View
Sorting
From A to Z
Products found: 5
Fortify WebInspect
- Most comprehensive and accurate dynamic scanning tool. Seamlessly crawl modern frameworks and web technology. Use dynamic analysis to show exploitability of web application and web server vulnerabilities.
- Automation and enterprise workflow integration. Fully automated solution that helps meet DevOps and scalability needs. Integrates with the SDLC without additional overhead.
- Available on-premise, as a service or in hybrid. Start on-premise or as a service and expand according to your business needs. Manage DAST on-premise and as a service program centrally.
- Compliance management. Pre-configured policies and reports for all major compliance regulations related to web application security, including PCI DSS, DISA STIG, NIST 800-53, ISO 27K, OWASP, and HIPPAA.
- Manage enterprise application security risk. Manage application security risk and create reports for remediation and for management oversight. Monitor trends and use dynamic analysis to take action on vulnerabilities within an application.
- Optimize scan results with agent technology. Get additional visibility and stack trace insight from scanned web applications. Optimize the scanning process based for both speed and accuracy using this technology.
-
-
ROI-
-
12
14
Micro Focus ESM
Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.
Categorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.
Improve incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.
Rapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.
Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process.
Categorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats.
Improve incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most.
Rapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface.
Accelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations.
Automatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.
Micro Focus Secure Gateway
Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system.
The Problem
Inappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:
- Sexual harassment lawsuits
- Criminal charges
- A hostile work environment
- Reputation damage
- A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email
- An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)
-
-
ROI-
-
13
4
Micro Focus Security ArcSight User Behavior Analytics (UBA)
Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster. Micro Focus User behavior Analytics helps you with:
- Lowering the risk and impact of cyber attacks
- Detect unusual behavior by correlating user identity management with rest of the IT logs from apps and network
- Achieve faster event resolution to identified threats through deeper integration with SIEM
- Quick forensics investigation UBA analyzes user related data looking for threats in comparison to peers, historical activity, and/or violations of predefined expected behavior.
-
-
ROI-
-
17
1
uft
Features:
- Cross-browser and multi-platform
- Optimized distributed testing
- Visual test flows (canvas)
- Multi-testing solution
- Image-based object recognition
-
-
ROI-
-
9
4
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.