View

Sorting

Products found: 5

logo
Offer a reference bonus
0.00

Micro Focus Fortify on Demand

Micro Focus Fortify on Demand delivers application security as a service, providing customers with the security testing, vulnerability management, expertise, and support needed to easily create, supplement, and expand a Software Security Assurance program. Complete software security assurance Our application security as a service integrates static, dynamic and mobile AppSec testing with continuous monitoring for web apps in production. Superior quality of results Vulnerability rule packs are regularly updated to protect web, mobile, and thick client applications from the latest threats. Dedicated technical team supports you We combine industry-leading software with a team of experts that deliver optimization, results review, and false positive removal as part of global 24/7 support. Scalable for application growth Solution can be delivered in a flexible cloud or hybrid to align with application demand. Only Fortify offers the flexibility of SaaS, on-premises or hybrid deployment of both. Industry-leading developer training Empowers developers to code securely with integrated eLearning courses and gamified learning programs.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
13
logo
Offer a reference bonus
1.00

Micro Focus Secure Gateway

Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system. The Problem Inappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:
  • Sexual harassment lawsuits
  • Criminal charges
  • A hostile work environment
  • Reputation damage
The Micro Focus Solution Organizations must address this inappropriate behavior through corporate policies and through the use of technology. Secure Gateway gives you the ability to monitor and block pornographic images, which addresses the primary issue of inappropriate communications. Secure Gateway screens images before they pass through your email system and takes action when offensive material is detected. It uses sophisticated analytical processes consisting of multiple detection methods to reliably distinguish between pornographic and non-pornographic content, without having to rely on a signature database of pre-categorized content. These processes ensure that pornography is prevented from entering or leaving your messaging system. CONFIGURE IMAGE ANALYSIS AUDITING Follow these instructions to set Secure Gateway into an audit mode. In audit mode, you will locate the images that are passing through your email system. You can use audit mode without interfering with the mail flow. PREREQUISITES To use Secure Gateway, you must have the following items:
  • A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email
  • An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)
... Learn more
-
ROI-calculator
Configurator
ROI-
-
2
19
logo
Offer a reference bonus
1.00

Micro Focus Security ArcSight User Behavior Analytics (UBA)

Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster. Micro Focus User behavior Analytics helps you with:
  • Lowering the risk and impact of cyber attacks
  • Detect unusual behavior by correlating user identity management with rest of the IT logs from apps and network
  • Achieve faster event resolution to identified threats through deeper integration with SIEM
  • Quick forensics investigation UBA analyzes user related data looking for threats in comparison to peers, historical activity, and/or violations of predefined expected behavior.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
10
1
logo
Offer a reference bonus
1.00

Micro Focus Software Development

From mainframe to mobile, we have the portfolio depth and breadth to cover challenges across DevOps, Hybrid IT, Security & Risk, and Predictive Analytics. We are a pure-play software company focused from the ground up on building, selling, and supporting software. This focus allows us to deliver on our mission to put customers at the center of innovation and deliver high-quality, enterprise-grade scalable software that our teams can be proud of. We help customers bridge the old and the new by maximizing the ROI on existing software investments and enabling innovation in the new hybrid model for enterprise IT.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
12
5
logo
Offer a reference bonus
1.00

NetIQ Identity & Access Management

Consistently enforce access rights across your business environment Your business needs immediate, easy and secure access to information. But you must balance that with access controls that secure protected information and help you meet government mandates. With Identity-Powered Access solutions, you can quickly and cost-effectively integrate Identity and Access Management (IAM) policies across local, mobile and cloud environments. Our solutions use integrated identity information to create, modify, and retire identities and control their access. We provide Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory (AD) administration. Give users quick and secure access to the resources they need I need to balance the need to quickly revoke access with enabling immediate access to IT resources. How can I easily and quickly grant secure access to the correct people, both in the Cloud and in the enterprise? Make passwords secure and simple to remember My users have to remember and use too many passwords. This leads to expensive reset calls, risks exposure from reuse, and causes user frustration. How can I enable a seamless single sign-on (SSO) experience across the enterprise and the Cloud? Make it easy to gain access to IT resources When users need access to resources, the approvals need to happen quickly so those users can remain productive. How can I make it easier for users or managers to request, review and approve secure access to resources, no matter where they reside? Govern access for regulatory compliance I need to demonstrate compliance with regulations or mandates that require controls to enforce least privilege access to sensitive information. Current certification processes are a burden on IT and the business. How can I more efficiently demonstrate access controls that limit access to only those that need it? Control and monitor privileged users We are challenged to grant 'just enough' access and authority for people to do their jobs. Without fine-grained role or access control, we end up granting more rights or access than we should. How can I grant and enforce least privileges? Strengthen authentication without restricting productivity My users' passwords are too easily compromised, and I deal with a growing list of requirements for stronger authentication to satisfy our security needs. How can I increase the security of access while keeping it easy for all of my users so they aren't burdened with an unwieldy environment? Identity-Powered Security NetIQ can help you to achieve Identity-Powered Security by providing the tools you need to aggregate identity information from across your IT infrastructure, and integrate this information into your security monitoring tools, delivering the essential "identity context" teams need to recognize and address- potential attacks faster than ever before thought possible.
... Learn more
-
ROI-calculator
Configurator
ROI-
-
0
3

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.