Newest Listing

Top Rated

Most Popular

Tags: Audit

Cisco NAC Appliance

Visit the Product Site

With Cisco NAC Appliance (formerly Cisco Clean Access), use your organisation's network infrastructure to enforce security policy compliance on all devices that attempt to gain access. Your network administrators can use the Cisco NAC Appliance to authent ...

VendorCisco Systems Inc.
Pricing ModelCommercial
Modified
Secure Cisco Auditor

Visit the Product Site

Secure Bytes provides Secure Cisco Auditor, which  is a state of the art Next Generation network security auditing software for Cisco firewalls, routers and switches along with different Router audit tools and Network security Software. Secure Cisco ...

VendorSecure Bytes
Pricing ModelCommercial
Modified
Total Protection for Compliance

Visit the Product Site

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...

Category:Compliance
VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Policy Auditor

Visit the Product Site

McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...

Category:Compliance
VendorMcAfee
Pricing ModelCommercial
Modified
Total Protection for Data

Visit the Product Site

Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...

Category:Host DLP
VendorMcAfee
Pricing ModelCommercial
Modified
Total Protection for Data Loss Prevention

Visit the Product Site

McAfee Total Protection for Data Loss Prevention (DLP) safeguards intellectual property and ensures compliance by protecting sensitive data wherever it lives — on premise, in the cloud, or at the endpoints. McAfee DLP is delivered through low-maintenance ...

Category:DLP Network
VendorMcAfee
Pricing ModelCommercial
Modified
RSA Archer GRC

Visit the Product Site

RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...

Category:Compliance
VendorEMC2
Pricing ModelCommercial
Modified
Nipper Studio

Visit the Product Site

Nipper Studio produces Penetration Testing level device reports in seconds. It helps maintain expert level security analysis, reduce the risk of breaches and lower the cost of external audits. Summarises the security of network devices Produces a deta ...

VendorTitania Ltd.
Pricing ModelCommercial
Modified