Security Compliance Software

Governance, Risk & Compliance Management MORE CATEGORIES

SelectHub Leaderboard
60 RESULTS / Security Compliance Software
Sort:
AppRiver

AppRiver offers secure business email hosting with cloud-based email and Web protection against spam, viruses and malware. AppRiver’s Secure Hosted Exchange solution provides both administrators and end users with: unlimited mailbox storage, embedded SecureTide™ Spam and Virus protection, Akamai-enabled performance optimization, mobile device synchronization, and 24/7 customer care. The company’s new, web-based Customer Portal offers administrators tools to help manage their e-mail hosting environments with greater simplicity.

95
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Netwrix Auditor

Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way.

93
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
ESET

ESET delivers the fastest, most effective and most proactive antivirus and antispyware software solution to eliminate viruses, spyware, adware, worms, trojans, rootkits and other malware before they attack your system. Nobody does proactive protection better than ESET!

92
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Authentic8 Silo

Silo is a cloud-based container designed for secure, controlled access to your important web apps. It’s insulated, accessible from any device, SSO enabled and policy enforced. Silo contains web data in a secure sandbox, beyond the reach of exploits. Silo provides secure single sign-on to your web apps. Silo enforces data use policies regardless of device

88
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Panda Cloud Office Protection

Panda Cloud Protection is a complete SaaS security suite delivering light, secure and simple protection for all the main threat entry points: Endpoints: PCs, laptops and serversEmail trafficWeb traffic

69
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
F-Secure

F-Secure Corporation is an anti-virus, cloud content and computer security company based in Helsinki, Finland. F-Secure is the global leader in providing security as a service through operators. F-Secure is now also expanding into Content Cloud space and offering tremendous opportunities for operators and their customers in providing a compelling range of solutions that are tailored to the needs of the Operator Community that goes beyond Internet security.

69
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Kaspersky Endpoint Security for Business SELECT

Kaspersky’s anti-malware technologies deliver multi-layer defenses to protect your systems and sensitive business data from today’s increasingly sophisticated threats. With a combination of signature-based, proactive and cloud-enabled technologies – plus special features including our Network Attack Blocker and two-way firewall – Kaspersky Endpoint Security for Business SELECT does more to keep your business secure.

61
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
LogRhythm SIEM 2.0

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
EventLog Analyzer

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Accertify® Fraud Management

Accertify® Fraud Management leverages vast and disparate enterprise data, driving better fraud detection with fewer false positives. Constantly evolving card-not-present fraud easily defeats fraud detection products that are inflexible or use limited data types. These products can lose their effectiveness over time allowing fraud rates to creep higher, putting the merchant right back where they started. Accertify® Fraud Management was developed to perform well beyond these limitations through our advanced, scalable and highly flexible Interceptas® Data Management Platform.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Actimize Integrated Fraud Management

Actimize Integrated Fraud Management solutions deliver real-time, customer-centric fraud prevention that supports a holistic, enterprise-wide fraud management program. Fully integrated channel and line-of-business specific detection solutions that seamlessly share data for true cross-channel fraud management.Advanced and comprehensive set of fraud framework services that provide detection, decisioning, and operations capabilities.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FirstStrike® Fraud Detect

Teaming with APEX you’ll develop the skills and expertise you need to isolate and report high-risk situations and transactions. FirstStrike Fraud Detect has automated analytics that provide prioritized risk scores on all of your vendors, and advance reports can be generated daily/weekly/monthly to identify vendors with high risk characteristics, based on more than 20 proven industry routines. FirstStrike can also provide validation against more than 20 prohibited entity listings to manage your compliance risk.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Arbutus Fraud Detection

Fraud examiners and forensic investigators use data analysis technologies because they are the most effective way to examine large volumes of transactional data in order to detect and deter corporate fraud. Arbutus Fraud Detection is designed specifically for testing and comparing all types of organizational data, whether financial, operational or security. Arbutus Fraud Detection combines comprehensive data access, analysis and reporting into one intuitive and customizable query tool.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Fraud Analytics Suite

Fraud Analytics Suite is a fraud detection tool that detects suspicious claims as early as the first notice of loss and automatically refers claims to investigators. Identify insurance fraud before the claim is paid, with CSC's Fraud Analytics Suite®. Fraud Analytics Suite is fraud detection software that can have a major positive impact on your loss ratio with its comprehensive approach to identifying suspicious claims.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudBreaker

Conectys’ FraudBreaker is web based fraud detection software that captures your transaction data and performs real time checks on a wide range of risk factors. The results of these checks are instantly sent back to you with a risk score that allows you to disposition the transaction as safe (immediate confirmation of the transaction), escalate (needs manual review) or unsafe (rejection of the transaction).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
CPA Detective

CPA Detective is an affiliate fraud detection and compliance monitoring service that identifies and eliminates fraud and low-quality traffic sources to improve online advertising campaign performance. CPA Detective will optimize online advertising campaigns (CPA, CPL, CPC, PPC, and CPM ) as well as improve ROI and increase traffic quality. The service features a leading technology and sophisticated algorithms, as well as a team of dedicated compliance monitoring experts to help you enhance campaign performance as well as increase earnings for Cost Per Action (CPA) campaigns.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Call SelectHub for a free 15-minute selection analysis: 1-855-850-3850
Fraud Analyst

Fraud Analyst is a proven platform for risk-based authentication, fraud detection, and real-time identity verification that is helping to reduce online fraud by as much as 90 percent for all customer segments. Regardless of the online touchpoint - from logins to new account creation to online transactions - Fraud Analyst provides protection for every customer segment and user session, offering a layered approach to fraud detection and prevention that helps to secure online accounts from today's most advanced criminals.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
en.SafeWatch Anti-Fraud

en.SafeWatch Anti-Fraud provides accurate, real-time credit card, wire and Internet fraud detection and prevention to protect your financial institution against fraud losses.en.SafeWatch Anti-Fraud is seamlessly integrated with EastNets top ranking anti-money laundering (AML) solutions used today by over 400 financial institutions and corporates in 80 countries. This integrated compliance framework enables financial institutions to aggregate data and processes across fraud and AML silos to improve business insight and streamline operational efficiencies.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
DB Change Manager XE2

DB Change Manager XE2’s compare, synchronization, and auditing capabilities let you track and report on changes, roll out new releases, and pinpoint performance problems resulting from changes in data, schema and database configuration.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Mule Enterprise Security

Mule Enterprise takes the guesswork out of managing performance, and lowers the risk of downtime. Monitor key statistics, set SLA alerts, diagnose and fix performance issues all from a single web-based console. Mule is architected to scale for both high throughput scenarios as well as highly distributed environments. Mule’s built-in high availability clustering and data-grid ensures zero message loss reliability for mission critical use cases.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetApp® SnapLock® Compliance

NetApp SnapLock compliance software helps you meet strict data retention regulations and internal IT governance rules. NetApp® SnapLock® Compliance and SnapLock Enterprise software are integrated, cost-effective solutions that enable you to meet both external and internal requirements for retaining, protecting, and accessing regulated and reference data.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetIQ Change Guardian

NetIQ Change Guardian™ helps IT security professionals manage change to critical files, system configuration and applications, and achieve compliance with regulations and internal security policies. Unmanaged change is a leading cause of security breaches and unauthorized user activity is one of the early indications of a targeted attack. With Change Guardian, you can proactively identify and respond to unmanaged changes that could lead to security breaches or failed audits, and identify potential breaches in real-time by monitoring privileged user activity across the enterprise.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetIQ Secure Configuration Manager

NetIQ Secure Configuration Manager™ helps you to proactively enforce security configuration policy across critical systems in evolving IT environments. Start reducing your risk of security breaches, failed audits, or costly downtime today.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudNet

We make the process of preventing and detecting fraud easier and more effective, reducing potential losses and operating costs without hindering sales. As the leading provider of dedicated fraud prevention solutions, 41st Parameter’s best practices methodology and patented technologies are responsible for dramatic reductions in fraud losses and subsequent declining attack rates at some of the largest institutions in e-commerce, financial services, and travel services.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP Online

Financial Institutions of all sizes use FraudMAP Online to proactively identify account takeover and prevent fraudulent transactions before the money is gone. As the industry's most advanced anomaly detection solution, it delivers sophisticated online fraud detection capabilities plus easy to use investigation and forensics tools.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP Mobile

FraudMAP Mobile is the first and only anomaly detection solution purpose built for the mobile channel. It uniquely uses behavioral analytics to transparently monitor every mobile banking session and identify the suspicious activity in the mobile banking channel.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
FraudMAP ACH

FraudMAP ACH is an anomaly detection solution purpose built for the ACH payments channel. It uniquely uses behavioral analytics to transparently monitor every ACH origination file and automatically identify the suspicious or unexpected batches, transactions, or modified line items. Financial institutions use FraudMAP ACH to find fraudulent ACH batches and payments very quickly in very large batch files without manual reviews and with very few false positives.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
IRIS

IRIS provides a complete simulation environment that enables fraud analysts to tightly control risk and fraud. Interactive simulation technology guides fraud analysts through decision model generation. The effects of all potential changes are instantly visible, enabling fraud analysts to "feel" the effects of such changes immediately.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Kount Complete™, Kount SMB™

Kount Complete, designed for enterprises with annual revenues exceeding $10,000,000, detects and prevents fraud for merchants, financial institutions, online communities, and other businesses with fraud issues that negatively effect corporate image, financial performance and customer satisfaction. For each transaction, Kount’s proprietary platform analyzes hundreds of relevant variables and activity across the globe in real-time, delivering a highly predictive risk assessment in less than one second.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NetWrix Change Reporter Suite

NetWrix Change Reporter Suite automates and simplifies the auditing of critical IT systems across the entire IT infrastructure. No matter who changed what and where — be it Active Directory, file servers, Microsoft Exchange, filer appliances such as NetApp or EMC, virtual infrastructure, SQL Server databases — everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review and forensic auditing of day-to-day administrative activities by your security team and periodic inspections by compliance auditors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
ProxySG

ProxySG appliances are part of the Unified Security solution and provide complete control over all your web traffic with robust features that include user authentication, web filtering, data loss prevention, inspection and validation of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting and more. ProxySG appliances deployed with Blue Coat WebFilter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Trend Micro Enterprise Security

Trend Micro provides layered content security that interconnects mobile devices, endpoints, gateways, servers and the cloud. By layering interconnected solutions that share data you can protect your information, end users, data center, and cloud resources from data breaches and targeted attacks. For more, read the Smart Protection Strategy white paper or download our Enterprise Solutions brochure.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS