Showing results: 136 - 150 of 750 items found.
-
-
-
Vanguard Analyzer -
Vanguard Integrity Professionals
Vanguard Analyzer™ provides Vanguard expertise on z/OS Security Server. Analyzer delivers expert-level vulnerability assessments of z/OS Security Server configuration controls and security settings with the ability to produce audit results in minutes. Vanguard Analyzer™ provides risk analysis and mitigation requirements in easy to read panels. System auditors can review Analyzer findings in order of priority and mitigate accordingly. Do you have access to expert-level assessment based on severity and vulnerabilities? Are your security analyst armed with invaluable interpretation of assessment findings? Can you provide your company with a detailed explanation, easy to understand risk statements and corrective actions that need to be followed step-by-step?
-
GreyMatter -
Reliaquest
Security practitioners are often on the defensive. There aren’t enough hours in the day or people with the broad skill sets needed to keep up with threats evolving at machine speed. That’s why we’re committed to making automation work across the entire security lifecycle. We believe the only way to make security possible is to automate away the repetitive and mundane. That’s why we built ReliaQuest GreyMatter, the first unified threat detection, investigation and response SaaS platform.
-
Garland Technology
Bypass TAPs (bypass switches) are used to connect a monitored network segment to an active, in-line security device and monitor the device's health. If your security tool goes off-line, the bypass TAP automatically 'switches to bypass mode' keeping your network link up while you resolve the issue. Garland's Bypass TAPs with failsafe technology guarantee 100% network up-time and let your security devices see every bit, byte, and packet.®
-
Broadcom Limited
Locate and protect sensitive and PII data to identify risk and ensure compliance. Monitor system events to identify and proactively respond to potential risks and bad actors. Simplify security operations, reduce risk and lighten security management load with automated ID and authorization cleanup.
-
LGMS
There is a rising concern that IoT devices are being developed rapidly without appropriate consideration of the profound security challenges involved, as demonstrated by the various IoT devices hacked in recent years— automobiles, cameras, children's toys, thermostats, and medical devices.With more than a decade of specialized cyber security testing experience combined with our extensive research and development, we can assess and identify both common and complex security vulnerabilities that may be residing within your whole IoT ecosystem.
-
LGMS
Red Team Assessment (Red Teaming) is an activity where a group of white hat hackers (or penetration tester) perform a series of activities to assess the company’s security readiness towards real-world cyber threats. Red teaming aims to ‘attack’ an organization’s digital and physical infrastructure to evaluate the organization’s security defense and posture, at the same time targeting to obtain any sensitive and beneficial information. Red Teaming usually emulates several malicious actors to penetrate the organization’s digital and physical infrastructure security.
-
HYAMP -
Wavecontrol, S.L.
Patented CAL-ALERT® functionElectronic Dwell4-wire measurement and milliohm offsetPatented VERI-CHEK® functionStorage of up to 10 setups with 3 steps per setupBuilt-in Security settingsMinimum and maximum trip settingsInterconnect to Hypot® III to form a complete test systemBuilt-in security settingsLine and Load regulation
-
Mindarray Systems Pvt Ltd
Derive Security Intelligence out of Network with Event Log Analyzer and Network Bandwidth Monitoring
-
Quanergy Systems, Inc.
Proven LiDAR powerhouse made and tested for 3D mapping, security and harsh industrial environments.
-
Fasoo, Inc.
Fasoo RiskView is a tool for security administrators that monitor activity related to unstructured data and user activities with confidential data. It gathers information from Fasoo Usage Tracer (the log analysis utility for Fasoo Enterprise DRM) and Fasoo eData Manager. It has APIs that can be configured to import log data from other security technology components, including firewalls, DLP, databases, and even physical security systems (e.g., entry/exit data from keycard or biometric systems) and employee attendance records. Fasoo RiskView includes a decision making framework that security administrators as well as business managers can use to review suspicious activities and after relevant investigations, in order to decide whether or not to take action to address these concerns with potential insider threats.
-
Microsoft Azure
Comprehensive IoT security solution—including hardware (crossover microcontroller), OS, and cloud components for IoT device security—to actively protect your devices, your business, and your customers. With billions of new devices connected each year, it's more important than ever to secure yours. Help protect your data, privacy, physical safety, and infrastructure with Azure Sphere. It's built on decades of Microsoft experience in hardware, software, and cloud services to provide a turnkey security solution for IoT devices.
-
Checkmarx.com Ltd.
Prevent vulnerabilities such as OpenSSL Heartbleed, Bash ShellShock and many others from impacting your application's security posture. Checkmarx Open Source Analysis (OSA) allows organizations to manage, control and prevent the security risks and legal implications introduced by open source components used as part of the development effort.
-
ChongqingTop Oil Purifier Manufacture Co., Ltd.
The Veracode Continuous Software Security Platform contains all of the application security testing types you need in one place – static analysis, dynamic analysis, software composition analysis, and manual penetration testing – ensuring that you have a comprehensive view of your risk from design through deployment.