Utilities & Tools|
Utilities & Tools
(Showing headlines 81 - 100) << 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ...
Security-as-a-Service ensures secure email, surfing, and backup.
Norman Data Defense Systems, Inc.
Fairfax, VA 22031
Jun 21, 2012
Consisting of 3 cloud-based services, Norman Online Protection stops malware and other threats before they reach organization's information systems. Fully managed, cloud-based email protection service, SecureTide, eliminates 99% of unwanted email before it reaches user's network. With SecureSurf, sites known to have malicious content are blocked automatically, shielding users from unwanted offensive content. Online Backup delivers safe storage with flexible access from PC, Mac, and mobile platforms.
Software strengthens authentication, federation, authorization.
San Francisco, CA 94107
Jun 21, 2012
With underlying replication architecture, Standards-based I3 Open Platform, OpenAM v10.0 delivers authentication, authorization, and federation capabilities. OAuth 2.0 authentication and risk based authentication are supplemented by OpenIG identity proxy, which expedites integration of Web applications into SSO environment. Also included, SAML 2.0 Identity Provider capabilities facilitate interaction with end-users for tasks such as approval of attribute release to service providers.
Data Security Software protects against mobile threats.
Calgary, Alberta T2L 2K7 Canada
Jun 21, 2012
Offering rapid deployment and zero device footprint, Mobile Security Module lets service providers protect their network, enterprise customers, and subscribers from mobile malware and malicious threats. Cross-session/cross-protocol support enables protection, identification, and intelligence on blended threats that affect mobile devices. Delivering dynamic threat protection, multi-protocol security platform stops threats at network with WedgeOS Deep Content Inspection technology.
Authentication/SSO Software features SAP certification.
Sunnyvale, CA 94085
Jun 21, 2012
Delivered as add-on to Centrify Suite 2012 and Centrify Express, Centrify DirectControl for Applications v4.4.3 provides secure, centralized authentication and SSO for users of client-server and Web browser solutions. Solution features SAP certification for integration with SAP NetWeaver® 7.0 technology platform. Also, add-on provides integrated authentication and access control for systems administrators running solutions on UNIX and Linux.
Troubleshooting Software accelerates design validation process.
Santa Clara, CA 95050
Jun 15, 2012
By validating manufacturability guidelines directly at design stage, DFMPro® v3.2 for PTC® Creo® aids identification of design areas that are difficult to manufacture, assemble, and service. Features include configurable assembly checks for clearance and interference as well as injection molding checks thta support multiple pull directions. Users can build list of checks and standard clearance values for specific components as well as exclude unwanted areas.
Electronic Signature Software enhances court efficiency.
Southfield, MI 48034
Jun 07, 2012
TrueSign(TM) v3.0 lets judges electronically sign or stamp document in real-time, eliminating need for them to print, sign, and then re-scan documents. By creating legally compliant electronic signatures, software reduces paper, printing, and related costs; accelerates signing process, and improves court efficiency. Along with ribbon toolbar interface, features include permanent markups and annotations as well as document redaction capabilities.
Enterprise Threat Protection Software integrates DLP functions.
Trend Micro, Inc.
Cupertino, CA 95014
Jun 05, 2012
Trend Micro(TM) Control Manager(TM), featuring instant-on DLP for data-centric protection, ties data and threat protection together at client, server, and gateway. This enables creation, application, and enforcement of policies across enterprise from central point. By negating need to build separate security layer or data protection infrastructure, solution promotes accelerated identification and response for compliance status, policy violations, and operational status.
Data Protection Management Software leverages KMIP v1.0.
Hopkinton, MA 01748-9103
Jun 01, 2012
RSA® Data Protection Manager v3.2 secures sensitive data at point of capture with data encryption/tokenization and enables enterprises to manage policies and lifecycle of keys and tokens across infrastructure. Integration of Key Management Interoperability Protocol (KMIP) specification, standardized through OASIS, helps enterprises centralize encryption policies and enforcement. With it, single protocol can be used for communication between disparate key management and encryption systems.
Authentication Software includes facial recognition technology.
Redwood City, CA 94063
May 30, 2012
Using DigitalPersona® Pro Enterprise, healthcare, financial, and government organizations can control access to applications and sensitive information. Program supports range of authentication methods, including passwords, PINs, fingerprint biometrics, proximity cards, smart cards, OATH tokens, and facial recognition. With multi-factor, multi-credential support for Citrix XenApp(TM), organizations can deliver strong authentication to follow-me desktops in kiosk environments.
Mobile Device Management Software integrates with Active Directory.
Sunnyvale, CA 94085
May 30, 2012
Leveraging Centrify Cloud Service, DirectControl for Mobile enables enterprises to centrally secure and manage smart phones and tablets, including iPads and Android devices, using existing Active Directory infrastructure, skill sets, and processes. From locking or remotely wiping devices to securing access to email networks and enforcing use of passcodes, solution enables administrators to assign devices to users and manage associated properties and settings for each device.
Mobile Device Management Software allows self-service enrollment.
Absolute Software Corp.
Vancouver V6B 6A3 Canada
May 24, 2012
With Bring Your Own Device support, Absolute Manage v6.1 automatically provides enrollment, management, and security for corporate and individually owned smartphones, tablets, and laptops. Program offers Mobile Application Management with installation/removal of apps silently or by policy. Other mobile device capabilities include automated IT commands based on predefined conditions including turning off roaming, demoting device to unmanaged status, alerting IT, and sending message to user.
Decision Support Software helps companies optimize processes.
Honeywell International, Inc.
Morristown, NJ 07960
May 22, 2012
To help companies in process industries optimize operation, Intuition(TM) Executive delivers enterprise-wide information management, decision support, and collaboration tools. Data processing and analytics capabilities enable software to anticipate problems and identify opportunities, while collaboration tools highlight and capture expert knowledge, share information, as well as help users make decisions and take action in order to drive intelligent operations and solve key challenges.
Data Protection Software provides secure mobile access.
Seattle, WA 98103
May 18, 2012
Datacastle RED v5 includes multi-tenant management console, enhanced active directory integration, and support for advanced data retention policies. RED v5 includes global data deduplication and data caching technologies to deliver network and storage performance relief for IT resources. It is Microsoft® Windows® 8 ready and available for on-premise, private cloud, or public cloud deployments.
Cloud-Based Data Security Service ensures endpoint protection.
Glendale, CA 91204
May 18, 2012
Managed remotely from anywhere through Web-based console, Panda Cloud Office Protection (PCOP) v6.0 helps prevent spread of malware spread by improper use of external devices. Device Control lets organizations enforce policies to deny access, force read-only access, or grant total access on multiple device types. This endpoint security SaaS also offers group policies for configuration of protection levels, malware and threat reports, and centralized quarantine.
Enterprise Cyber Security Software offers constant monitoring.
Telecommunication Systems Limited
Annapolis, MD 21401
May 18, 2012
Centered on 5 key elements (Assess, Protect, Validate, Monitor, and Train), Enterprise Security and Protection (ESP) cyber security portfolio meets needs of enterprise organizations with distributed networks by safeguarding critical business assets. Functionality identifies exploitable vulnerabilities and recommends countermeasures/corrective actions, implements protective actions, and provides quantitative measurement of security posture via ESP Validation Quotient(TM).
Network Security Assessment Software tests endpoint vulnerability.
Boston, MA 02210
May 17, 2012
Empowering IT and security professionals to reveal implications of advanced persistent threats and other sophisticated attacks, CORE Impact Professional v12.3 leverages commercial-grade, multi-vector testing capabilities to safely replicate data breach attempts across network, client, web, mobile, and wireless environments. Proactive solution provides numerous endpoint, mobile, web, and wireless testing capabilities to help identify critical information security exposures.
Backup and Restore Software offers central management console.
Sichuan Province 610041 China
May 17, 2012
Suitable for both small and large enterprises, EaseUS Todo Backup v4.5 enables users to backup and restore Microsoft Exchange Server mailboxes. Program includes function for dynamic disk backup and clone, and provides full support for Windows Server 8 beta. With backup management interface, users can create, modify, and schedule backup jobs.
Email Protection Software targets SMBs.
GFI Software Ltd UK
Hampton Wick, Kingston upon Thames, Surrey KT1 4AN United Kingdom
May 15, 2012
To protect SMBs against harmful emails, GFI MailEssentials 2012 UnifiedProtection provides anti-spam functionality combined with up to 5 virus detection engines. Combination of technologies results in spam capture rate exceeding 99% and low false positives. Managed from single, intuitive, Web-based dashboard, solution also provides flexible and granular user-based attachment and keyword filtering, content filtering, and email reporting capabilities.
Mobile Equipment ID Software helps implement FCC mandate.
Richardson, TX 75081
May 15, 2012
With Mavenir Equipment Identity Register solution, mobile service providers can implement FCC mandate that enables carriers to disable devices from use in any network once reported stolen. LTE release prevents stolen devices from being used in existing 2G/3G networks, as well as 4G. In addition to blacklisting capability, solution allows mobile service provider to understand patterns of device usage in network and target new services to subscribers with appropriate equipment.
Data Encryption Solution supports Intel acceleration technology.
San Jose, CA 95131
May 11, 2012
Vormetric Encryption supports Intel® Advanced Encryption Standard New Instructions (Intel AES-NI) on-chip technology for accelerated execution of compute-intensive encryption/decryption operations. Intel AES-NI, which protects structured and unstructured data, is supported for IBM DB2, SQL Server, Oracle, Informix, MySQL, and other databases running on Linux/Windows. Without impacting response times, solution provides centralized, secure key management and strong separation of duties.
(Showing headlines 81 - 100) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158