Tags: Compliance

RSA Archer Policy Management

RSA Archer Policy Management provides the foundation for your governance, risk management, and compliance (GRC) program, with a comprehensive, consistent process for managing the lifecycle of policies and their exceptions. Policy management software prov ...

Category Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Risk Management

RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization’s risk appetite. RSA Archer provid ...

Category Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Vendor Management

RSA Archer Vendor Management automates and streamlines the oversight of vendor relationships. This web-based vendor-management software facilitates risk-based vendor selection, relationship management, and compliance monitoring as part of a governance, ri ...

Category Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
Titania Paws

Titania Paws is compliance software that audits workstations, servers and laptops against pre-defined compliance policies and initiatives including PCI DSS, SANS, DoD, STIG, CIS, FISMA and Cyber Essentials. It also offers the ability to create and save cu ...

Category Compliance
VendorTitania Ltd.
Pricing ModelLimited Free Trial
Modified

Titania Nipper is an industry-leading configuration auditing software product that audits network devices such as firewalls, routers and switches with supported devices including Cisco, Check Point Software Technologies, Fortinet, Palo Alto Networks, 3Com ...

VendorTitania Ltd
Pricing ModelLimited Free Trial
Modified
Cisco identity Services Engine

Whether you need to support employee "bring-your-own-device" (BYOD) to work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) meets your needs. It helps you reliably enforce compliance, enhanc ...

VendorCisco
Pricing ModelCommercial
Modified

With hundreds of lines of code to check - and vulnerabilities often subtle and hard to find - a serious data breach is often the first sign that a web application has problems. Having secured thousands of production applications against more than 11 billi ...

Category Guards Web
VendorBarracuda Networks
Pricing ModelCommercial
Modified
Wave Inspector

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is goi ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Wave Endpoint Monitor

Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage. Antivirus software can’t detect rootkits and other malware; it works at the level of ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2021