Security Compliance Software
AppRiver offers secure business email hosting with cloud-based email and Web protection against spam, viruses and malware. AppRiver’s Secure Hosted Exchange solution provides both administrators and end users with: unlimited mailbox storage, embedded SecureTide™ Spam and Virus protection, Akamai-enabled performance optimization, mobile device synchronization, and 24/7 customer care. The company’s new, web-based Customer Portal offers administrators tools to help manage their e-mail hosting environments with greater simplicity.
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way.
ESET delivers the fastest, most effective and most proactive antivirus and antispyware software solution to eliminate viruses, spyware, adware, worms, trojans, rootkits and other malware before they attack your system. Nobody does proactive protection better than ESET!
Silo is a cloud-based container designed for secure, controlled access to your important web apps. It’s insulated, accessible from any device, SSO enabled and policy enforced. Silo contains web data in a secure sandbox, beyond the reach of exploits. Silo provides secure single sign-on to your web apps. Silo enforces data use policies regardless of device
Our endpoint security products have been utilizing next-generation technologies – such as behavioral analysis and machine learning – for a decade already. Over the years, our products have developed further to offer several state-of-the-art technologies to keep your business safe.Our behavior-based protection engine, DeepGuard, is one of the key security elements in our business security software. Combined with the power of F-Secure Security Cloud, which tracks malware behavior globally, it gives our customers consistent security against new and emerging threats.
Panda Security specializes in security solutions ranging from antiviruses to cyber-security solutions designed to prevent cybercrime. It proposes a security model that is a combination of its patented TruPrevent and Collective Intelligence models. TruPrevent blocks unknown viruses and Collective Intelligence detects, analyzes and classifies malware. It works with both individuals and businesses and offers security and management, cybersecurity, perimeter security and more. Managing it is very easy and has shown reductions in downtime and support time while identifying defective hardware and software.
LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.
Fraud Analytics Suite is a fraud detection tool that detects suspicious claims as early as the first notice of loss and automatically refers claims to investigators. Identify insurance fraud before the claim is paid, with CSC's Fraud Analytics Suite®. Fraud Analytics Suite is fraud detection software that can have a major positive impact on your loss ratio with its comprehensive approach to identifying suspicious claims.
en.SafeWatch Anti-Fraud provides accurate, real-time credit card, wire and Internet fraud detection and prevention to protect your financial institution against fraud losses.en.SafeWatch Anti-Fraud is seamlessly integrated with EastNets top ranking anti-money laundering (AML) solutions used today by over 400 financial institutions and corporates in 80 countries. This integrated compliance framework enables financial institutions to aggregate data and processes across fraud and AML silos to improve business insight and streamline operational efficiencies.
Fraud Analyst is a proven platform for risk-based authentication, fraud detection, and real-time identity verification that is helping to reduce online fraud by as much as 90 percent for all customer segments. Regardless of the online touchpoint - from logins to new account creation to online transactions - Fraud Analyst provides protection for every customer segment and user session, offering a layered approach to fraud detection and prevention that helps to secure online accounts from today's most advanced criminals.
NetWrix Change Reporter Suite automates and simplifies the auditing of critical IT systems across the entire IT infrastructure. No matter who changed what and where — be it Active Directory, file servers, Microsoft Exchange, filer appliances such as NetApp or EMC, virtual infrastructure, SQL Server databases — everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review and forensic auditing of day-to-day administrative activities by your security team and periodic inspections by compliance auditors.
EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.
Teaming with APEX you’ll develop the skills and expertise you need to isolate and report high-risk situations and transactions. FirstStrike Fraud Detect has automated analytics that provide prioritized risk scores on all of your vendors, and advance reports can be generated daily/weekly/monthly to identify vendors with high risk characteristics, based on more than 20 proven industry routines. FirstStrike can also provide validation against more than 20 prohibited entity listings to manage your compliance risk.
NetApp SnapLock compliance software helps you meet strict data retention regulations and internal IT governance rules. NetApp® SnapLock® Compliance and SnapLock Enterprise software are integrated, cost-effective solutions that enable you to meet both external and internal requirements for retaining, protecting, and accessing regulated and reference data.
AlienVault’s Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. With all of the essential security controls built-in, and continuous threat intelligence updates from AlienVault Labs, USM provides unparalleled security visibility.
Fraud examiners and forensic investigators use data analysis technologies because they are the most effective way to examine large volumes of transactional data in order to detect and deter corporate fraud. Arbutus Fraud Detection is designed specifically for testing and comparing all types of organizational data, whether financial, operational or security. Arbutus Fraud Detection combines comprehensive data access, analysis and reporting into one intuitive and customizable query tool.
CPA Detective is an affiliate fraud detection and compliance monitoring service that identifies and eliminates fraud and low-quality traffic sources to improve online advertising campaign performance. CPA Detective will optimize online advertising campaigns (CPA, CPL, CPC, PPC, and CPM ) as well as improve ROI and increase traffic quality. The service features a leading technology and sophisticated algorithms, as well as a team of dedicated compliance monitoring experts to help you enhance campaign performance as well as increase earnings for Cost Per Action (CPA) campaigns.
DB Change Manager XE2’s compare, synchronization, and auditing capabilities let you track and report on changes, roll out new releases, and pinpoint performance problems resulting from changes in data, schema and database configuration.
The Enablon ACS solution allows the company’s self-assessment and audit approach to be deployed to all company sites, based on the following types of regulations and standards: business guidelines: standards and codes of conduct, standards: ISO, OHSAS, ILO, etc., scheduling and administration, compliance monitoring, analysis, and information sharing.
Conectys’ FraudBreaker is web based fraud detection software that captures your transaction data and performs real time checks on a wide range of risk factors. The results of these checks are instantly sent back to you with a risk score that allows you to disposition the transaction as safe (immediate confirmation of the transaction), escalate (needs manual review) or unsafe (rejection of the transaction).
FraudMAP ACH is an anomaly detection solution purpose built for the ACH payments channel. It uniquely uses behavioral analytics to transparently monitor every ACH origination file and automatically identify the suspicious or unexpected batches, transactions, or modified line items. Financial institutions use FraudMAP ACH to find fraudulent ACH batches and payments very quickly in very large batch files without manual reviews and with very few false positives.
FraudMAP Mobile is the first and only anomaly detection solution purpose built for the mobile channel. It uniquely uses behavioral analytics to transparently monitor every mobile banking session and identify the suspicious activity in the mobile banking channel.
Financial Institutions of all sizes use FraudMAP Online to proactively identify account takeover and prevent fraudulent transactions before the money is gone. As the industry's most advanced anomaly detection solution, it delivers sophisticated online fraud detection capabilities plus easy to use investigation and forensics tools.
We make the process of preventing and detecting fraud easier and more effective, reducing potential losses and operating costs without hindering sales. As the leading provider of dedicated fraud prevention solutions, 41st Parameter’s best practices methodology and patented technologies are responsible for dramatic reductions in fraud losses and subsequent declining attack rates at some of the largest institutions in e-commerce, financial services, and travel services.
IRIS provides a complete simulation environment that enables fraud analysts to tightly control risk and fraud. Interactive simulation technology guides fraud analysts through decision model generation. The effects of all potential changes are instantly visible, enabling fraud analysts to "feel" the effects of such changes immediately.
Mule Enterprise takes the guesswork out of managing performance, and lowers the risk of downtime. Monitor key statistics, set SLA alerts, diagnose and fix performance issues all from a single web-based console. Mule is architected to scale for both high throughput scenarios as well as highly distributed environments. Mule’s built-in high availability clustering and data-grid ensures zero message loss reliability for mission critical use cases.
ProxySG appliances are part of the Unified Security solution and provide complete control over all your web traffic with robust features that include user authentication, web filtering, data loss prevention, inspection and validation of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting and more. ProxySG appliances deployed with Blue Coat WebFilter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems.
Accertify® Fraud Management leverages vast and disparate enterprise data, driving better fraud detection with fewer false positives. Constantly evolving card-not-present fraud easily defeats fraud detection products that are inflexible or use limited data types. These products can lose their effectiveness over time allowing fraud rates to creep higher, putting the merchant right back where they started. Accertify® Fraud Management was developed to perform well beyond these limitations through our advanced, scalable and highly flexible Interceptas® Data Management Platform.
NetIQ Change Guardian™ helps IT security professionals manage change to critical files, system configuration and applications, and achieve compliance with regulations and internal security policies. Unmanaged change is a leading cause of security breaches and unauthorized user activity is one of the early indications of a targeted attack. With Change Guardian, you can proactively identify and respond to unmanaged changes that could lead to security breaches or failed audits, and identify potential breaches in real-time by monitoring privileged user activity across the enterprise.
NetIQ Secure Configuration Manager™ helps you to proactively enforce security configuration policy across critical systems in evolving IT environments. Start reducing your risk of security breaches, failed audits, or costly downtime today.
Kount Complete, designed for enterprises with annual revenues exceeding $10,000,000, detects and prevents fraud for merchants, financial institutions, online communities, and other businesses with fraud issues that negatively effect corporate image, financial performance and customer satisfaction. For each transaction, Kount’s proprietary platform analyzes hundreds of relevant variables and activity across the globe in real-time, delivering a highly predictive risk assessment in less than one second.
ActiveGuard is able to accurately collect and correlate vast amounts of data from virtually any application or device capable of producing a log file. This allows Solutionary to improve security while making it more efficient. ActiveGuard provides powerful cross-correlation and event-handling capabilities to recognize threats and reduce false positives, making security more operationally efficient. Using multiple detection methods – anomaly detection, statistical analysis and heuristic analysis – ActiveGuard is able to better identify and protect against advanced threats.
Cisco Security Manager helps to enable consistent policy enforcement and rapid troubleshooting of security events, offering summarized reports across the security deployment. Using its centralized interface, organizations can scale efficiently and manage a wide range of Cisco security devices with improved visibility.
The OptionEase application will accurately calculate your valuation inputs and meet your accounting needs. You’re provided with flexible expensing features which maintain historical information for your audit purposes. The application is IFRS compliant with full disclosure reporting. OptionEase is the industry leader in consistent auditability and contains a full read-only audit trail tracking every change (i.e., add, update, delete) within the system.
Trend Micro Endpoint Security is a solution designed to help businesses protect their user devices. Trend’s offering provides a bevy of software tools and features that result in a complete, multi-layered approach to endpoint security and protection.The app delivers standard endpoint protection features like advanced threat protection, anti-malware, encryption, device control, application whitelisting and more, on top of its unique features, like data-loss protection and instant messaging protection.
LogicManager’s compliance management software provides pre-built, industry specific content with a risk-based framework for streamlining your compliance process: assess which standards and frameworks are being met, document the activities in place for each requirement and report adherence levels or gaps.
Real People... with Data
We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.
As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.
Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.