View

Sorting

Products found: 5

logo
Offer a reference bonus
1.00

Fortify WebInspect

  • Most comprehensive and accurate dynamic scanning tool. Seamlessly crawl modern frameworks and web technology. Use dynamic analysis to show exploitability of web application and web server vulnerabilities.
  • Automation and enterprise workflow integration. Fully automated solution that helps meet DevOps and scalability needs. Integrates with the SDLC without additional overhead.
  • Available on-premise, as a service or in hybrid. Start on-premise or as a service and expand according to your business needs. Manage DAST on-premise and as a service program centrally.
  • Compliance management. Pre-configured policies and reports for all major compliance regulations related to web application security, including PCI DSS, DISA STIG, NIST 800-53, ISO 27K, OWASP, and HIPPAA.
  • Manage enterprise application security risk. Manage application security risk and create reports for remediation and for management oversight. Monitor trends and use dynamic analysis to take action on vulnerabilities within an application.
  • Optimize scan results with agent technology. Get additional visibility and stack trace insight from scanned web applications. Optimize the scanning process based for both speed and accuracy using this technology.
WebInspect automation workflows WebInspect automation workflows use build automation tools to manage the dynamic scanning ecosystem, including QA testing and cloud deployments.  Dynamic analysis (DAST), combined with static analysis (SAST), provides more thorough coverage, but automating dynamic is more complex. You can either build your own tech stack, or borrow a framework. This guide helps you accelerate your automation by using existing test automation scripts/frameworks that other enterprises have already created as part of their DevOps practices.
... Learn more
-
-
ROI-
-
12
14
logo
Offer a reference bonus
2.30

Micro Focus ESM

Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process. Categorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats. Improve incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most. Rapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface. Enriches the data with user and asset information, giving you the situational/content awareness you need to make informed decisions during investigation and to accelerate the remediation process. Categorization and normalization of data helps you quickly identify situations that require investigation or immediate action helping you focus your attention on most urgent, high risk threats. Improve incident response time from days to minutes with the most intelligent correlation engine in the industry. It filters out irrelevant noise while zeroing in on threats that matter most. Rapidly search terabytes of data using a simple search interface. Enables needle-in-the-haystack queries of both active and historical data with a simple search interface. Accelerate your SIEM deployment with a large library of predefined security use cases and compliance automation and reporting tools that are the cornerstone of building Security Operations. Automatically or manually escalate events to the right people in the right time frame. The robust workflow framework comes with built in case management and can integrate with your existing systems.
... Learn more
-
ROI-
-
1
10
logo
Offer a reference bonus
1.00

Micro Focus Secure Gateway

Micro Focus Secure Gateway monitors and blocks illicit and inappropriate images, videos on your messaging system. This solution is an add-on for Micro Focus Secure Gateway that scans the actual composition of images and videos to ensure accuracy. Its sophisticated probability engine scans incoming and outgoing images, reliably distinguishes between pornographic and non-pornographic content, and stops the inappropriate content from entering or leaving your messaging system. The Problem Inappropriate email communications, including pornography and other explicit content, continue to be a major problem in many organizations. This content is often found in unsolicited spam, but it is more commonly generated from employee communications, both inside and outside of the workplace. If these messages go unchecked, organizations could face a number of devastating consequences that can cost time and money:
  • Sexual harassment lawsuits
  • Criminal charges
  • A hostile work environment
  • Reputation damage
The Micro Focus Solution Organizations must address this inappropriate behavior through corporate policies and through the use of technology. Secure Gateway gives you the ability to monitor and block pornographic images, which addresses the primary issue of inappropriate communications. Secure Gateway screens images before they pass through your email system and takes action when offensive material is detected. It uses sophisticated analytical processes consisting of multiple detection methods to reliably distinguish between pornographic and non-pornographic content, without having to rely on a signature database of pre-categorized content. These processes ensure that pornography is prevented from entering or leaving your messaging system. CONFIGURE IMAGE ANALYSIS AUDITING Follow these instructions to set Secure Gateway into an audit mode. In audit mode, you will locate the images that are passing through your email system. You can use audit mode without interfering with the mail flow. PREREQUISITES To use Secure Gateway, you must have the following items:
  • A pre-installed Micro Focus Secure Gateway server that is configured and actively scanning email
  • An Secure Gateway license key. Either a full license or trial key will work. (Contact your Micro Focus representative for your evaluation key)
... Learn more
-
-
ROI-
-
13
4
logo
Offer a reference bonus
1.00

Micro Focus Security ArcSight User Behavior Analytics (UBA)

Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. Micro Focus User Behavior Analytics gives enterprises visibility into their users, making it much easier for them to gain information on behavior patterns to help mitigate threats. It helps detect and investigate malicious user behavior, insider threat and account misuse. Therefore, it enables organizations to detect breaches before significant damage occurs by finding the adversary faster. Micro Focus User behavior Analytics helps you with:
  • Lowering the risk and impact of cyber attacks
  • Detect unusual behavior by correlating user identity management with rest of the IT logs from apps and network
  • Achieve faster event resolution to identified threats through deeper integration with SIEM
  • Quick forensics investigation UBA analyzes user related data looking for threats in comparison to peers, historical activity, and/or violations of predefined expected behavior.
... Learn more
-
-
ROI-
-
17
1
logo
Offer a reference bonus
1.00

uft

Features:
  • Cross-browser and multi-platform
UFT provides real device testing on top mobile platforms (iOS, Android, and Windows), across top browsers (Chrome, Firefox, Internet Explorer, and Safari), and a wide range of technologies.
  • Optimized distributed testing
UFT is engineered to facilitate distributed test execution of multiple tests simultaneously. This is core to the speed and execution of test automation for a testing center of excellence (TCoE).
  • Visual test flows (canvas)
API and GUI tests are displayed on a graphical canvas where testers can efficiently manage actions,change test order, run and debug tests, and manage parameters.
  • Multi-testing solution
UFT's new execution engine allows you to run distributed tests on multiple machines, mobile devices, and servers (real and virtual) without the need for the full UFT license.
  • Image-based object recognition
To learn objects as a human would, through the way they look on the screen, enabling testing to keep up with controls that are not supported out of the box.
... Learn more
-
-
ROI-
-
9
4

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.