Security Compliance Software GET THE
IN-DEPTH REPORT

categories > Governance, Risk & Compliance Management

SelectHub Leaderboard
59 RESULTS / Security Compliance Software
Sort:
AppRiver

AppRiver offers secure business email hosting with cloud-based email and Web protection against spam, viruses and malware. AppRiver’s Secure Hosted Exchange solution provides both administrators and end users with: unlimited mailbox storage, embedded SecureTide™ Spam and Virus protection, Akamai-enabled performance optimization, mobile device synchronization, and 24/7 customer care. The company’s new, web-based Customer Portal offers administrators tools to help manage their e-mail hosting environments with greater simplicity.

95
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Netwrix Auditor

Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way.

93
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
ESET

ESET delivers the fastest, most effective and most proactive antivirus and antispyware software solution to eliminate viruses, spyware, adware, worms, trojans, rootkits and other malware before they attack your system. Nobody does proactive protection better than ESET!

92
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Authentic8 Silo

Silo is a cloud-based container designed for secure, controlled access to your important web apps. It’s insulated, accessible from any device, SSO enabled and policy enforced. Silo contains web data in a secure sandbox, beyond the reach of exploits. Silo provides secure single sign-on to your web apps. Silo enforces data use policies regardless of device

88
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Panda Security Endpoint Protection

Protection and disinfectionProactive and real-time protection from the cloud thanks to Panda Security's Collective Intelligence.Maximum malware detection, even for malware that exploits unknown (zero-day) vulnerabilities, regardless of the source of infection (email, USB memory sticks, Web, etc)Ease to use, easy to maintainManage the security of all users from anywhere from the Web console.Simple, automatic and/or remote installation.Automatic or scheduled transparent updates to avoid any inconvenience to the user.A level of security for each situation and environmentProfile-based security to adapt the protection to the specific needs of your users.Centralized monitoring of the security status of all PCs, servers and laptops through comprehensive dashboards.Device control to block entire peripheral device categories (USB drives and modems, webcams, DVD/CD, etc.) with whitelists and control of permitted actions (access, read, write).

69
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
F-Secure Protection Service for Business

Our endpoint security products have been utilizing next-generation technologies – such as behavioral analysis and machine learning – for a decade already. Over the years, our products have developed further to offer several state-of-the-art technologies to keep your business safe.Our behavior-based protection engine, DeepGuard, is one of the key security elements in our business security software. Combined with the power of F-Secure Security Cloud, which tracks malware behavior globally, it gives our customers consistent security against new and emerging threats.

69
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
LogRhythm SIEM 2.0

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
EventLog Analyzer

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Accertify® Fraud Management

Accertify® Fraud Management leverages vast and disparate enterprise data, driving better fraud detection with fewer false positives. Constantly evolving card-not-present fraud easily defeats fraud detection products that are inflexible or use limited data types. These products can lose their effectiveness over time allowing fraud rates to creep higher, putting the merchant right back where they started. Accertify® Fraud Management was developed to perform well beyond these limitations through our advanced, scalable and highly flexible Interceptas® Data Management Platform.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Actimize Integrated Fraud Management

Actimize Integrated Fraud Management solutions deliver real-time, customer-centric fraud prevention that supports a holistic, enterprise-wide fraud management program. Fully integrated channel and line-of-business specific detection solutions that seamlessly share data for true cross-channel fraud management.Advanced and comprehensive set of fraud framework services that provide detection, decisioning, and operations capabilities.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FirstStrike® Fraud Detect

Teaming with APEX you’ll develop the skills and expertise you need to isolate and report high-risk situations and transactions. FirstStrike Fraud Detect has automated analytics that provide prioritized risk scores on all of your vendors, and advance reports can be generated daily/weekly/monthly to identify vendors with high risk characteristics, based on more than 20 proven industry routines. FirstStrike can also provide validation against more than 20 prohibited entity listings to manage your compliance risk.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Arbutus Fraud Detection

Fraud examiners and forensic investigators use data analysis technologies because they are the most effective way to examine large volumes of transactional data in order to detect and deter corporate fraud. Arbutus Fraud Detection is designed specifically for testing and comparing all types of organizational data, whether financial, operational or security. Arbutus Fraud Detection combines comprehensive data access, analysis and reporting into one intuitive and customizable query tool.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Fraud Analytics Suite

Fraud Analytics Suite is a fraud detection tool that detects suspicious claims as early as the first notice of loss and automatically refers claims to investigators. Identify insurance fraud before the claim is paid, with CSC's Fraud Analytics Suite®. Fraud Analytics Suite is fraud detection software that can have a major positive impact on your loss ratio with its comprehensive approach to identifying suspicious claims.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudBreaker

Conectys’ FraudBreaker is web based fraud detection software that captures your transaction data and performs real time checks on a wide range of risk factors. The results of these checks are instantly sent back to you with a risk score that allows you to disposition the transaction as safe (immediate confirmation of the transaction), escalate (needs manual review) or unsafe (rejection of the transaction).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
CPA Detective

CPA Detective is an affiliate fraud detection and compliance monitoring service that identifies and eliminates fraud and low-quality traffic sources to improve online advertising campaign performance. CPA Detective will optimize online advertising campaigns (CPA, CPL, CPC, PPC, and CPM ) as well as improve ROI and increase traffic quality. The service features a leading technology and sophisticated algorithms, as well as a team of dedicated compliance monitoring experts to help you enhance campaign performance as well as increase earnings for Cost Per Action (CPA) campaigns.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Fraud Analyst

Fraud Analyst is a proven platform for risk-based authentication, fraud detection, and real-time identity verification that is helping to reduce online fraud by as much as 90 percent for all customer segments. Regardless of the online touchpoint - from logins to new account creation to online transactions - Fraud Analyst provides protection for every customer segment and user session, offering a layered approach to fraud detection and prevention that helps to secure online accounts from today's most advanced criminals.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Call SelectHub for a free 15-minute selection analysis: 1-855-850-3850
en.SafeWatch Anti-Fraud

en.SafeWatch Anti-Fraud provides accurate, real-time credit card, wire and Internet fraud detection and prevention to protect your financial institution against fraud losses.en.SafeWatch Anti-Fraud is seamlessly integrated with EastNets top ranking anti-money laundering (AML) solutions used today by over 400 financial institutions and corporates in 80 countries. This integrated compliance framework enables financial institutions to aggregate data and processes across fraud and AML silos to improve business insight and streamline operational efficiencies.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
DB Change Manager XE2

DB Change Manager XE2’s compare, synchronization, and auditing capabilities let you track and report on changes, roll out new releases, and pinpoint performance problems resulting from changes in data, schema and database configuration.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Mule Enterprise Security

Mule Enterprise takes the guesswork out of managing performance, and lowers the risk of downtime. Monitor key statistics, set SLA alerts, diagnose and fix performance issues all from a single web-based console. Mule is architected to scale for both high throughput scenarios as well as highly distributed environments. Mule’s built-in high availability clustering and data-grid ensures zero message loss reliability for mission critical use cases.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetApp® SnapLock® Compliance

NetApp SnapLock compliance software helps you meet strict data retention regulations and internal IT governance rules. NetApp® SnapLock® Compliance and SnapLock Enterprise software are integrated, cost-effective solutions that enable you to meet both external and internal requirements for retaining, protecting, and accessing regulated and reference data.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetIQ Change Guardian

NetIQ Change Guardian™ helps IT security professionals manage change to critical files, system configuration and applications, and achieve compliance with regulations and internal security policies. Unmanaged change is a leading cause of security breaches and unauthorized user activity is one of the early indications of a targeted attack. With Change Guardian, you can proactively identify and respond to unmanaged changes that could lead to security breaches or failed audits, and identify potential breaches in real-time by monitoring privileged user activity across the enterprise.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetIQ Secure Configuration Manager

NetIQ Secure Configuration Manager™ helps you to proactively enforce security configuration policy across critical systems in evolving IT environments. Start reducing your risk of security breaches, failed audits, or costly downtime today.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudNet

We make the process of preventing and detecting fraud easier and more effective, reducing potential losses and operating costs without hindering sales. As the leading provider of dedicated fraud prevention solutions, 41st Parameter’s best practices methodology and patented technologies are responsible for dramatic reductions in fraud losses and subsequent declining attack rates at some of the largest institutions in e-commerce, financial services, and travel services.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP Online

Financial Institutions of all sizes use FraudMAP Online to proactively identify account takeover and prevent fraudulent transactions before the money is gone. As the industry's most advanced anomaly detection solution, it delivers sophisticated online fraud detection capabilities plus easy to use investigation and forensics tools.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP Mobile

FraudMAP Mobile is the first and only anomaly detection solution purpose built for the mobile channel. It uniquely uses behavioral analytics to transparently monitor every mobile banking session and identify the suspicious activity in the mobile banking channel.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP ACH

FraudMAP ACH is an anomaly detection solution purpose built for the ACH payments channel. It uniquely uses behavioral analytics to transparently monitor every ACH origination file and automatically identify the suspicious or unexpected batches, transactions, or modified line items. Financial institutions use FraudMAP ACH to find fraudulent ACH batches and payments very quickly in very large batch files without manual reviews and with very few false positives.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
IRIS

IRIS provides a complete simulation environment that enables fraud analysts to tightly control risk and fraud. Interactive simulation technology guides fraud analysts through decision model generation. The effects of all potential changes are instantly visible, enabling fraud analysts to "feel" the effects of such changes immediately.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Kount Complete™, Kount SMB™

Kount Complete, designed for enterprises with annual revenues exceeding $10,000,000, detects and prevents fraud for merchants, financial institutions, online communities, and other businesses with fraud issues that negatively effect corporate image, financial performance and customer satisfaction. For each transaction, Kount’s proprietary platform analyzes hundreds of relevant variables and activity across the globe in real-time, delivering a highly predictive risk assessment in less than one second.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetWrix Change Reporter Suite

NetWrix Change Reporter Suite automates and simplifies the auditing of critical IT systems across the entire IT infrastructure. No matter who changed what and where — be it Active Directory, file servers, Microsoft Exchange, filer appliances such as NetApp or EMC, virtual infrastructure, SQL Server databases — everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review and forensic auditing of day-to-day administrative activities by your security team and periodic inspections by compliance auditors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
ProxySG

ProxySG appliances are part of the Unified Security solution and provide complete control over all your web traffic with robust features that include user authentication, web filtering, data loss prevention, inspection and validation of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting and more. ProxySG appliances deployed with Blue Coat WebFilter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Trend Micro Endpoint Security

Trend Micro endpoint security gives you the threat protection and data security you need to protect your users and your corporate information across every device and application. And we do it with unprecedented depth and breadth. You get multiple layers of advanced threat protection, including anti-malware, packer variant protection, encryption, device control, data loss prevention, vulnerability shielding, command and control blocking, browser exploit protection, application whitelisting, behavior monitoring, web threat protection, and more. All this is delivered via a light, lean client built for speed so neither the user experience nor your network is impacted.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Equiease

The OptionEase application will accurately calculate your valuation inputs and meet your accounting needs. You’re provided with flexible expensing features which maintain historical information for your audit purposes. The application is IFRS compliant with full disclosure reporting. OptionEase is the industry leader in consistent auditability and contains a full read-only audit trail tracking every change (i.e., add, update, delete) within the system.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS