DefenseFlow leverages adaptive behavioral-based DoS attack detection engine and traffic diversion mechanism.

Enterprise Software protects against threats on all fronts.

Radware Inc.    Mahwah, NJ 07430
Mar 06, 2014 As holistic security architecture combining distributed detection and mitigation elements, Attack Mitigation Network (AMN) expands detection coverage across all enterprise resources and automates mitigation by selecting most effective tools and locations in data center, at perimeter, or in cloud. Security solution synchronizes traffic baselines and attack information among all mitigation tools across private and cloud IT infrastructure, promoting accurate and efficient attack mitigation.

Data Protection Software prevents, detects, and analyzes threats.

Trend Micro, Inc.    Cupertino, CA 95014
Mar 06, 2014 With unified threat defense as well as centralized visibility and control, Trend Micro™ Smart Protection Platform guards against known threats while also detecting and immediately responding to new targeted attacks to prevent further intrusion. Trend Micro™ Smart Sensor solution, included, consists of context-aware endpoint monitoring solution that lets threat investigators detect and assess nature and extent of targeted attacks on endpoints and servers, accelerating remediation.

Virtual Appliance detects advanced database threats.

DB Networks    Carlsbad, CA 92010
Mar 05, 2014 Based on Core Intrusion Detection System platform, Model IDS-6300v enables cloud providers and managed security service providers to deliver security SaaS offerings based on behavioral analysis technology. Virtual appliance delivers advanced and Zero-Day SQL injection attack detection as well as continuous database monitoring that alerts of attacks and behavioral anomalies in real-time. Product addresses compliance requirements within PCI DSS, HIPAA, GLBA, and NIST spec 800-53 regulations.

Authentication Software includes biometric capabilities.

Entrust, Inc.    Addison, TX 75001
Mar 04, 2014 With 3M™ Cogent biometric fingerprint capture and verification technology, Entrust IdentityGuard 10.2 Feature Pack 1 offers organizations 16 unique authenticators, all within single platform. Program also provides support for mobile one-time-passcodes; enhancements to Entrust Mobile Smart Credential, including ability to log in to Entrust's self-service module and expiry notifications; additional support for Thales nShield® Hardware Security Modules; and FIPS 201 support.

Security Policy Software manages network segmentation.

Tufin Technologies    Chatham, NJ 07928
Mar 04, 2014 With Tufin Orchestration Suite™ R14-1, IT organizations can enforce security policy across complex, multi-vendor enterprise networks. Unified Security Policy enables users to map out and manage their desired network security architecture, while in-depth information about zone-to-zone traffic and policy restrictions optimizes change management. In addition to monitoring application connectivity, SecureApp provides one-click repair of broken application connections to minimize downtime. 

Threat Intelligence Software solves enterprise vulnerabilities.

Emerging Threats Pro LLC    Lafayette, IN 47901
Mar 04, 2014 Part of IQRisk™ Suite, ETPro Ruleset offers layer of protection at network level to provide complete malware protection on SNORT® and Suricata platforms. IQRisk Rep List consists of IP reputation list that is ingested into most firewalls and UTMs to identify and block malicious threats from entering network. Delivering information through Web-based portal, IQRisk Query includes up to 3 years of historical data of IP and domain behavior, threat categorization, scoring, and geo location.

Mobile Authentication Solution offers native app integration.

Vasco Data Security Inc.    Oakbrook Terrace, IL 60181
Mar 03, 2014 Native authentication integration solution for MYDIGIPASS.COM in-the-cloud authentication platform lets application developers protect their end-users' online identities. Users securely log on from mobile app by clicking one button and are automatically redirected to MYDIGIPASS.COM mobile application to enter PIN code. Once this is validated, user is automatically switched back to mobile app and gains instant access to secured content. Authentication process is entirely done in back-end.

Web Application Scanner works with complex workflows.

NT OBJECTives    Irvine, CA 92616
Feb 27, 2014 NTOSpider enables automated security testing of complex application workflows, including shopping carts and registration sequences. Capable of automatically understanding workflow sequence and expected results, solution enables automatic creation of relevant session states and discovery of web application security vulnerabilities. Functionality respects workflow order, allowing attack payloads to be delivered into application code where it can discover security vulnerabilities.

Threat Management Software uses contextual intelligence.

NetCitadel, Inc.    Mountain View, CA 94043
Feb 26, 2014 With ThreatOptics™, incident response times to Advanced Persistent Threats and malware attacks can be reduced. Software automatically turns threat reports received by Palo Alto Networks’ WildFire service into protection in multi-vendor, large scale environments. Using threat scores, administrators can identify high priority incidents based on severity and malware confidence rating. Reporting capabilities show attacks over time, recurring internal offenders, and frequent sources of attacks.

Advanced Threat Detection Software offers analysis, remediation.

Lancope    Alpharetta, GA Georgia 30022
Feb 25, 2014 StealthWatch® System v6.5 features StealthWatch Labs security updates, which offer capabilities to detect, analyze, and remediate security threats targeting enterprise networks. Through StealthWatch Labs Intelligence Center™ (SLIC) delivers global intelligence on top threats, and SLIC Threat Feed provides enhanced detection capabilities for botnets and other advanced malware. Via collection and analysis of flow data, system helps deal with such attacks as APTs, insider threats, and DDoS.

Cloud Security Automation Software enforces compliance.

Catbird Networks, Inc.    Scotts Valley, CA 95066
Feb 21, 2014 Bringing automation and agility of cloud to security automation and compliance enforcement, SDN-ready Catbird v6.0 offers extended support for VMware® and Microsoft® hypervisors while also supporting VMware NSX® and Cisco ACI®. Continuous monitoring capabilities include extensive configuration checks based on Security Content Automation Protocol. Catbird v6.0 API includes ACL and alert operations, asset searching and enumeration, compliance state retrieval, and event operations.

(Showing headlines 1 - 20)   more ....

 Latest Products in the News

HBC-radiomatic  - April 18, 2014
quadrix Ex: High-Quality Handheld Radio Control Now Certified According to NEC 500 / 505

Gems Sensors Inc.  - April 17, 2014
Simplifying the Search for the Perfect Fluid Sensor

Matrix Packaging Machinery  - April 17, 2014
Matrix Brings Its Robust Cheese Bagging Machine and Pre-Made Pouch Filler/Sealer to the International Cheese Technology Expo, April 23-24 in Milwaukee

Murata Machinery USA/Machine Tool Div.  - April 16, 2014
Murata Machinery USA's Fiber Laser Takes Laser Processing to the Cutting Edge of Technology

Schaffner EMC, Inc.  - April 16, 2014
"iF Product Design Award" 2014 for Schaffner IEC Inlet Filters

American Empire Manufacturing  - April 16, 2014
American Empire Manufacturing Enhances Contract Filling Capabilities, Adds ISO 8/Class 100K Clean Room

Cal Quality Electronics, Inc.  - April 16, 2014
Cal Quality Electronics Contracts with Boeing to Support the Combat Survivor Evader Locater (CSEL) Program

Saint-Gobain Performance Plastics, Omniseal  - April 16, 2014
Saint-Gobain Seals' Rulon® 1439 Material Certified as USP Class VI Compliant, Further Meeting Needs of Medical Device and Pharmaceutical Processing

Nora Lighting  - April 16, 2014
REVO, First Motorized Track Head, Available from Nora Lighting

MJS Packaging  - April 16, 2014
MJS Packaging Customizes Jar for Household Products

More Products in the News...

Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by        Browse ThomasNet Directory

Copyright © 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy