Hot products from RSA 2011

| | Comments

Share

Next Prev
Next Prev yah

Network Intrusion Prevention System GX7800

Network IPS GX7800 runs at 20Gbps, so it is suitable for the largest networks and busiest environments such as data centers. In addition to IPS protection, it also performs web application protection, data loss prevention and virtual patching of known vulnerabilities, all of which can run concurrently.

Next Prev yah

Virtual Gateway (VGW)

This virtual security gateway protects virtual machines with firewalls, but also integrates with Juniper SRX security appliances. This integration enables VGW to adopt the security zones and policies set on customer SRXs to reduce configuration time and to ensure policies are consistent between SRX and VGW platforms. VGW is a new version of the Altor Networks virtual security platform that was bought last year by Juniper and includes integration with Juniper's Security Threat Response Management software, giving STRM a view into activity among virtual machines.

Next Prev yah

SuperMassive E10000 Series

The four SuperMassive E10000 devices are multi-core next generation firewall products designed for use in high volume environments such as data centres. The gear supports 10Gbps anti-spyware, anti-malware protection, 30Gbps application control, SSL inspection and intrusion prevention and 40Gbps stateful firewall protection. The company says it built the SuperMassive gear with power economy in mind and claims that its Gbps/Watt ratio is the best among next generation firewall gear.

Next Prev yah

M86 MailMarshal ECM

MailMarshal ECM is the only granular policy control solution for internal e-mail passing through an Exchange infrastructure which simplifies compliance for enterprise customers. New features include enhanced centralised management, increased scalability and support for Exchange 2010.

Next Prev yah

Sophos Virtual Email Appliance

The first virtual security appliance to take strong security, data protection and simplified management to the latest VMware virtual environments, combining DLP and email encryption with proactive spam and malware protection.

Next Prev yah

Sophos Mobile Control

Safeguards data on mobile devices including iPhones, iPads, Android and Windows Mobile. Provides centrally configured security settings, lockdown of unwanted features, remote over-the-air lock or wipe, security policy enforcement, a self service portal and access control to corporate email.

Next Prev yah

Venafi Encryption Director 6

Director 6 allows customers to automate management of encryption keys and digital certificate technologies across the enterprise. Director 6 generates and maintains an inventory of encryption assets, ensures key strengths, validation, lifecycle management and reporting. New to Director 6 are enhancements to Certificate Manager, and the addition of an SSH Key Manager and Symmetric Key Manager.

Next Prev yah

Mykonos Security Appliance - Jujitsu Release

The Mykonos Security Appliance is a web application firewall appliance that detects, tags, tracks and stops hackers in real time. New features include a Cross Site Request Forgery processor that protects against that type of attack as well as a new reporting management system that enables administrators to share valuable hacker data with their internal stakeholders. Key infrastructure improvements also enable the product to work seamlessly within enterprise IT environments.

Next Prev yah

FortiGate-3140B

The FortiGate-3140B provides large enterprises with up to 58Gbps of firewall performance, 10Gbps of IPS performance and up to 22Gbps of VPN performance.

Next Prev yah

TeamMentor OWASP Edition

TeamMentor OWASP contains 160 knowledge assets, code snippets, checklists, attacks, etc. that ensure development teams conduct design, coding and testing to avoid OWASP Top Ten Vulnerabilities, helping improve application security.

Next Prev yah

nuBridges Protect Tokenization as a Service (TaaS)

TaaS is a cloud-based tokenization service providing secure data protection for credit card, personally identifiable information and electronic health records all managed 24x7 by nuBridges.

Next Prev yah

Solera OS 5.0

Solera OS 5.0 powers Solera DS network forensics appliances and now includes Application Classification, DeepSee Active Reporting and geolocation through DeepSee Maps and Google Earth integration, enabling swift incident response.

Next Prev yah

YubiKey authentication key

The YubiKey authentication key from Yubico is now available as one of the strong authentication methods in Symantec's VeriSign Identity Protection (VIP) Authentication Service. VIP users and customers can now enjoy a simplified login process with the ease of use and minimal size of the YubiKey.

Next Prev yah

Identity Finder version 5.0

Helps organisations reduce the risk of data leakage and identity theft by locating and securing sensitive information across systems. 5.0 delivers new searching support for email systems and enterprise servers, centralised remediation and configuration management and vastly improved performance.

Next Prev yah

The Bit9 Global Software Registry (GSR)

The Bit9 Global Software Registry (GSR) is the first open, cloud-based reputation platform available to assess the trustworthiness of software. The Bit9 Global Software Registry (GSR) is now accessible via an open API allowing the global cybersecurity community to easily integrate their solutions with the Bit9 GSR Platform.

Next Prev yah

FireEye Email Malware Protection System

FireEye Email MPS features the Real-time Attachment and URL Analysis engine that evaluates emails for zero hour malware and enables FireEye to detect and stop socially engineered attacks.

Next Prev yah

Threat Manager and ActiveWatch

Trusted by enterprises, managed hosting providers and partners worldwide, Alert Logic provides innovative, low cost, worry-free SaaS offerings to help monitor and manage threats and achieve regulatory compliance.

Next Prev yah

TITUS Aware for Microsoft Outlook

TITUS Aware for Microsoft Outlook protects businesses from inadvertent data breaches by validating emails for corporate policy and regulatory compliance, allowing users to correct policy violations before email leaves the desktop.

1
/12

Share

Comments

Latest UK

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message