archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • IMB Security Systems - Data Security Solutions
    IBM Security Systems has capabilities across the 4 dimensions people data applications and infrastructure Any other vendor who claims that today is really stretching the truth There s an amazing layer of intelligence across IBM s Security Systems coverage of these 4 dimensions that allows you to do intelligence analytics and Governance Risk and Compliance Bringing IBM s security software and hardware products into one unified team enables IBM and IBM s Business Partners such as Data Security Solutions to develop the integrated strategy and roadmap needed in today s world of ever increasing security complexity We are building our team of technology vendor and system s integrator to provide a single voice of IBM security for the client and to support the CISO in developing the secure and efficient operational environments that they envision IBM Security framework With more than 6 000 researchers developers and subject matter experts engaged in security initiatives IBM operates one of the world s broadest enterprise security research development and delivery organizations This powerful combination of expertise is made up of the award winning X Force research and development team with one of the largest vulnerability databases in the industry and includes nine security operations centers nine IBM Research centers 14 software security development labs and the IBM Institute for Advanced Security with chapters in the United States Europe and the Asia Pacific region IBM currently monitors more than 13 billion security events per day for its clients in more than 130 countries IBM has the consultants and expertise to help any organization move toward optimized integrated security controls with Security Intelligence So whether your risks are due to advanced threats mobile access cloud infrastructure compliance issues or you re looking to analyze big data for security insights the tools and expertise from IBM

    Original URL path: http://dss.lv/en/razotaji/imb-security-systems/30/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    of advanced threats as well as meets current and emerging compliance mandates Official webpage QRadar s Next Generation SIEM is the most intelligent integrated and automated SIEM system in the industry What sets QRadar SIEM apart is its unrivaled platform architecture that delivers Unified turnkey deployments and more efficient administration and management Distributed correlation that allows for billions of logs and records to be monitored per day Single log archival capacity ensures seamless reporting and comprehensive searching within SIEM system Centralized command and control reduces security management solution acquisition costs and improves IT efficiency Advanced threat and security incident detection that both reduces the number of false positives and detects threats that other solutions miss Compliance centric workflow that enables the delivery of IT best practices that support compliance initiatives Distributed appliance architecture scales to provide log management in any enterprise network Security Intelligence Integrating across IT silos Total intelligence and visibility First generation SIEM technology was designed to monitor traditional security telemetry and reduce the data collected to a subset of suspected security incidents through rules and data correlation This traditional approach to a SIEM system delivers visibility into servers hosts and security systems but lacks the ability to collect from all possible sources or efficiently distinguish between true threats and false alarms As the only SIEM solution designed from the ground up to deliver the benefits of next generation SIEM technology QRadar SIEM dramatically expands visibility into network activity virtual activity user activity and application activity giving network security professionals unprecedented intelligence into potential offense sources across their entire network QRadar correlates log data from the security and network infrastructure in the context of network activity in order to detect incidents that other products miss and to accurately prioritize incidents Total intelligence also includes being able to provide

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/security-intelligence/8/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    an intuitive user interface that integrates previously disparate indicators of risk including configuration data network activity data network and security events and vulnerability scan results A comprehensive out of the box library of industry specific policy templates helps assess risk across multiple regulatory mandates and network security best practices such as PCI HIPAA CoCo and ISO 27001 among many others In addition the templates are easily extended to align with an organization s internal network security policies Simplified multi vendor configuration audits With QRadar Risk Manager organizations can begin to introduce consistency across network and security configuration through automated configuration collection analysis and alerting QRadar Risk Manager provides automated configuration audit across an organization s multi vendor switches routers firewalls and IDS IPS Key configuration audit capabilities include A unique ability to normalize multi vendor device configuration QRadar Risk Manager provides a detailed and intuitive assessment of how devices are configured including defined firewall rules security policy and network hierarchy and maintain a history of configuration changes audit configuration rules on a device and compares this across devices Centralized history of enterprise wide configuration changes Leveraging this feature users can easily audit configurations across a multi vendor network with historical context This powerful capability makes it easier to compare normalized device configurations from a single device or from different devices and is instrumental in building an enterprise wide representation of a network s topology Topology mapping that provides greater clarity of allowed and denied activity across the entire network which results in improved consistency of device configurations reduced risk of mis configurations and a better understanding of the impact of configuration changes Advanced security modeling and simulations QRadar Risk Manager s Advanced Modeling and Simulation feature leverages the broad array of risk indicators which helps network security professionals prioritize their most significant areas of risk Key modeling and simulation features include The ability to quickly understand the risk impact of proposed changes to a network s configuration before the changes are implemented on the actual network greatly minimizing the time to roll out new applications and services Analysis of VA scan results in conjunction with active network topology profiling provides a unique prioritization of the most vulnerable systems Reporting that not only summarizes which assets have vulnerabilities but also exposes those assets that are vulnerable due to network configurations resulting in improved operational efficiency and security Powerful network security visualization QRadar Risk Manager offers two network visualization tools that provide unique risk focused graphical representations of the network s configurations Both visualization tools offer network and security professionals a revolutionary investigative capacity by providing before during and after vulnerability information Key visualization features include A comprehensive network topology tool that provides detailed views into how network traffic can or is traversing your network A powerful Connection Monitor tool which provides fast and efficient investigation of network activity Integrated network mappings add value by enabling network security professionals to assess when traffic can or is occurring to or from specific geographic

    Original URL path: http://dss.lv/en/pakalpojumi/security-management/siem-based-risk-management/10/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    identify application vulnerabilities but also reduce overall application risk The IBM Security AppScan portfolio includes dynamic application security testing DAST and static application security testing SAST as well as innovative technologies like glass box testing and run time analysis that keep up with the latest threats and drive precise actionable results IBM Security AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities offering intelligent fix recommendations to simplify remediation IBM Security AppScan Enterprise software offers advanced application security testing and risk management with a platform that drives governance collaboration and security intelligence throughout the application life cycle With this strategic approach to application security and risk management IBM Security AppScan Enterprise provides Scalable enterprise architecture that enables scanning of multiple applications simultaneously Correlation of results discovered using dynamic and static analysis techniques Glass box testing a form of IAST run time analysis that applies an internal agent to monitor application behavior during a dynamic test providing more accurate test results and identify specific lines of code Ability to scan Web sites for both embedded malware and links to malicious or undesirable sites to ensure your Web site is not infecting visitors or directing them to unwanted or dangerous sites without their knowledge Ability to test Web services Advisories fix recommendations and built in training videos to facilitate the process of remediation once security vulnerabilities have been identified and validated Issue management capabilities and integration with Defect Tracking Systems Enterprise level reporting which provides visibility of the security and compliance risk associated with the identified security issues Performance metrics and trending that give Management an overview of the progress being made Flexible detailed security issues reports that enable users to group and organize their report data in multiple ways Over 40 out of the box security compliance reports

    Original URL path: http://dss.lv/en/pakalpojumi/application-security/application-security/18/ (2013-11-15)
    Open archived version from archive

  • InfoWatch - Data Security Solutions
    to local pan Baltic market InfoWatch InfoWatch delivers customers packaged solutions to control their information flow and gather evidence in case of litigation forensics as well as provides high quality result driven information security audit and consulting services InfoWatch solutions have been successfully implemented and are being used by leading international and Russian companies and governmental institutions The company was founded in 2003 as a spin off of Kaspersky Lab subsequently acquired its first clients in 2004 and in the recent years has matured into a dynamically growing independent enterprise which currently remains amongst the top leaders on the global software market InfoWatch group of companies includes several organizations working in the sphere of information security corporate information security and linguistic analysis namely InfoWatch Kribrum and EgoSecure Businesses and government agencies rely on InfoWatch solutions when they make a strategic decision on being aware of the business related information flows within the organization and even outside its boundaries InfoWatch software products comprise a set of carefully optimized technologies to help our customers address their multiple business needs Safeguard essential information against unauthorized access and distribution and prevent data loss Protect intellectual property Mitigate information related risks Enable compliance with regulative

    Original URL path: http://dss.lv/en/razotaji/infowatch/10/ (2013-11-15)
    Open archived version from archive

  • Ipoque - Data Security Solutions
    s 1 and most innovative technologies from all across the globe to help companies of all sizes protect their IT security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market Ipoque ipoque is the leading European provider of deep packet inspection DPI solutions for Internet traffic management and analysis We deliver intelligent Internet traffic management solutions in over 60 countries around the world Learn more about what we do and the people behind the company Our application classification and analysis engine enables bandwidth and congestion control prioritized quality of service delivery and detailed network visibility ipoque was founded in 2005 in Leipzig Germany and has become a Rohde Schwarz company in 2011 Fast Internet thrives innovation ipoque s deep packet inspection solutions help network operators to efficiently manage their network Our portfolio of products spans from Internet traffic management network visibility policy enforcement to the integration of our deep packet inspection engine All of ipoque s solutions aim to optimize network resources and increase customer satisfaction in the end List of manufacturers AirTight Networks BalaBit Vasco Cellcrypt Centrify ForeScout IMB Security Systems InfoWatch Ipoque Lumension McAfee MobileIron Radware PGP SecPoint Proofpoint SpectorSoft

    Original URL path: http://dss.lv/en/razotaji/ipoque/11/ (2013-11-15)
    Open archived version from archive

  • Lumension - Data Security Solutions
    on world s 1 and most innovative technologies from all across the globe to help companies of all sizes protect their IT security assets Specialization of DSS for many years has been transfer of innovations to local pan Baltic market Lumension Proactive Endpoint Management IT Security and Compliance Today s global economic and IT security environment presents organizations with the constant challenge of increasing operational efficiency while also managing critical risk protecting vital information demonstrating compliance with regulatory and industry standards The dramatic increase of insider threats to sensitive data explosive growth of malware and targeted attacks and strict enforcement of security and operations standards mean organizations must focus on TCO and effective risk management while still investing in their strategic security initiatives Lumension s portfolio of solutions addresses these economic and security challenges by delivering endpoint and data protection with proactive risk management The result is improved security risk mitigation and audit readiness at a lower investment of operational resources time and money Device Control Application Whitelisting Endpoint Management Suite Risk Compliance Mangement List of manufacturers AirTight Networks BalaBit Vasco Cellcrypt Centrify ForeScout IMB Security Systems InfoWatch Ipoque Lumension McAfee MobileIron Radware PGP SecPoint Proofpoint SpectorSoft Protected Networks Symantec

    Original URL path: http://dss.lv/en/razotaji/lumension/13/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    used by employees to improve access and transfer of information Analysts estimate that nearly 4 billion USB enabled devices will ship in 2012 3 And these devices are the most common data leakage routes no file copy limits no encryption no audit trails and no central management And as more users depend on USB and portable devices to store and move data the more tantalizing a target these devices are to cybercriminals looking for new paths into large networks According to researchers as many as one in four malware attacks 4 is carried out through a USB device with recent examples including Stuxnet and Conficker To ensure that productivity is maintained or even improved without the risk of data loss or introduction of malware a centralized solution is needed that automates the discovery of devices defines and enforces device use and data encryption policies by user group and provides detailed forensic information to track data events Lumension Device Control enforces flexible usage policies for removable devices removable media and data such as read write encryption that enable organizations to embrace productivity enhancing tools while limiting the potential for data leakage and its impact With Lumension Device Control you can Enable productivity and reduce insider risk by centrally managing security policies regarding the use of removable devices e g USB flash drives and media e g DVDs CDs through a flexible device whitelist approach Software Demo Securing Your USB Flash Drives Ensure data is encrypted and secure when on removable devices media using FIPS 140 2 Level 2 validated cryptography module Prevent malware intrusion via removable devices media adding a layer of protection to your network Ensure protection whether or not endpoints are connected to the network Provide the visibility forensics and reporting needed to demonstrate compliance with applicable laws via patented bi directional shadowing Leverage a seamless layer of protection within a defense in depth strategy via the integration with Lumension Endpoint Management and Security Suite Identify all removable devices connected to your endpoints using the audit mode which allows you to collect information without disrupting productivity Create rules at both default and machine specific levels for groups and individual users with regards to device access by class model and or specific ID and uniquely identify and authorize specific media These permissions can be linked to the user and user group information stored in Microsoft Active Directory Continuously observe the effectiveness of device and data usage policies in real time and identify potential security threats by logging all device connections and tracking all file transfers by file name and content type You can even keep a copy of every file that is transferred to or from a removable device using our patented bi directional shadowing technology Implement device and data usage policies by file copy limitations amount per day time of day and file type filtering You can also enforce the encryption of data moved onto removable devices media and apply permissions to specific and or groups of endpoints ports

    Original URL path: http://dss.lv/en/pakalpojumi/endpoint-security/device-control/19/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-16