View
Sorting
Products found: 147
Adlumin's Sentry
- Artificial Intelligence-Based Decisions
- No Rules to Write or Hardware to Manage
- Artificial Intelligence Writes Your SIEM Rules
- 24/7 Network Vulnerability Assessment
- Analyzes Firewall, VPN Log Data, & Network
- Automated Anomaly Interpretation
- User and Device Context/Correlation
- Automated log and Device Ingest
- Critical Server Log Management
- Real-time Intrusion Detection Alerts
- Windows & Linux Server Management
- Cloud and On-premise Ingest
- Integrated Compliance Management (PCI, FFIEC, FINRA)
- Secure & Encrypted Log Management
- Log Data Normalization
- Includes Reports Designed to Hand to Your Financial Auditor
- Risk Management, Visualization, and Analysis
- Automated Reporting for Auditors and Compliance
- Make Decisions in Minutes, Not Days
- Financial Compliance Audit Reports Included
- Know Everything About an Account with 1 Click
- 90-Days of Research Included with SIEM
- 24/7 Anomaly Hunting w/o Hiring Anyone
- Designed for Financial Institutions
- Understand Risk with 1 Button Click
Aegify RSC Suite
Aegify RSC Suite
- Reduced risk
- Unified/integrated approach
- Lower total cost of ownership
- Oversight ease
- Maximum security
- No compliance tradeoffs
The NEED
RISK management is not optional for healthcare, retail and financial organizations.When SECURITY breaches happen, critical data is compromised, jobs are lost and profits disappear. Managing the regulatory maze is challenging. PCI, ISO and SANS 20 COMPLIANCE is best practice. HIPAA, GLBA and FISMA COMPLIANCE is the law. Risk, security and compliance (RSC) protection is complex and cumbersome. Until now. Discover the effective simplicity of a unified RSC solution. Discover Aegify.
- Aegify RSC Suite includes:
- Aegify Risk Manager
- Aegify Security Manager
- Aegify Compliance Manager
- Aegify Integrity Manager
UNIFIED APPROACH
For management ease and cost reduction, most healthcare providers and business associates prefer a unified Risk, Security and Compliance solution. Consider these diagnostic questions:- Are you confident your vendors and business associates are compliant with all regulations?
- Are burdens of compliance forcing you to take calculated risks due to resource constraints?
- Do you have multiple siloed solutions that cause integration, management and financial headaches?
- If your answers are mostly “yes,” consider Aegify RSC Suite
Diagnose
Within hours, you will know:- Your total organizational risk including your risk from each of your vendors and business associates
- Where your security threats lie
- What curative measures need to be undertaken
- Your compliance status with HIPAA, Meaningful Use, HITECH, PCI, ISO, SANS 20 and all other regulations and standards
Cure
Follow Aegify instructions to:- Minimize organizational risk
- Close your risk, security and compliance gaps
- Comply with all applicable regulations and standards
Protect
24/7 continuous monitoring program will:
- Reduce all risk… today and tomorrow
- Diagnose and cure future security threats in real time
- Comply with all applicable current and future regulations
WHY AEGIFY?
Aegify was founded on a simple set of guiding principles:
- RSC services are too siloed, complicated and expensive
- The market needs a holistic RSC solution that diagnoses, cures and prevents future catastrophic events from occurring
Today, the Aegify Suite is a unique unified solution that operates at the intersection of security, compliance and risk management for healthcare, retail and financial organizations.
For those that don’t need a unified RSC Solution, each individual Aegify Manager product is a robust standalone solution.
AhnLab EPS
- Proactively protects against unknown malware
- Prevents malware-induced security breaches
- Provides system stability without requiring signature or patch updates
- Eliminates interruptions caused by malicious or unauthorized software
- Operates around the clock without the need for constant maintenance
- Allows simple administration and implementation
- Reduces system and data restoration costs by preventing malware damages
- Reduces time and costs required for system security and maintenance
Alcide Kubernetes Advisor
- Kubernetes infrastructure vulnerability scanning
- Hunting misplaced secrets, or excessive priviliges for secret access
- Workload hardening from Pod Security to network policies
- Istio security configuration and best practices
- Ingress Controllers for security best practices
- Kubernetes API server access privileges
- Kubernetes operators security best practices
- Deployment conformance to labeling, annotating, resource limits and much more
AlphaSOC Network Behavior Analytics for Splunk
- Volumetric and quantitative analysis (counting events, identifying patterns)
- Resolving FQDNs and domains to gather context (identifying sinkholes and ASN values)
- Breakdown and analysis of each FQDN label (i.e. hostname, domain, TLD)
- Gathering of reputation data (e.g. WHOIS and associated malware samples)
- Categorization of traffic based on known patterns (e.g. C2, P2P, VPN, cryptomining)
- Uncovering C2 callbacks and traffic to known sinkholes
- Tor, I2P, and Freenet anonymized circuit identification
- Cryptomining and JavaScript cryptojacking detection
- Flagging traffic to known phishing domains
- Brand impersonation detection via Unicode homoglyphs and transpositions
- Flagging multiple requests for DGA domains, indicating infection
- DNS and ICMP tunneling and exfiltration detection
- Alerting of lateral movement and active network scanning
- Policy violation flagging (e.g. third-party VPN and P2P use)
AnubisNetworks MPS
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
AppGuard Enterprise
Adaptation. AppGuard Enterprise automatically adapts to software updates and patches.
AppGuard ServerGuard
- Simple Deployment
- Real-Time Protection
- Prevents In-Memory Attacks
- No Sandboxing
AppRiver Email Security
- Modern dashboard that spotlights phishing and malware threats
- Real-time protection from phishing and malware
- Proprietary technology that protects against conversation hijacking
- Maximizes or limits user control options
- Over 60 filtering techniques
- Office 365-compatible
- Efficiently filters quarantine with convenient declutter feature
- Viewable or searchable quarantined messages for a domain
- Downloadable messages for further analysis
- Full security management with Two-Factor authentication (2FA)
AppVisory
- Security classification of the top apps from the commissioned commercial app stores
- Intuitively understandable security classification of apps in the APPVISORY ® evaluation procedure
- Changes of the security status of an app will be highlighted in the APPVISORY ® app catalog
- Development, service und hosting in Germany
- Administrator access for APPVISORY ® management console per web-login
- Export of individual test results and applicants as CSV, JSON and PDF
- Extensive app catalog of continually tested apps
- Automatic review of each app update
- For Android and iOS
- Automatic connection to leading MDM software
- Scan of the app portfolio created in the MDM against the APPVISORY database
- Transfer of an app portfolio to the MDM Whitelist/Blacklist
- Escalation by push notification in case of violation of company’s compliance guidelines
- Automatic or manual assembly of apps for the creation of a basic Whitelist/Blacklist
- Automatic synchronization of changed risk ratings of apps due to updated results
Armis IoT Security Platform
- Comprehensive device and asset discovery
- Device type, location, software, vulnerabilities, services used, and more
- Connection history for forensics
- Passive monitoring which does not disrupt devices
- Devices that are behaving correctly
- Devices that are acting suspiciously
- Devices that may be part of a botnet or vulnerable
- Leverage your existing infrastructure
- Take action Immediately
- Gain the peace of mind you need for all devices, managed or unmanaged
Avanan
- Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
- Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
- Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
- Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
Avast Business Antivirus Pro Plus
Avira Antivirus Pro - Business Edition
- A PC running Windows 7 or higher (with Service Pack 1 and the latest updates)
- Or a Mac running OSX 10.11 (El Capitan) or higher.
- 2 GB of RAM, over 2 GB of hard disk space, and an internet connection
- Android: Android 4.0.3 or later
Avocado Systems Platform
- One Touch Segmentation. Deterministic threat detection at the web, application and database tiers.
- Zero Policies. Highest resolution application of the pico segmentation without any policy.
- Platform Agnostic. Bare metal, virtualized, containerized, and server-less platforms.
Better Mobile Security MTD
- Apps. Prevent risky and leaky apps from putting sensitive data at risk with app scanning technology powered by machine learning.
- Web and Content. Employees are more likely to get phished on their phone than their computer. Protect them from all sources of malicious links (texting, WhatsApp, iMessage, Snapchat, Facebook, etc.)
- Device / OS. Mobile device OS vulnerabilities must be mitigated. Users need defense against advanced jailbreak attacks and risky device configurations. Get control of device versions, including CVEs based on Android patch levels and iOS versions.
- Network. Risky Wi-Fi hotspots are everywhere. How do you know if a man-in-the-middle attack is in place? Prevent the full range of advanced network-based threats with detection powered by our cloud-based global visibility.
BeyondTrust POWERBROKER ENDPOINT PROTECTION PLATFORM
- Protect critical endpoints with an all-in-one firewall, IPS, anti-malware, antivirus solution
- Conduct local vulnerability assessments of air-gapped and otherwise disconnected systems
- Protect web servers and web applications against exploits, zero-days, and unauthorized access (optional)
- Reduce system management costs with a “no-touch” solution that eliminates the need for constant updates
- Rely on updates from the renowned BeyondTrust Security Research Team
BitDam
- Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
- 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
- Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
- Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
- Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
- Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
- Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
- Cloud Storage
- Instant Messaging
Bitdefender Gravity Zone Ultra Security (XDR)
- Real-time endpoint visibility
- Expose (insight into) suspicious activities
- One-click investigation
- Alert triage and incident analysis visualization
- Track live attacks and lateral movements
- Rapid response
- Reduce dwell time with fast resolution, containment and remediation
- Minimize noise and distraction from false alarms
- Reduce the volume of incidents with effective threat prevention
- Eliminate manual remediation of blocked attacks with automatic remediation and repair
- Minimize exposure with strong prevention
- Machine-learning and behavior-based detection stops unknown threats at pre-execution and on-execution
- Detect and block script-based, fileless, obfuscated and custom malware with automatic remediation
- Memory protection to prevent exploits
- Reduce attack surface by enabling IT security controls
- Integrated client firewall, device control, web content filtering, app control, patch management and more.
BufferZone
- Virtual Container: A secure, virtual environment for accessing content from any potentially risky source including internet browsers, removable media and e-mail.
- Secure Bridge: A configurable process for extracting data from the container to enable collaboration between people and systems while ensuring security and compliance.
- Endpoint Intelligence: Detailed reporting and integration with SIEM and Big Data analytics to identify targeted attacks.
- Containment Features. Prevent uncontained applications, which can access organizational resources, from accessing the internet; and prevent contained applications, which can access the internet, from accessing organizational resources.
- Hidden Files. Set file locations, that may contain sensitive data, to be hidden from contained applications.
- Upload Blocker. When Upload Blocker is enabled, contained browsers can download to and upload from only a designated folder (by default: Downloads), which is isolated from uncontained programs. This prevents browsers from uploading any files to the internet other than contained files that were previously downloaded from the internet.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.