List Categories and Listings by R

EMC Corporation
Commercial
Pricing Model

This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...

Category Compliance
Modified
RSA Archer Audit Management
EMC Corporation
Online Use Only
Pricing Model

RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...

Category Compliance
Modified
RSA Archer Business Continuity Management
EMC Corporation
Commercial
Pricing Model

This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...

Category Compliance
Modified
RSA Archer Compliance Management
Commercial
Pricing Model

RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...

Category Compliance
Modified
RSA Archer Incident Management
EMC Corporation
Commercial
Pricing Model

RSA Archer Policy Management provides the foundation for your governance, risk management, and compliance (GRC) program, with a comprehensive, consistent process for managing the lifecycle of policies and their exceptions. Policy management software prov ...

Category Compliance
Modified
RSA Archer Policy Management
EMC Corporation
Commercial
Pricing Model

RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization’s risk appetite. RSA Archer provid ...

Category Compliance
Modified
RSA Archer Risk Management
EMC2
Commercial
Pricing Model

RSA Archer Threat Management consolidates threat data and reports on threat remediation activities, enabling a consistent, repeatable threat management process. Powered by the RSA Archer governance, risk management, and compliance (GRC) platform, Threat ...

Category Compliance
Modified
RSA Archer Threat Management
EMC Corporation
Service
Pricing Model

RSA Data Protection (DLP) modules provide unprecedented visibility into the location and usage of sensitive data such as credit card data, Personally Identifiable Information (PII), intellectual property and other corporate data. Once the modules have loc ...

Category DLP Network
Modified
RSA Data Loss Protection
EMC Corporation
Commercial
Pricing Model

RSA Archer Vendor Management automates and streamlines the oversight of vendor relationships. This web-based vendor-management software facilitates risk-based vendor selection, relationship management, and compliance monitoring as part of a governance, ri ...

Category Compliance
Modified
RSA Archer Vendor Management
EMC Corporation
Commercial
Pricing Model

RSA Access Management: Access-management software that enables seamless and secure access to information anywhere and anytime. With simplified access management, businesses can connect users to information simply, securely, and efficiently. Secure Access ...

Modified
RSA Access Management
EMC Corporation
Commercial
Pricing Model

Provides secure user access with self-contained two-factor authentication security tokens. The authentication process combines time, an algorithm and a unique identifier. You can enable multiple uses for key fob or card tokens. They can be set up to handl ...

Modified
RSA SecurID Hardware Authenticator
EMC Corporation
Commercial
Pricing Model

RSA SecurID Software Authenticator protects mobile users within your organisation with security tokens for their smartphones, tablets and PCs. It uses software tokens to secure access from popular mobile platforms, including iOS (iPhone, iPad), Android, B ...

Modified
RSA SecurID Software Authenticator
Siber Systems Inc.
Freeware
Pricing Model

One click convenience RoboForm securely stores all of your passwords and logs you in with a single click (or tap). Save time entering personal and billing information with AutoFill for long web forms. Capture passwords while you browse Go about surfing ...

Modified
RoboForm
Lenny Zeltser
Open Source
Pricing Model

REMnux™ is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using the variety of freely-available tools that can exami ...

Modified
REMnux
Service
Pricing Model

THREATDETECT – Rapid detection and response to cyber threats Redscan ThreatDetect is a Security Operations Centre as-a-service platform that provides visibility of breaches and threats that impact information security risk. The service combines AlienVau ...

Modified
Redscan ThreatDetect
Tim Tomes / Black Hills Information Security
Open Source
Pricing Model

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in whic ...

Modified
Recon-ng
Commercial
Pricing Model

RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region.  RVAsec attracts over 400 security professionals from across the country.  The conference is dual-track a ...

Modified
Erlend Oftedal
Freeware
Pricing Model

There is a plethora of JavaScript libraries for use on the web and in node.js apps out there. This greatly simplifies, but we need to stay update on security fixes. "Using Components with Known Vulnerabilities" is now a part of the OWASP Top 10 and insecu ...

Modified
Retire.js

© Computer Network Defence Limited 2021