Software Magazine
Subscriber Login    Vendor Login

Welcome to Software Magazine 's source for vendor information

    Help
Categories

New Search

Search Results: Security » Security Systems 9 Product(s) Found.

Sort By
1
(ISC)²

(ISC)²

(ISC)2 CSSLP

For software developers, the CSSLP® certification from (ISC)² validates an individual’s application security competency within the software development lifecycle (SDLC). CSSLP professionals are not only seen as industry leaders in application security, but also as leaders within their organizations. A CSSLP professional benefits from proficiency in: • Developing an application security program in their organization • Reducing production costs, application vulnerabilities and delivery delays • Enhancing the credibility of their organization and its development team • Reducing loss of revenue and reputation due to a breach resulting from insecure software The Certified Secure Software Lifecycle Professional (CSSLP) is for everyone involved in the SDLC with at least 4 years of cumulative paid full-time work experience in one or more of the eight domains of the CSSLP CBK. Learn more at https://www.isc2.org/csslp/default.aspx. Last Updated: 02/12/14
Category: Security » Security Systems
Contact: Marketing
Email: csslpsupportteam@isc2.org
Phone: 866-462-4777
URL: http://www.isc2.org
View More Detail or Request Additional Information
View All (ISC)² Listings
 

Bomgar

Bomgar Privileged Access Management

Last Updated: 03/09/16
Category: Security » Security Systems

Phone: 877-596-3065
URL: www.bomgar.com
View More Detail or Request Additional Information
View All Bomgar Listings
 

Bomgar

Bomgar Remote Support

Last Updated: 03/09/16
Category: Security » Security Systems

Phone: 877-596-3065
URL: www.bomgar.com
View More Detail or Request Additional Information
View All Bomgar Listings
 
CData Software

CData Software

CData Sync

CData Sync is a universal data pipeline that delivers automated continuous replication between hundreds of SaaS applications & cloud data sources and any database & data warehouse of consequence, on-premise or in the cloud. Replicate data from 150+ popular enterprise data sources, including: * Salesforce * Microsoft Dynamics CRM * Microsoft SharePoint * NetSuite CRM & ERP * QuickBooks Online * Service Now * Xero Accounting * Intacct * HubSpot * Marketo * Oracle Marketing Cloud * And More Right into popular database destinations, such as SQL Server, Redshift, S3, Snowflake, BigQuery, and many more! Configuring replication is easy: login, select the data tables to replicate, and select a replication interval. Done. CData Sync extracts data iteratively, causing minimal impact on operational systems by only querying and updating data that has been added or changed since the last update. CData Sync offers the utmost flexibility, with simple point and click ETL / ELT processing, bulk/batch data loading, and broad support for full and partial replication scenarios. Support all your data warehousing initiatives and ensure that critical data is stored safely, accurately in your cloud database of choice. Simplify ETL/ELT — CData Sync eliminates the need for custom script management and enables you to unify all of your automated data synchronizations in one place. Download a 30-day free trial of CData Sync or learn more at: www.cdata.com/sync Last Updated: 04/14/20
Category: Security » Security Systems
Contact: Alex Pauncz
Email: marketing@cdata.com
Phone: 8002357250
URL: https://www.cdata.com/sync/
View More Detail or Request Additional Information
View All CData Software Listings
 
Metaforic

Metaforic

Metaforic Core

Metaforic Core™ software analyzes code both statically and dynamically, then automatically injects an optimized schema of various software antibodies into a copy of the source code, which developers then compile and build as normal. Developers never have to interact with the immune system; it is part of the automated build process. Metaforic Core provides the foundation for all Metaforic software protection; it is a prerequisite for additional Metaforic capabilities: • Metaforic Authenticator™– Ensures an application is in constant communication with an authentication device or cloud service. • Metaforic Concealer™– Hides sensitive data and obfuscates sensitive code. • Metaforic Enhanced Integrator™– Facilitates easy deployment into complex build environments. Last Updated: 07/05/12
Category: Security » Security Systems


View More Detail or Request Additional Information
View All Metaforic Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

Our Products

UNIS’ product line falls into three categories: • automation • data security • integrated embedded complexes UNIS has designed and applied an entire array of automated systems that can be applied to various aspects of a company’s business processes. Our design covers all the phases of system development: • design of the project architecture; • development of the relevant software; • building of hardware components; • personnel training and client support. An example of a complex, fully-automated system is the UNIS-proprietary “AScpr” Automated System for cell phone registration). This system, built by government contract, automatically registers all imported cell hones, so as to prevent contraband trade in Ukraine. The system is designed for maximum reliability. The use of cluster technologies on all levels allows for uninterrupted operation 24/7. A few specifics: • number of IMEI codes in the system: 119 million. • number of SMS and WEB queries processed daily: 300,000. • time spent on processing a single query: less than 0.05 seconds. Despite their complexity, neither of our automated and secure systems has even countered a single breach or breakdown in operations. UNIS is continuously researching and developing methods of data encryption. We have developed several unique methods of encryption, such as: • distribution of encryption keys, based on elliptic curves; • initialization of a random sequences generator. Our research has yielded the following unique software products: • a cryptographic data protection utility for use in automated systems; • a hardware-software certification authority solution. UNIS has developed a software utility for use as a component of automated systems for cryptographic data transformations. This utility provides for the following possibilities: • the use of electronic digital signatures; • the use of Certificate Revocation Lists (CRL); • the use of TSP and OCSP services. Our certification authority solution is designed to carry out regulated procedures and to service our client’s public key certificates. This product, which employs an integrated hardware-software solution, can automatically generate, block, invalidate and/or renew digital certificates, publish timely information regarding the certificate’s status and provide time stamping services. In addition to strictly software-based solutions, UNIS also develops embedded solutions of encryption with a separate software component. These modules are distinguished by a higher level of security of information and may be utilized in various ways, for example as a component of a computer system. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

ARGOS

“ARGOS” – a data encryption system that connects with a computer through a USB interface, so that all cryptographic data transformations take place inside the microprocessor, which, in turn, eliminates the possibility that the secret key may be copied, or that the data may be captured by spy software. Some product features: • data encryption; • calculation of hash-functions; • electronic signature verification; • random sequences generation (with the use of an internal hardware noise generator); • unauthorized access protection. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

AMON

“AMON” – a voice flow encryption system, designed for the encryption of voice flow. This unique product can be used for the creation of a secure channel for audio communication between a group of users in a GSM network. The odds of encountering a breach in such a communication link are about one in a trillion. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 

Wibu-Systems

CodeMeter Licensing, Software and IP Protection Platform

CodeMeter is a secure platform for license management, IP protection, and anti-piracy. The patented technology provides ISVs and embedded device manufacturers with a full suite of tools for creating and managing licenses for desktop, SaaS, and cloud-based applications. CodeMeter protects software and digital assets against piracy, tampering, and reverse engineering with both hardware and software based solutions. Last Updated: 03/30/16
Category: Security » Security Systems
Contact: Terry Gaul
Email: terry.gaul@wibu.us
Phone: 425 775 6900
URL: http://www.wibuusa.com
View More Detail or Request Additional Information
View All Wibu-Systems Listings
 
1
New Search
Send to Friend