Browse Business Software Categories

Close  

HyTrust CloudControl

HyTrust CloudControl is virtual and private cloud security software that provides users with access control, forensic logging tools and policy enforcement functionality. The platform protects the user’s hypervisor through automated security and compliance in VMware environments, provides visibility into and control of the environment, and provides users with security and policy enhancements without impacting the user’s GUI.

Crossmatch DigitalPersona

DigitalPersona is web security software that provides companies with a flexible range of authentication factors designed to determine if access is granted to laptops, applications and workflows both local and in the cloud. The platform utilizes composite authentication, is equipped with dynamic risk-based policies that adapt to threats, and ensures that security measures are optimized for every app, every user and every location that the system is accessed.

FireEye Network Security

FireEye Network Security is cyber-attack protection software designed to defend the user’s network, data and users. The platform detects and stops attacks, is equipped with the signature-less Multi-Vendor Virtual Execution (MVX) engine, and provides users with Intelligence-Driven Analysis technology that identifies and blocks both known and unknown threats.

CipherCloud Platform

CipherCloud Platform is cloud security software that provides users with a complete CASB solution designed to eliminate threats, protect data, and provide visibility. The platform is equipped with adaptive policy controls, and protects against Shadow IT, user accidents, malicious threats, hackers, and account hijacking.

– Symantec Blue Coat Data Loss Prevention

Blue Coat Data Loss Prevention (DLP) delivers web security, Wide Area Network (WAN) Optimization and cloud service security to businesses that have mobile and web-based components that are exposed to online threats.

CloudPassage Halo

CloudPassage Halo, the award-winning cloud security platform, bridges the gap between traditional perimeter-oriented data center security and security in dynamic cloud environments.

The Top Four Email Security Threats – And How to Avoid Them

Get an overview of some of the most common email security threats, and a summary of how today’s email security technology solutions can help prevent them.