ThomasNet News Logo
Sign Up | Log In | ThomasNet Home | Promote Your Business
 Journals
Industry Market Trends ®
Fluid & Gas Flow Journal
Machining Journal
Procurement Journal
Tech Trends Journal
 Industry News
Latest New Product News
Association & Government News
Thought Leaders
 Product News
Adhesives and Sealants
Agricultural and Farming Products
Architectural and Civil Engineering Products
Automatic ID
Chemical Processing and Waste Management
Cleaning Products and Equipment
Communication Systems and Equipment
Computer Hardware and Peripherals
Construction Equipment and Supplies
Controls and Controllers
Display and Presentation Equipment
Electrical Equipment and Systems
Electronic Components and Devices
Explosives, Armaments and Weaponry
Fasteners and Hardware
Fluid and Gas Flow Equipment
Food Processing and Preparation
Green & Clean
Health, Medical and Dental Supplies and Equipment
HVAC
Labels, Tags, Signage and Equipment
Laboratory and Research Supplies and Equipment
Lubricants
Machinery and Machining Tools
Material Handling and Storage
Materials and Material Processing
Mechanical Components and Assemblies
Mechanical Power Transmission
Mining, Oil Drilling & Refining
Mounting and Attaching Products
Non-Industrial Products
Optics and Photonics
Packaging Products & Equipment
Paints and Coatings
Plant Furnishings and Accessories
Portable Tools
Printing and Duplicating Equipment
Retail and Sales Equipment
Robotics
Safety and Security Equipment
Sensors, Monitors and Transducers
Services
Software
Test and Measuring Instruments
Textile Industry Products
Thermal and Heating Equipment
Timers and Clocks
Transportation Industry Products
Vision Systems
Waste Handling Equipment
Welding Equipment and Supplies
 Press Releases
Products in the News
Company News
Mergers & Acquisitions
People in the News
Literature & Websites
 Resources
News Delivery Options
Newsletter Archive
SME
Browse Categories
Browse Companies
Mobile Edition
PR Resources
Licensing
Advertising
Call for Contributors, Guest Writers and Submissions
How to Write an effective Press Release
Trade Associations
Software -> Utilities & Tools -> Utilities


Utilities




(Showing headlines 1 - 20)   more ....
LPDDR4 PHY Layer Test Software completely assesses conformance.

LPDDR4 PHY Layer Test Software completely assesses conformance.

Tektronix, Inc.    Beaverton, OR 97077
Sep 29, 2014 PHY layer and conformance test solution for JEDEC LPDDR4 mobile memory technology provides all tools needed to qualify LPDDR4 designs. Through automated set-up and test execution, solution can reduce testing cycles to 1 hr. Functionality ensures designs are in full conformance with memory standards. If memory system fails conformance tests, user can switch to debug mode and use tools to isolate events of interest for deeper root-cause analysis with DPOJET Jitter and Eye measurement toolkit.

Fingerprint Sensor Software offers fake finger detection.

NexID Biometrics    Potsdam, NY 13676
Sep 22, 2014 Providing spoof mitigation, NexID Software is designed for both mobile devices with fingerprint sensors, such as smartphones that have been proven vulnerable to spoofing, and embedded modules such as ATMs, which combine sensor and microprocessor controllers. Software integrates with embedded match-on-chip implementations where matching fake-finger-detection software executed on same process that controls fingerprint sensor's image capture, enrollment, and authentication operations.

Monitoring Software ensures Linux OS performs correctly.

Halcyon Software    Peterborough PE2 6FT  United Kingdom
Sep 22, 2014 Operating on IBM Power Systems, Linux on Power agent provides tight control of mission-critical applications running on Linux through automatic and continuous monitoring. Software is shipped with Halcyon Enterprise Console, which provides IT team with point-and-click, single view of all alerts across enterprise, from any platform, including SNMP-enabled devices. Integration into Advanced Reporting Suite allows preconfigured reports to be generated for single and multi-platform environments.

Authentication Software supports mobile banking platforms.

BioCatch    Boston, MA 02210
Sep 09, 2014 Delivered through SDK integration for iOS and Android applications, BioCatch Mobile offers frictionless authentication and threat detection to mobile Apps. Authentication function creates cognitive biometric signature which takes into account physiological factors such as left/right handedness, press-size, and hand tremor. Utilizing cognitive behavioral analysis, threat detection capability identifies signs of account takeover and live malware manipulation attacks on mobile applications.

Cybersecurity Software protects data across multiple platforms.

SAIC Corp.    McLean, VA 22102
Sep 03, 2014 As adaptive solution, CyberSecurity Edge™ offers data security and mitigates vulnerabilities to protect against hackers, viruses, and malware. Holistic, agile, and adaptive approach to securing data leverages architecture designed to help thwart operational disruption, intellectual property loss and fraud, as well as loss of public trust resulting from cyberattacks. Repeatable and scalable solution is tailored to meet customer compliance requirements and is aligned with best practices.

Monitoring/Validation Platform offers video service analytics.

S3 Group    San Jose, CA 95128
Sep 02, 2014 As cloud-based video service monitoring and validation platform, StormTest® Warning Center provides network operations teams with continuous, automated monitoring of service availability and performance within live network. End-users can apply their own pre-defined thresholds for alerts, use real-time analytics to make big data-driven business decisions, and reduce mean-time-to-diagnose and mean-time-to-repair via remote access to network monitoring nodes.

Counterveillance Software protects financial applications.

SnoopWall, LLC    Nashua, NH 03062
Aug 29, 2014 Embedded in any financial application such as mobile banking, mobile payment, or mobile wallet applications, Privacy Shield™ provides trusted connection so that information such as passwords or account numbers can be transmitted securely. Software is designed to shield financial applications from eavesdropping by malicious apps on device and to prevent cybercriminals in close proximity from intercepting transmission of sensitive information.

Healthcare Provider Software fosters secure access management.

Caradigm    Bellevue, WA 98004
Aug 28, 2014 Promoting security and compliance by safeguarding patient health information, Caradigm® Identity and Access Management (IAM) helps healthcare organizations control access to applications and patient data. Subscription-based model includes integration to unlimited number of applications. Product portfolio includes Caradigm Provisioning, which provides role-based user identity management, as well as Caradigm Single Sign-On (SSO) and Caradigm Context Management (CM).

Network Analysis Software incorporates VoIP diagnostic support.

Colasoft Co., Ltd.    Chengdu 610041  China
Aug 27, 2014 As real-time portable network analyzer, Capsa Network Analyzer v7.8 is used for wired and wireless network monitoring, bandwidth analysis, and intrusion detection. Support for VoIP communication analysis is also included, and users can monitor VoIP calls as well as drill into collected call statistics detailing jitter, loss, and MOS. Other features include detailed Port Analysis view, Top Domain Name view of network traffic, and visualization of VoIP data.

Data Management Software helps adopt cloud architecture.

CommVault Systems, Inc.    Oceanport, NJ 07757-0900
Aug 26, 2014 Designed to speed cloud adoption and data center modernization, Simpana Solution Sets include Simpana for VM Backup, Recovery and Cloud Management which enables users to build, protect, and optimize virtualized and cloud infrastructure. Simpana for Endpoint Data Protection helps protect and enable mobile workforce by backing up devices, while Simpana for Email Archive minimizes compliance risk and optimizes insights by integrating self-service access, eDiscovery, and legal hold.

Cyber Security Software enables secure transfer of data.

Validian Corporation    Ottawa, Ontario K1P 5L4  Canada
Aug 15, 2014 Integrated into ShareProtect secure file transfer application, ValidianProtect v2.1 provides secure access to, and transfer of, confidential digital information and data. Validian-enabled ShareProtect will help eliminate points of cyber attack by preventing, not just detecting, hacking or improper access of confidential digital information; encrypting data for transfer from point-of-inception to point-of-final-reception; and dynamically changing all information and crypto policies.

VPD System provides cloud key management security.

Porticor®    Ramat Hasharon   Israel
Aug 06, 2014 Combining data encryption with split-key encryption and homomorphic key management technologies, Porticor Virtual Private Data System protects critical data in public, private, and hybrid cloud environments. By supporting Microsoft SQL Server Transparent Data Encryption, product secures Microsoft's database in cloud infrastructures. Software-defined key management solution eliminates risks of storing SQL Database Encryption Keys on database server, where they can be compromised or stolen.

IT/Cybersecurity Analysis Software reports business impact risks.

CXOWARE    Spokane, WA 99202
Aug 05, 2014 With what if analysis, root cause analysis, and issue management capabilities, RiskCalibrator v2.0 automatically generates reports that provide insight needed to make risk management decisions. This specifically addresses IT and cybersecurity risk mitigation investment allocation, cybersecurity insurance requirements assessment, communication of risk and compliance issues, deriving financially driven risk appetite statements, as well as quantification of capital reserves and other set-asides.

Data Security Software unifies network and endpoint analysis.

LightCyber Ltd    New York, NY 10019
Aug 04, 2014 By passively monitoring internal network traffic, LightCyber Magna identifies deviations that may indicate security breach. Magna Pathfinder provides actionable insight into security incidents via agentless endpoint analysis, while Magna Cloud provides actionable information via cloud-based subscription service, applying threat intelligence on malicious domains/files. With Magna Manager, users can react to breaches directly from console, isolating breached endpoints and compromised credentials.

Multi-Platform OS aids metering, grid management for utilities.

Landis+Gyr    Alpharetta, GA 30022
Jul 25, 2014 Enabling utilities to manage Gridstream® advanced metering and grid management system, Command Center v6.2 handles such advanced metering network technologies as RF mesh, PLC, and cellular. Features include network management tools for routers and collectors; monitoring of load-side meter voltage and remote service switch operations; as well as scheduled snapshots of meter information, such as temperature, to aid diagnostics and analytics.

Telecom Software analyzes SS7 signaling and traffic.

Telecom Software analyzes SS7 signaling and traffic.

GL Communications Inc.    Gaithersburg, MD 20877
Jul 10, 2014 Supporting SS7 and tens of T1 E1 traffic trunks as well as many SS7 signaling links, Call Capture & Analysis of SS7 Signaling and Traffic can help users understand traffic patterns and optimize network architecture, avoiding congestion and troubleshooting complex routing and protocol issues. When used in conjunction with Voice Band Analyzer, captured signaling and voice can be used to troubleshoot customer complaints of voice call quality, fax quality, and tones/dual tone transmission issues.

Product Intelligence Software accelerates risk response.

Product Intelligence Software accelerates risk response.

Granta Design Ltd.    Cambridge CB1 7EG  United Kingdom
Jul 08, 2014 MI:Product Intelligence Package helps engineering enterprises optimize products while minimizing environmental, regulatory, and supply chain risks. Used within CAD environment or via Web browser application, tools draw on authoritative materials and environmental data to provide interactive, integrated feedback on risks. Components include MaterialUniverse data module, MI:Product Intelligence tools, MI:Materials Gateway 2.0 integration technology, and MI:BoM Analyzer.

Utilities Software offers storm management, wires down features.

Avineon, Inc.    Alexandria, VA 22311
Jul 02, 2014 Comprising software and mobile apps, Avineonics® Outage Restoration Management Suite (ORMS) v5 helps utilities manage storm restoration, damage assessment, and wires down response following severe weather events or other emergencies. Solution works in conjunction with existing systems to improve efficiency, collect key data, and comply with reporting requirements. Functionality covers lifecycle management, resource management, damage assessment, and critical customer care activities.

Security Software manages network segmentation.

Tufin Technologies    Chatham, NJ 07928
Jul 02, 2014 Extending Unified Security Policy™ into SecureChange® Network Change Automation platform, Tufin Orchestration Suite™ vR14-2 brings best of breed management, visibility, and automation to enterprise network security policies. Program includes central violation and exception management resulting in comprehensive auditability and minimized network exposure, delivering automation for controlling organization's desired segmentation during network change process.

CEM Software optimizes network troubleshooting.

Anite plc    Berkshire   United Kingdom
Jul 01, 2014 Complementing traditional CEM data with drive test level network information, Nemo CEM Observer helps operators optimize troubleshooting and minimize customer churn. Customer Experience Monitoring solution gives engineering-level visibility to mobile network data which can be used to detect root causes of subscriber experience issues typically caused by network. Coupled with Nemo Analyze post-processing tool, collected data can be efficiently analyzed and visualized.




(Showing headlines 1 - 20)   more ....


Home  |  My ThomasNet News®  |  Industry Market Trends®  |  Submit Release  |  Advertise  |  Contact News  |  About Us
Brought to you by Thomasnet.com        Browse ThomasNet Directory

Copyright © 2014 Thomas Publishing Company. All Rights Reserved.
Terms of Use - Privacy Policy