View

Sorting

Products found: 12

logo
Offer a reference bonus
0.00

Amazon Key Management Service (KMS)

AWS Key Management Service (KMS) makes it easy for you to create and manage keys and control the use of encryption across a wide range of AWS services and in your applications. AWS KMS is a secure and resilient service that uses FIPS 140-2 validated hardware security modules to protect your keys. AWS KMS is integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs. FEATURES AWS Key Management Service (KMS) gives you centralized control over the encryption keys used to protect your data. AWS KMS is integrated with AWS services making it easy to encrypt data you store in these services and control access to the keys that decrypt it. AWS KMS is integrated with AWS CloudTrail, which provides you the ability to audit who used which keys, on which resources, and when. AWS KMS also enables developers to easily add encryption functionality to their application code either directly through encrypt and decrypt service APIs or through its integration with the AWS Encryption SDK. Centralized Key Management AWS Key Management Service provides you with centralized control of your encryption keys. Customer master keys (CMKs) are used to control access to data encryption keys that encrypt and decrypt your data. You can create new master keys whenever you wish, and easily manage who has access to them and which services they can be used with. You can also import keys from your own key management infrastructure into AWS KMS or use keys stored in your AWS CloudHSM cluster and manage them from AWS KMS. You can manage your master keys and audit usage from the AWS Management Console or by using the AWS SDK or AWS Command Line Interface (CLI). The keys in AWS KMS, whether created within KMS, your CloudHSM cluster, or imported by you, are stored in highly durable storage in an encrypted format so that they can be used when needed. You can choose to have AWS KMS automatically rotate master keys created within KMS once per year without the need to re-encrypt data that has already been encrypted with your master key. You don’t need to keep track of older versions of your master keys as KMS keeps them available to decrypt previously encrypted data. AWS Service Integration AWS KMS is seamlessly integrated with most AWS services. This integration means that you can easily use KMS master keys to control the encryption of the data you store within these services. When deciding to encrypt data in a service, you can chose to use an AWS managed master key that is created in KMS for you automatically by that service. You can track the usage of the key but it is managed by the service on your behalf. If you need direct control over the lifecycle of a master key or wish to allow other accounts to use it, you can create and manage your own master keys that can be used on your behalf by AWS services. These customer managed master keys give you full control over the access permissions that determine who can use the key and under which conditions. Audit Capabilities If you have AWS CloudTrail enabled for your AWS account, each request you make to AWS KMS is recorded in a log file that is delivered to the Amazon S3 bucket that you specified when you enabled AWS CloudTrail. The information recorded includes details of the user, time, date, API action and, when relevant, the key used. Scalability, Durability, and High Availability AWS KMS is a fully managed service. As your use of encryption grows KMS automatically scales to meet your needs. AWS KMS enables you to manage thousands of master keys in your account and to use them whenever you want. AWS KMS defines default limits for number of keys and request rates, but you can request increased limits if necessary. The master keys you create in AWS KMS or ones that are created on your behalf by other AWS services cannot be exported from the serviced. Therefore KMS takes responsibility for their durability. To help ensure that your keys and your data is highly available, KMS stores multiple copies of encrypted versions of your keys in systems that are designed for 99.999999999% durability. If you import keys into KMS, you maintain a secure copy of the master keys so that you can re-import them if they are not available when you need to use them. If you use the custom key store feature in KMS to create your master keys in an AWS CloudHSM cluster, encrypted copies of your keys are automatically backed up and you have full control over the recovery process. AWS KMS is designed to be a highly available service with a regional API endpoint. As most AWS services rely on AWS KMS for encryption and decryption, it is architected to provide a level of availability that supports the rest of AWS and is backed by the AWS KMS Service Level Agreement. Secure AWS KMS is designed so that no one, including AWS employees, can retrieve your plaintext keys from the service. The service uses FIPS 140-2 validated hardware security modules (HSMs) to protect the confidentiality and integrity of your keys regardless of whether you request KMS to create keys on your behalf, create them in an AWS CloudHSM cluster, or import them into the service. Your plaintext keys are never written to disk and only ever used in volatile memory of the HSMs for the time needed to perform your requested cryptographic operation. Keys created by KMS are never transmitted outside of the AWS region in which they were created and can only be used in the region in which they were created. Updates to the KMS HSM firmware is controlled by multi-party access control that is audited and reviewed by an independent group within Amazon as well as a NIST-certified lab in compliance with FIPS 140-2. Custom Key Store AWS KMS provides the option for you to create your own key store using HSMs that you control. Each custom key store is backed by an AWS CloudHSM cluster. When you create a KMS customer master key (CMK) in a custom key store, KMS generates and stores non-extractable key material for the CMK in an AWS CloudHSM cluster that you own and manage. When you use a CMK in a custom key store, the cryptographic operations under that key are performed in your CloudHSM cluster. Master keys that are stored in a custom key store rather than the default KMS key store are managed in the same way as any other master key in KMS and can be used by any AWS service that supports customer managed CMKs. The use of a custom key store involves the additional cost of the CloudHSM cluster and makes you responsible for the availability of the key material in that cluster. Key Storage Each customer master key (CMK) that you create in AWS Key Management Service (KMS), regardless of whether you use it with KMS-generated key material or key material imported by you, costs $1/month until you delete it. For a CMK with key material generated by KMS, if you opt-in to have the CMK automatically rotated each year, each newly rotated version will raise the cost of the CMK by $1/month. KMS retains and manages each previous version of the CMK to ensure you can decrypt older data. You are not charged for the following:
  • Creation and storage of AWS managed CMKs, which are automatically created on your behalf when you first attempt to encrypt a resource in a supported AWS service.
  • CMKs that are scheduled for deletion. If you cancel the deletion during the waiting period, the CMK will incur charges as though it was never scheduled for deletion.
  • Data keys, which are created by GenerateDataKey and GenerateDataKeyWithoutPlaintext API requests. You are charged for these API requests per the usage pricing discussed below whether you make these API requests directly or they are made on your behalf by an integrated AWS service. You are not charged an ongoing monthly fee for the data keys themselves as they are neither stored nor managed by KMS.
Custom Key Store You have the option of using a CloudHSM cluster to generate and store your AWS KMS keys. The use of a custom key store does not affect the KMS charges for storing and using a CMK. However, a custom key store does require you to maintain a CloudHSM cluster that contains at least two HSMs. More HSMs can be added for improved availability and performance. The standard CloudHSM charges apply. Free Tier AWS Key Management Service provides a free tier of 20,000 requests/month calculated across all regions that KMS is available. BENEFITS: Fully managed You control access to your encrypted data by defining permissions to use keys while AWS KMS enforces your permissions and handles the durability and physical security of your keys. Centralized key management AWS KMS presents a single control point to manage keys and define policies consistently across integrated AWS services and your own applications. You can easily create, import, rotate, delete, and manage permissions on keys from the AWS Management Console or by using the AWS SDK or CLI. Manage encryption for AWS services AWS KMS is integrated with AWS services to simplify using your keys to encrypt data across your AWS workloads. You choose the level of access control that you need, including the ability to share encrypted resources between accounts and services. KMS logs all use of keys to AWS CloudTrail to give you an independent view of who accessed your encrypted data, including AWS services using them on your behalf. Encrypt data in your applications AWS KMS is integrated with the AWS Encryption SDK to enable you to used KMS-protected data encryption keys to encrypt locally within your applications. Using simple APIs you can also build encryption and key management into your own applications wherever they run. Built-in auditing AWS KMS is integrated with AWS CloudTrail to record all API requests, including key management actions and usage of your keys. Logging API requests helps you manage risk, meet compliance requirements and conduct forensic analysis. Low cost There is no commitment and no upfront charges to use AWS KMS. You only pay US $1/month to store any key that you create. AWS managed keys that are created on your behalf by AWS services are free to store. You are charged per-request when you use or manage your keys beyond the free tier. Secure AWS KMS uses FIPS 140-2 validated hardware security modules (HSMs) to generate and protect keys. Your keys are only used inside these devices and can never leave them unencrypted. KMS keys are never shared outside the AWS region in which they were created. Compliance The security and quality controls in AWS KMS have been certified under multiple compliance schemes to simplify your own compliance obligations. AWS KMS provides the option to store your keys in single-tenant HSMs in AWS CloudHSM instances that you control.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Amazon Simple Queue Service (SQS)

Amazon Simple Queue Service (SQS) is a fully managed message queuing service that enables you to decouple and scale microservices, distributed systems, and serverless applications. SQS eliminates the complexity and overhead associated with managing and operating message oriented middleware, and empowers developers to focus on differentiating work. Using SQS, you can send, store, and receive messages between software components at any volume, without losing messages or requiring other services to be available. Get started with SQS in minutes using the AWS console, Command Line Interface or SDK of your choice, and three simple commands. SQS offers two types of message queues. Standard queues offer maximum throughput, best-effort ordering, and at-least-once delivery. SQS FIFO queues are designed to guarantee that messages are processed exactly once, in the exact order that they are sent. FEATURES: Queue types Amazon SQS offers two queue types for different application requirements: Standard Queues Unlimited Throughput: Standard queues support a nearly unlimited number of transactions per second (TPS) per API action. At-Least-Once Delivery: A message is delivered at least once, but occasionally more than one copy of a message is delivered. Best-Effort Ordering: Occasionally, messages might be delivered in an order different from which they were sent. You can use standard message queues in many scenarios, as long as your application can process messages that arrive more than once and out of order, for example:
  • Decouple live user requests from intensive background work: Let users upload media while resizing or encoding it.
  • Allocate tasks to multiple worker nodes: Process a high number of credit card validation requests.
  • Batch messages for future processing: Schedule multiple entries to be added to a database.
FIFO Queues High Throughput: By default, FIFO queues support up to 300 messages per second (300 send, receive, or delete operations per second). When you batch 10 messages per operation (maximum), FIFO queues can support up to 3,000 messages per second. Exactly-Once Processing: A message is delivered once and remains available until a consumer processes and deletes it. Duplicates aren't introduced into the queue. First-In-First-Out Delivery: The order in which messages are sent and received is strictly preserved (i.e. First-In-First-Out). FIFO queues are designed to enhance messaging between applications when the order of operations and events is critical, or where duplicates can't be tolerated, for example:
  • Ensure that user-entered commands are executed in the right order.
  • Display the correct product price by sending price modifications in the right order.
  • Prevent a student from enrolling in a course before registering for an account.
Functionality
  • Unlimited queues and messages: Create unlimited Amazon SQS queues with an unlimited number of message in any region
  • Payload Size: Message payloads can contain up to 256KB of text in any format. Each 64KB ‘chunk’ of payload is billed as 1 request. For example, a single API call with a 256KB payload will be billed as four requests. To send messages larger than 256KB, you can use the Amazon SQS Extended Client Library for Java, which uses Amazon S3 to store the message payload. A reference to the message payload is sent using SQS.
  • Batches: Send, receive, or delete messages in batches of up to 10 messages or 256KB. Batches cost the same amount as single messages, meaning SQS can be even more cost effective for customers that use batching.
  • Long polling: Reduce extraneous polling to minimize cost while receiving new messages as quickly as possible. When your queue is empty, long-poll requests wait up to 20 seconds for the next message to arrive. Long poll requests cost the same amount as regular requests.
  • Retain messages in queues for up to 14 days.
  • Send and read messages simultaneously.
  • Message locking: When a message is received, it becomes “locked” while being processed. This keeps other computers from processing the message simultaneously. If the message processing fails, the lock will expire and the message will be available again.
  • Queue sharing: Securely share Amazon SQS queues anonymously or with specific AWS accounts. Queue sharing can also be restricted by IP address and time-of-day.
  • Server-side encryption (SSE): Protect the contents of messages in Amazon SQS queues using keys managed in the AWS Key Management Service (AWS KMS). SSE encrypts messages as soon as Amazon SQS receives them. The messages are stored in encrypted form and Amazon SQS decrypts messages only when they are sent to an authorized consumer.
  • Dead Letter Queues (DLQ): Handle messages that have not been successfully processed by a consumer with Dead Letter Queues. When the maximum receive count is exceeded for a message it will be moved to the DLQ associated with the original queue. Set up separate consumer processes for DLQs which can help analyze and understand why messages are getting stuck. DLQs must be of the same type as the source queue (standard or FIFO).
Using Amazon SQS with other AWS infrastructure web services Amazon SQS message queuing can be used with other AWS Services such as Redshift, DynamoDB, RDS, EC2, ECS, Lambda, and S3, to make distributed applications more scalable and reliable. Below are some common design patterns:
  • Work Queues: Decouple components of a distributed application that may not all process the same amount of work simultaneously.
  • Buffer and Batch Operations: Add scalability and reliability to your architecture, and smooth out temporary volume spikes without losing messages or increasing latency.
  • Request Offloading: Move slow operations off of interactive request paths by enqueing the request.
  • Fanout: Combine SQS with Simple Notification Service (SNS) to send identical copies of a message to multiple queues in parallel.
  • Priority: Use separate queues to provide prioritization of work.
  • Scalability: Because message queues decouple your processes, it’s easy to scale up the send or receive rate of messages - simply add another process.
  • Resiliency: When part of your system fails, it doesn’t need to take the entire system down. Message queues decouple components of your system, so if a process that is reading messages from the queue fails, messages can still be added to the queue to be processed when the system recovers.
PRICING:
  • Pay only for what you use
  • No minimum fee
Amazon SQS Free Tier You can get started with Amazon SQS for free. All customers can make 1 million Amazon SQS requests for free each month. Some applications might be able to operate within this Free Tier limit. How are Amazon SQS requests priced? The first 1 million monthly requests are free. After that, the pricing is as follows for all regions: Price per 1 Million Requests after Free Tier (Monthly)
  • Standard Queue $0.40 ($0.00000040 per request)
  • FIFO Queue $0.50 ($0.00000050 per request)
How are Amazon SQS charges metered? API Actions. Every Amazon SQS action counts as a request. FIFO Requests. API actions for sending, receiving, deleting, and changing visibility of messages from FIFO queues are charged at FIFO rates.  All other API requests are charged at standard rates. Contents of Requests. A single request can have from 1 to 10 messages, up to a maximum total payload of 256 KB. Size of Payloads. Each 64 KB chunk of a payload is billed as 1 request (for example, an API action with a 256 KB payload is billed as 4 requests). Interaction with Amazon S3. When using the Amazon SQS Extended Client Library to send payloads using Amazon S3, you incur Amazon S3 charges for any Amazon S3 storage you use to send message payloads.
Interaction with AWS KMS. When using the AWS Key Management Service to manage keys for SQS server-side encryption, you incur charges for calls from Amazon SQS to AWS KMS. BENEFITS: Eliminate Administrative Overhead AWS manages all ongoing operations and underlying infrastructure needed to provide a highly available and scalable message queuing service. With SQS, there is no upfront cost, no need to acquire, install, and configure messaging software, and no time-consuming build-out and maintenance of supporting infrastructure. SQS queues are dynamically created and scale automatically so you can build and grow applications quickly and efficiently. Reliably Deliver Messages Use Amazon SQS to transmit any volume of data, at any level of throughput, without losing messages or requiring other services to be available. SQS lets you decouple application components so that they run and fail independently, increasing the overall fault tolerance of the system. Multiple copies of every message are stored redundantly across multiple availability zones so that they are available whenever needed. Keep Sensitive Data Secure You can use Amazon SQS to exchange sensitive data between applications using server-side encryption (SSE) to encrypt each message body. Amazon SQS SSE integration with AWS Key Management Service (KMS) allows you to centrally manage the keys that protect SQS messages along with keys that protect your other AWS resources. AWS KMS logs every use of your encryption keys to AWS CloudTrail to help meet your regulatory and compliance needs. Scale Elastically and Cost-Effectively Amazon SQS leverages the AWS cloud to dynamically scale based on demand. SQS scales elastically with your application so you don’t have to worry about capacity planning and pre-provisioning. There is no limit to the number of messages per queue, and standard queues provide nearly unlimited throughput. Costs are based on usage which provides significant cost saving versus the “always-on” model of self-managed messaging middleware.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

CSPi Aria Software Defined Security

The ARIA SDS platform is a radically different approach to comprehensive network and data security as it employs capabilities normally only found in carrier-class or military-grade architectures. When deployed on available optional hardware offerings it provides the high-availability and fast failover and service-level assurance features demanded in a carrier-class infrastructure. It also uses military communication techniques to protect from penetration and administrative eavesdropping from set-up through operation. Yet, even with this added layer of functionality, the deployment and overall platform management is simple as it is handled through advanced zero-touch provisioning techniques. How It Works The ARIA Software-Defined Security (SDS) platform can secure and encrypt containers and/or VMs as they spawn on-premise, private data centers or public cloud instances. The ARIA software automatically applies the organization’s appropriate contextually aware security policies. Additionally, the ARIA Orchestrator automatically discovers the SDSi and manages the application of the appropriate type and level of security services upon deployment. The central execution, across an entire organization, using a single pane of glass, ensures the desired access controls, micro-segmentation, encryption service types and levels, and other service techniques are correctly applied – no matter where the applications are running – whether it’s on premises, in the public cloud, or anywhere in between. Benefits: Achieve SecDevOps Balance the InfoSec requirement to maintain the consistent application of security policies and data protection with the desire of application developers for more agile and flexible DevOps practices. With ARIA, developers can simply select and connect to their applications for complete encryption. Gain a Cost-effective, End-to-End Security Solution The ARIA software defined security solution works with any enterprise infrastructure, is easy to deploy, and costs up to ten times less than other server host-based encryption solutions. Organizations that run critical security functions on the Myricom ARC Series SIA (versus the server processor) can expect cost savings in the need for fewer server upgrades and lower power consumption, while also achieving increased application performance. Secure Data at Rest, in Motion and in Use It’s not good enough to protect stored data. You must also have a solution for when it moves across the network, when it is accessed and used. ARIA applies the appropriate encryption policies by application, device, or data type – under any use and at any time. Improve Application and Server Performance Advanced security functions like encryption, micro-segmentation, or tokenization are CPU-intensive and, if run through local servers, may cause an unacceptable delay in application performance. The ARIA platform runs seamlessly with the Myricom ARC Series SIA, making it the ideal choice for server off-load. In addition the SIA serves as a zone of trust for keys, making them impenetrable to breaches.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

EgoSecure Data Protection

If data is lost due to theft, negligence or accident, great damage can be done. It can ruin businesses and reputations. The most vulnerable points of attack are our devices, e.g. computers, smartphones, laptops, etc., which are operated by people – and people are fallible. Anti-virus protection and a firewall are not enough to protect data. Data is the life-blood of every organization and for more than 10 years, we have been innovating and leading the way in the field of data protection. To date, more than 2,100 customers from every industry and of all sizes, are benefiting from EgoSecure Data Protection. We do more than just blindly protecting your data. Firstly, our unique solution determines the data protection situation of your network. It then gives you accurate information, specific to your network, with guidance on how to protect yourself via our 20+ protection modules. This process can even be automated. We call this a simply beautiful solution; making complicated things simple is what makes us so very attractive to our customers.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.90

Gemalto Trusted Service Hub

Gemalto’s TSH enables seamless and secure over-the-air deployment of the digital keys to any type of phone that supports the solution. With the key safely downloaded to a secure element via Gemalto’s TSH, drivers can lock/unlock their cars by simply placing the smartphone against the door handle. The engine can also be turned on with the phone in the charging tray of the dashboard and pressing the start button. Capable of operating even if the phone battery is drained, the need to carry a conventional key is eliminated. As an integral part of the ‘Mercedes me connect’ program, the digital vehicle key will connect seamlessly with services that meet the demands of modern mobility and digital lifestyles. Source: Gemalto
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Infosec Global AgileScan

AgileScan is a cryptographic security management solution that quickly, easily, and automatically generates an inventory of certificates, keys and cryptographic mechanisms found in software and systems across the enterprise. It pro-actively hunts for hidden risks and vulnerabilities. AgileScan accelerates cryptographic compliance and post-quantum readiness for Enterprises, Governments, and Technology Providers. Features: Certificates | Analysis AgileScan inventories and analyses certificates embedded within applications, infrastructure, servers and network to:
  • Prevent downtime of an infrastructure by detecting expiring certificates
  •  

  • Prevent data breach by detecting in-secure or fraudulent certificates
  •  

  • Prevent compliance breach by detecting non-compliant certificate
  •  

Keys | Analysis AgileScan inventories and analyses cryptographic keys embedded within applications, infrastructure, servers and network to:
  • Prevent data breach by detecting insecure or weak private keys
  •  

  • Prevent key disclosure by detecting insecure key storage
  •  

  • Prevent compliance breach by detecting use of noncompliant private keys
  •  

Cryptographic | Analysis AgileScan inventories and analyses cryptographic mechanisms present within applications, infrastructure, servers and network to:
  • Prevent data breach by detecting vulnerable cryptographic libraries
  •  

  • Prevent compliance breach by detecting non-compliant algorithms (e.g. SHA1)
  •  

  • Support quantum-safe transition by detecting quantum vulnerable algorithms
  •  

Key benefits: Deliver Unique Information AgileScan delivers unique information about certificates, keys and cryptography present within a digital infrastructure or embedded within applications. Enhance Cyber Resilience AgileScan detects hidden certificates, keys and cryptographic vulnerabilities that leave companies at risk and that can be exploited by attackers. Prevent Infrastructure Downtime AgileScan detects embedded certificates that are expiring and that can lead to unanticipated downtime of sensitive infrastructure or services. Verify Compliance with Standards AgileScan automates compliance controls required by industry specific regulations and continuously verifies usage of state-of-the-art mechanisms. Prepare for Quantum Transition AgileScan enables organizations to prepare their transition to new cryptographic standards (e.g. Post-Quantum) by mapping presence of cryptography Leverage Leading-Edge Detection AgileScan has unique capabilities to detect certificates, keys and cryptography within byte code independently from coding language and without source code. Integrate Infrastructure AgileScan integrates with different enterprise systems including Continuous Integration (CI), SIEM and any other system via API and webservices. Ensure Minimal Operational Impact AgileScan uses a lightweight scanning approach to minimize impact on operations and ensure seamless deployment through standard automation tools.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
1.40

infotecs ViPNet Coordinator HW

ViPNet Coordinator — семейство шлюзов безопасности, входящих в состав продуктовой линейки ViPNet Network Security. В зависимости от настроек ViPNet Coordinator может выполнять следующие функции в защищенной сети ViPNet:  
Маршрутизатор VPN-пакетов: маршрутизация зашифрованных IP-пакетов, передаваемых между сегментами защищенной сети.
VPN-шлюз: туннелирование (шифрование и имитозащита) открытых IP-пакетов, передаваемых между локальными сегментами сети.
Межсетевой экран: анализ, фильтрация и регистрация IP-трафика на границе сегмента сети.
Транспортный сервер: маршрутизация передачи защищенных служебных данных в сети ViPNet, почтовых сообщений, передаваемых программой «ViPNet Деловая почта».
Сервер IP-адресов, сервер соединений: обеспечивает регистрацию и доступ в реальном времени к информации о состоянии объектов защищенной сети и о текущем значении их сетевых настроек (IP- адресов и т.п.).
Продукты ViPNet Coordinator адаптированы для использования в различных отраслях и сценариях применения. Семейство шлюзов безопасности ViPNet Coordinator подразделяется на решения, в зависимости от особенностей их исполнения, в том числе аппаратной платформы продукта, набора дополнительных сетевых сервисов, производительности, сетевых интерфейсов и др.  
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Joe Security Sandbox Detect

Joe Sandbox Detect continuously monitors browsers and e-Mail clients for suspicious files. If suspicious files are opened or created, Joe Sandbox Detect uploads them immediately and fully automatically to Joe Sandbox for deep analysis. Once the analysis is finished, Joe Sandbox alerts the security team as well as the end user, and provides detailed information such as the verdict (malicious, suspicious, clean) and IOCs. Key Features: Monitoring of Browsers and e-Mail clients Joe Sandbox Detect monitors most common browsers and e-Mail clients including Internet Explorer, Edge, Chrome, Firefox, Microsoft Outlook and Thunderbird. If any of these programs creates a suspicious file, Joe Sandbox Detect automatically analyzes it with Joe Sandbox. Analysis of suspicious e-Mails and Files Joe Sandbox Detect enables users to analyze suspicious e-Mails and files with the help of Joe Sandbox Desktop, Joe Sandbox Complete, Joe Sandbox Ultimate and Joe Sandbox Cloud. Being specialized in Deep Malware Analysis, Joe Sandbox detects even the most advanced cyber threats. Joe Sandbox Detect has the ability to analyze any type of files. Joe Sandbox Detect also analyzes URLs to detect Phishing attacks or malicious webpages. File and IOC Encryption Any file including Office documents analyzed by Joe Sandbox Detect are fully private and encrypted with AES. Only the user has access to the decryption password. Shared encryption keys can be used to get access to the analyses of several users. Configurable Alerts Detailed alerts about the detection can be configured by Joe Sandbox through Joe Sandbox Detect. Alerts are sent via SYSLOG or e-Mail to one or mo receivers. Easy Deployment Joe Sandbox Detect can be easily deployed in enterprises. It comes with an installer with command line switch to configure the install. Apart from .Net Joe Sandbox Detect does not require any other third party software. Complementary to other security products Joe Sandbox Detect is fully complementary to other security products such as Antivirus, Firewalls and Endpoint Protection. Joe Sandbox Detect does not impact your current existing security settings or products. Zero Performance Impact Joe Sandbox Detect has a zero performenace impact to your end points. All analysis is done in the cloud or on your on-premise instance. With Joe Sandbox Detect you do not fear to have a laggy end point. Simple User Interface Joe Sandbox Detect was designed for the average computer user, and gives them the possibility to analyze e-mails with a single drag and drop action. The bar nicely integrates into the ribbon bar of Microsoft Windows Desktop. The notification screens are simple and easy to understand. Seamless Integration Joe Sandbox Detect integrates with Joe Sandbox Desktop, Joe Sandbox Complete, Joe Sandbox Ultimate and Joe Sandbox Cloud. The integration is done in seconds and offers the possibility to download the detailed analysis results for each analyzed attachment. SOCs, CERTs and CIRTS can fully access the analysis and the detailed reports.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
2.40

Kaspersky Total Security

Keeps you safe from viruses, attacks, fraud, spyware, cybercrime and more Secures PC, Mac, Android, iPhone and iPad – with just one product & one license Protects you privacy & personal data – against phishing, tracking & spying Automatically adds extra security when you are online shopping or banking Securely stores website & account passwords – for easy access from all your devices Range of functions depends on the type of device being used Anti-malware Installation Assistant Two-Way Firewall Private Browsing Secure Connection Safer Networking Application Control New! Software Cleaner Improved Safe Money Safe surfing System Watcher & Anti-Blocker Network Attack Blocker Improved! Anti-Banner Anti-Spam Advanced Anti-Phishing Webcam Protection Secure Keyboard On-Screen Keyboard Privacy Protection Kaspersky Password Manager - Premium Backup, Encryption & File Shredder Online backup Kaspersky Safe Kids – Premium Multi-Device Security Anti-Theft Simplified Web Management Software Update Safety checks Automatic Exploit Prevention FREE, Automatic Updates Security Optimized for Performance Technical support  SECURITY – Keeps you safe from viruses, spyware & more You depend on your computers, tablets and phones for so many things – so you need to protect them all against the very latest digital dangers. Our award-winning, cloud-assisted security helps you protect against infections & attacks, blocks banners & spam, keeps software up-to-date and warns you about dangerous websites – before they’re clicked.  PC, MAC & MOBILE – One license protects your multiple devices Every device you use could be compromising your security – so you need to secure them all… PC, Mac, iPhone, iPad and Android. With just one product – and only one license – we help you to protect all of your computers and mobile devices… plus you can lock, wipe & locate missing Android phones & tablets  PRIVACY – Protects your privacy and personal information Because all your devices are capable of storing a lot of sensitive, personal information – that can be valuable to criminals – you need to make sure snoopers and phishers can’t steal any confidential data. We’ll help you guard your personal data, prevent online activities being monitored, block unauthorized webcam use and protect data when any of your devices connects to a public network.  MONEY – Adds extra security for online shopping and banking Online shopping and banking are everyday activities for most people – but you need to make sure you aren’t caught off guard by online thieves. Our unique security technology – Safe Money – helps you to protect your money and account details… to help prevent theft.  PASSWORDS – Securely stores all passwords for quick & easy access We all know that using complex, unique passwords – for every website and online account – helps to keep us secure… but remembering all those passwords can be quite a task. Now, there’s no need to remember every complex password for every website and account. Each user only needs to remember their one master password – and they can access all their individual passwords from their PC, Mac, Android phone & tablet, iPhone and iPad.  FILES – Safeguards precious files, photos, music & memories Nobody wants to lose irreplaceable files, photos or memories… or suffer a security breach if any sensitive data finds its way into the wrong hands. We’ll help you to create backup copies of all your precious photos, music and files. In addition, data encryption helps to ensure confidential files can’t be read if they’re accessed by criminals or unauthorized users.  PERFORMANCE – Lets devices keep performing as they’re designed to Security shouldn’t slow you down. That’s why you need rigorous security that won’t impact the performance of your computers, tablets and phones. Our protection technologies work ‘behind the scenes’ – and that means your computers and mobile devices can help you to keep up with your busy life.  SIMPLICITY – Simplifies family security with easy, online control Nobody wants to waste time getting to grips with complex security. If your family’s security software is difficult to set up and run, it could even leave their computers and mobile devices with serious security gaps. By giving you a free My Kaspersky account, we make it easy for you to manage your family’s security – across all their computers, tablets & phones – from anywhere that you can get online. You can check each device’s security & license status and adjust key security settings – plus access special offers and download free Kaspersky Lab products. My Kaspersky also gives you easy access to technical support.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

McAfee Complete Data Protection

Secure your confidential data with an enterprise-grade security solution that is FIPS 140-2 and Common Criteria EAL2+ certified, and accelerated with the Intel® Advanced Encryption Standard—New Instructions (Intel AES-NI) set. McAfee Complete Data Protection uses drive encryption combined with strong access control via two-factor pre-boot authentication to prevent unauthorized access to confidential data on endpoints, including desktops, virtual desktop infrastructure (VDI) workstations, laptops, Microsoft Windows tablets, USB drives, and more.
Key Features
■    Drive encryption
■    File and removable media protection
■    Management of native encryption

Key Advantages
■    Stop data loss initiated by sophisticated malware that hijacks sensitive and personal information.
■    Secure data when it’s stored on desktops, laptops, tablets, and cloud storage.
■    Manage Apple FileVault and Microsoft BitLocker native encryption on endpoints directly from McAfee ePO software.
■    Communicate with and take control of your endpoints at the hardware level, whether  they are powered off, disabled, or encrypted to halt desk-side visits and endless helpdesk calls due to security incidents, outbreaks, or forgotten encryption passwords.
■    Prove compliance with advanced reporting and auditing capabilities and monitor events and generate detailed reports that show auditors and other stakeholders your compliance with internal and regulatory privacy requirements.
... Learn more
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Zentera's CoIP Enclave

CoIP Enclave uses an advanced overlay network to bring the unifying power of a virtual private cloud (VPC) to a complex hybrid environment. Abstracting away details of the physical network connections, developers can enable unmodified Linux and Windows applications to communicate seamlessly and securely with hosts in other datacenters and public clouds – even those belonging to another enterprise. Distributed applications can be deployed in an afternoon, without the need to touch existing firewall and router configurations or establish dedicated VPN connections. Once set up, applications can be migrated in seconds. After setting up an Enclave, enterprises can:
  • Deploy applications to a hybrid or multi-cloud environment without time-consuming network analysis and design
  • Bridge hosts or subnets, even if no physical route exists
  • Virtualize networking for existing on-premises applications
CoIP Enclave enhances a company’s existing security architecture by providing an extra layer with additional controls. The technology operates at the session layer in the ISO network model (L5), using but not interfering with the existing network and security infrastructure. CoIP isolates traffic end-to-end in encrypted SSL tunnels that are set up to support application traffic on an as-needed basis. The endpoint network can be locked to the CoIP Enclave; by requiring traffic to travel over the CoIP overlay network and blocking other traffic that comes in over the physical interface, the endpoint is effectively invisible to other endpoints, even on the same subnet. Solutions:
  • Overlay for Hybrid Infrastructure. Because the security challenge is ultimately caused by disruptive applications, Zentera solves the challenge by providing an application-based overlay network that meets the Zero Trust Security model. Zentera’s Zero Trust Network is designed to connect and protect applications, regardless of their physical locations. Zentera’s CoIP Solution is hardware agnostic, completely decoupled from the underlying physical network.
  • Supply Chain Access. Third-party users can only access what they’re authorized to access; everything else is blocked and beyond their reach. That is because Zentera’s ZTNs are overlay networks with complete micro-segmentation
  • Overlay Fabric for Enterprise Datacenter Migration to the Cloud. Zentera’s CoIP Enclave™ solution creates a zero trust network that connects on-premises environments into the cloud. This virtual network fabric completely abstracts the physical network topology, forwarding traffic to the datacenter machine and provides connectivity back to the on-premises environments. This allows datacenter applications to be migrated without modification, and enables a running datacenter to be migrated in stages to minimize downtime.
  • Self-Service Hybrid Networking Tools for DevOps. Zentera’s CoIP™ solution creates a Zero Trust Network that extends from clouds back to on-premises environments. This “Universal VPC” can be created and managed directly by DevOps teams, without touching existing on-premises networking and security settings. With “self-service” provisioning and automation, DevOps users can set up hybrid applications while retaining the agility and flexibility associated with public clouds.
  • Overlay for Smart Manufacturing. Zentera’s CoIP™ Solution connects factories and platform vendors with a virtual overlay network that allows a remote platform to access data within the factory without requiring either party to fully open its networks. This overlay network is set up without modifying legacy networks or changing firewall rules, condensing the InfoSec and compliance process.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Zix Mail

Installed on your desktop, Zix Mail provides end-to-end email encryption to protect messages and attachments with a single click. With ZixMail, you enjoy automated key management and leverage the ZixDirectory and Best Method of Delivery to exchange secure email with anyone, anywhere on any device. Zix Mail integrates with your on-site or Web-based email, and encrypted messages are delivered using your existing email address. Optional plug-ins are also available to you for full integration with Microsoft Outlook. How Zix Mail works? ZixMail makes end-to-end email encryption easy, keeping customer data, employee records, financial information and other sensitive data secure both internally and externally. Work principles: Encryption in a click If you want to encrypt an email, simply create a message and click the ‘Encrypt & Send’ button. Secure at rest and in transit Maintaining end-to-end encryption, emails are encrypted in transit as well as on your mail server. Simply click on your email and enter your password to view encrypted email. Email encryption to anyone Unsure of your recipients’ capabilities? We deliver encrypted emails using our patented Best Method of Delivery, inclusive of a secure pull option for recipients without email encryption. Zix Mail Benefits:
  • EASY TO GET STARTED. Installing ZixMail is quick, and learning how to use it is simple.
  • CONVENIENT INTEGRATION. ZixMail can be used with your current email system, and optional plug-ins make it even more convenient for Outlook users.
  • KEY MANAGEMENT. We take care of the most complicated aspect of email encryption - key management - by connecting you to ZixDirectory, the world’s largest key repository.
  • ADDED AUTHENTICATION. Time-stamping provides further peace of mind with proof of delivery and receipt for your encrypted emails.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.