Newest Listing

Top Rated

Most Popular

Tags: compliance

Total Protection for Compliance

Visit the Product Site

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...

Category:Compliance
VendorMcAfee
Pricing ModelCommercial
Modified
VirusScan Enterprise for Offline Virtual Images

Visit the Product Site

McAfee VirusScan Enterprise for Offline Virtual Images protects your virtual environment and corporate network by automatically scanning, cleaning, and updating VMs before they go online. VirusScan Enterprise for Offline Virtual Images offers: An opti ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Vulnerability Manager

Visit the Product Site

McAfee Vulnerability Manager, with its McAfee Asset Manager feature, actively or passively canvases everything on your network. Now you can uncover devices hidden on your network as well as smartphones, tablets, and laptops that come and go between schedu ...

VendorMcAfee
Pricing ModelCommercial
Modified
McAfee Vulnerability Manager for Databases

Visit the Product Site

McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses such as weak passwords, default accounts, and other common threats. Vulnerabi ...

VendorMcAfee
Pricing ModelCommercial
Modified
RSA Archer Audit Management

Visit the Product Site

This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...

Category:Compliance
VendorEMC Corporation
Pricing ModelCommercial
Modified
Paws Studio

Visit the Product Site

Paws Studio is a compliance solution which is cost effective, easy to use and produces compliance reports in seconds on your workstations and servers. • Audit against and edit pre-defined compliance policies such as SANS, NERC, PCI DSS, NSA and STIGs • ...

Category:Compliance
VendorTitania Ltd.
Pricing ModelCommercial
Modified
Cisco identity Services Engine

Visit the Product Site

Whether you need to support employee "bring-your-own-device" (BYOD) to work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) meets your needs. It helps you reliably enforce compliance, enhanc ...

VendorCisco
Pricing ModelCommercial
Modified
Barracuda Web Application Firewall

Visit the Product Site

With hundreds of lines of code to check - and vulnerabilities often subtle and hard to find - a serious data breach is often the first sign that a web application has problems. Having secured thousands of production applications against more than 11 billi ...

Category:Guards Web
VendorBarracuda Networks
Pricing ModelCommercial
Modified
Wave Inspector

Visit the Product Site

Inspector lets you decide which people and which data need minding, and which can have more freedom. First you define which data you consider sensitive—for example, patient names or credit card numbers. Then you define how each class of information is goi ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified
Wave Endpoint Monitor

Visit the Product Site

Malware can do its work for weeks or months before you ever know it’s there. But with Wave Endpoint Monitor, you can spot malware before it has a chance to cause damage. Antivirus software can’t detect rootkits and other malware; it works at the level of ...

VendorWave Systems Corp.
Pricing ModelCommercial
Modified