ThomasNet News Logo
Sign Up | Log In | ThomasNet Home | Promote Your Business
 Journals
Industry Market Trends ®
Fluid & Gas Flow Journal
Machining Journal
Procurement Journal
Tech Trends Journal
 Industry News
Latest New Product News
Association & Government News
Thought Leaders
 Product News
Adhesives and Sealants
Agricultural and Farming Products
Architectural and Civil Engineering Products
Automatic ID
Chemical Processing and Waste Management
Cleaning Products and Equipment
Communication Systems and Equipment
Computer Hardware and Peripherals
Construction Equipment and Supplies
Controls and Controllers
Display and Presentation Equipment
Electrical Equipment and Systems
Electronic Components and Devices
Explosives, Armaments and Weaponry
Fasteners and Hardware
Fluid and Gas Flow Equipment
Food Processing and Preparation
Green & Clean
Health, Medical and Dental Supplies and Equipment
HVAC
Labels, Tags, Signage and Equipment
Laboratory and Research Supplies and Equipment
Lubricants
Machinery and Machining Tools
Material Handling and Storage
Materials and Material Processing
Mechanical Components and Assemblies
Mechanical Power Transmission
Mining, Oil Drilling & Refining
Mounting and Attaching Products
Non-Industrial Products
Optics and Photonics
Packaging Products & Equipment
Paints and Coatings
Plant Furnishings and Accessories
Portable Tools
Printing and Duplicating Equipment
Retail and Sales Equipment
Robotics
Safety and Security Equipment
Sensors, Monitors and Transducers
Services
Software
Test and Measuring Instruments
Textile Industry Products
Thermal and Heating Equipment
Timers and Clocks
Transportation Industry Products
Vision Systems
Waste Handling Equipment
Welding Equipment and Supplies
 Press Releases
Products in the News
Company News
Mergers & Acquisitions
People in the News
Literature & Websites
 Resources
News Delivery Options
Newsletter Archive
SME
Browse Categories
Browse Companies
Mobile Edition
PR Resources
Licensing
Advertising
Call for Contributors, Guest Writers and Submissions
How to Write an effective Press Release
Trade Associations
Software -> Utilities & Tools -> Utilities


Utilities




(Showing headlines 1 - 20)   more ....
Telecom Software analyzes SS7 signaling and traffic.

Telecom Software analyzes SS7 signaling and traffic.

GL Communications Inc.    Gaithersburg, MD 20877
Jul 10, 2014 Supporting SS7 and tens of T1 E1 traffic trunks as well as many SS7 signaling links, Call Capture & Analysis of SS7 Signaling and Traffic can help users understand traffic patterns and optimize network architecture, avoiding congestion and troubleshooting complex routing and protocol issues. When used in conjunction with Voice Band Analyzer, captured signaling and voice can be used to troubleshoot customer complaints of voice call quality, fax quality, and tones/dual tone transmission issues.

Product Intelligence Software accelerates risk response.

Product Intelligence Software accelerates risk response.

Granta Design Ltd.    Cambridge CB1 7EG  United Kingdom
Jul 08, 2014 MI:Product Intelligence Package helps engineering enterprises optimize products while minimizing environmental, regulatory, and supply chain risks. Used within CAD environment or via Web browser application, tools draw on authoritative materials and environmental data to provide interactive, integrated feedback on risks. Components include MaterialUniverse data module, MI:Product Intelligence tools, MI:Materials Gateway 2.0 integration technology, and MI:BoM Analyzer.

Utilities Software offers storm management, wires down features.

Avineon, Inc.    Alexandria, VA 22311
Jul 02, 2014 Comprising software and mobile apps, Avineonics® Outage Restoration Management Suite (ORMS) v5 helps utilities manage storm restoration, damage assessment, and wires down response following severe weather events or other emergencies. Solution works in conjunction with existing systems to improve efficiency, collect key data, and comply with reporting requirements. Functionality covers lifecycle management, resource management, damage assessment, and critical customer care activities.

Security Software manages network segmentation.

Tufin Technologies    Chatham, NJ 07928
Jul 02, 2014 Extending Unified Security Policy™ into SecureChange® Network Change Automation platform, Tufin Orchestration Suite™ vR14-2 brings best of breed management, visibility, and automation to enterprise network security policies. Program includes central violation and exception management resulting in comprehensive auditability and minimized network exposure, delivering automation for controlling organization's desired segmentation during network change process.

CEM Software optimizes network troubleshooting.

Anite plc    Berkshire   United Kingdom
Jul 01, 2014 Complementing traditional CEM data with drive test level network information, Nemo CEM Observer helps operators optimize troubleshooting and minimize customer churn. Customer Experience Monitoring solution gives engineering-level visibility to mobile network data which can be used to detect root causes of subscriber experience issues typically caused by network. Coupled with Nemo Analyze post-processing tool, collected data can be efficiently analyzed and visualized.

Signature Verification Software reduces instances of fraud.

Top Image Systems, Ltd    Tel Aviv 69710  Israel
Jun 26, 2014 Used to reduce fraud, eFLOW® Signature Verification automatically analyzes incoming signatures on any document against existing samples collected during previous instances. Signatures flagged as potentially fraudulent are passed to operators through GUI for further analysis to highlight where problem areas exist. Via this functionality, solution helps increase speed and accuracy of processes and enables staff to be redeployed.

Software Testing Platform helps find and fix security issues.

Coverity, Inc.    San Francisco, CA 94107
Jun 25, 2014 With Coverity® Software Testing Platform v7.5, organizations can focus test development and execution on most critical parts of code, regardless of whether testing is done in Development or QA. Coverity Test Advisor - QA Edition enables QA teams to monitor execution and results of tests, then identify which tests are most critical based on changes to source code and testing gaps. Using analysis algorithms for C# and Java, developers can troubleshoot and fix defects such as concurrency issues.

Security Software targets hybrid cloud environments.

Trend Micro, Inc.    Cupertino, CA 95014
Jun 25, 2014 Available for VMware's vCloud® Hybrid Service™, Deep Security solution offers platform for security controls and policies managed across physical, virtual, and cloud environments. Interoperability with VMware vCloud Director and other VMware technologies lets administrators automatically detect virtual machines and apply context-based policies to them for consistent security across datacenter and into public cloud. Users also benefit from virtual patching, which shields VMs from vulnerabilities.

Web Performance Testing SaaS allows transaction time measurement.

LoadStorm    Dillon, CO 80435
Jun 25, 2014 LoadStorm® 2.0 enterprise-grade, cloud-based web application performance testing tool provides analysis of website's speed and scalability via interactive real-time graphs with key performance metrics. Users can correlate test results to real-world, time-based user perspectives of performance to ensure applications perform logical business processes with expected speed. Along with transaction measurement feature, solution offers traditional stress and load testing and analysis capabilities.

DCIM Software enhances capacity management with interactive map.

Raritan Computer, Inc.    Somerset, NJ 08873
Jun 24, 2014 Featuring interactive Data Center Map and bidirectional workflow engine, data center infrastructure management (DCIM) software helps facilitate data center management while promoting healthiness and resource efficiency. Inspector widget provides details of budgeted capacities and real-time measured utilization and lets users drill down for trend analysis and information correlation. Automated alerts and reports help warn data center operators of potential capacity and health issues.

Boundary-Scan Testing Software leverages several modules.

Corelis, Inc.    Cerritos, CA 90703
Jun 23, 2014 ScanExpress Boundary-Scan Tool Suite v8.0 includes ScanExpress Debugger interface with pin browser interface, script modules, and JTAG protocol scan module. Top-level ScanExpress TPG project, also included, features project revision and comparison wizards, support for netlist and BOM replacement, and was/is file support for back-annotation. Other features include ScanExpress JET with boot sequence recording and JET model management system that helps obtain CPU and peripheral updates.

RF SDK enables developers to verify system in one day.

Texas Instruments, Inc.    San Jose, CA 95134
Jun 18, 2014 RFSDK lets small cell developers configure baseband-to-radio communication and achieve first call or system verification within one day. Also, KeyStone™-based TCI6630K2L small cell SoC and TCI6631K2L backhaul SoC can implement such digital radio functions as DPD/CFR and use JESD204B interface to communicate with AFE7500 analog front end transceiver to maximize performance and system power efficiency. Further functionality lets TCI6630K2L communicate with TI analog high-speed data converters.

Data Security Software offers web protection capabilities.

GFI Software USA, Inc.    Cary, NC 27513
Jun 16, 2014 Offering advanced Web Protection features based on GFI WebMonitor solution, GFI MAX RemoteManagement allows MSPs to protect customers' networks from web-based threats by limiting access to malicious websites, enforcing corporate browsing policies, and monitoring bandwidth utilization. By deploying this feature set alongside GFI MAX RemoteManagement's managed antivirus and patch management capabilities, MSPs have ability to offer clients complete endpoint security.

Cyber Security Solutions boost automation system protection.

Metso Automation    Shrewsbury, MA 01545-8044
Jun 13, 2014 Designed to counteract emerging threats and avoid disrupted production, Security Business Solution includes assessments of security of installations with security audits to identify vulnerabilities. Risk mitigation techniques, including firewalls and VPNs, are supplemented with virus-protection software custom configured to automation system. To ensure highest level of protection, security follow-up provides security updates, including antivirus software, virus definitions, and security patches.

Security Software helps implement STIG-compliant environment.

SteelCloud Inc.    Herndon, VA 20171
Jun 12, 2014 Designed for DoD and government customers as well as organizations that support them, GoldDisk Plus™ STIG-hardened Windows 2008 R2 Amazon Machine Image implements .NET, IIS, and Internet Explorer, and has pre-installed DoD Certs and Microsoft EMET. ACAS/Nessus scans and completed DISA STIG Checklist are also included. With patent-pending technology, ConfigOS™ automates remediation of production servers using XML policy signature, cutting STIG policy update and testing process down to 5 min.

Smart Grid Network Management Software offers cloud functionality.

Ambient Corp.    Newton, MA 02459
Jun 10, 2014 Cloud-based version of AmbientNMS® extensible network management system, which manages communications between grid devices and utility operations center, lets utilities add necessary computing resources to manage vital communications for smart grid applications. Integrated suite of software applications provides function for real-time grid monitoring and management. With individual configurations, users can adopt smart grid solutions and manage communications between their assets.

UTM/NGFW Appliances deliver wired and wireless network security.

UTM/NGFW Appliances deliver wired and wireless network security.

WatchGuard Technologies, Inc.    Seattle, WA 98104
Jun 06, 2014 Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances let users deploy, configure, and manage wired and wireless network security through one appliance and single-pane view. Enabled via Fireware® v11.9 OS, wireless functionality eliminates need for additional wireless network management solutions and provides unified Web interface for managing and monitoring network in real-time. OS also includes such services as: antivirus, antispam, application control, ATP, and DLP.

Pipeline Inspection Software assesses integrity, degradation.

Pipeline Inspection Software assesses integrity, degradation.

Creaform    Levis, QC G6V4L2
Jun 05, 2014 When used with HandySCAN 3D scanner, Pipecheck v2.2 enables NDT service companies and pipeline operators to evaluate pipeline corrosion and mechanical damage as well as remaining service life. Pipecheck Analyze module, addressing parallel workflow for end-users, provides assessment tool for on-site or remote analysis. Additionally, this pipeline integrity assessment solution offers virtual pit gauge as well as optimized surface merging method that optimizes workflows.

Virtual Storage Encryption Appliance secures critical workloads.

AFORE Solutions Inc.    Ottawa Ontario K2B 8J9  Canada
Jun 05, 2014 CloudLink® SecureVSA lets businesses moving to cloud deployments bring their own encryption to VMware® vCloud® Hybrid Service™ and renders data inaccessible to other tenants, cloud administrators, and outsiders. Without requiring any changes to workloads and applications, agentless solution addresses data privacy and regulatory compliance concerns via its security policy that automates encryption management and enables VMware customers to have exclusive control of encryption keys.

Endpoint Protection Software tackles advanced malware.

IBM (Corporate Headquarters)    Armonk, NY 10504-1783
May 30, 2014 Providing automated threat analysis, Trusteer Apex Software blocks attempts to exploit vulnerabilities on endpoint that lead to data breaches. Program prevents malicious Java applications through assessing application trust and activity risk, and blocking untrusted apps from performing high-risk activities. If phishing email is opened, Trusteer Apex can identify malware and stop it from exploiting endpoint. Program also prevents employees from re-using corporate credentials on untrusted sites.




(Showing headlines 1 - 20)   more ....



 Latest Products in the News


Mr. ShrinkWrap  - July 22, 2014
MR. SHRINKWRAP PRESERVES GLEN ECHO HOUSE

Easi-Set Industries, Inc.  - July 21, 2014
Leesburg Concrete Provides Unique Solution with Easi-Set Precast Concrete Building

Easi-Set Industries, Inc.  - July 21, 2014
Pre-Engineered Precast Building Manufactured for Sports Complex at Riverside County Park South

Easi-Set Industries, Inc.  - July 21, 2014
Shea Concrete Products Installs Easi-Set Restroom for Harwich, MA

Filter Pump Industries  - July 18, 2014
Filter Pump Re-Designs its Penguin Series P-HF High Flow Vertical Pumps

Leesburg Concrete Co.  - July 18, 2014
Venetian Falls Turns To Leesburg Concrete Company, Inc. For Pump House Solution

Tantec, Inc.  - July 18, 2014
Vacuum Plasma Treatment Helps with Coatings

PCB Piezotronics, Inc.  - July 18, 2014
PCB Announces Launch of Single Channel Telemetry Product Line

Horlick Co., Inc.  - July 18, 2014
The Horlick Company Ships a Model 60SC, Frequency Conversion Motor-Generator Set to JGB International for a Customer in Abu Dhabi

Future Lighting Solutions  - July 18, 2014
Future Electronics Promotes the ZMOTION PIR-based Motion Detection Solutions from Zilog


More Products in the News...

Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by Thomasnet.com        Browse ThomasNet Directory

Copyright © 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy