Newest Listing

Top Rated

Most Popular

Directory: Recently Added Listings RSS

Deep Secure Network Management Guard

Visit the Product Site

The Deep-Secure Network Management Guard controls the network management traffic as it passes between the enterprise networks and the management system. Its self-defending architecture means it can exert the required control without itself becoming vulner ...

VendorDeep Secure
Pricing ModelCommercial
Modified
SafeToGo

Visit the Product Site

The next generation of highly secure USB 3.0 compliant flash drives SafeToGo™ from Cardwave is a fully robust, hardware encrypted USB3.0 flash drive that protects your sensitive data. SafeToGo™ can be fully managed through the SafeConsole Secure USB Mana ...

VendorCardwave
Pricing ModelCommercial
Modified

SAINT Popular

0 reviews
SAINT

Visit the Product Site

Before you can secure a network, you have to know how it's threatened. SAINT, or the Security Administrator's Integrated Network Tool, uncovers areas of weakness and recommends fixes. With the SAINT® vulnerability scanner, you can: Identify vulnerabilitie ...

VendorSAINT Corporation
Pricing ModelCommercial
Modified
PortalGuard

Visit the Product Site

PistolStar, Inc. maker of PortalGuard offers an on-premise turnkey user authentication solution-set for companies with external-facing web applications to their employees, contractors, suppliers, and vendors. This all-in-one integrated design includes two ...

VendorPistolStar Inc.
Pricing ModelService
Modified
Deep-Secure Chat Guard

Visit the Product Site

The Deep-Secure Chat Guard is one of our family of Content Inspection Guards.  It controls the use of Internet standard chat, to allow an organisation to make use of chat without putting sensitive information or critical business processes at risk. ...

VendorDeep-Secure
Pricing ModelCommercial
Modified
Deep-Secure XML Guard

Visit the Product Site

The Deep-Secure XML Guard is one Guard in our family of Content Control Guards.  It controls XML data entering and leaving an organisation, defending against advanced attacks and misuse.  Its self-defending architecture means it can exert the re ...

Category:Guards XML
VendorDeep-Secure
Pricing ModelCommercial
Modified
Paws Studio

Visit the Product Site

Paws Studio is a compliance solution which is cost effective, easy to use and produces compliance reports in seconds on your workstations and servers. • Audit against and edit pre-defined compliance policies such as SANS, NERC, PCI DSS, NSA and STIGs • ...

Category:Compliance
VendorTitania Ltd.
Pricing ModelCommercial
Modified
RSA SecurID Software Authenticator

Visit the Product Site

RSA SecurID Software Authenticator protects mobile users within your organisation with security tokens for their smartphones, tablets and PCs. It uses software tokens to secure access from popular mobile platforms, including iOS (iPhone, iPad), Android, B ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Nipper Studio

Visit the Product Site

Nipper Studio produces Penetration Testing level device reports in seconds. It helps maintain expert level security analysis, reduce the risk of breaches and lower the cost of external audits. Summarises the security of network devices Produces a deta ...

VendorTitania Ltd.
Pricing ModelCommercial
Modified
RSA SecurID Hardware Authenticator

Visit the Product Site

Provides secure user access with self-contained two-factor authentication security tokens. The authentication process combines time, an algorithm and a unique identifier. You can enable multiple uses for key fob or card tokens. They can be set up to handl ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
Skycure

Visit the Product Site

With Skycure, you can use your device to access sensitive and private information without having to fear that the network has been compromised. Skycure provides you with a seamless solution to secure your device and make sure the device and all apps on it ...

Category:Mobile Devices
VendorSkycure, Ltd.
Pricing ModelLimited Free Trial
Modified
RSA Access Management

Visit the Product Site

RSA Access Management: Access-management software that enables seamless and secure access to information anywhere and anytime. With simplified access management, businesses can connect users to information simply, securely, and efficiently. Secure Access ...

VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Vendor Management

Visit the Product Site

RSA Archer Vendor Management automates and streamlines the oversight of vendor relationships. This web-based vendor-management software facilitates risk-based vendor selection, relationship management, and compliance monitoring as part of a governance, ri ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Data Loss Protection

Visit the Product Site

RSA Data Protection (DLP) modules provide unprecedented visibility into the location and usage of sensitive data such as credit card data, Personally Identifiable Information (PII), intellectual property and other corporate data. Once the modules have loc ...

Category:DLP Network
VendorEMC Corporation
Pricing ModelService
Modified
RSA Archer Threat Management

RSA Archer Threat Management consolidates threat data and reports on threat remediation activities, enabling a consistent, repeatable threat management process. Powered by the RSA Archer governance, risk management, and compliance (GRC) platform, Threat ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA Archer Risk Management

Visit the Product Site

RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization’s risk appetite. RSA Archer provid ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Policy Management

Visit the Product Site

RSA Archer Policy Management provides the foundation for your governance, risk management, and compliance (GRC) program, with a comprehensive, consistent process for managing the lifecycle of policies and their exceptions. Policy management software prov ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Incident Management

Visit the Product Site

RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA Archer Compliance Management

Visit the Product Site

This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Business Continuity Management

Visit the Product Site

RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...

Category:Compliance
VendorEMC Corporation
Pricing ModelOnline Use Only
Modified