Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Deep-Secure XML Guard

Visit the Product Site

The Deep-Secure XML Guard is one Guard in our family of Content Control Guards.  It controls XML data entering and leaving an organisation, defending against advanced attacks and misuse.  Its self-defending architecture means it can exert the re ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Paws Studio

Visit the Product Site

Paws Studio is a compliance solution which is cost effective, easy to use and produces compliance reports in seconds on your workstations and servers. • Audit against and edit pre-defined compliance policies such as SANS, NERC, PCI DSS, NSA and STIGs • ...

Category:Compliance
VendorTitania Ltd.
Pricing ModelCommercial
Modified
RSA SecurID Software Authenticator

Visit the Product Site

RSA SecurID Software Authenticator protects mobile users within your organisation with security tokens for their smartphones, tablets and PCs. It uses software tokens to secure access from popular mobile platforms, including iOS (iPhone, iPad), Android, B ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Nipper Studio

Visit the Product Site

Nipper Studio produces Penetration Testing level device reports in seconds. It helps maintain expert level security analysis, reduce the risk of breaches and lower the cost of external audits. Summarises the security of network devices Produces a deta ...

VendorTitania Ltd.
Pricing ModelCommercial
Modified
RSA SecurID Hardware Authenticator

Visit the Product Site

Provides secure user access with self-contained two-factor authentication security tokens. The authentication process combines time, an algorithm and a unique identifier. You can enable multiple uses for key fob or card tokens. They can be set up to handl ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Skycure

Visit the Product Site

With Skycure, you can use your device to access sensitive and private information without having to fear that the network has been compromised. Skycure provides you with a seamless solution to secure your device and make sure the device and all apps on it ...

Category:Mobile Devices
VendorSkycure, Ltd.
Pricing ModelLimited Free Trial
Modified
RSA Access Management

Visit the Product Site

RSA Access Management: Access-management software that enables seamless and secure access to information anywhere and anytime. With simplified access management, businesses can connect users to information simply, securely, and efficiently. Secure Access ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Vendor Management

Visit the Product Site

RSA Archer Vendor Management automates and streamlines the oversight of vendor relationships. This web-based vendor-management software facilitates risk-based vendor selection, relationship management, and compliance monitoring as part of a governance, ri ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Data Loss Protection

Visit the Product Site

RSA Data Protection (DLP) modules provide unprecedented visibility into the location and usage of sensitive data such as credit card data, Personally Identifiable Information (PII), intellectual property and other corporate data. Once the modules have loc ...

Category:DLP Network
VendorEMC Corporation
Pricing ModelService
Modified
RSA Archer Threat Management

RSA Archer Threat Management consolidates threat data and reports on threat remediation activities, enabling a consistent, repeatable threat management process. Powered by the RSA Archer governance, risk management, and compliance (GRC) platform, Threat ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA Archer Risk Management

Visit the Product Site

RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization’s risk appetite. RSA Archer provid ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Policy Management

Visit the Product Site

RSA Archer Policy Management provides the foundation for your governance, risk management, and compliance (GRC) program, with a comprehensive, consistent process for managing the lifecycle of policies and their exceptions. Policy management software prov ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Incident Management

Visit the Product Site

RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA Archer Compliance Management

Visit the Product Site

This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Business Continuity Management

Visit the Product Site

RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...

Category:Compliance
VendorEMC Corporation
Pricing ModelOnline Use Only
Modified
RSA Archer Audit Management

Visit the Product Site

This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer GRC

Visit the Product Site

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA: ECAT

Visit the Product Site

RSA ECAT is an endpoint compromise-assessment and monitoring tool that enables organizations to detect and respond to threats.  Using a unique signature-less approach, it identifies previously unknown malware and compromises that other solutions may ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA CyberCrime Intelligence Service

Visit the Product Site

Provides information on corporate machines, network resources, access credentials, business data, and email correspondence that may have been compromised by malware. Enabling security professionals to identify gaps in existing processes and adjust or crea ...

Category:Enterprise
VendorEMC Corporation
Pricing ModelService
Modified
RSA Adaptive Authentication

Visit the Product Site

Adaptive Authentication monitors and authenticates online activities in real time by correlating behavioral analysis, device profiling, and data feeds from RSA eFraudNetwork. AT A GLANCE Measures risk of login and post login activities by evaluating o ...

VendorRSA
Pricing ModelCommercial
Modified