Security Services

Miscellaneous Software

Computer Security for SMBs is available as hosted service.

With convenience of cloud-based service, Symantec Hosted Endpoint Protection enables customers to protect Windows-based laptops, desktops, and file servers from threats. Single solution, managed from Web-based console, offers protection from endpoint to gateway. For clients with distributed workforce, service provides visibility into health of end user systems and ensures that protection levels...

Read More »
Security Services

Security Service helps optimize network security posture.

Using Remediation Manager-Pro, organizations can remediate security vulnerabilities on their computing platforms. DDI not only identifies what clients need to do with vulnerabilities discovered, but also provides action plan whereby DDI Security Analysts will securely remediate discovered vulnerabilities on behalf of client. Service provides pre- and post- remediation analysis report, detailed...

Read More »
Access Control Systems

Cloud Identity Services target enterprises and service providers.

Available in 2 editions, myOneLogin creates single, secure login to thousands of web applications. Enterprise Edition, suited for up to 500 users, integrates cloud-based access control with enterprise directories, networks, and desktops through TriCipher Enterprise Connector. myOneLogin Service Provider Edition offers access to myOneLogin's SOAP-based APIs for SaaS providers or others integrating...

Read More »
Security Services

Website Security Service targets e-commerce merchants.

Designed to help convert website visitors to buyers, HackerProof(TM) certifies that site has been tested and meets stringent security standards. Overview dashboard enables access to common functions and information needed to manage scans. All tables can be sorted by each field, and users can set email alert options per IP/Domain or Device. Acting as vulnerable customer, SiteInspector visits site,...

Read More »
Data and Database Management Software

Network Security Service protects against data theft and fraud.

Powered by RSA® Anti-Fraud Command Center, RSA CyberCrime Intelligence Service leverages 24/7 monitoring and detection, alerts, and reporting to identify computers, information assets, and identities compromised by Trojans or other online attacks. Actionable information helps IT professionals understand and isolate possible points of exposure within enterprise environments so they can...

Read More »
Security Services

Managed Access Gateway delivers external identity management.

Managed Access Gateway is cloud-based identity hub service that enables businesses to outsource external identity management while still allowing them to control access to applications and associated data by third-parties. It incorporates protocols such as WS-Federation and SAML to support web-based access. Authentication methods such as username/password and digital certificates are also...

Read More »
Security Services

Services help healthcare companies comply with HITECH Act.

With Breach Prevent for Healthcare services, healthcare organizations can review all aspects of PHI security and data breach readiness. HITECH Compliance ensures initial and ongoing compliance with data breach regulations of HITECH Act. Breach Risk Assessment is performed by IAPP certified experts who assess organizations' PHI and PII assets, policies, and processes. Experts will develop Incident...

Read More »
Internet Software

Software-as-a-Service delivers essential website security.

Designed to address entry-level security needs, WhiteHat Sentinel Baseline Edition provides fully automated assessment service that identifies business-critical vulnerabilities. By delivering verified actionable results, PCI-ready reports, and Web interface for tracking and trending, Sentinel BE helps organizations fight against website attacks. API enables integration with existing bug-tracking,...

Read More »
Security Services

Managed Service helps enterprises secure IT environments.

Risk-Correlation Service automatically identifies and evaluates security risks by combining 2 factors: likelihood that attack will be successful, and adverse impact of attack on business. Using online risk-intelligence scorecard, service synthesizes information and presents text- and image-based results for at-a-glance viewing. Current and emerging threats are prioritized, allowing enterprises to...

Read More »
Security Services

Security Service manages USB Flash drives over Internet.

IronKey Silver Bullet Service enables enterprise security professionals to remotely manage hundreds or thousands of IronKey secure flash drives over Internet. Capabilities include remotely tracking, denying access to, and destroying said devices. Policies can be set to define course of action when device is lost or stolen. Also included, tracking and reporting capabilities deliver provable...

Read More »
Do You Have Unique Lifting Needs?
Sponsored

Do You Have Unique Lifting Needs?

EZRig Cranes offers lifting solutions that are engineered for robust performance, providing the ultimate in portability. Designed for real-world lifting needs, our products are small and light with options and features that make them ideal for a broad range of applications. See our video to learn how an EZRig Crane can simplify your lifting requirements.

Read More »

All Topics