Categories
» Application Development
|
| » BI/Business Management
|
| » Cloud Computing
|
| » Compliance
|
| » Computing |
| » e-Business
|
| » Horizontal Markets
|
| » Infrastructure
|
| » Other |
| » Outsourcing
|
| » Security
|
| » Vertical Markets
|
|
| New Search
Search Results: | Security
» Security Systems | 9 Product(s) Found. |
|
|
|
(ISC)² |
(ISC)2 CSSLP |
For software developers, the CSSLP® certification from (ISC)² validates an individual’s application security competency within the software development lifecycle (SDLC). CSSLP professionals are not only seen as industry leaders in application security, but also as leaders within their organizations. A CSSLP professional benefits from proficiency in:
• Developing an application security program in their organization
• Reducing production costs, application vulnerabilities and delivery delays
• Enhancing the credibility of their organization and its development team
• Reducing loss of revenue and reputation due to a breach resulting from insecure software
The Certified Secure Software Lifecycle Professional (CSSLP) is for everyone involved in the SDLC with at least 4 years of cumulative paid full-time work experience in one or more of the eight domains of the CSSLP CBK. Learn more at https://www.isc2.org/csslp/default.aspx.
Last Updated: 02/12/14
|
Category: Security
» Security Systems |
Contact: Marketing Email: csslpsupportteam@isc2.org | Phone: 866-462-4777 URL: http://www.isc2.org |
View More Detail or Request Additional Information |
View All (ISC)² Listings |
|
|
|
| | |
|
|
CData Software |
CData Sync |
CData Sync is a universal data pipeline that
delivers automated continuous replication
between hundreds of SaaS applications &
cloud data sources and any database & data
warehouse of consequence, on-premise or in
the cloud.
Replicate data from 150+ popular enterprise
data sources, including:
* Salesforce
* Microsoft Dynamics CRM
* Microsoft SharePoint
* NetSuite CRM & ERP
* QuickBooks Online
* Service Now
* Xero Accounting
* Intacct
* HubSpot
* Marketo
* Oracle Marketing Cloud
* And More
Right into popular database destinations,
such as SQL Server, Redshift, S3, Snowflake,
BigQuery, and many more!
Configuring replication is easy: login, select
the data tables to replicate, and select a
replication interval. Done. CData Sync
extracts data iteratively, causing minimal
impact on operational systems by only
querying and updating data that has been
added or changed since the last update.
CData Sync offers the utmost flexibility, with
simple point and click ETL / ELT processing,
bulk/batch data loading, and broad support
for full and partial replication scenarios.
Support all your data warehousing initiatives
and ensure that critical data is stored safely,
accurately in your cloud database of choice.
Simplify ETL/ELT — CData Sync eliminates the
need for custom script management and
enables you to unify all of your automated
data synchronizations in one place.
Download a 30-day free trial of CData Sync or
learn more at: www.cdata.com/sync
Last Updated: 04/14/20
|
Category: Security
» Security Systems |
Contact: Alex Pauncz Email: marketing@cdata.com | Phone: 8002357250 URL: https://www.cdata.com/sync/ |
View More Detail or Request Additional Information |
View All CData Software Listings |
|
|
|
|
|
Metaforic |
Metaforic Core |
Metaforic Core™ software analyzes code both statically and dynamically, then automatically injects an optimized schema of various software antibodies into a copy of the source code, which developers then compile and build as normal. Developers never have to interact with the immune system; it is part of the automated build process.
Metaforic Core provides the foundation for all Metaforic software protection; it is a prerequisite for additional Metaforic capabilities:
• Metaforic Authenticator™– Ensures an application is in constant communication with an authentication device or cloud service.
• Metaforic Concealer™– Hides sensitive data and obfuscates sensitive code.
• Metaforic Enhanced Integrator™– Facilitates easy deployment into complex build environments.
Last Updated: 07/05/12
|
Category: Security
» Security Systems |
| |
View More Detail or Request Additional Information |
View All Metaforic Listings |
|
|
|
|
|
Ukrainian National Information Systems (UNIS) |
Our Products |
UNIS’ product line falls into three categories:
• automation
• data security
• integrated embedded complexes
UNIS has designed and applied an entire array of automated systems that can be applied to various aspects of a company’s business processes.
Our design covers all the phases of system development:
• design of the project architecture;
• development of the relevant software;
• building of hardware components;
• personnel training and client support.
An example of a complex, fully-automated system is the UNIS-proprietary “AScpr” Automated System for cell phone registration).
This system, built by government contract, automatically registers all imported cell hones, so as to prevent contraband trade in Ukraine.
The system is designed for maximum reliability. The use of cluster technologies on all levels allows for uninterrupted operation 24/7.
A few specifics:
• number of IMEI codes in the system: 119 million.
• number of SMS and WEB queries processed daily: 300,000.
• time spent on processing a single query: less than 0.05 seconds.
Despite their complexity, neither of our automated and secure systems has even countered a single breach or breakdown in operations.
UNIS is continuously researching and developing methods of data encryption. We have developed several unique methods of encryption, such as:
• distribution of encryption keys, based on elliptic curves;
• initialization of a random sequences generator.
Our research has yielded the following unique software products:
• a cryptographic data protection utility for use in automated systems;
• a hardware-software certification authority solution.
UNIS has developed a software utility for use as a component of automated systems for cryptographic data transformations.
This utility provides for the following possibilities:
• the use of electronic digital signatures;
• the use of Certificate Revocation Lists (CRL);
• the use of TSP and OCSP services.
Our certification authority solution is designed to carry out regulated procedures and to service our client’s public key certificates. This product, which employs an integrated hardware-software solution, can automatically generate, block, invalidate and/or renew digital certificates, publish timely information regarding the certificate’s status and provide time stamping services.
In addition to strictly software-based solutions, UNIS also develops embedded solutions of encryption with a separate software component. These modules are distinguished by a higher level of security of information and may be utilized in various ways, for example as a component of a computer system. Last Updated: 01/08/13
|
Category: Security
» Security Systems |
Contact: Roman Zvarych Email: roman@ukrainesystems.com | Phone: 380 44 253-2950 URL: http://www.ukrainesystems.com |
View More Detail or Request Additional Information |
View All Ukrainian National Information Systems (UNIS) Listings |
|
|
|
|
|
Ukrainian National Information Systems (UNIS) |
ARGOS |
“ARGOS” – a data encryption system that connects with a computer through a USB interface, so that all cryptographic data transformations take place inside the microprocessor, which, in turn, eliminates the possibility that the secret key may be copied, or that the data may be captured by spy software.
Some product features:
• data encryption;
• calculation of hash-functions;
• electronic signature verification;
• random sequences generation
(with the use of an internal hardware noise generator);
• unauthorized access protection. Last Updated: 01/08/13
|
Category: Security
» Security Systems |
Contact: Roman Zvarych Email: roman@ukrainesystems.com | Phone: 380 44 253-2950 URL: http://www.ukrainesystems.com |
View More Detail or Request Additional Information |
View All Ukrainian National Information Systems (UNIS) Listings |
|
|
|
| |
|
Wibu-Systems |
CodeMeter Licensing, Software and IP Protection Platform |
CodeMeter is a secure platform for license
management, IP protection, and anti-piracy.
The patented technology provides ISVs and
embedded device manufacturers with a full
suite of tools for creating and managing
licenses for desktop, SaaS, and cloud-based
applications. CodeMeter protects software
and digital assets against piracy, tampering,
and reverse engineering with both hardware
and software based solutions. Last Updated: 03/30/16
|
Category: Security
» Security Systems |
Contact: Terry Gaul Email: terry.gaul@wibu.us | Phone: 425 775 6900 URL: http://www.wibuusa.com |
View More Detail or Request Additional Information |
View All Wibu-Systems Listings |
|
|
|
| |
| |