Tags: Compliance

NNT Change Tracker Gen provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. NNT Change Tracker Generation 7 u ...

VendorNew Net Technologies
Pricing ModelCommercial
Modified

Protection for your Microsoft Exchange and Lotus Domino servers. Features Strong internal safeguardsDetects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also bloc ...

Category Servers
VendorMcAfee
Pricing ModelCommercial
Modified
Verisys

Verisys Popular

Verisys is an system and file integrity monitoring solution for Windows, Linux and network devices that allows you to maintain the integrity of business critical files and data by detecting unauthorised changes. Verisys is easily configured to suit your ...

VendorIonx
Pricing ModelCommercial
Modified
CimTrak Integrity and Compliance Suite

CimTrak is a comprehensive file integrity monitoring and compliance software application that is easy to use and less expensive then similar solutions.  Customers worldwide look to CimTrak as an alternative to other file integrity monitoring tools such as ...

VendorCimcor, Inc.
Pricing ModelCommercial
Modified

Helps meet regulatory compliance by limiting access to critical data, tracking user access and providing reporting for the virtual infrastructure. Provides defense-in-depth, dynamic security with VM rootkit detection and virtual infrastructure auditing an ...

Category PCI DSS
VendorIBM
Pricing ModelCommercial
ModifiedNever
McAfee Application Data Monitor (Formerly NitroView ADM)

The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...

Category Compliance
VendorMcAfee (formerly NitroSecurity)
Pricing ModelCommercial
Modified
McAfee Database Event Monitor for SIEM (Formerly NitroView DBM)

The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...

Category Compliance
VendorMcAfee (formerly NitroSecurity)
Pricing ModelCommercial
Modified
Total Protection for Compliance

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...

Category Compliance
VendorMcAfee
Pricing ModelCommercial
Modified

McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...

Category Compliance
VendorMcAfee
Pricing ModelCommercial
Modified

McAfee VirusScan Enterprise for Offline Virtual Images protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online. VirusScan Enterprise for Offline Virtual Images offers: An opti ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Vulnerability Manager

McAfee Vulnerability Manager, with its McAfee Asset Manager feature, actively or passively canvases everything on your network. Now you can uncover devices hidden on your network as well as smartphones, tablets, and laptops that come and go between schedu ...

VendorMcAfee
Pricing ModelCommercial
Modified

McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses such as weak passwords, default accounts, and other common threats. Vulnerabi ...

VendorMcAfee
Pricing ModelCommercial
Modified

Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...

Category Host DLP
VendorMcAfee
Pricing ModelCommercial
Modified
Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...

Category DLP Network
VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Integrity Control

McAfee Integrity Control blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Integrity Control prevents out-of-policy changes while still allowing update ...

VendorMcAfee
Pricing ModelCommercial
Modified
RSA Archer GRC

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...

Category Compliance
VendorEMC2
Pricing ModelCommercial
Modified
RSA Archer Audit Management

This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...

Category Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Business Continuity Management

RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...

Category Compliance
VendorEMC Corporation
Pricing ModelOnline Use Only
Modified

This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...

Category Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
RSA Archer Incident Management

RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...

Category Compliance
VendorEMC2
Pricing ModelCommercial
Modified

© Computer Network Defence Limited 2019