View
Sorting
Products found: 151
6Scan
What Does 6Scan Do?
- Find. The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.
- Fix. Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.
- Protect. 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.
Adlumin's Sentry
- Artificial Intelligence-Based Decisions
- No Rules to Write or Hardware to Manage
- Artificial Intelligence Writes Your SIEM Rules
- 24/7 Network Vulnerability Assessment
- Analyzes Firewall, VPN Log Data, & Network
- Automated Anomaly Interpretation
- User and Device Context/Correlation
- Automated log and Device Ingest
- Critical Server Log Management
- Real-time Intrusion Detection Alerts
- Windows & Linux Server Management
- Cloud and On-premise Ingest
- Integrated Compliance Management (PCI, FFIEC, FINRA)
- Secure & Encrypted Log Management
- Log Data Normalization
- Includes Reports Designed to Hand to Your Financial Auditor
- Risk Management, Visualization, and Analysis
- Automated Reporting for Auditors and Compliance
- Make Decisions in Minutes, Not Days
- Financial Compliance Audit Reports Included
- Know Everything About an Account with 1 Click
- 90-Days of Research Included with SIEM
- 24/7 Anomaly Hunting w/o Hiring Anyone
- Designed for Financial Institutions
- Understand Risk with 1 Button Click
Aegify RSC Suite
Aegify RSC Suite
- Reduced risk
- Unified/integrated approach
- Lower total cost of ownership
- Oversight ease
- Maximum security
- No compliance tradeoffs
The NEED
RISK management is not optional for healthcare, retail and financial organizations.When SECURITY breaches happen, critical data is compromised, jobs are lost and profits disappear. Managing the regulatory maze is challenging. PCI, ISO and SANS 20 COMPLIANCE is best practice. HIPAA, GLBA and FISMA COMPLIANCE is the law. Risk, security and compliance (RSC) protection is complex and cumbersome. Until now. Discover the effective simplicity of a unified RSC solution. Discover Aegify.
- Aegify RSC Suite includes:
- Aegify Risk Manager
- Aegify Security Manager
- Aegify Compliance Manager
- Aegify Integrity Manager
UNIFIED APPROACH
For management ease and cost reduction, most healthcare providers and business associates prefer a unified Risk, Security and Compliance solution. Consider these diagnostic questions:- Are you confident your vendors and business associates are compliant with all regulations?
- Are burdens of compliance forcing you to take calculated risks due to resource constraints?
- Do you have multiple siloed solutions that cause integration, management and financial headaches?
- If your answers are mostly “yes,” consider Aegify RSC Suite
Diagnose
Within hours, you will know:- Your total organizational risk including your risk from each of your vendors and business associates
- Where your security threats lie
- What curative measures need to be undertaken
- Your compliance status with HIPAA, Meaningful Use, HITECH, PCI, ISO, SANS 20 and all other regulations and standards
Cure
Follow Aegify instructions to:- Minimize organizational risk
- Close your risk, security and compliance gaps
- Comply with all applicable regulations and standards
Protect
24/7 continuous monitoring program will:
- Reduce all risk… today and tomorrow
- Diagnose and cure future security threats in real time
- Comply with all applicable current and future regulations
WHY AEGIFY?
Aegify was founded on a simple set of guiding principles:
- RSC services are too siloed, complicated and expensive
- The market needs a holistic RSC solution that diagnoses, cures and prevents future catastrophic events from occurring
Today, the Aegify Suite is a unique unified solution that operates at the intersection of security, compliance and risk management for healthcare, retail and financial organizations.
For those that don’t need a unified RSC Solution, each individual Aegify Manager product is a robust standalone solution.
AgileSi
360° SAP Security powered by SIEM
agileSI is an award winning, industry-grade solution for continuous monitoring of SAP security events, parameter checks, change detection of critical settings, transaction manipulation and automated response. agileSI is much more than just another tool or SAP plugin. It brings with it a whole new way to manage and monitor SAP® in all of its aspects, while taking care of security. Continuously monitoring basically any stats you desire, it’s a one-for-all solution to give you insight into what’s going on in your engine room, without digging through tons of data and interfaces yourself. And it makes audit preparation and reporting a breeze. agileSI is based on a three-tier architecture model with a collection, administration and analysis layer, respectively. Analyzing the data is achieved by using the agileSI content package for SIEM. This contains an extended Security Analytics Pack which provides the categorization of events and a large set of predefined SAP-specific event correlations for different security domains. It also handles the evaluation of criticality, as well as the visualization & notification and delivers alerting rules and reports.The added value is a SAP-specific Security Intelligence Package for SIEM. The product approach does not fall back to another isolated solution, but pursues the holistic strategy of establishing security event management at a central point in the company: in the SOC, on the basis of next generation SIEM & Log Management solutions that are planned or already being used in all security-conscious organizations.
Solution offers:
- The SAP-SIEM-integration. agileSI provides a broad set of SAP Extractors, feeding different kind of SAP data, such as database data, system settings, logs and events from various SAP security sources into SIEM. The framework and its extractors are highly flexible and configurable, to meet exactly the customers‘ needs. The integration of SAP data into SIEM provides transparency to many stakeholders.
- Domain. agileSI is used for supervision of security-critical activity & events, access control checks and monitoring of audit-relevant information, compliance of system settings and authorizations, as well as SAP Operations support and the monitoring of dedicated SAP business application data & transactions.
- SAP Operations. Integration of SAP Basis near information and events will facilitate SAP Basis processes and remediation cycles, raising efficiency at work and providing ad-hoc reports of system metrics data.
- Any SAP Data. Get any SAP data with the help of flexible and configurable agileSI data extractors, create any customer use case and integrate any customer’s SAP-based applications.
- SAP Security Log Management & Monitoring. agileSI Extractors retrieve all kinds of security-relevant information of SAP NW ABAP based SAP systems.The included content package adds SAP Security Intelligence to SIEM.
- Ready-to-use. Ready-to-use with a predefined set of use cases – the agileSI configuration frontend is developed in Web Dynpro ABAP. The key benefit is the powerful and ready-to-use content of predefined uses cases, that makes agileSI a real product, rather than a tool only with high customer site implementation and customization effort. The use cases can be maintained, customized or created newly using the agileSI configuration frontend.
- Guidelines. Implemented DSAG audit guidelines, SAP Security Guidelines and information, as well as practical-proven SAP Security specialists and auditors know-how are transferred into use cases, implemented in agileSI SAP and SIEM components.
Allied Telesis Secure Enterprise SDN (SES)
Allure Security
- Third-Party Monitoring. Know when third parties mishandle or share files outside of policy
- Document Flow Analytics. Uncover file access and sharing patterns both inside and outside of an organization
- Breach & Leak Detection. Be alerted early in the attack cycle if sensitive files are compromised or exfiltrated
- Risk Reports. Schedule monthly reports or generate them on-demand
- Data Loss Forensics. Track data loss back to the source and hold culprits accountable
- Geo Location Enrichment. Enrich file logs with proprietary geo location insights
AlphaSOC Network Behavior Analytics for Splunk
- Volumetric and quantitative analysis (counting events, identifying patterns)
- Resolving FQDNs and domains to gather context (identifying sinkholes and ASN values)
- Breakdown and analysis of each FQDN label (i.e. hostname, domain, TLD)
- Gathering of reputation data (e.g. WHOIS and associated malware samples)
- Categorization of traffic based on known patterns (e.g. C2, P2P, VPN, cryptomining)
- Uncovering C2 callbacks and traffic to known sinkholes
- Tor, I2P, and Freenet anonymized circuit identification
- Cryptomining and JavaScript cryptojacking detection
- Flagging traffic to known phishing domains
- Brand impersonation detection via Unicode homoglyphs and transpositions
- Flagging multiple requests for DGA domains, indicating infection
- DNS and ICMP tunneling and exfiltration detection
- Alerting of lateral movement and active network scanning
- Policy violation flagging (e.g. third-party VPN and P2P use)
AMT - Banking Malware Detector
The AMT Technology Website
The AMT (Agentless anti-Malware Technology) is a new proprietary Minded Security technology for detection and management of malware software. AMT has been developed after years of study for detecting and managing in real time advanced banking malware for our customers online users. The core engine is a JavaScript Analyzer written by renowned JavaScript experts specialized in advanced JavaScript security research. Various innovative analysis technique have been used in AMT such as Trusted JavaScript Modeling combined with optimized WebInject differential analysis.The product: AMT Banking Malware Detector
The AMT Banking Malware Detector is a sophisticated security platform for detecting and managing advanced malware on your online banking customers in real time. AMT Banking Malware Detector instantly recognizes all new malwares that have been installed on users' computer interacting with your Internet Banking Web Site. The technology is able to detect all types of banking malwares, with a focus on targeted malware specifically designed to attack a particular bank.Key Features:
- Agentless: does not install anything on user’s computer.
- Transparent: does not alter the user experience.
- Proactive detection: detects malware not known yet.
- Easy Setup: installation and tuning in just a few days.
- Available in both modes cloud and appliance.
Performance
No degradation in the performance of the bank infrastructure: no need to install new infrastructure components.
Light Deployment: for portals with millions of users does not require significant additional infrastructure.
- Fraud Risk Management
The technology reduces risk of infected users preventing frauds.
Can be easily managed by the bank's internal anti-fraud team through the innovative HTML5 interface.
- Easy Management
The product is easy to install with a single JavaScript source for multiple sites. No need to install new infrastructure components (no impact on Business Continuity).
Easy to manage with AMT control panel and AMT daily reports.
- Customization
It is designed to integrate with any anti-fraud systems with the ability to customize the modular components such as GUI, API, and specific components.
Ability to create ad hoc components for malware detection.
Why choosing AMT?
The key point of the AMT Banking Malware Detector is the new proactive approach.
AMT creates a model of Custom Signature Engine (CSE) for each online banking service.
The CSE permits to perform a continuous comparison with the mutations and to identify in real time a new threat.
AMT Banking Malware Detector allows to identify malware victims before they will be defrauded.
AppGuard ServerGuard
- Simple Deployment
- Real-Time Protection
- Prevents In-Memory Attacks
- No Sandboxing
AppRiver Email Security
- Modern dashboard that spotlights phishing and malware threats
- Real-time protection from phishing and malware
- Proprietary technology that protects against conversation hijacking
- Maximizes or limits user control options
- Over 60 filtering techniques
- Office 365-compatible
- Efficiently filters quarantine with convenient declutter feature
- Viewable or searchable quarantined messages for a domain
- Downloadable messages for further analysis
- Full security management with Two-Factor authentication (2FA)
AppVisory
- Security classification of the top apps from the commissioned commercial app stores
- Intuitively understandable security classification of apps in the APPVISORY ® evaluation procedure
- Changes of the security status of an app will be highlighted in the APPVISORY ® app catalog
- Development, service und hosting in Germany
- Administrator access for APPVISORY ® management console per web-login
- Export of individual test results and applicants as CSV, JSON and PDF
- Extensive app catalog of continually tested apps
- Automatic review of each app update
- For Android and iOS
- Automatic connection to leading MDM software
- Scan of the app portfolio created in the MDM against the APPVISORY database
- Transfer of an app portfolio to the MDM Whitelist/Blacklist
- Escalation by push notification in case of violation of company’s compliance guidelines
- Automatic or manual assembly of apps for the creation of a basic Whitelist/Blacklist
- Automatic synchronization of changed risk ratings of apps due to updated results
Aruba 360 Secure Fabric
Avocado Systems Platform
- One Touch Segmentation. Deterministic threat detection at the web, application and database tiers.
- Zero Policies. Highest resolution application of the pico segmentation without any policy.
- Platform Agnostic. Bare metal, virtualized, containerized, and server-less platforms.
Better Mobile Security MTD
- Apps. Prevent risky and leaky apps from putting sensitive data at risk with app scanning technology powered by machine learning.
- Web and Content. Employees are more likely to get phished on their phone than their computer. Protect them from all sources of malicious links (texting, WhatsApp, iMessage, Snapchat, Facebook, etc.)
- Device / OS. Mobile device OS vulnerabilities must be mitigated. Users need defense against advanced jailbreak attacks and risky device configurations. Get control of device versions, including CVEs based on Android patch levels and iOS versions.
- Network. Risky Wi-Fi hotspots are everywhere. How do you know if a man-in-the-middle attack is in place? Prevent the full range of advanced network-based threats with detection powered by our cloud-based global visibility.
Capsule8 Platform
- No Risk to System Stability. Capsule8 runs in userland (outside the operating system’s kernel) and collects kernel-level data without the need of a kernel module. This approach ensures no risk to stability in production (both servers and networks).
- Minimal Performance Impact. To ensure minimal performance impact to hosts and networks, Capsule8 employs a resource limiter that enforces hard limits to system CPU, disk and memory, with an intelligent load-shedding strategy.
- Simple Deployment and Maintenance. The Capsule8 agent is a single static Go binary that is portable and easy to install and to update through a wide variety of orchestration mechanisms, including Puppet, Ansible, Kubernetes, etc. Our system works on-premise, in the cloud, or in a hybrid environment.
- Minimal Network Load. Our distributed approach to analytics pushes computation as close to the data as possible, ensuring minimal impact to even the busiest of networks.
Carbon Black (CB) Defense
- Signatures and cloud-based reputation to stop malware
- Streaming prevention to stop advanced fileless attacks
- Online and offline prevention
- Flexible prevention policies
- Customizable executive dashboard
- Interactive attack chain visualization
- Live Response: real-time threat remediation
- PCI and HIPAA compliant
- Open APIs integrate with your security stack
Carson & SAINT Corporation Security Suite
Celerium Cyber Defense Network
- Create, share, and receive threat information easily and rapidly
- Quickly assess and prioritize the most relevant data to determine a course of action
- Feed high quality intelligence into technology already in use, enhancing its value and responsiveness
- See similar responses to and actions on threat data by other community members to evaluate your own resilience and response
Centripetal Networks CleanINTERNET
- Lowers false positives through bulk enforcement of millions of complex IOC rules, paired down from hundreds of millions of indicators
- Greatly reduces event volume through intelligence-based filtering and data aggregation
- Converts indicators to action on a continuous basis, as intelligence feeds are dynamically updated
- Organizations cannot apply threat intelligence at-scale
- High latency rates limit real-time prevention of known threats. Less than 1% of compromise indicators are persistently applied to an organization’s defense
- Eradicate threats based threat intelligence enforcement
- Focus on investigating the 10% of threats that are unknown
Without a single platform that can process the amount of threat intelligence necessary to actively defend the business, security teams have been struggling. Firewalls and IPS systems are not the answer.
Centripetal has solved this problem with its invention of the Threat Intelligence Gateway. This solution fundamentally changes how cyber teams filter bad traffic based on intelligence, allowing them to:
Change Tracker Gen7 R2
IT SECURITY & COMPLIANCE - PROBLEM SOLVED!
NNT’s Change Tracker™ Gen7 R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems. Completely redesigned with both security and IT operations in mind, Change Tracker™ Gen7 R2 is the only solution designed to reduce change noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments. Gen7 R2 integrates with leading Service desks and Change Management solutions to reconcile the changes that are actually occurring within your environment with those that were expected and part of an approved Request for Change. Security and IT Service Management (ITSM) have traditionally observed and managed change in two very different ways. By linking the changes approved and expected within the ITSM world with those that are actually happening from a security perspective, SecureOps™ is delivered and underpins effective, ongoing security and operational availability.Change Tracker Features And Benefits
Automates CIS Controls Spot cyber threats, identify any suspicious changes and adjust the secure baseline for all of your systems in real-time with NNT Change Tracker™ Gen7R2. Approve changes to the authorized baseline with a simple point and click. Breach Prevention Ensure all IT assets are secure and breach free at all times by leveraging state of the art, recommended security and configuration hardening settings along with real-time system vulnerability and configuration drift management. Breach Detection Change Tracker™ Gen7 R2 identifies suspicious activity using highly sophisticated contextual change control underpinned by threat intelligence to spot breach activity while reducing change noise. Real-Time Contextual File Integrity Monitoring Change Tracker™ intelligently analyzes all changes in real-time leveraging the world’s largest repository of independently verified whitelisted files combined with intelligent and automated planned change rules to significantly reduce change noise and deliver a true FIM solution. System Hardening & Vulnerability Management Minimize your attack surface with continuous and real-time clear configuration guidance and remediation based on CIS and other industry standard benchmarks for system hardening and vulnerability mitigation guidance. Continuous Compliance Monitoring Across all Industries NNT provides comprehensive tailored or pre-built reports to provide vital evidence to security staff, management and auditors of the ongoing and improving state of your organizations secure and compliant posture.New Features and Functionality
- All new Dashboard, fully customizable with choice of widgets and multiple tabs for alternative Dashboard layouts
- ‘Single-Page Application’ design gives a contemporary, super-responsive Change Tracker experience
- New universal Query/Report controls, consistently available, enables reports to be built ‘off the page’
- New Reports Center – build and schedule any reports, with graphically-rich content, including all new Executive Report showing overall security of your estate
- ‘Expert Event Analysis’ sections for reports, with events automatically pre-analyzed to show ‘noisiest’ devices, paths, registry settings and any other monitored configuration attributes to aid decision making in your Change Control Program
- Report production now performance optimized, even large volume event reports are generated on a streamed basis to minimize impact on Hub server resources
- Report properties can be tailored – include a hyperlinked Table of Contents, Event Details table and Query Parameters, together with as many/few event attributes as required
- New Group & Device/Date & Time filter and selection control panel, selections persist for any page accessed, panel can be hidden when not in use to give a ‘full screen’ display of the Dashboard
- User-defined auto-refresh settings for all pages
- New componentized Planned Changes, allowing easy re-use of schedules and/or rulesets, driven by a new Planned
- New ‘FAST list’ planned change rule option, ensures only file changes you select as permitted, allows a user-defined list of approved file changes to be operated – like a personal FAST Cloud!
Operating at a forensic level within the IT infrastructure, Change Tracker™ works across all popular platforms such as:
- Windows, all versions including Server 2019, 2016 and Windows 10, XP, 2003/R2, Windows 7, Windows 8/8.1, 2008R2, 2012/R2 (Core and GUI)
- Linux, all versions, including Ubuntu, SUSE, CentOS, RedHat, Oracle, FreeBSD and Apple MAC OS
- Unix, all versions including Solaris, HPUX, AIX, Tandem Non-Stop
- VMWare, all versions including ESXi
- Database Systems, including Oracle, SQL Server, DB2, PostgreSQL, My SQL
- Network Devices and Appliances, all types and manufacturers, including routers, switches and firewalls, from Cisco, Nortel, Juniper, Fortinet and Checkpoint
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.