NNT Change Tracker Gen provides continuous protection against known and emerging cyber security threats in an easy to use solution, offering true enterprise coverage through agent-based and agentless monitoring options. NNT Change Tracker Generation 7 u ...
Protection for your Microsoft Exchange and Lotus Domino servers. Features Strong internal safeguardsDetects threats that may have either slipped past your perimeter defenses or entered your network via infected laptops and internal email. It also bloc ...
Verisys is an system and file integrity monitoring solution for Windows, Linux and network devices that allows you to maintain the integrity of business critical files and data by detecting unauthorised changes. Verisys is easily configured to suit your ...
CimTrak is a comprehensive file integrity monitoring and compliance software application that is easy to use and less expensive then similar solutions. Customers worldwide look to CimTrak as an alternative to other file integrity monitoring tools such as ...
Helps meet regulatory compliance by limiting access to critical data, tracking user access and providing reporting for the virtual infrastructure. Provides defense-in-depth, dynamic security with VM rootkit detection and virtual infrastructure auditing an ...
The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...
The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...
McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...
McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...
McAfee VirusScan Enterprise for Offline Virtual Images protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online. VirusScan Enterprise for Offline Virtual Images offers: An opti ...
McAfee Vulnerability Manager, with its McAfee Asset Manager feature, actively or passively canvases everything on your network. Now you can uncover devices hidden on your network as well as smartphones, tablets, and laptops that come and go between schedu ...
McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses such as weak passwords, default accounts, and other common threats. Vulnerabi ...
Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...
McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...
McAfee Integrity Control blocks unauthorized applications and change on fixed-function, point-of-service infrastructures, including ATMs, point-of-sale (POS) systems, and kiosks. Integrity Control prevents out-of-policy changes while still allowing update ...
RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...
This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...
RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...
This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...
RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...
Page 1 of 2