View
Sorting
Products found: 112
AceBIT Password Depot
- Best possible encryption. In Password Depot, your information is encrypted not merely once, but in fact twice, thanks to the algorithm AES or Rijndael 256. In the US, this algorithm is approved for state documents of highest security clearance!
- Double protection. You can secure your passwords files twice. To start with, you select a master password that has to be entered whenever one opens the file. Additionally, you can choose to protect your data by means of a key file that must be uploaded to open the file.
- Protection against brute-force attacks. Every time the master password is entered incorrectly, the program is locked for three seconds. This renders attacks that rely on the sheer testing of possible passwords – so called “brute-force attacks” – virtually impossible.
- Backup copies. Password Depot generates backup copies of your passwords files. The backups may be stored optionally on FTP servers on the Internet (also via SFTP) or on external hard drives. You can define the time interval between the backup copies’ creation individually.
- Protection from keylogging. All password fields within the program are internally protected against different types of interception of keystrokes (Key Logging). This prevents your sensible data entries from being spied on.
- Traceless Memory. Whilst dealing with your passwords, Password Depot does not leave any traces in your PC's working memory. Therefore, even a hacker sitting directly at your computer and searching through its memory dumps cannot find any passwords.
- Clipboard protection. Password Depot protects your clipboard data in multiple ways: it automatically detects any active clipboard viewers and masks its changes within the clipboard; furthermore, after performing auto-complete, all sensitive data is automatically and immediately cleared from the clipboard.
- Virtual keyboard. The ultimate protection against keylogging. With this tool, you can enter your master password or other confidential information without even touching the physical keyboard. Password Depot does not simulate keystrokes, but instead uses an internal cache, so that input cannot be intercepted, neither software- nor hardware-based.
- Verified password quality. Let Password Depot check your passwords' quality and security! Intelligent algorithms will examine your passwords and warn you against ‘weak’ passwords, which you can subsequently replace with the help of the Password Generator.
- Password policies. You can define basic security requirements that must be met by all passwords which are added or modified. For instance, you can specify the passwords’ minimum length and the range of characters contained therein.
- Security warnings. Password Depot contains a list of warnings which always keep an eye on your passwords’ security. For instance, the program warns you in case you use the unsafe FTP protocol and in this case advices you to use SFTP instead.
- Protection against dictionary attacks. An important warning featured in Password Depot is the notification in case you are using unsafe passwords. These are passwords which are frequently used, therefore appear in hackers’ dictionaries and are easily crackable.
- Cards, identities, licenses. Password Depot protects and manages not only your passwords, but also your information from credit cards, EC cards, software licenses and identities. Each information type offers a separate template, with e.g. the credit card window featuring a PIN field.
- File attachments. You may add file attachments containing e.g. additional information to your password entries. These attachments can be opened directly from within Password Depot and may additionally be saved on data storage media.
- Transfer passwords. You can import both password entries from other password managers into Password Depot as well as export entries from Password Depot. To do so, the software offers you special wizards that facilitate importing and exporting password information.
- Synchronize password files. Password Depot supports you in synchronizing two different password files. This is relevant e.g. if you are using a single password file on two different PCs. This being said, the file synchronization works in both directions.
Actima
Основные выгоды Actima:
- Повышение уровня безопасности предприятия и производственной дисциплины
- Снижение потерь рабочего времени на 50%-90% от текущего уровня
- Снижение затрат на персонал, занятый табельным учетом и начислением заработной платы
- Формирование реального фонда оплаты труда, на основании точных данных о фактически отработанном времени
- Обеспечение безопасности персонала и посетителей в аварийных ситуациях за счет установления их точного местонахождения
- Оптимизация трудовых и транспортно-материальных потоков предприятия
- Замена медленного бумажного документооборота быстрым электронным
Основные функции
- Контроль и управление доступом на предприятие по основе индивидуальных прав допуска
- Учет фактически отработанного времени
- Информационное обеспечение плана ликвидации аварийных ситуаций
- Сбор и хранение данных о регистрациях
- Учет сведений об автотранспорте, персонале и посетителях предприятия
- Самодиагностика работоспособности системы, оборудования, серверов и формирование аварийных, текущих и контрольных отчетов
AlertEnterprise IoT IAM Solution
- Device provisioning
- Authentication
- Control and monitoring
Anti-Fraud - DiaManT®
- Вызов анализа аудио и телефонии
- Перекрестные проверки геолокации
- Анализ и анализ МО
- Анализ типа устройства
- Профилирование и подсчет кредитных карт
- Поддержка белого и черного списка звонков
Arcon Privileged Access Management Platform
- Authorization
- One Admin Control
- Virtual Grouping
- Fine-Grained Access Control
- Multi-factor Authentication
- Password Vaulting
- Workflow
- Session Monitoring
- Text and Video Logs
- Privileged Elevation and Delegation Management (PEDM)
- Single- Sign-On (SSO)
- User onboarding
- Auto-discovery
- Customized Reporting
Aruba ClearPass
ClearPass allows you to safely connect business and personal devices to your network in compliance with your security policies. It allows you to grant full or limited access to devices based on users’ roles, device type, and cybersecurity posture.
This solution leverages the next plan:
Identify
With this new demand for network access, the burden on your IT department has increased exponentially and it’s not just laptops and smartphones that should be on your radar. IoT devices, printers, and even surveillance cameras are connecting to companies’ wireless networks.
ClearPass helps you identify which devices are being used, how many are connected to your network, where they’re connecting from, and which operating systems are supported. It gives you continuous visibility into changes on your network, including which devices are connecting and disconnecting.
When you need device-specific information, you can easily identify a device’s:
- Type and model name
- MAC address
- IP address
- NIC vendor
- OS and version number
- VLAN
Enforce
Enforcing network policies can pose a huge challenge to IT departments. When an employee wants to add a new device to the network, they often have to go through extensive IT protocols. They may even need someone from IT to walk them through the process.
ClearPass allows you to enforce policies during the onboarding of new devices without any involvement from your IT department – whether it’s a laptop, smartphone, or security camera. A built-in certificate authority lets you support devices more quickly without any additional IT resources.
Your IT team will simply need to establish your foundation of security and write rules that define:
- Who can onboard a device
- The type of device users can onboard
- How many devices each user can onboard
You can then enforce access a number of ways. You can use a portal, or you can use the more secure and preferred method that uses encryption in the authentication process. After devices are granted access, ClearPass uses active and passive profiling methods to monitor your network and keep it safe.
Protect
The health of individual devices connected to your network is an essential component of network security. With ClearPass OnGuard, your IT team can define the “level of health” a device must have in order to gain network access.
This solution automatically conducts critical endpoint health checks and posture assessments to ensure that all devices are compliant with your requirements (and industry best practices). It works for both wired and wireless networks.
ClearPass also offers a variety of third-party integrations (which we’ll touch on shortly). These integrations empower you to implement dynamic policy controls and threat remediation. You’ll have real-time insight into the activity on your network, equipping you to identify and address any threats that may present themselves.
After all, you have to be prepared to take action if you discover unusual network behavior. That requires establishing a unified approach that can block traffic and disconnect devices when necessary – even in the middle of the night.
Integrate
The right network security solution must be comprehensive and that often requires you to create a seamless solution comprised of several different platforms.
Aruba ClearPass Exchange integrates with over 25 IT partners – the vast majority of your current technology and security stacks - to ensure that every element of your system is working without issue.
These third-party technology systems could include:
- Firewalls
- Enterprise mobility management (EMM)
- Mobile device management (MDM)
- Security information and event management (SIEM)
Whichever platforms you use (or are considering), they will work with ClearPass’ REST-based APIs, Syslog messaging, and extensions repository. Your collective solution will deliver end-to-end policy enforcement and the visibility you need to keep your network secure.
Source: inbound.kelsercorp.com/blog/what-is-aruba-clearpass-and-how-does-it-protect-your-network
BALABIT PRIVILEGED ACCESS MANAGEMENT
BeyondTrust Privileged Access Management Platform
BeyondTrust Privileged Password Management
- Reduce attack surfaces by eliminating credential sharing
- Monitor and audit sessions for unauthorized access
- Analyze behavior to detect suspicious user, account and asset activity
Broadcom (CA) Identity and Access Management
- Deliver trusted access between users and applications through continuous and context-based authentication
- Detect user, network and device risk automatically and transparently
- Make risk-adjusted access decisions only when needed and with minimal friction to the user
- Enable trusted users with seamless cross-application access
- Simplify access across cloud, mobile, Web applications and use of identity federation standards from any device
- Prevent account takeover with the most advanced session assurance on the market
- Grant trusted users access to on-premises and cloud applications with broad provisioning
- Increase audit and compliance efficiency by streamlining governance campaigns
- Manage identity with consumer-grade scalability and real-time policy enforcement and entitlement analysis
- Connect trusted users to trusted applications faster, to deliver the experience your users expect
- Provide a highly-responsive and always-available application experience with fewer resources
- Achieve superior scalability, reliability and an 84% higher overall performance than the competition
Centrify Privileged Access Management Solution
Cisco Identity Services Engine
CISCO ISE (Identity Services Engine)
The Cisco Identity Services Engine (ISE) offers a network-based approach for adaptable, trusted access everywhere, based on context. It gives you intelligent, integrated protection through intent-based policy and compliance solutions. And it is all delivered with streamlined, centralized management that lets you scale securely in today's market.
Username is a key element in determining access to a network. Username can also help you alert you users to potentially suspicious activity with their devices. It answers the all-important question of who is connected to your network.
The Cisco Identity Services Engine (ISE) Passive Identity Connector centralizes, consolidates, and distributes identity information, including IP addresses, MAC addresses, and usernames. At the same time it offloads work from key infrastructure such as Microsoft Active Directory.
Many servers on the network are active participants in user authentication. They take user credentials and either verify them or look them up in a dedicated repository such as Active Directory. Rather than being actively involved in user authentication, the Passive Identity Connector listens to the various authentication servers on the network. It centralizes the authentication information, becoming the single source of truth for its subscribers.
The Passive Identity Connector distributes the session identity information to other devices on the network that are natural consumers of such information. These devices include firewalls, web security appliances, and traffic analyzers. Using the Cisco Platform Exchange Grid (pxGrid), the Cisco ISE Passive Identity Connector can support up to 20 subscribers.
Features:
- Centralized information
- Improved performance
- Syslog server support
- Active Directory support
- Kerberos SPAN support
- Endpoint probes
- Active Directory agent
- Support for custom APIs
- Citrix Terminal Server support
- High availability
- Migration support
- Virtual machine support
- Scalability
Benefits:
- Consolidates data from multiple authentication sources, eliminating the need for every system that requires authentication data to interact with every authentication source
- Eliminates the burden on an often-overtaxed infrastructure with a single system that caches data for other authentication data consumers
- Gathers authentication data from systems that support syslog
- Gathers authentication data from Active Directory through the Microsoft Windows Management Interface (WMI)
- Gathers Active Directory authentication data from switches supporting Kerberos SPAN
- Understands when endpoints log off
- Gathers authentication data from up to 10 Microsoft Active Directory domain controllers
- Gathers authentication data from systems that support a custom interface
- Gathers authentication data from Citrix Terminal Server
- Supports active/passive redundancy
- Customers may upgrade from the Cisco ISE Passive Identity Connector to Cisco ISE, adding the Passive Identity Connector node to an existing Cisco ISE cluster.
- Supports KVM, VMware, and Hyper-V
- Tailored to fit your organization with support for 3,000 and 300,000 sessions
Crypthomathic Authenticator
Strong authentication provides a long-term, strategic solution for protecting against online attacks, such Phishing, Trojans, etc. Digital authentication is about putting measures in place to confirm an individual is who they say they are, so that only the right individual has access to certain information. Strong Customer Authentication systems should be flexible to easily allow different authentication mechanisms to be used depending on the protection profile of users or changes to the security landscape. Cryptomathic delivers the complete solution or individual components for implementing large-scale strong authentication services. The Cryptomathic Authenticator is a Multi-Factor Authentication server designed for scalable applications, such as eBanking and eGovernment, with complete support for a wide range of tokens to seamlessly match the current and future security needs of all user segments.
Multi-Factor Authentication
- CAP / DPA
- VISA CodeSure
- Digital signatures
- Matrix cards
- OATH (HOTP / TOTP / OCRA)
- OTP proprietary tokens (e.g. Vasco)
- Pattern recognition
- PKI
- Secure fax
- Smart phone applications (e.g. Cryptomathic)
- SMS OTP
- Static & partial user name and password
Authentication End-to-end Security
The Authenticator provides a much more secure and comprehensive solution than any other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:
- HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
- Attack detection, e.g. invalid authentication attempts
- Administrator Security - remote admin client, chip
- Card log-on, separation of duties and dual controls
- Tamper evident audit logs, including usage log and security log
- Database, e.g. HSM encryption
Flexible & Future Proof
Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:
- Internal Attack
- Man-In-The-Browser
- Man-In-The-Middle
- Mining
- Pharming
- Phishing
- Social Engineering
- Trojan
Authentication Scalability
The Authenticator is scalable and is used by customers for managing anywhere from a few thousand users to several million.The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:
- Fail-over, e.g. back-up or disaster recovery
- Clustering
- Load balancing across servers and HSMs
Authenticator Return on Investment
Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in.
This ensures the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.
CyberArk Core Privileged Access Security
- Mitigate security risks
- Reduce operations expense and complexity
- Improve regulatory compliance
- Accelerate time-to-value
- Improve visibility
CyberArk Privileged Account Security Solution
Privileged accounts represent the largest security vulnerability an organization faces today. In the hands of an external attacker or malicious insider, privileged accounts allow attackers to take full control of an organization’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations. Stolen, abused or misused privileged credentials are used in nearly all breaches. With this growing threat, organizations need controls put in place to proactively protect against, detect and respond to in-progress cyber attacks before they strike vital systems and compromise sensitive data.
CyberArk is the trusted expert in privileged account security. Designed from the ground up with a focus on security, CyberArk has developed a powerful, modular technology platform that provides the industry’s most comprehensive Privileged Account Security Solution. Each product can be managed independently or combined for a cohesive and complete solution for operating systems, databases, applications, hypervisors, network devices, security appliances and more. The solution is designed for on-premise, hybrid cloud and OT/SCADA environments.
The CyberArk Privileged Account Security Solution is based on CyberArk Shared Technology Platform™, which combines an isolated vault server, a unified policy engine, and a discovery engine to provide scalability, reliability and unmatched security for privileged accounts.
Product list:
Enterprise Password Vault® fully protects privileged passwords based on privileged account security policies and controls who can access which passwords when.
SSH Key Manager™ secures, rotates and controls access to SSH keys in accordance with policy to prevent unauthorized access to privileged accounts.
Privileged Session Manager® isolates, controls, and monitors privileged user access as well as activities for critical Unix, Linux, and Windows-based systems, databases, and virtual machines.
Privileged Threat Analytics™ analyzes and alerts on previously undetectable malicious privileged user behavior enabling incident response teams to disrupt and quickly respond to an attack.
Application Identity Manager™ eliminates hard-coded passwords and locally stored SSH keys from applications, service accounts and scripts with no impact on application performance.
CyberArk Viewfinity enables organizations to remove local administrator privileges from business users and control applications on Windows endpoints and servers.
On-Demand Privileges Manager™ allows for control and continuous monitoring of the commands super-users run based on their role and task.
CyberArk Privileged Identity Management (PIM)
deepVB®
Пассивная голосовая биометрия IVR
Клиенты свободно общаются в разговоре на естественном языке с DiaManT®, в то время как deepVB® использует биометрические функции голосового отпечатка для идентификации клиентов в фоновом режиме, как они разговаривают
DiaManT® Sentiment Analysis - Business Insights
Excelsecu eSecuServer-OTP
- Support TOTP and OCRA
- Support operating load and redundancy between authentication servers
- Supports up to 1200 concurrent users per server
- Web based management subsystem support local and remote management
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.