View
Sorting
From A to Z
Products found: 195
360Suite Security and Administration
Identify who has access to what
- View, manage and audit security
- Document security (XLS, CSV, PDF)
- View explicit, inherited and granular rights
- Get a user-centric and object-centric view of security
- Spend less time on administrative and analytic tasks
- Bulk update crystal connections and report instances
- Bulk re-point Webi (UNV to UNX, update BEx/BICS queries)
- Update Webi variables en masse
- Archive objects content & report instances (WID, PDF, XLS, CSV, text)
- Automate any administrative task (update owners, purge reports, update recurring instances, etc.)
- Clean up unused content and dormant users
- Data Catalog for documents
- Drill down capabilities with export
- Replace Query Builder
-
-
ROI-calculator
Configurator
ROI-
-
4
14
4iQ IDHunt
The only way to stop cyber-enabled crimes is to unmask whoever is truly behind it. By identifying bad actors, you can recover funds, freeze accounts, takedown infrastructure — and, most importantly, thwart additional attacks and exploitations. For even the most advanced intelligence operations, however, identifying threat actors can be a slow and difficult process. And one with many dead ends. That’s where 4iQ IDHunt comes in. We help investigators analyze monikers or pseudonyms and other identity related attributes, connect the dots and unmask bad actors around the globe, by combining open source intelligence and our one-of-a-kind 4iQ IDLake.
4iQ IDHunt Core
IDHunt Core is an easy to use web application for intel analysts to analyze personas, enhance attribution analysis, and uncover the real identities behind criminal activities.
- Targeted Threat Analysis. Instead of searching for a needle in a haystack, investigators start with what they already know – suspected bad actors – and search the 4iQ IDLake to begin making connections.
- Accelerate Findings. 4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.
- Analytics. A single actor analysis can require hundreds of pivots. With 4iQ IDHunt, you can automatically connect the dots, generate graphs and calculate maliciousness scores in seconds.
- No Training Required. 4iQ IDHunt application is simple. Using an intuitive interface, Investigators can search and immediately start seeing results with no prior training.
-
-
ROI-calculator
Configurator
ROI-
-
6
0
Actifio's platform
Secure, centralized control and instant access to production copies for continuous security testing.
Features:
Enforced Retention to Prevent Data Deletion
Ensure data integrity by preventing unexpected data expiration or deletion prior to established retention periods thus protecting against rogue users and ransomware.
Air Gap Technology
Implement a low cost air gap strategy to protect against unexpected attacks and recover instantly and enable compliance with regulations like Appendix J or Sheltered Harbor.
Leverage Object Storage for Cost Effective Retention
Benefit from the powerful economics of object storage for data storage while also gaining instant data access.
Secure Immutable Data Storage
Rely on a hardened software appliance that limits external access and uses advanced data encryption to ensure data integrity and enable compliance with policies like Sheltered Harbor and GDPR.
Ability to Instantly Rollback & Recover
Rollback to previous states instantly regardless of data age or type & recover instantly.
Instant Creation of Test Environments
Spin up dozens of VMs instantly in a consistent and reliable manner to enable large scale security testing and validation.
Parallel Recoveries
Recover 10s, 100s or even 1000s of servers in parallel when attacks occur thus minimizing downtime and outage windows.
Consistent Security Policies
Maintain consistent security and access control on all data regardless of location by reducing surface area of attack by provisioning thin clones using a single backup copy to dev/test and UAT environments.
Enable Automated Legal Hold on Critical Data
Set enforced retention policies to ensure that data is retained based on fixed schedules and cannot be deleted prior to expiration.
Integrated Workflows to Enable Automated Data Masking or Record Removal
Workflow tools ensures that consistent actions are performed on all presented data copies including enabling third party masking tools or execution of database scripts to remove selected records.
-
-
ROI-calculator
Configurator
ROI-
-
5
17
AhnLab EPS
Industrial control systems have long been considered immune to cyber attacks as they are mostly isolated from the Internet. Unfortunately, this no longer holds true. Today’s advanced cyber attacks are targeting critical infrastructures and organizations with highly valuable information, leading to sabotage of massive assembly lines, severe economic damages, and data breaches.
AhnLab EPS is a compact, optimized security solution for industrial systems based on whitelisting. Find out how EPS ensures the stability of operations and increases endpoint security effectiveness without impacting business productivity.
Features:
Whitelist Approach
Application whitelisting takes a proactive approach, denying everything that is not specifically approved. This approach allows only trusted programs in the whitelist, in contrast to traditional reactive solutions that only block known threats that are explicitly defined in a blacklist. By ensuring that only clean, approved applications can be executed, it protects networks from a broader range of potential threats.
Specialized for Industrial Systems
The importance and nature of industrial control systems, such as production lines, plants, and Point of Sales (POS) machines, present particular challenges to ensuring their continued security and stability. Coupled with restrictive controls on clients in these systems, EPS ensures stable system operation and security integrity in industrial environments.
Complete Network Control
Enables you to control the direction of communication and block malicious network IPs and ports in to keep potential risks at bay. Customize your protection for networks and preempt threats.
Simplified Endpoint Protection
EPS places its powerful antivirus engine on the central server, so that IT administrators do not need to update and maintain the signatures at every endpoint.
Learning Mode
Administrator can simulate the results when the configured settings or security policies are applied to real circumstances. It helps reduce disruptions to productivity and unexpected errors that are common with untested deployments.
Advantages:
Stability
- Proactively protects against unknown malware
- Prevents malware-induced security breaches
- Provides system stability without requiring signature or patch updates
- Eliminates interruptions caused by malicious or unauthorized software
- Operates around the clock without the need for constant maintenance
- Allows simple administration and implementation
- Reduces system and data restoration costs by preventing malware damages
- Reduces time and costs required for system security and maintenance
-
-
ROI-calculator
Configurator
ROI-
-
14
9
Allgeier IT Solutions julia mailoffice
In the field of security, our julia mailoffice product is the market leader for e‑mail security. julia mailoffice is used by a large of number of German federal authorities and big-name private enterprises. It serves as federal government's virtual mail room. We supply you with electronic encryption/decryption and digital signatures/signature scanning for e‑mails.
Feaures:
- A scalable solution for small, medium-sized and large companies
- Extremely stable operation and performance
- Defined rules can be adapted in line with your compliance requirements
- New web mailer ensures secure communication even with recipients who do not have their own encryption
- Automated links to any trust centers to source certificates efficiently
-
-
ROI-calculator
Configurator
ROI-
-
6
16
Anonymizer Ion
Ion disperses enterprise web scraping activity over our vast network of anonymous rotating IP addresses, allowing you to increase your data collection speed, avoid detection by targeted sites, and perform unrestricted deep-drill scraping. Ion is not only faster and safer, but is more reliable than other comparable solutions. Our high-speed, low latency IPs accelerate your data collection, with far more accurate and reliable results.
The Ion Advantage
- Speed
- Reliability
- IP Quality
- Competitive Intelligence
- Investment Intelligence
- Reputation Management
- Research
- Web Monitoring
-
-
ROI-calculator
Configurator
ROI-
-
16
18
AnubisNetworks MPS
For Service Providers
Grow your revenue and lower your costs, managing and selling email security services.
The great skillset of Service Providers, their ability with communications networks, and especially their proximity to customers, make Service Providers especially fit to provide carrier-grade systems and value-added managed services on the Cybersecurity market.
For Enterprises
Email security is critical for business to face the growth of cyber threats
The permanent relevance of Email in organizations, affected by the increasing security concerns associated with phishing, data leakage, and privacy protection, among others, pushes Service Providers to provide Email Security on top of the existing email infrastructure. Preferably, with an Email Security service robust enough to build trust on organizations, while becoming a value added service for the cloud platform itself, as well as hosted Service Providers and Resellers.
MPS Characteristics
AnubisNetworks Global Threat Intelligence Platform
AnubisNetworks’ security ecosystem permanently monitors the world for Botnets, IP Reputation, Email phishing and Malware campaigns, and communicates with MPS edge filters, for real time proactive malware prevention.
Control Features on top of Security Features
DLP (Data Leakage Protection), Quota Management, Rate control, Email Validation, transport Encryption and many other features are available per user and per scope, taking this platform far beyond Email Security.
Complete Visibility on your platform
Complete details on messages and queues for inbound and outbound flows. MPS also contains several dashboard data, system auditing, business information tools, each feature configurable by scope and data.
Customizable/White Label GUI
Each of the hierarchy scopes can be fully customized with your brand identity, your partners and your end customers.
Lean Management of Quarantine
Quarantine can be managed by IT and/or end users, in a centralized console, with the option of web end user interface and/or email interface (via periodic digests).
Hierarchic Multitenant System for Inbound and Outbound
An advanced architecture with several administration scopes (Virtual scopes, SMTP domains and LDAP based Organizational units), each with distinct roles – including Helpdesk users - for both centralized and delegated management.
Email Secure Routing and Virtual Aliases
MPS brings a new dimension to email routing management by enabling the usage of BCC, Email Queue holding, Distribution lists, Virtual Aliases, and Listeners based routing. And protected under SPF, TLS and DKIM encryption mechanisms.
Auditing, Monitoring and Billing information
Advanced and easy access to detailed information on all activities and system information, for billing, auditing and compliance purposes.
Email Control
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
-
-
ROI-calculator
Configurator
ROI-
-
16
1
Arkivum Platform
Arkivum software delivers long-term preservation and safeguarding of some of the world’s most prestigious and important data. Built-in automated processes ensure future accessibility, easy search and usability of your data, making your content discoverable and available over any digital channel. Arkivum software is powered by industry adopted open source technology, and pre-built integrations and open APIs make Arkivum solutions seamless when integrating, whether on-premise, cloud-based or hybrid. Arkivum is ISO 27001 and ISO 9001 certified and adheres to GxP principles for best-practice information security and data management.
Benefits:
Compliance
- Smart management of regulated data
- Automate retention schedules
- In-built mechanisms for secure removal of data
- Trusted data export that proves authenticity of records in original state
- Extraction and enrichment of metadata for easy search and discovery
- Records can be shared securely
- Make sure data is where it needs to be with our flexible data organisation model
- Long term access
- Adheres to OAIS standards
- Ongoing file normalization to ensure always readable
- Secure, cloud based managed service
- Flexible deployment options
- 100% data integrity guaranteed
- In-built validation, integrity and fixity checks
- Secure, user permisioned access
- Retention schedules
- Investigation
- Easy administration
- Integration with your reporting and analytical tools
-
-
ROI-calculator
Configurator
ROI-
-
16
6
AvailabilityPlus DocRAID
DocRAID is the pioneer in CloudRAID technology, 100% zero-knowledge backup and file sync, secure file exchange, and easy to use email encryption. Off-Premise in our data centers or on-premise (self-hosted) in your data center.
Awarded security
Your data is save with DocRAID. This is why we got awards from these international corporations and institutions: SAP, Siemens, Empolis, Bayer, Volkswagen, EU Office of cyber security and privacy.
Compliance
Be compliant with international standards such as HIPAA, EU General Data Protection Regulation and others.
On-premise (self-hosted) or off-premise on our metal
Scalable and flexible hosting for your company's most valuable information. Get your own domain e.g. myCompany.docraid.com. You manage your team online, we provide the secure infrastructre. Alternatively you host DocRAID in your data center.
CloudRAID Pionier
DocRAID is the pioneer in CloudRAID technology and combines multiple mechanisms for maximum data protection: fragmentation, encryption and redundant distribution to multiple storages.
Solutions
These industries use DocRAID: Healthcare, Administrations, Pharma, Architecture, Defense, Energy, critical Infrastructures or simply teams and private users.
- Healthcare collaboration. Exchange large files across countries and across hospitals. Be compliant with HIPAA and other regulations.
- Email. Send email protected without handling a complex and expensive public key infrastructures.
- Cyber Defense. Reduce your attack profile significantly. Use zero-knowledge-synchronization for additional protection. Manage the key material at separate locations.
- Insider threats. Reduce insider threat risks and maximize your data protection capabilities.
- Strategic Reconnaissance. Prevent industrial espionage and mass surveillance.
- Pharma. DocRAID makes it easy to deliver secure corporate collaboration, without end-user hassle. DocRAID provides enterprise-grade security, allows large file uploads, and can synchronize files across desktop and mobile devices.
- Attorneys. Encrypted document transfer, remote access and collaboration designed to meet an attorney’s workflow and security requirements. With DocRAID, attorneys securely deliver and access confidential correspondence and other case files faster and without size limits, saving time and expense compared to manual methods. As a professional resource, DocRAID works with Microsoft Outlook, on tablets, and any Mac or PC.
- Collaboration. Exchange data with external partners.
- Healthcare - Interoperability. Send sensitive data to patients, doctors, hospitals. Audit proof.
- Architecture. Send large files to local administrations. The receiver does not need to install software. Get proof that you delivered your file on time.
-
-
ROI-calculator
Configurator
ROI-
-
4
9
Awake Security Platform
Awake Security can continuously monitor an entire environment, process countless points of data, sense abnormalities or threats, and react if necessary—all in a matter of seconds.
The Awake Security Platform gives you:
Cognition
Understand your entire attack surface
Get a clearer view and understanding of every user, device, and application—whether managed or unmanaged. It offers:
- A more complete view of your potential attack surface and the business assets that are part of it.
- Tracking of every asset as they move across your network while detecting malicious intent of all entities.
- An autonomously built understanding of the relationships and similarities between entities.
- Building up evidence of malicious intent for each entity and correlating all behaviors over time.
- Going beyond alerts and visualizing the entire incident kill-chain across entities, protocols, and time.
- Allowing custom detection for your unique risks without needing threat hunters or data scientists.
- Comprehensive, descriptive investigative answers to give better context to threats and event details.
- Forensic artifacts and timelines that equip you with meaningful evidence you can actually use.
- Insights you can share with your entire security infrastructure to enhance existing investments.
- Connect it to Your Network. Integrates easily into all your existing networks
- See Results. See high-risk incidents and compromised entities without the need of agents, manual configuration, or complex integrations
- That’s It. Deploying Awake really is that simple
-
-
ROI-calculator
Configurator
ROI-
-
6
13
Axxana Phoenix for Oracle
Phoenix for Oracle achieves continuous application availability and saves money by constantly protecting yet-to-be-replicated data and rapidly restoring production across the Oracle environment. By combining Oracle® multiplexing capabilities with Phoenix’s disaster-proof Black Box and its operating system’s rich-featured recovery process, Phoenix for Oracle provides continuous application availability without the complexity, cost, performance issues, and distance limitations associated with synchronous replication. In the event of failure at the primary site, Phoenix for Oracle recovers all applications and databases together, with full consistency across them. Your organization can leverage any type of storage (including Exadata and flash arrays), any type of server connectivity (e.g., storage area network [SAN], InfiniBand, or IP-based), and any type of replication (e.g., storage-based or Data Guard). In addition, Phoenix operates over existing communication lines and has no impact on bandwidth requirements, freeing you from one of the most costly line items in disaster recovery budgets.
Benefits:
Continuous Availability
Zero data loss and full consistency across applications means you can fail over immediately to maintain continuous application availability and reduce downtime costs.
Cross-App Consistency
Phoenix synchronizes all applications and databases in the Oracle environment to one consistent point in time, ensuring data integrity and allowing the fastest possible recovery.
Unmatched Cost Reduction
No three-data-center topology. No bandwidth upgrades. Less human intervention. Less downtime. Phoenix reduces capital, operational, and risk-related costs.
No Distance Barrier
Locate your DR site at any distance from the primary site. Phoenix augments your asynchronous replication and protects yet-to-be-replicated data right at the primary site.
No Costly Communication Lines
The disaster-proof Black Box protects and transfers the data lag from its location at the primary site, eliminating bandwidth costs related to synchronous replication.
Continuous Application Availability at Flash Speeds
Phoenix protects the most recent not-yet-replicated snapshot and is the only technology that enables continuous application availability of flash-based storage arrays.
-
-
ROI-calculator
Configurator
ROI-
-
20
13
Ayehu Platform
Ayehu NG is an intelligent IT Automation and Orchestration platform built for the Digital Era. Powered by machine learning algorithms, Ayehu acts as a force multiplier, driving efficiency through a simple and powerful, web 3.0 automation platform for IT and security operations. Ayehu helps enterprises, save time on manual and repetitive tasks, accelerate mean time to resolution by 90%, and maintain greater control over IT infrastructure. As an agentless platform, Ayehu is easily deployed, allowing you to rapidly automate tasks and processes, including interoperability across disparate solutions and systems, all in one, unified platform.
- Simple. Easy to use, no coding required
- Scalable. Highly scalable and flexible to deploy
- Integrated. Powerful interoperability across IT and security solutions
- Intelligent. Machine learning driven decision support
-
-
ROI-calculator
Configurator
ROI-
-
10
3
BackBox
BackBox is the leading provider of Intelligent Automation for all Network and Security devices. BackBox provides the ability to schedule automated backup and storing of device configurations, single-click recovery, real-time inventory management, custom task automation, and pre-emptive health checks for all your critical devices. BackBox is ideal for any organization, multi-tenant sites and service providers.
Features:
Automated Backup & Recovery Solutions
BackBox provides a single, central repository for all your network device configuration backups. Eliminating the need for manual or scripted backup procedures, BackBox will pull all configuration files required for recovery.
Network Visualization Software
Network inventory and asset management has been a long-time feature of BackBox. Since BackBox is connecting to the devices regularly and pulling the necessary information, BackBox is able to provide a dynamic list of devices associated with the network that is automatically populated and updated with each backup performed.
Network Inventory & Asset Management
BackBox reports on hardware information such as CPUs, RAM, and storage, model and type information for devices, licensing information, and much more. The data is refreshed with every backup so it’s always current, and has customizable fields so you can access the exact information you want.
Network Task Automation
BackBox comes with a set of pre-configured network tasks that can alter configurations on multiple devices with a single-click. Automating these network and security tasks can be as simple as adding or removing an administrator from devices or as elaborate as preforming complex automated upgrades or hot fixes to multiple devices with a single click of a mouse.
INTELLICHECKS: Network Health Checks
In contrary to regular network monitoring solutions, BackBox comes with a predefined signature set that can check the health of your systems and keep uniformity and consistency of your device configuration. In contrary to regular monitoring solutions, BackBox can check things on the application level, what allows for much deeper intelligence, that is not available otherwise.
Identity and Access Management Software
Access Management adds the ability for BackBox to connect to remote devices without the need of a 3rd party software. It improves the connection experience by giving SSH, TELNET and RDP access from one console to all of your devices connected to BackBox.
-
-
ROI-calculator
Configurator
ROI-
-
17
15
Baffle Advanced Data Protection
Baffle’s solution goes beyond legacy encryption to truly close gaps in the data access threat model. Baffle provides an advanced data protection solution that protects data in memory, in process and at-rest to reduce insider threat and data theft risk. Baffle’s solution is an advanced data protection solution for two main reasons:
- The solution delivers application level encryption via a “no code” model
- The technology provides “homomorphic-like” functionality meaning it enables mathematical operations, sorting and searching on AES encrypted data without ever decrypting the underlying values in memory, in process, or at-rest
-
-
ROI-calculator
Configurator
ROI-
-
0
15
Basis Technology Cyber Triage
Start the Endpoint Investigation
Directly integrating with security orchestration, automation, and response (SOAR) and security information and event management (SIEM) systems, Cyber Triage investigations can start automatically based on an alert or analyst-initiated workbook.
Requirements and integrations:
- Integration with SOARs/SIEMs requires the Team version of Cyber Triage, which includes a REST API
- Cyber Triage integrates with Demisto, DFLabs, IBM QRadar SIEM, IBM Resilient, Phantom, Splunk, and Swimlane and more
- If we don’t currently support the integration you need, reach out; we can add the needed integration to our roadmap
- Runs on all versions of Microsoft Windows (XP and newer)
- Requires no installation on target systems; it is pushed to live systems as needed or can run directly from a USB drive
- Contained in a single executable, which makes it easy to deploy
- Analyzes disk images in raw or E01 formats
- Uses The Sleuth Kit® forensics library, thereby making collection less vulnerable to typical rootkits and does not modify file access times
- Volatile data (including running processes, open ports, logged-in users, active network connections, and DNS cache)
- Malware persistence mechanisms, including startup items and scheduled tasks
- User activity, including what programs they ran, web activity, and logins
- File content from suspicious files
- File metadata from all files on the system
- Files with malware based on results from multiple ReversingLabs engines
- Known bad files and other items based on IOCs and blacklists
- Startup programs, services, or drivers in uncommon locations or that are not signed
- User accounts with abnormal behaviors and failed logins
- Known good operating system and application files based on MD5 hash values and NIST NSRL and ignore them; this reduces the amount of data that needs to be analyzed and reviewed.
- Encrypted archive files that could be from data exfiltration
- Having a built-in intrusion forensics workflow that allows users to quickly see what items are suspicious and mark items as suspicious
- Allowing the user to pivot between correlated data types; they can start with a process and quickly see its network connections and remote host information, or look at the process’s executable file or how it started
- Showing the current timeline of bad items; when an item is marked bad in the investigation workflow, it is shown in a small timeline, making it easy to compare a suspicious item with other bad items
- Providing a full timeline of system activity, which allows the user to see what happened before and after a given event; this makes it easier to find related activities and put context around a suspicious event
- Giving the user a file explorer view to see what else is in the suspicious file folder
- Showing how common or rare an item is based on how often it was found in previous sessions
- Queueing up a set of hosts that need data collecting and analyzing
- Adding the hosts to the same “incident grouping,” which allows the user to correlate among them
- Items marked as bad in one host will be marked as bad in others.
-
-
ROI-calculator
Configurator
ROI-
-
20
16
BigID Platform
Discover PI across structured, unstructured & big data
Find every person’s data across petabytes of on-prem or cloud data using advanced machine learning, identity intelligence & smart correlation.
Find hidden information & relationships
Uncover unknown & uncatalogued personal data. Resolve identities; show data connections across PI tables; detect quality anomalies.
Inventory PI by data subject & residency
Index identity data by data subjects, country, app & more to enable GDPR privacy requirements like right-to-be-forgotten, breach response notifications and consent.
Automate access right fulfillment at scale
Generate customized data access reports at scale and high volume. Ensure continuous compliance through ongoing data deletion checks.
Automate data flow mapping
Automatically build & maintain data flow maps from scanned data. Enrich process maps with built-in surveys & collaboration.
Track data access & X-border Flows
Monitor PI access by application for enhanced data protection. Automatically track x-border data flows for all PI automatically.
Identify and Prioritize Protection for PI with Open Access
BigID consolidates access intelligence insights to provide a granular view of where personal data at risk, with the ability to drill down and search the inventory for focused security and privacy compliance actions.
Comply with privacy regulations like GDPR & CCPA
Enable security, privacy, data governance organizations to satisfy current regulations and test against future regulations through simple natural language queries, analysis templates, and reports.
Map your data relationships across data stores
Trace and traverse your identity data across apps and data stores. Identify connections across entities; find sensitive associations; determine lineage.
Smart, Privacy-aware Tagging
Add GDPR and identity-centric labels to documents for simplified security enforcement with DLP, DRM, DAM and Encryption.
72H Breach Investigation and Notification
Compare internal data with dark web data to identify affected users and their residency for fast targeted response and accelerated investigation.
Automate Policy Checks and Enforcement Orchestration
Flag, alert, and orchestrate data protection actions via APIs with configurable policies; proactively react to compliance violations, risk escalation or cross-border transfers.
Advantages:
- Know your data without moving your data. Graph your data relationships without building another data warehouse or lake. Discover identity relationships across your data stores with no language or metadata dependencies.
- Find more personal data in any language without false positive frustration. Get up to 97% accuracy across all data types, without language, character, meta-data or RegX dependencies using BigID’s first of its kind, patent-pending machine learning, identity intelligence and smart correlation search algorithm.
- Hot or not, easily find your PI with heatmap. Quickly detect possible PI in data stores to streamline data migration to cloud, monitor dev environments for personal data pollution or focus investigations.
- Agentless Search across structured, unstructured, Big Data & Cloud. Scan and correlate data across all on-prem & cloud data stores without agent complexity including Mainframe, Hadoop, Hive, NetApp, Teradata, RDBMS, Salesforce, SAP, S3, Outlook, O365, GSuite and dozens of others pre-built no-agent connections.
- Data maps from data science, not data recollections. Today data maps are generated through interviews and surveys. BigID brings data mapping into the 21st century by collecting the information directly from your IT environment and applications.
- DeRisk with data Intelligence. Get a 360 view of your customer data. Quickly identify potential risks proactively based on industry standards or metrics you define, and get actionable recommendations for risk reduction.
- Analyze in your own words. Use natural language to query and build reports in BigID. No SQL or JSON knowledge required.
- Your datacenter or your cloud. Easily deploy inside your own datacenter or fully automated inside AWS, MS Azure or Google Compute Engine clouds.
- Open APIs & Pre-wired Apps. Access BigID operations programmatically, virtualize PI data or simplify integration with GRC, DLP, DRM, DAM and Anonymization.
- Custom Compliance Policies and Alerting. Build data residency and flow policies and alert notifications.
-
-
ROI-calculator
Configurator
ROI-
-
16
10
Binary Defense Managed Detection and Response
With Binary Defense Managed Detection & Response (MDR), our security team will protect your business through continuously collecting, recording, and storing endpoint data giving you surveillance-like visibility you can use to investigate past incidents or proactively hunt for threats lurking in your networks.
Every threat — from the common to the sophisticated — swiftly identified and isolated by our dynamic endpoint services. The Binary Defense MDR platform has detection and prevention capabilities for each part of the attack lifecycle. Protect your brand, your data, and your enterprise with Binary Defense MDR.
24/7 round-the-clock security event monitoring
- 100% Cloud-based
- Alert for state changes that may be Indiacators of Compromise
- Off-line Support
- Removes the burden of keeping defenitions current
- Always available cloud-scale data management
- Consolidated real-time data collection
- Techniques to detect suspicious system behavior
- User and Entity Behavioral Analytics (UEBA)
- Hacker-tested, superior detection to any solution available, both on and off premise
- Detection of anomalies, advanced persistant threats, lateral movements, privilege escalation, Powershell injection, and many more
- 360-degree visibility across customer’s on-premises and cloud resources
- Automated response features for incident response
- Accelerates investigation and remediation
- Proactive detection, device monitoring, and blocking of known malware, unknown malware, and zero-day exploits
- Honeypots and decoys
-
-
ROI-calculator
Configurator
ROI-
-
15
1
Biscom Secure File Transfer
Biscom Secure File Transfer (SFT) is a web-based managed file transfer solution that replaces insecure FTP and email to send and share files all while being easy enough for end users to operate without IT involvement.
6 key ways that Biscom’s Secure File Transfer solution keeps your business moving
Easy to use and collaborate
- Simple and intuitive, requires minimal training
- Self-service — no IT support needed
- Integrates with Outlook
- Mobile apps provide access and control from anywhere, anytime
- Drag and drop files into Web
- Automation tools for unattended and machine-to-machine transfers
- Reduce your Exchange server mailbox size by re-routing attachments through Biscom SFT
- No size or file type limitations — easily supports files 100+ GB and up for simplified large file transfers
- Overcome Microsoft Outlook/Exchange limits
- Built-in acceleration for optimal transfer
- More user-friendly replacement to FTP
- Checkpoint restart for interrupted transfers
- FIPS 140-2 certified, AES-256 bit encryption
- Data encrypted at rest and in transit
- Full transaction logging and reporting
- Anti-virus integration
- Three-tier security architecture
- Penetration tested
- 3-tier architecture for scalability, flexible security
- Integrates directly with Microsoft Active Directory and LDAP
- Microsoft Outlook plug-in works with Global Address List (GAL)
- Configurable for high availability (HA) and disaster recovery (DR)
- Microsoft SharePoint
- HP/Autonomy iManage
- RESTful API available for developers and system integrators
- Confirmed delivery
- Detailed usage reports, file activity, active users, and other analytics
- Policy-based – can trigger secure deliveries based on file size, file type, or keywords
- Advanced delivery options – second level password protection, expiration date, notification options
- Compliance role
- Audit-friendly
-
-
ROI-calculator
Configurator
ROI-
-
2
3
Bitcrack Cyber Security ThreatBox
Identify Interanal Attackers
ThreatBox looks, acts and feels like a real IoT device or web-service in your environment. When attackers are performing reconnaissance or finding targets, ThreatBox will alert you. When an attacker actually tries to attack a system that is a ThreatBox, it allows it. Holding the attacker while alerting you. You can also deploy our ThreatBox plugins to existing websites in your company to further enhance detection of internal adversaries and lateral movement.
How it Works
Adversaries in your network have one goal - attack and gain access to lucrative systems. These systems can be medical devices, CCTV, transaction/banking systems, PLC/SCADA devices and more. In 2015, we set out with an idea to help detect these kinds of attacks. By creating systems so real, and so distinctly bespoke - attackers will hack them, not realising that the underlying architecture is designed to detect and alert on their covert activities and movement.
Dashboard
Monitor your alerts and get more information on attacks via the dashboard. You also get emailed when a ThreatBox detects malicious activity against it. Got your own security monitoring? ThreatBox can output alerts to many formats including Syslog and support for Splunk!, AlienVault and others.
-
-
ROI-calculator
Configurator
ROI-
-
13
15
Boole Server BooleBox
Sensitive information
Safeguarding your company's material assets is routine. However, protecting intangible assets is often overlooked. When it comes to security, everything should be archived in a space that can be accessed externally and internally in a controlled manner. With BooleBox, you can. Risk-free.
- Guaranteed military encryption
- Multiple personal keys
- Advanced protection
- Secure file-sharing systems
- Online editing and collaboration supports
- Reports and activity logs
- Integrated e-mail encryption system
- Special plug-in that can also be installed on Outlook and Gmail
- Controlled file classification
- Default access to work groups
-
-
ROI-calculator
Configurator
ROI-
-
7
13
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.