View
Sorting
Products found: 125
Adlumin's Sentry
- Artificial Intelligence-Based Decisions
- No Rules to Write or Hardware to Manage
- Artificial Intelligence Writes Your SIEM Rules
- 24/7 Network Vulnerability Assessment
- Analyzes Firewall, VPN Log Data, & Network
- Automated Anomaly Interpretation
- User and Device Context/Correlation
- Automated log and Device Ingest
- Critical Server Log Management
- Real-time Intrusion Detection Alerts
- Windows & Linux Server Management
- Cloud and On-premise Ingest
- Integrated Compliance Management (PCI, FFIEC, FINRA)
- Secure & Encrypted Log Management
- Log Data Normalization
- Includes Reports Designed to Hand to Your Financial Auditor
- Risk Management, Visualization, and Analysis
- Automated Reporting for Auditors and Compliance
- Make Decisions in Minutes, Not Days
- Financial Compliance Audit Reports Included
- Know Everything About an Account with 1 Click
- 90-Days of Research Included with SIEM
- 24/7 Anomaly Hunting w/o Hiring Anyone
- Designed for Financial Institutions
- Understand Risk with 1 Button Click
AhnLab EPS
- Proactively protects against unknown malware
- Prevents malware-induced security breaches
- Provides system stability without requiring signature or patch updates
- Eliminates interruptions caused by malicious or unauthorized software
- Operates around the clock without the need for constant maintenance
- Allows simple administration and implementation
- Reduces system and data restoration costs by preventing malware damages
- Reduces time and costs required for system security and maintenance
Alcide Kubernetes Advisor
- Kubernetes infrastructure vulnerability scanning
- Hunting misplaced secrets, or excessive priviliges for secret access
- Workload hardening from Pod Security to network policies
- Istio security configuration and best practices
- Ingress Controllers for security best practices
- Kubernetes API server access privileges
- Kubernetes operators security best practices
- Deployment conformance to labeling, annotating, resource limits and much more
Allure Security
- Third-Party Monitoring. Know when third parties mishandle or share files outside of policy
- Document Flow Analytics. Uncover file access and sharing patterns both inside and outside of an organization
- Breach & Leak Detection. Be alerted early in the attack cycle if sensitive files are compromised or exfiltrated
- Risk Reports. Schedule monthly reports or generate them on-demand
- Data Loss Forensics. Track data loss back to the source and hold culprits accountable
- Geo Location Enrichment. Enrich file logs with proprietary geo location insights
AlphaSOC Network Behavior Analytics for Splunk
- Volumetric and quantitative analysis (counting events, identifying patterns)
- Resolving FQDNs and domains to gather context (identifying sinkholes and ASN values)
- Breakdown and analysis of each FQDN label (i.e. hostname, domain, TLD)
- Gathering of reputation data (e.g. WHOIS and associated malware samples)
- Categorization of traffic based on known patterns (e.g. C2, P2P, VPN, cryptomining)
- Uncovering C2 callbacks and traffic to known sinkholes
- Tor, I2P, and Freenet anonymized circuit identification
- Cryptomining and JavaScript cryptojacking detection
- Flagging traffic to known phishing domains
- Brand impersonation detection via Unicode homoglyphs and transpositions
- Flagging multiple requests for DGA domains, indicating infection
- DNS and ICMP tunneling and exfiltration detection
- Alerting of lateral movement and active network scanning
- Policy violation flagging (e.g. third-party VPN and P2P use)
AnubisNetworks MPS
- DLP - Data Leakage Protection
- Multitenant Quota management
- White & Blacklists inheritance
- Attachments Discovery
- BCC and Archiving plugins
- AD Integration for AAA
AppGuard ServerGuard
- Simple Deployment
- Real-Time Protection
- Prevents In-Memory Attacks
- No Sandboxing
AppRiver Email Security
- Modern dashboard that spotlights phishing and malware threats
- Real-time protection from phishing and malware
- Proprietary technology that protects against conversation hijacking
- Maximizes or limits user control options
- Over 60 filtering techniques
- Office 365-compatible
- Efficiently filters quarantine with convenient declutter feature
- Viewable or searchable quarantined messages for a domain
- Downloadable messages for further analysis
- Full security management with Two-Factor authentication (2FA)
AppVisory
- Security classification of the top apps from the commissioned commercial app stores
- Intuitively understandable security classification of apps in the APPVISORY ® evaluation procedure
- Changes of the security status of an app will be highlighted in the APPVISORY ® app catalog
- Development, service und hosting in Germany
- Administrator access for APPVISORY ® management console per web-login
- Export of individual test results and applicants as CSV, JSON and PDF
- Extensive app catalog of continually tested apps
- Automatic review of each app update
- For Android and iOS
- Automatic connection to leading MDM software
- Scan of the app portfolio created in the MDM against the APPVISORY database
- Transfer of an app portfolio to the MDM Whitelist/Blacklist
- Escalation by push notification in case of violation of company’s compliance guidelines
- Automatic or manual assembly of apps for the creation of a basic Whitelist/Blacklist
- Automatic synchronization of changed risk ratings of apps due to updated results
Avanan
- Deploys Inside the Cloud. 100%visibility, with no need to put a gateway or agent between your users and their apps. No latency, no disruption, no change in user experience
- Pre- configured. We take our partners' latest software and wrap the core technology in the Avanan API, standardizing all their user, file, event and policy information. We make cloud-native versions that are not available anywhere else.
- Single License. You don't need to pay for each security tool individually. Avanan consolidates each vendor's individual licensing model into a single per-user per month subscription.
- Standardized Universal Policies. Every SaaS has a completely different policy engine, each with its own rules and enforcement capabilities. With Avanan you can create one policy and apply it everywhere without having to do the translation.
Avocado Systems Platform
- One Touch Segmentation. Deterministic threat detection at the web, application and database tiers.
- Zero Policies. Highest resolution application of the pico segmentation without any policy.
- Platform Agnostic. Bare metal, virtualized, containerized, and server-less platforms.
Better Mobile Security MTD
- Apps. Prevent risky and leaky apps from putting sensitive data at risk with app scanning technology powered by machine learning.
- Web and Content. Employees are more likely to get phished on their phone than their computer. Protect them from all sources of malicious links (texting, WhatsApp, iMessage, Snapchat, Facebook, etc.)
- Device / OS. Mobile device OS vulnerabilities must be mitigated. Users need defense against advanced jailbreak attacks and risky device configurations. Get control of device versions, including CVEs based on Android patch levels and iOS versions.
- Network. Risky Wi-Fi hotspots are everywhere. How do you know if a man-in-the-middle attack is in place? Prevent the full range of advanced network-based threats with detection powered by our cloud-based global visibility.
BitDam
- Close to zero latency – With minimal email latency of just a few seconds, end-users will not notice any change. With BitDam, they’re safe to click everything that lands in their inbox.
- 2-click integration – Pre-built APIs enables a (literally) 2-click self-service deployment through the BitDam portal, which applies for all mailboxes in the organization.
- Fast and easy deployment – No MX record change is needed, no hassle to your IT team.
- Intuitive dashboard – Your SOC team can view email subject and recipients through the BitDam dashboard, making tracking and investigating attacks simple.
- Email body and clean files are never saved – BitDam scans the entire email including links and attachments, but doesn’t save it unless malicious.
- Quarantine malicious emails – Malicious emails are automatically quarantined, allowing the SOC team to investigate, delete or release them as needed.
- Visibility to other security checks – As a SOC team user you can see what basic security checks each email went through. This includes anti-spam, spf, and dmarc checks.
- Cloud Storage
- Instant Messaging
Bitdefender Gravity Zone Ultra Security (XDR)
- Real-time endpoint visibility
- Expose (insight into) suspicious activities
- One-click investigation
- Alert triage and incident analysis visualization
- Track live attacks and lateral movements
- Rapid response
- Reduce dwell time with fast resolution, containment and remediation
- Minimize noise and distraction from false alarms
- Reduce the volume of incidents with effective threat prevention
- Eliminate manual remediation of blocked attacks with automatic remediation and repair
- Minimize exposure with strong prevention
- Machine-learning and behavior-based detection stops unknown threats at pre-execution and on-execution
- Detect and block script-based, fileless, obfuscated and custom malware with automatic remediation
- Memory protection to prevent exploits
- Reduce attack surface by enabling IT security controls
- Integrated client firewall, device control, web content filtering, app control, patch management and more.
BufferZone
- Virtual Container: A secure, virtual environment for accessing content from any potentially risky source including internet browsers, removable media and e-mail.
- Secure Bridge: A configurable process for extracting data from the container to enable collaboration between people and systems while ensuring security and compliance.
- Endpoint Intelligence: Detailed reporting and integration with SIEM and Big Data analytics to identify targeted attacks.
- Containment Features. Prevent uncontained applications, which can access organizational resources, from accessing the internet; and prevent contained applications, which can access the internet, from accessing organizational resources.
- Hidden Files. Set file locations, that may contain sensitive data, to be hidden from contained applications.
- Upload Blocker. When Upload Blocker is enabled, contained browsers can download to and upload from only a designated folder (by default: Downloads), which is isolated from uncontained programs. This prevents browsers from uploading any files to the internet other than contained files that were previously downloaded from the internet.
Capsule8 Platform
- No Risk to System Stability. Capsule8 runs in userland (outside the operating system’s kernel) and collects kernel-level data without the need of a kernel module. This approach ensures no risk to stability in production (both servers and networks).
- Minimal Performance Impact. To ensure minimal performance impact to hosts and networks, Capsule8 employs a resource limiter that enforces hard limits to system CPU, disk and memory, with an intelligent load-shedding strategy.
- Simple Deployment and Maintenance. The Capsule8 agent is a single static Go binary that is portable and easy to install and to update through a wide variety of orchestration mechanisms, including Puppet, Ansible, Kubernetes, etc. Our system works on-premise, in the cloud, or in a hybrid environment.
- Minimal Network Load. Our distributed approach to analytics pushes computation as close to the data as possible, ensuring minimal impact to even the busiest of networks.
Carbon Black (CB) Response
- Continuous and Centralized Recording
- Live Response for Remote Remediation
- Attack Chain Visualization and Search
- Automation via Integrations and Open APIs
- Faster end-to-end response and remediation
- Accelerated IR and threat hunting with unfiltered endpoint visibility
- Rapid identification of attacker activities and root cause
- Secure remote access to infected endpoints for in-depth investigation
- Better protection from future attacks through automated hunting
- Unlimited retention and scale for the largest installations
- Reduced IT headaches from reimaging and helpdesk tickets
Centripetal Networks CleanINTERNET
- Lowers false positives through bulk enforcement of millions of complex IOC rules, paired down from hundreds of millions of indicators
- Greatly reduces event volume through intelligence-based filtering and data aggregation
- Converts indicators to action on a continuous basis, as intelligence feeds are dynamically updated
- Organizations cannot apply threat intelligence at-scale
- High latency rates limit real-time prevention of known threats. Less than 1% of compromise indicators are persistently applied to an organization’s defense
- Eradicate threats based threat intelligence enforcement
- Focus on investigating the 10% of threats that are unknown
Without a single platform that can process the amount of threat intelligence necessary to actively defend the business, security teams have been struggling. Firewalls and IPS systems are not the answer.
Centripetal has solved this problem with its invention of the Threat Intelligence Gateway. This solution fundamentally changes how cyber teams filter bad traffic based on intelligence, allowing them to:
Cisco Advanced Malware Protection (Cisco AMP for Endpoints)
- Filtering out policy-violating files from the Internet, e-mails, and more.
- Detecting and protecting against client-side exploit attempts and exploit attempts aimed at client applications like Java and Flash.
- Recognizing, blocking, and analyzing malicious files.
- Identifying malware patterns and anticipating potentially breached devices.
- Tracking malware’s spread and communications.
- Alleviating threats of reinfection.
Cleafy
- Patented Full Content Integrity (FCI) continuously verifies full application integrity (DOM/XHR/API)
- Deep threat visibility automatic extraction of threat evidence (e.g. malicious web-injects and mobile apps)
- Patented Dynamic Application Encryption (DAE) to enable safe transactions from infected endpoints
- Client-less - no agent deployed and passive mobile SDK – no touch of application backend infrastructure
- User-transparent – no impact on end-user experience, content delivery and endpoint performance
- Application-independent - no changes required to application code – no re-training upon new releases
- Open architecture and comprehensive REST APIs – integrates any Transaction Monitor, Case Mgmt, SIEM
- Scalable to continuously monitor full application perimeter and analyze millions of events/day
- Deployed either on-premise or over the Cloud
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.