The Nessus vulnerability scanner is the world leading vulnerability scanner, with over five million downloads to-date. Nessus is currently rated among the top vulnerability scanners throughout the security industry and is endorsed by professional security ...
If you have a large network, the Security Center can be used to place multiple Nessus scanners throughout your infrastructure. Using multiple scanners decreases your scan time, but also has several other advantages. The Security Center can help any org ...
Lumension® Endpoint Management and Security Suite delivers an end-to-end suite of solution capabilities across endpoint operations, security, compliance and IT risk management to reduce complexity, optimize TCO, improve visibility and deliver control ...
Collect and store security related data enterprise-wide for auditing, reporting, compliance verification and event monitoring. CA Audit provides you with a scalable, centralized repository that stores and analyzes audit logs and security data from a diver ...
Solidcore® is a provider of real-time change control software. Organizations worldwide trust Solidcore to assure compliance with Payment Card Industry (PCI) and Sarbanes-Oxley (SOX) standards, to improve service availability, and achieve faster return ...
Tripwire Enterprise is the configuration control solution that combines best-of-breed file integrity monitoring with comprehensive compliance policy management to protect, detect and correct IT systems throughout the modern enterprise. As a part of the Tr ...
Sourcefire Defense Center is the nerve center of the Sourcefire 3D system. Defense Center unifies critical network security functions including event monitoring, correlation, and prioritization for forensic analysis, trends analysis, and management report ...
Symantec Control Compliance Suite is a comprehensive solution for compliance process automation. It allows a risk based approach to managing compliance and security, and provides a fully integrated and flexible platform for deployment. It provides the mos ...
CA Security Compliance Manager provides automation of security processes required to meet compliance objectives. It enables continuous and automated compliance testing processes, analysis of findings, remediation, validation, and publishing of compliance ...
Here's a security solution that isn't as complex as the problem. NetIQ Sentinel™ is a full-featured Security Information and Event Management (SIEM) solution that simplifies the deployment, management and day-to-day use of SIEM, readily adapts to dynamic ...
NetIQ Security Compliance Suite leverages configuration management, change management and security information management capabilities to provide a comprehensive IT security solution that provides coverage for your enterprise and allows you to implement a ...
NetIQ Secure Configuration Manager audits system configurations and compares them to corporate policies, previous snapshots, and/or other systems. It also leverages this configuration information to reliably identify vulnerabilities and exposures, using t ...
When it comes to security, manual monitoring just doesn't cut it. For true policy enforcement, you need something that doesn't ever get tired, bored, distracted or lazy. The active dashboard in Sentinel automates the security monitoring of IT systems and ...
RedSeal Network Advisor is automated assurance software for network security. Every day, it gathers the configurations of all your network devices: firewalls, routers, load balancers, and more. It analyzes how the rules on all of these devices work togeth ...
RedSeal Vulnerability Advisor transforms scanning into actionable vulnerability management. It gathers the configurations of all your network devices — firewalls, routers, load balancers, wireless access points, and more—and combines this info ...
The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...
The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...
McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...
McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...
Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...
Page 1 of 2