Utilities

Software

Data Security Platform protects information in AWS S3 and Box.

April 17, 2015

With encryption, key management, and access controls, Cloud Encryption Gateway helps enterprises secure sensitive data residing in Amazon Web Services (AWS) Simple Storage Service (S3) and Box environments. Data is encrypted before being saved to cloud storage; encryption keys and access policies are always under enterprise control. While gateway provides encryption and policy enforcement, paired Vormetric Data Security Manager (DSM) delivers encryption key and policy management. Read More

Software

Data Capture Software offers cloud-based identity verification.

April 8, 2015

With idScan® cloud-based offerings, companies can capture and verify customer's identity and critical personal information to optimize efficiency, security, and quality of customer interactions. Users can capture data from identity documents such as driver's licenses, passports, and medical insurance cards. Information is processed in cloud and data is then populated into integrated third party system, helping to optimize customer onboarding and registration processes. Read More

Software, Computer Hardware & Peripherals

Session Border Controller secures IP-PBX appliances.

April 7, 2015

Optionally available for CompletePBX IP-PBX Series of all-in-one appliances, CompleteSBC™ software provides security via intrusion prevention, acting as firewall for access control and Denial of Service. Program provides NAT traversal, smart routing, and messages repair to solve interoperability problems. As B2BUA server, CompleteSBC allows implementation of additional applications such as SIP UDP/TCP/TLS gateway. Read More

Software

Network Assessment Software helps defend against major breaches.

April 3, 2015

Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit in major breach, immediate risks, as well as higher-order effects to show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network changes that would prevent attacker from compromising additional systems with stolen credentials. Read More

Software

Real-Time Software solves enterprise application security challenges.

April 2, 2015

Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and operating within 7 min, solution supports Java 8 and legacy versions of Microsoft .NET. Read More

Software

Cyber Threat Detection Platform protects enterprise blind spots.

April 2, 2015

S-series sensor extends real-time cybersecurity into all corners of organization, including such blind spots as remote sites and internal network segments, to automatically see indicators of cyber attack anywhere in network. Detection Triage functionality, included, lets security teams identify and track risky behaviors that can enable or obscure network attacks. Ability to customize and track detections of such behaviors using local context ensures cyber attacks are not overlooked. Read More

Software

Cluster Computing Platform performs identity analytics.

March 27, 2015

Utilizing open source platforms, Astra™ performs large-scale identity-related security tasks. Program distributes comparison operations and data across multiple computing nodes, enabling rapid search of large biometric databases and execution of high volumes of biometric authentications. Astra can also perform advanced text-based search and analytics on large stores of identity data. Algorithm-independent and fault-tolerant, Astra uses browser-based dashboard for system monitoring and alerts. Read More

Software

Fragmentation Prevention Solution optimizes SAN storage.

March 26, 2015

Operating at physical server layer where I/O operations originate, Diskeeper 15 Server uses IntelliWrite® 2.0 to prevent fragmentation from occurring so files are written in sequential state for servers with local storage, DAS, and SAN. Instant Defrag™ 2.0 monitors volumes to resolve critically fragmented files in real-time. With InvisiTasking® 2.0 intelligent resource monitoring technology, Diskeeper background operations can run with near-zero resource impact on current activities. Read More

Software

Security Software protects distributed enterprise blind spots.

March 25, 2015

S-series sensor provides threat detection platform that extends automated, real-time cybersecurity into all corners of organization, including remote sites and internal network segments. In addition to security visibility, solution offers Detection Triage functionality that lets security teams identify and track risky behaviors that can enable/obscure network attacks. Ability to customize and track detections using local context is critical to ensure cyber attacks are not overlooked. Read More

Software

Management Software locates network traffic issues in real-time.

March 17, 2015

MXstudio® 2.1 can automatically detect network devices, provide real-time availability monitoring, display topological representation of networks, generate event logs, and provide virtual panel displays to indicate real-time status of device ports. Traffic Load Visualization tool helps implementers achieve optimization goals, and multiple snapshots of network help accelerate network problems diagnoses. MIB compiler with basic SNMP support for third-party devices is also standard. Read More

Software

Software Development Kit simplifies database security.

March 13, 2015

With field-level encryption, Smart Encryption SDK protects sensitive information in databases at field level allowing organizations in financial services, government, and healthcare to maintain compliance. Length + Format preserving protection preserves database schemas requiring only minimal changes to applications. Feature solidifies integrity for fields containing fixed length or format specific values like Social Security or credit cards numbers without compromising referential integrity. Read More

Software

Data Privacy Software streamlines management with automation.

March 12, 2015

Data Privacy Management Platform offers Assessment Manager with automation functionality, which reduces effort required for each privacy assessment by helping privacy teams keep pace with changing business, legal, and regulatory landscape. Solution also promotes overall quality of data privacy management program. Specifically, Assessment Manager capabilities include data collection audits, compliance reviews, gap and risk analysis, and workflow management. Read More

Software, Computer Hardware & Peripherals

Attack Mitigation Platform handles high-volume cyber attacks.

March 12, 2015

Intended for carriers and cloud providers, DefensePro® x4420 can address volumetric DDoS attacks while simultaneously picking out and mitigating sophisticated non-volume threats. Solution offers 100 Gb interfaces, can handle 230 million packets per second of attack traffic, and supports up to 1,000 active policies, separate processing capabilities, and customized management and reporting per tenant. Offering up to 300 Gbps of mitigation capacity, solution suits multi-tenant environments. Read More

Software

SCM Software offers distributed version control capabilities.

March 11, 2015

Available as on-premise software and as cloud service, Helix SCM and Content Collaboration Platform serves as single source of truth for all contributors on multi-disciplinary product teams. Solution includes native Distributed Version Control System engine and complete Git management with advanced repo management capabilities, pull requests, issue tracking, and web hooks. Using advanced behavioral analytics, Helix automatically detects potential IP theft across accounts, projects, and assets. Read More

Software, Services

Predictive Anti-Fraud Analytics uncover telecom frauds.

March 11, 2015

As predictive, machine learning-based fraud prevention solution, Mobileum Anti-Fraud Analytics helps telecom operators arrest revenue leakage. Solution runs on Wisdom Big Data and Analytics platform, which can mine through billions of unsuspected usage transactions in real-time to discover anomalous patterns of emerging fraudulent behaviors. This breadth helps detect deviations in known types of frauds and identify unknown frauds across voice, data, and SMS scenarios. Read More

Software

Mobile Data Security Software offers control and transparency.

March 10, 2015

AVG Zen™ lets mobile operators provide context-aware alerts, updates, and information direct to customer to give them control and transparency of security across their devices. Core features include subscription security service for families that includes AVG AntiVirus and AVG Cleaner across all devices; dedicated Location Labs by AVG products, including phone controls and location services; and platform that mobile operators can use to deliver context-aware solutions for core services. Read More

Software

Collaborative Security Platform helps fight cyber-threats.

March 4, 2015

Featuring fully decentralized, peer-to-peer architecture, Comilion facilitates compliant, cross-industry, relevancy-based sharing and security collaboration in tightly regulated markets. Closed, self-managed communities enable real-time threat identification, mitigation, and joint remediation. Leveraging customizable rule-based sharing policy, multi-jurisdictional regulation enforcement, and privacy-by-design handling, Comilion correlates trends across all vetted community members. Read More

Software

Mobile Platform helps organizations manage apps.

February 27, 2015

With access to cloud-based or on premise capabilities, organizations using IBM MobileFirst Platform can secure, personalize, and integrate data from multiple sources to optimize decision-making. Clients can use platform to build and deploy mobile apps, integrate apps built with third party tools, and collect in-app usage and feedback for sentiment analysis and crash analytics. With Cloudant module, organizations can store, sync, scale, and connect to data in enterprise systems. Read More

Software

SIP Protocol Test Suite simplifies assessment procedures.

February 27, 2015

Supporting range of protocols, including TDM, IP, and wireless infrastructure protocols, MAPS™ Protocol Test platform provides fault insertion and erroneous call flow testing capability as well as support for scripted call generation and automated call reception. MAPS™ SIP can simulate any interface in SIP network; MAPS™ SIP I can simulate SIP-ISUP signaling specification as defined by ITU / IETF standards ITU-T Q.1912.5; and SIP Conformance Test Suite is designed with 300+ test cases. Read More

Software

Secure Network Framework counters mobile, server cyber threats.

February 27, 2015

Built around 4 main features, SafeMobile provides security framework to meet cyber threats on mobile client and main server. Cyber Secure Gateway secures mobile traffic by ensuring authentication, identity, and encryption; Cyber Secure Mobile Client enables mobile applications development using secure framework; Secure Certification offers authority and workflow designed to issue certificate for mobile environment; and Cyber Device Management provides secure mobile device storage/provisioning. Read More