Helps meet regulatory compliance by limiting access to critical data, tracking user access and providing reporting for the virtual infrastructure. Provides defense-in-depth, dynamic security with VM rootkit detection and virtual infrastructure auditing an ...
The McAfee Application Data Monitor appliance decodes an entire application session to Layer 7, providing a full analysis of everything from the underlying protocols and session integrity all the way up to the contents of the application (such as the text ...
The non-intrusive design of McAfee Database Event Monitor for SIEM supports your expanding compliance auditing and reporting requirements and enhances security operations. While it monitors all database transactions, Database Event Monitor for SIEM provid ...
McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess, and report across managed and unmanaged systems, reducing the time and effort required for IT audits. The Total Protection for Compliance suite includes Mc ...
McAfee Policy Auditor helps you report consistently and accurately against key industry mandates and internal policies across your infrastructure or on specific targeted systems. Policy Auditor is an agent-based IT audit solution that leverages the Securi ...
Corporate data is constantly at risk of loss, theft, and exposure. The McAfee Total Protection for Data solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring. It helps you establish and ...
RSA Archer GRC: RSA Archer GRC modules allow you to build an efficient, collaborative enterprise governance, risk, and compliance (GRC) program across IT, finance, operations, and legal domains. With RSA Archer, you can manage risks, demonstrate complianc ...
This solution enables Internal Audit to use a consistent, risk-based audit approach to drive greater efficiency in the execution of the audit plan. Features include risk-based prioritization of your audit universe, resource scheduling and staffing, manage ...
RSA Archer Business Continuity Management provides a centralized, automated approach to business continuity and disaster recovery planning, allowing you to respond swiftly in a crisis to protect your operations. This web-based software combines business ...
This flexible, web-based compliance software enables you to document process and technical controls, link them to authoritative sources, perform risk-based scoping, execute design and operating tests, and respond to gaps. You can also report assessment re ...
RSA Archer Incident Management centralizes and streamlines the case management lifecycle for cyber and physical incidents and ethics violations. This web-based incident-management software lets you capture events that may escalate into governance, risk ma ...
RSA Archer Policy Management provides the foundation for your governance, risk management, and compliance (GRC) program, with a comprehensive, consistent process for managing the lifecycle of policies and their exceptions. Policy management software prov ...
RSA Archer Risk Management enables organizations to deploy a systematic and methodical approach to identify, assess, decision, treat, and monitor risks to optimize the management of risk consistent with the organization’s risk appetite. RSA Archer provid ...
RSA Archer Vendor Management automates and streamlines the oversight of vendor relationships. This web-based vendor-management software facilitates risk-based vendor selection, relationship management, and compliance monitoring as part of a governance, ri ...
Titania Paws is compliance software that audits workstations, servers and laptops against pre-defined compliance policies and initiatives including PCI DSS, SANS, DoD, STIG, CIS, FISMA and Cyber Essentials. It also offers the ability to create and save cu ...