View
Sorting
Products found: 198
360Suite Security and Administration
- View, manage and audit security
- Document security (XLS, CSV, PDF)
- View explicit, inherited and granular rights
- Get a user-centric and object-centric view of security
- Spend less time on administrative and analytic tasks
- Bulk update crystal connections and report instances
- Bulk re-point Webi (UNV to UNX, update BEx/BICS queries)
- Update Webi variables en masse
- Archive objects content & report instances (WID, PDF, XLS, CSV, text)
- Automate any administrative task (update owners, purge reports, update recurring instances, etc.)
- Clean up unused content and dormant users
- Data Catalog for documents
- Drill down capabilities with export
- Replace Query Builder
4iQ IDHunt
- Targeted Threat Analysis. Instead of searching for a needle in a haystack, investigators start with what they already know – suspected bad actors – and search the 4iQ IDLake to begin making connections.
- Accelerate Findings. 4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.
- Analytics. A single actor analysis can require hundreds of pivots. With 4iQ IDHunt, you can automatically connect the dots, generate graphs and calculate maliciousness scores in seconds.
- No Training Required. 4iQ IDHunt application is simple. Using an intuitive interface, Investigators can search and immediately start seeing results with no prior training.
Actifio's platform
AhnLab EPS
- Proactively protects against unknown malware
- Prevents malware-induced security breaches
- Provides system stability without requiring signature or patch updates
- Eliminates interruptions caused by malicious or unauthorized software
- Operates around the clock without the need for constant maintenance
- Allows simple administration and implementation
- Reduces system and data restoration costs by preventing malware damages
- Reduces time and costs required for system security and maintenance
Allgeier IT Solutions julia mailoffice
- A scalable solution for small, medium-sized and large companies
- Extremely stable operation and performance
- Defined rules can be adapted in line with your compliance requirements
- New web mailer ensures secure communication even with recipients who do not have their own encryption
- Automated links to any trust centers to source certificates efficiently
Anonymizer Ion
- Speed
- Reliability
- IP Quality
- Competitive Intelligence
- Investment Intelligence
- Reputation Management
- Research
- Web Monitoring
AnubisNetworks MPS
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
Arkivum Platform
- Smart management of regulated data
- Automate retention schedules
- In-built mechanisms for secure removal of data
- Trusted data export that proves authenticity of records in original state
- Extraction and enrichment of metadata for easy search and discovery
- Records can be shared securely
- Make sure data is where it needs to be with our flexible data organisation model
- Long term access
- Adheres to OAIS standards
- Ongoing file normalization to ensure always readable
- Secure, cloud based managed service
- Flexible deployment options
- 100% data integrity guaranteed
- In-built validation, integrity and fixity checks
- Secure, user permisioned access
- Retention schedules
- Investigation
- Easy administration
- Integration with your reporting and analytical tools
Audit Manager
Pro-fee and Facility Medical Auditing Software. Introducing Audit Manager.
Streamline the way you manage audits by merging audit workflow, management, education and reporting into one easy-to-use, web-based solution. Designed by auditors, for auditors, Audit Manager allows you to audit on your terms through immediate reporting, template customization, and total oversight of your entire audit program.Benefits
Identify Revenue. Evaluate financial impact. Minimize denials and identify up to 10%, per provider, in missed revenue with extensive reporting and analytics tools.Increase Efficiency. Improve your auditing efficiency by up to 40%. Reduce the amount of time you spend completing audits with our user-friendly interface.
Improve Accuracy. Customize your audit templates. Include your own standards, MAC carrier guidelines and claim scrubber tech for ideal results.
Software Features
Cloud-based Access. Never install software again. Access your audit tools, assignments, reports and training from anywhere, any time.
Flexible Audit Management. Experience total oversight of your entire audit program. View the status, and each associated status, of every audit, by any auditor.
E/M Calculator. Save time with every audit. Automatically calculate E/M codes with a built-in calculator while you audit.
Reporting. Capture and create clean, professional reports on every aspect, of any completed audit.
Education Modules. Enjoy pain-free training. Track and report deficiencies on core competencies, and access training modules based on the outcome of audits.
Customizable Templates. Ensure consistent language across your audit staff. Create your own customized audit findings/recommendations comment templates.
Pro-fee and Facility Audits. Manage your entire organization's audit program with Audit Manager. Leverage simple-to-use modules to audit either your pro-fee or facility auditing needs.
Audit Coders & Providers. Audit anyone with the click of a button. Easily identify and sort your coders and providers, then start your customized audit.
Risk Adjustment. Automatically complete your risk adjustment audits more efficiently. Then, deliver your audit results back to your provider or coder with clean, professional looking reports.
Auxilium Cyber Sec
PENETRATION TESTING, SECURE DESIGN, IMPLEMENTATION
Infrastructure and cloud. Company provides visibility into the security state of your network from internal and external prospective and an extensive penetration test of your organization perimeter and identify weak links that can allow attacker to get access inside your network. Mobile and desktop software.Developing good software is not easy. But it is even harder to secure it properly. Team will test the security of your software, perform code reviews and ensure security of your customers. Web - your website represents your brand and can bare critical business functionality. At the same time it is one of the easiest attack surface to access. Therefore Auxilium wants to help you ensure that your web site is secure properly maintains its functionality by performing Penetration tests and analyzing the efficiency of existing security measures. Hardware (IoT devices, connected cars, robots, etc.).Auxilium performs an extensive penetration test, provides appropriate security measures for your specific scenario or help you to make your products secure by design.RISK ASSESSMENT, THREAT MODELLING
Does your organization have a known problem in information security field or you simply want to increase the security level without knowing where to start? Auxilium can perform cost-effective and rapid analysis of your ICT environment pinpointing the most acute issues and assisting you with mitigating them.SECURITY STRATEGY AND IMPLEMENTATION
Is your organization striving for comprehensive and efficient information security management with high long-term added value? Team will design Information Security Strategy following frameworks like ISO 27001 and PSI DSS, among others, and provide you with necessary assistance and experience to embed such Information Security Strategy seamlessly into your daily operations.INCIDENT RESPONSE AND FORENSICS
Has information security inside your organization already been breached or are you suspicious that something is not right? Auxilium extensive expertise in intrusion detection and reverse engineering will help you uncover the high-profile security incidents including hacking intrusions or malware infections.SOCIAL ENGINEERING PENETRATION TESTS
With the constant evolution of defensive technologies people remain the weakest link in the system. No matter how good your technologies are, attackers can exploit your employees to achieve their goals. Auxilium will simulate this threat for your organizations and help to educate your employees afterwards.RED TEAMING
Are you ready to see what a real attacker what do to meet his objective? Are you ready to really test your defenses? Auxilium will identify weak links in your organization through pre agreed controlled attack scenarios (Digital, Physical and combined). It is a step beyond the traditional security testing and security reviews.SECURITY TRAININGS
Auxilium really like to share our knowledge and experience. Team will teach your employees to detect social engineering attempts and improve their security awareness, and your developers to write secure code and your engineers to create solutions which are secure by design.AvailabilityPlus DocRAID
- Healthcare collaboration. Exchange large files across countries and across hospitals. Be compliant with HIPAA and other regulations.
- Email. Send email protected without handling a complex and expensive public key infrastructures.
- Cyber Defense. Reduce your attack profile significantly. Use zero-knowledge-synchronization for additional protection. Manage the key material at separate locations.
- Insider threats. Reduce insider threat risks and maximize your data protection capabilities.
- Strategic Reconnaissance. Prevent industrial espionage and mass surveillance.
- Pharma. DocRAID makes it easy to deliver secure corporate collaboration, without end-user hassle. DocRAID provides enterprise-grade security, allows large file uploads, and can synchronize files across desktop and mobile devices.
- Attorneys. Encrypted document transfer, remote access and collaboration designed to meet an attorney’s workflow and security requirements. With DocRAID, attorneys securely deliver and access confidential correspondence and other case files faster and without size limits, saving time and expense compared to manual methods. As a professional resource, DocRAID works with Microsoft Outlook, on tablets, and any Mac or PC.
- Collaboration. Exchange data with external partners.
- Healthcare - Interoperability. Send sensitive data to patients, doctors, hospitals. Audit proof.
- Architecture. Send large files to local administrations. The receiver does not need to install software. Get proof that you delivered your file on time.
Awake Security Platform
- A more complete view of your potential attack surface and the business assets that are part of it.
- Tracking of every asset as they move across your network while detecting malicious intent of all entities.
- An autonomously built understanding of the relationships and similarities between entities.
- Building up evidence of malicious intent for each entity and correlating all behaviors over time.
- Going beyond alerts and visualizing the entire incident kill-chain across entities, protocols, and time.
- Allowing custom detection for your unique risks without needing threat hunters or data scientists.
- Comprehensive, descriptive investigative answers to give better context to threats and event details.
- Forensic artifacts and timelines that equip you with meaningful evidence you can actually use.
- Insights you can share with your entire security infrastructure to enhance existing investments.
- Connect it to Your Network. Integrates easily into all your existing networks
- See Results. See high-risk incidents and compromised entities without the need of agents, manual configuration, or complex integrations
- That’s It. Deploying Awake really is that simple
Axxana Phoenix for Oracle
Ayehu Platform
- Simple. Easy to use, no coding required
- Scalable. Highly scalable and flexible to deploy
- Integrated. Powerful interoperability across IT and security solutions
- Intelligent. Machine learning driven decision support
BackBox
Baffle Advanced Data Protection
- The solution delivers application level encryption via a “no code” model
- The technology provides “homomorphic-like” functionality meaning it enables mathematical operations, sorting and searching on AES encrypted data without ever decrypting the underlying values in memory, in process, or at-rest
Basis Technology Cyber Triage
- Integration with SOARs/SIEMs requires the Team version of Cyber Triage, which includes a REST API
- Cyber Triage integrates with Demisto, DFLabs, IBM QRadar SIEM, IBM Resilient, Phantom, Splunk, and Swimlane and more
- If we don’t currently support the integration you need, reach out; we can add the needed integration to our roadmap
- Runs on all versions of Microsoft Windows (XP and newer)
- Requires no installation on target systems; it is pushed to live systems as needed or can run directly from a USB drive
- Contained in a single executable, which makes it easy to deploy
- Analyzes disk images in raw or E01 formats
- Uses The Sleuth Kit® forensics library, thereby making collection less vulnerable to typical rootkits and does not modify file access times
- Volatile data (including running processes, open ports, logged-in users, active network connections, and DNS cache)
- Malware persistence mechanisms, including startup items and scheduled tasks
- User activity, including what programs they ran, web activity, and logins
- File content from suspicious files
- File metadata from all files on the system
- Files with malware based on results from multiple ReversingLabs engines
- Known bad files and other items based on IOCs and blacklists
- Startup programs, services, or drivers in uncommon locations or that are not signed
- User accounts with abnormal behaviors and failed logins
- Known good operating system and application files based on MD5 hash values and NIST NSRL and ignore them; this reduces the amount of data that needs to be analyzed and reviewed.
- Encrypted archive files that could be from data exfiltration
- Having a built-in intrusion forensics workflow that allows users to quickly see what items are suspicious and mark items as suspicious
- Allowing the user to pivot between correlated data types; they can start with a process and quickly see its network connections and remote host information, or look at the process’s executable file or how it started
- Showing the current timeline of bad items; when an item is marked bad in the investigation workflow, it is shown in a small timeline, making it easy to compare a suspicious item with other bad items
- Providing a full timeline of system activity, which allows the user to see what happened before and after a given event; this makes it easier to find related activities and put context around a suspicious event
- Giving the user a file explorer view to see what else is in the suspicious file folder
- Showing how common or rare an item is based on how often it was found in previous sessions
- Queueing up a set of hosts that need data collecting and analyzing
- Adding the hosts to the same “incident grouping,” which allows the user to correlate among them
- Items marked as bad in one host will be marked as bad in others.
BigID Platform
- Know your data without moving your data. Graph your data relationships without building another data warehouse or lake. Discover identity relationships across your data stores with no language or metadata dependencies.
- Find more personal data in any language without false positive frustration. Get up to 97% accuracy across all data types, without language, character, meta-data or RegX dependencies using BigID’s first of its kind, patent-pending machine learning, identity intelligence and smart correlation search algorithm.
- Hot or not, easily find your PI with heatmap. Quickly detect possible PI in data stores to streamline data migration to cloud, monitor dev environments for personal data pollution or focus investigations.
- Agentless Search across structured, unstructured, Big Data & Cloud. Scan and correlate data across all on-prem & cloud data stores without agent complexity including Mainframe, Hadoop, Hive, NetApp, Teradata, RDBMS, Salesforce, SAP, S3, Outlook, O365, GSuite and dozens of others pre-built no-agent connections.
- Data maps from data science, not data recollections. Today data maps are generated through interviews and surveys. BigID brings data mapping into the 21st century by collecting the information directly from your IT environment and applications.
- DeRisk with data Intelligence. Get a 360 view of your customer data. Quickly identify potential risks proactively based on industry standards or metrics you define, and get actionable recommendations for risk reduction.
- Analyze in your own words. Use natural language to query and build reports in BigID. No SQL or JSON knowledge required.
- Your datacenter or your cloud. Easily deploy inside your own datacenter or fully automated inside AWS, MS Azure or Google Compute Engine clouds.
- Open APIs & Pre-wired Apps. Access BigID operations programmatically, virtualize PI data or simplify integration with GRC, DLP, DRM, DAM and Anonymization.
- Custom Compliance Policies and Alerting. Build data residency and flow policies and alert notifications.
Binary Defense Managed Detection and Response
- 100% Cloud-based
- Alert for state changes that may be Indiacators of Compromise
- Off-line Support
- Removes the burden of keeping defenitions current
- Always available cloud-scale data management
- Consolidated real-time data collection
- Techniques to detect suspicious system behavior
- User and Entity Behavioral Analytics (UEBA)
- Hacker-tested, superior detection to any solution available, both on and off premise
- Detection of anomalies, advanced persistant threats, lateral movements, privilege escalation, Powershell injection, and many more
- 360-degree visibility across customer’s on-premises and cloud resources
- Automated response features for incident response
- Accelerates investigation and remediation
- Proactive detection, device monitoring, and blocking of known malware, unknown malware, and zero-day exploits
- Honeypots and decoys
Biscom Secure File Transfer
- Simple and intuitive, requires minimal training
- Self-service — no IT support needed
- Integrates with Outlook
- Mobile apps provide access and control from anywhere, anytime
- Drag and drop files into Web
- Automation tools for unattended and machine-to-machine transfers
- Reduce your Exchange server mailbox size by re-routing attachments through Biscom SFT
- No size or file type limitations — easily supports files 100+ GB and up for simplified large file transfers
- Overcome Microsoft Outlook/Exchange limits
- Built-in acceleration for optimal transfer
- More user-friendly replacement to FTP
- Checkpoint restart for interrupted transfers
- FIPS 140-2 certified, AES-256 bit encryption
- Data encrypted at rest and in transit
- Full transaction logging and reporting
- Anti-virus integration
- Three-tier security architecture
- Penetration tested
- 3-tier architecture for scalability, flexible security
- Integrates directly with Microsoft Active Directory and LDAP
- Microsoft Outlook plug-in works with Global Address List (GAL)
- Configurable for high availability (HA) and disaster recovery (DR)
- Microsoft SharePoint
- HP/Autonomy iManage
- RESTful API available for developers and system integrators
- Confirmed delivery
- Detailed usage reports, file activity, active users, and other analytics
- Policy-based – can trigger secure deliveries based on file size, file type, or keywords
- Advanced delivery options – second level password protection, expiration date, notification options
- Compliance role
- Audit-friendly
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.