CyberInt's Automated Cybersecurity Readiness Platform Helps Optimize your Cyber-attack Resilience by Constantly Searching for Potential Gaps in your Defenses. Every organization's ability to defend itself varies according to its unique footprint of internal processes, decision-making, technologies, employee behavior and mentality - and this picture changes dynamically over time.
Atriceps, Inc. is a new software as a service company started to fix broken communications. We advance existing & emerging comms with security, classification & certainty to improve efficiency and lower IT costs. Our current focus is helping IT service providers dissatisfied with the status quo and the lack of attention in preventing waylaid correspondence.
We are pioneers of the Security Visualization field. For over a decade it has been our mission to help users gain quick insights into their data. We are known for developing open source solutions, such as DAVIX (Data Analysis and Visualization Linux) or AfterGlow, one of the most downloaded security visualizations tools.
DLP MEETS User Behavior ANALYTICS (UEBA) harvest.ai's MACIE™ Analytics provides the confidence and dependability in protecting your business's most important assets, protecting user accounts from compromise and preventing theft of data and intellectual property.
Security Mentor training is available as a service from Security Mentor's website or as SCORM-compliant lessons hosted on your internal, corporate Learning Management System (LMS). Either way, lesson progress and completion is tracked and reported. See for yourself why Security Mentor's trainees say "great, loved it."
By inventing and patenting unified threat management technology, DeepNines' products enable unparalleled protection and control of ports, protocols, users, applications and content at firewall speed. DeepNines' gateway products leverage the power to protect, control and manage inbound and outbound Internet traffic, empowering enterprises and institutions to secure their networks deep-into-the-nines.
OWA Desktop gives users complete control over OWA sessions with real time alerts and advanced one-click features. Advanced server authentication security to protect Outlook Web App users and businesses from a variety of logon and password attacks, and real-time reporting and alerts of suspicious OWA logon activity.
The CorreLog system is designed to support a major role in monitoring for security compliance. Our system directly supports multiple standards that have been formulated for the protection of you and your customers.
The flagship LetMobile product, Secure Mobile Email, is an easy-to-implement, frictionless solution for protecting corporate mail, attachments, calendars and contacts on any mobile phone or tablet. Designed to secure both personal and corporate devices, LetMobile enables employees to view email from the native mobile apps while keeping corporate data and login credentials safe.
Protecting data starts with being able to identify it, and understanding the way it behaves. MinerEye offers solutions to automatically identify, classify and track your most sensitive data. It leverages your e-discovery, access management, data loss prevention and your cloud access security brokers by focusing their activities on the relevant data they cannot see.