Utilities & Tools|
Utilities & Tools
(Showing headlines 1 - 20) more ....
Data Validation Software helps meet regulatory requirements.
Warner, NH 03278
May 24, 2013
Madgetech 4 Secure Software Validation Package helps meet 21 CFR Part 11 requirements and ensures data integrity with step-by-step IQ/OQ/PQ protocols. Product includes audit trails, electronic signatures, and auto logger detection. Configurable templates let user save settings for specific loggers, while memorized setups retain arrangement and positioning of windows. Software also has drag and drop mapping of multiple data sets, for side-by-side comparisons, and data analysis functions.
Surveillance Planning App is based on Google Maps API.
Vumii Imaging, Inc
Atlanta, GA 30328
May 23, 2013
Vumii SiteBuilder tool is Web application that allows users to assess site security needs and build surveillance strategy based on specific requirements. Users can place virtual cameras to spot potential gaps in surveillance coverage and see how different camera, sensor, and lens combinations affect field of view. Icons, videos, and text help show advantages of near-IR and thermal IR technology and uses. Also, app lets users build, save, and recall unlimited number of site layouts.
Thermal Printer Drivers support Linux and Mac OS X.
SATO America, Inc.
Charlotte, NC 28273
May 16, 2013
Available for CL4e/CL6e, CG2/CG4, and M84Pro series printer models, SATO Printer Drivers integrate into Linux-based PC or Mac set-up for general purpose SOHO and enterprise-based printing functions utilizing CUPS printing system. Drivers support major Linux distributions, including Red Hat (.rpm), Ubuntu (.deb), and tar.gz for generic distribution installations.
Power Cycling Test Technology fosters design validation.
ATP Electronics, Inc.
Sunnyvale, CA 94085
May 15, 2013
ATP Power Cycling Test validates design of ATP PowerProtector, available in flash products, by demonstrating functionality under sudden power-down situations. At beginning of each cycle, test writes segment of data pattern into testing device and waits for exact microsecond to cut off power during programing data into NAND blocks. During power cycles, product without PowerProtector will result in data corruption and show Fail, whereas product with ATP PowerProtector will show Pass.
Cloud-Based Software offers patch management capabilities.
GFI Software USA, Inc.
Cary, NC 27513
May 07, 2013
With antivirus, network monitoring, asset management, and patch management capabilities, GFI Cloud gives IT administrators one place to see status and health of all proactively managed IT systems. With TeamViewer® installed, users can also remotely access problem device. All updates — including those from Microsoft® and third-party applications — can be managed with GFI Cloud via single intuitive dashboard, eliminating need for any other update tools.
Hypervisor Software protects against cyber threats.
San Jose, CA 95138-1018
May 06, 2013
With added security features, LynxSecure v5.2 offers real-time detection, alert, and protection against new cyber threats, including zero-day rootkits and bootkits. Adding virtualization to separation kernel allows for multiple guest operating systems, both real-time and general purpose, to run in secure domains on single embedded system. When LynxSecure is used on embedded devices, it can help detect malicious infections as they inject their payload, long before start of actual cyber attack.
Mobile Payment App/Reader works with iOS or Android phones. .
Electronic Merchant Systems
Cleveland, OH 44131
May 06, 2013
Allowing use of iOS or Android phone for credit card processing, EMS+ consists of application and encrypted audio jack reader letting merchants accept payment from smartphone or tablet. Users can sign up via online application and download software to mobile device; reader is shipped to customer's location. Service is available with 24/7/365 customer support and detailed online transaction reporting for merchants, including monthly activity statements.
Multilevel Printing Software provides optimized security.
Bedford, MA 01730
May 03, 2013
With Trusted Print Delivery™ cross domain solution, users can print from existing applications at different security or sensitivity levels to single printer located on high side network. TPD uses UCDMO Baseline- listed Trusted Gateway System as Protection Level 4 cross domain guard component, ensuring that malicious data is not transferred from low side to high side network and that sensitive data is not inadvertently or intentionally transferred from high side network to lower level network.
POS Software mitigates merchant disruption.
Scottsdale, AZ 85253
May 02, 2013
Through uniform interface and process, Apriva POS™ Universal Application enables merchant service providers to automatically deliver compliance and feature updates to dial, IP, and wireless point-of-sale terminals without taking terminals off-line. Program offers payment processors and independent sales organizations common interface and functionality across terminal families and communications technologies, with one set of technical support documents, reference guides, and training manuals.
Embedded Firewall Software protects against cyber attacks.
West Des Moines, IA 50266
Apr 24, 2013
Designed to meet ANSI/ISA/IEC/TS 62443 standards for cyber security, Floodgate™ Packet Filter adds firewall security to RTXC™ Quadros™ real-time operating system (RTOS)-powered devices to protect against Internet-based attacks. Solution provides Stateful Packet Inspection (SPI) and rules-based filtering and is designed for use in embedded devices with limited memory and processor speeds that require secure network implementation certified to such standards as ISASP 99.
Encryption Software secures Android applications.
ITTIA - Mobile and Embedded Database Solutions
Bellevue, WA 98004
Apr 19, 2013
ITTIA DB SQL allows Android developers of embedded systems and mobile devices to achieve optimal data security in embedded applications by encrypting both network communications and storage media. Whether connecting over TCP/IP, shared memory, opening database file directly, or through SSL protocol, solution provides secure channel for remote data management. Storage encryption specifically provides support for the AES-128 and AES-256 block ciphers.
IBM i Access Control Software features web-based interface.
Peterborough PE2 6FT United Kingdom
Apr 18, 2013
With Authority Swapper v11, IT managers can grant users different levels of authority, for temporary periods, to carry out specific tasks. Program provides visible forensic trace of user activity, which helps organizations meet security compliance rules. Using browser-based GUI, IT and compliance teams can see what users are doing in real-time. Authority Swapper logs, records, and stores every activity carried out, all of which can be exported to secure, encrypted file for auditing purposes.
File Replication and Transfer Services support Big Data.
Burlington, MA 01803
Apr 09, 2013
Designed to move data to, from, and between cloud environments, Attunity CloudBeam Services include on-premises to cloud file replication service, which is tightly integrated with AWS S3, and enables business-critical initiatives including disaster recovery, backup and data distribution. Managed file transfer service uploads files with acceleration and security to AWS S3, providing automated, fully-audited, and recoverable file transfers to support BI/analytics, archiving, and content availability.
Data Recovery Software retrieves files from corrupt memory cards.
Sichuan Province 610041 China
Apr 09, 2013
EaseUS Card Recovery Wizard lets users recover lost or deleted photos, videos, and audio files from memory cards, USB drives, mobile phones, digital cameras, and more. Available for those of any experience level, data recovery software protects against accidental loss incurred by power shortages, untimely memory card removal, formatting issues, card corruption, deletion, and virus attack.
RACF Command Testing Software helps prevent future errors.
Vanguard Integrity Professionals, Inc.
Las Vegas, NV 89120-3478
Apr 03, 2013
Improving security controls and audit processes, Vanguard Offline™ simulation-testing application lets security administrators test and analyze how new RACF commands will impact users and production processes before commands are executed in production environment. Functionality reduces RACF errors and problems with System z® production environments. Reports can be created for various aspects of access, and security administrators can perform what-if analyses on RACF databases.
IJTAG Tool Suite helps debug SoCs, test circuit boards.
Asset InterTech Inc.
Richardson, TX 75080
Mar 29, 2013
ScanWorks® IJTAG Test lets engineers access, control, and automate operations of test and measurement instruments embedded in chips. Suite supports IEEE P1687 Internal JTAG (IJTAG) standard for embedded instrumentation, providing method for debugging designs by standardizing how engineers control and access instruments embedded on chip. IJTAG Test tools can read ICL and PDL, and GUI lets engineers drag-and-drop instruments and specific operations to automatically develop test routines.
Code Troubleshooting Software offers architecture visualization.
Ithaca, NY 14850
Mar 07, 2013
With treemap view, CodeSonar® users see hierarchical structure of code. Colorization shows density of defects in modules, facilitating identification of most problematic parts of code. Call graph is organized by module structure. Users can drill down to see greater level of detail; choose different layouts – treemap, circuit, cluster, flow, radial, and others; and attach persistent notes to diagram. Also included, transitions such as zooming or layout changes are fluid and real-time.
Industrial Firewall Appliance protects against cyber-attacks.
West Des Moines, IA 50266
Feb 28, 2013
Floodgate Defender™ provides security layer to protect SCADA networks, military equipment, critical infrastructure controllers, and medical/industrial devices against cyber-attacks. Placed between Internet and device, solution is configured with communication policies customized for device it is protecting. Enforced policies block attacks before connection can be established with target device. Along with SPI and rules-based filtering, features include secure Web interface.
GRC Software supports cloud security.
Baton Rouge, LA 70809
Feb 27, 2013
Delivering comprehensive visibility and accountability, TraceCSO IT GRC optimizes risk and compliance profiles across all areas of organization. Software allows organizations of any size, industry, or security skill set to evaluate, create, implement, and manage comprehensive holistic and risk-based information security program, to protect their organizations from top information security risks, including cloud security and Bring Your Own Device concerns.
Alarm and Bypass Management Tool carries TÜV certification.
London United Kingdom
Feb 18, 2013
Certified by TÜV Rheinland to IEC61508 Systematic Capability 3 for use in applications up to Safety Integrity Level 3, Triconex Safety View improves situational awareness and broadens visibility into risks that come with system startups, shutdowns, and other critical process transitions that must be managed by plant personnel. Alarm and bypass management solution, built on ArchestrA System Platform, draws attention to changes in process conditions that require immediate attention.
(Showing headlines 1 - 20) more ....
Latest Products in the News
Hennig, Inc. - May 23, 2013
Enclosures Protect Cummins Standby Power Generating Stations at Oklahoma Water Treatment Plant
API Technologies Corp. - May 23, 2013
EMCON® Line of TEMPEST and Secure Communications Products to Be Highlighted at CANSEC 2013
Mettler-Toledo International Inc. - May 23, 2013
Hazardous Area Catalog Presents Expert Solutions for Industrial Weighing Applications
CAS Data Loggers - May 22, 2013
5 Ways Accsense Alarm Systems Can Protect Your Business
Badger Plug Co. - May 22, 2013
Steel Core Plugs Assure Roll Protection
Henkel Corporation - May 22, 2013
Henkel Products Receive Award Recognition
Meggitt (Maryland), Inc. - May 22, 2013
Meggitt Provides Custom Vibration Monitoring Solutions
Crocus Technology - May 22, 2013
Crocus Licenses Its Magnetic Logic Unit(TM) Technology to TowerJazz
D-M-E Company - May 22, 2013
DME Back at Amerimold 2013 Showcasing Efficiency and Precision
American Vanadium Corp. - May 22, 2013
American Vanadium and Gildemeister Sign Master Sales Agreement for CellCube Grid Scale Energy Storage Systems
More Products in the News...