Utilities

Software

Network Asset Management Plug-in enhances VSA capabilities.

April 22, 2015

ESET Remote Administrator (ERA) Plug-in for Kaseya® VSA provides central management of ESET Endpoint Solutions across distributed networks. Integrating with Kaseya VSA, solution offers ability to plug-in to multiple ERA servers, notification functionality, as well as ability to initiate scans and update tasks on ESET clients when notifications are triggered. With customizable graphs and charts displaying threat data, dashboard provides users with high-level overview of network health. Read More

Software

Patch Management Software safeguards against vulnerability.

April 21, 2015

Absolute Manage® v6.8 enables IT administrators to manage operating system patches for Mac and Windows devices, along with a wide range of third-party applications, in fully automated system that detects and downloads missing patches. This is enabled via integrated automated patch engine that provides coverage and updates for most prevalent and at-risk third-party applications. Upon administrator approval for each update, solution deploys and reports on status of each patch. Read More

Software

Access Management Software securely supports mobile devices.

April 20, 2015

Identity and Access Management Suite v9.0 includes Hitachi ID Mobile Access for Android and iOS, which enables access to all product features from phones and tablets. Along with dashboards and reports, features include ability to feed report output into requests to automate access remediation. Communication between user's device and on-premise IAM system is facilitated by cloud-hosted proxy service. To ensure security, devices must be activated via scanned QR code. Read More

Software

Purchasing Card Monitoring Software automates compliance.

April 20, 2015

Providing automated analysis and resolution of over 35 risks inherent to P-Card processes, P-Card Monitoring Solution helps expand P-Card usage while minimizing exposure to card misuse. Software includes Integrated Case Management for rectification of non-compliance, best-practice guides for controls and administration of P-Card programs, and dashboards that provide visibility into P-Card activities such as risks, root causes, and spend patterns across employees, departments, and merchants. Read More

Software

Fraud Prevention Software offers real-time auditing solution.

April 20, 2015

Utilizing patent-pending algorithms, SmartTouch Advanced Fraud Prevention analyzes, detects, and prevents fraudulent financial transactions. Solution examines spending habits, historical patterns, and approver activity to identify anomalies and inconsistencies in transactions. After being automatically routed to authorized reviewer, transactions suspected for fraud are halted, while legitimate transactions are approved for payment. All financial activity is recorded in audit log. Read More

Software

Utility Software transfers data into SPC software.

April 20, 2015

Designed to automate data transfer in Synergy 1000 and 2000 programs, Synergy 2000™ Multi-function Toolbox v3.0 includes Keyence Interface Module, which allows for automatic creation of Data Bank and associated Data Tables based upon measurement programs configured in Keyence IM Series image dimension measurement system. Version 3.0 offers optimized file formatting, handling, and organizing, as well as wireless gauging interface that allows remote collection of data. Read More

Software

Data Security Platform protects information in AWS S3 and Box.

April 17, 2015

With encryption, key management, and access controls, Cloud Encryption Gateway helps enterprises secure sensitive data residing in Amazon Web Services (AWS) Simple Storage Service (S3) and Box environments. Data is encrypted before being saved to cloud storage; encryption keys and access policies are always under enterprise control. While gateway provides encryption and policy enforcement, paired Vormetric Data Security Manager (DSM) delivers encryption key and policy management. Read More

Software

Data Capture Software offers cloud-based identity verification.

April 8, 2015

With idScan® cloud-based offerings, companies can capture and verify customer's identity and critical personal information to optimize efficiency, security, and quality of customer interactions. Users can capture data from identity documents such as driver's licenses, passports, and medical insurance cards. Information is processed in cloud and data is then populated into integrated third party system, helping to optimize customer onboarding and registration processes. Read More

Software, Computer Hardware & Peripherals

Session Border Controller secures IP-PBX appliances.

April 7, 2015

Optionally available for CompletePBX IP-PBX Series of all-in-one appliances, CompleteSBC™ software provides security via intrusion prevention, acting as firewall for access control and Denial of Service. Program provides NAT traversal, smart routing, and messages repair to solve interoperability problems. As B2BUA server, CompleteSBC allows implementation of additional applications such as SIP UDP/TCP/TLS gateway. Read More

Software

Network Assessment Software helps defend against major breaches.

April 3, 2015

Combining data collection, logic, and visualization, Orkos identifies critical credential theft risks in organizational networks. Solution identifies critical links that attackers will exploit in major breach, immediate risks, as well as higher-order effects to show total risk of credential theft. Credential assessment capability also supports remediation through simulation of network changes that would prevent attacker from compromising additional systems with stolen credentials. Read More

Software

Real-Time Software solves enterprise application security challenges.

April 2, 2015

Leveraging distributed agents, Contrast Enterprise enables vulnerability identification as applications run at enterprise scale. REST API and scriptable zero-configuration installers provide complete automation of application security into any software development life cycle, while 10+ information sources are used to discover vulnerabilities while eliminating false positives. Deployed and operating within 7 min, solution supports Java 8 and legacy versions of Microsoft .NET. Read More

Software

Cyber Threat Detection Platform protects enterprise blind spots.

April 2, 2015

S-series sensor extends real-time cybersecurity into all corners of organization, including such blind spots as remote sites and internal network segments, to automatically see indicators of cyber attack anywhere in network. Detection Triage functionality, included, lets security teams identify and track risky behaviors that can enable or obscure network attacks. Ability to customize and track detections of such behaviors using local context ensures cyber attacks are not overlooked. Read More

Software

Cluster Computing Platform performs identity analytics.

March 27, 2015

Utilizing open source platforms, Astra™ performs large-scale identity-related security tasks. Program distributes comparison operations and data across multiple computing nodes, enabling rapid search of large biometric databases and execution of high volumes of biometric authentications. Astra can also perform advanced text-based search and analytics on large stores of identity data. Algorithm-independent and fault-tolerant, Astra uses browser-based dashboard for system monitoring and alerts. Read More

Software

Fragmentation Prevention Solution optimizes SAN storage.

March 26, 2015

Operating at physical server layer where I/O operations originate, Diskeeper 15 Server uses IntelliWrite® 2.0 to prevent fragmentation from occurring so files are written in sequential state for servers with local storage, DAS, and SAN. Instant Defrag™ 2.0 monitors volumes to resolve critically fragmented files in real-time. With InvisiTasking® 2.0 intelligent resource monitoring technology, Diskeeper background operations can run with near-zero resource impact on current activities. Read More

Software

Security Software protects distributed enterprise blind spots.

March 25, 2015

S-series sensor provides threat detection platform that extends automated, real-time cybersecurity into all corners of organization, including remote sites and internal network segments. In addition to security visibility, solution offers Detection Triage functionality that lets security teams identify and track risky behaviors that can enable/obscure network attacks. Ability to customize and track detections using local context is critical to ensure cyber attacks are not overlooked. Read More

Software

Management Software locates network traffic issues in real-time.

March 17, 2015

MXstudio® 2.1 can automatically detect network devices, provide real-time availability monitoring, display topological representation of networks, generate event logs, and provide virtual panel displays to indicate real-time status of device ports. Traffic Load Visualization tool helps implementers achieve optimization goals, and multiple snapshots of network help accelerate network problems diagnoses. MIB compiler with basic SNMP support for third-party devices is also standard. Read More

Software

Software Development Kit simplifies database security.

March 13, 2015

With field-level encryption, Smart Encryption SDK protects sensitive information in databases at field level allowing organizations in financial services, government, and healthcare to maintain compliance. Length + Format preserving protection preserves database schemas requiring only minimal changes to applications. Feature solidifies integrity for fields containing fixed length or format specific values like Social Security or credit cards numbers without compromising referential integrity. Read More

Software

Data Privacy Software streamlines management with automation.

March 12, 2015

Data Privacy Management Platform offers Assessment Manager with automation functionality, which reduces effort required for each privacy assessment by helping privacy teams keep pace with changing business, legal, and regulatory landscape. Solution also promotes overall quality of data privacy management program. Specifically, Assessment Manager capabilities include data collection audits, compliance reviews, gap and risk analysis, and workflow management. Read More

Software, Computer Hardware & Peripherals

Attack Mitigation Platform handles high-volume cyber attacks.

March 12, 2015

Intended for carriers and cloud providers, DefensePro® x4420 can address volumetric DDoS attacks while simultaneously picking out and mitigating sophisticated non-volume threats. Solution offers 100 Gb interfaces, can handle 230 million packets per second of attack traffic, and supports up to 1,000 active policies, separate processing capabilities, and customized management and reporting per tenant. Offering up to 300 Gbps of mitigation capacity, solution suits multi-tenant environments. Read More

Software

SCM Software offers distributed version control capabilities.

March 11, 2015

Available as on-premise software and as cloud service, Helix SCM and Content Collaboration Platform serves as single source of truth for all contributors on multi-disciplinary product teams. Solution includes native Distributed Version Control System engine and complete Git management with advanced repo management capabilities, pull requests, issue tracking, and web hooks. Using advanced behavioral analytics, Helix automatically detects potential IP theft across accounts, projects, and assets. Read More