Security Compliance Software

SelectHub is real people helping you find the best Security Compliance Software for your unique business needs while recognizing the true solution leaders who help make your decisions possible.
60 Products found for

Security Compliance Software

Sort by:

AppRiver

User Satisfaction:
95%

AppRiver offers secure business email hosting with cloud-based email and Web protection against spam, viruses and malware. AppRiver’s Secure Hosted Exchange solution provides both administrators and end users with: unlimited mailbox storage, embedded SecureTide™ Spam and Virus protection, Akamai-enabled performance optimization, mobile device synchronization, and 24/7 customer care. The company’s new, web-based Customer Portal offers administrators tools to help manage their e-mail hosting environments with greater simplicity.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Netwrix Auditor

User Satisfaction:
93%

Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

ESET

User Satisfaction:
92%

ESET delivers the fastest, most effective and most proactive antivirus and antispyware software solution to eliminate viruses, spyware, adware, worms, trojans, rootkits and other malware before they attack your system. Nobody does proactive protection better than ESET!

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Authentic8 Silo

User Satisfaction:
88%

Silo is a cloud-based container designed for secure, controlled access to your important web apps. It’s insulated, accessible from any device, SSO enabled and policy enforced. Silo contains web data in a secure sandbox, beyond the reach of exploits. Silo provides secure single sign-on to your web apps. Silo enforces data use policies regardless of device

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Panda Security Endpoint Protection

User Satisfaction:
69%

Protection and disinfectionProactive and real-time protection from the cloud thanks to Panda Security's Collective Intelligence.Maximum malware detection, even for malware that exploits unknown (zero-day) vulnerabilities, regardless of the source of infection (email, USB memory sticks, Web, etc)Ease to use, easy to maintainManage the security of all users from anywhere from the Web console.Simple, automatic and/or remote installation.Automatic or scheduled transparent updates to avoid any inconvenience to the user.A level of security for each situation and environmentProfile-based security to adapt the protection to the specific needs of your users.Centralized monitoring of the security status of all PCs, servers and laptops through comprehensive dashboards.Device control to block entire peripheral device categories (USB drives and modems, webcams, DVD/CD, etc.) with whitelists and control of permitted actions (access, read, write).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

F-Secure Protection Service for Business

User Satisfaction:
69%

Our endpoint security products have been utilizing next-generation technologies – such as behavioral analysis and machine learning – for a decade already. Over the years, our products have developed further to offer several state-of-the-art technologies to keep your business safe.Our behavior-based protection engine, DeepGuard, is one of the key security elements in our business security software. Combined with the power of F-Secure Security Cloud, which tracks malware behavior globally, it gives our customers consistent security against new and emerging threats.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

LogRhythm SIEM 2.0

User Satisfaction:
n/a

LogRhythm is an enterprise-class platform that seamlessly combines SIEM, Log Management, File Integrity Monitoring and Machine Analytics, with Host and Network Forensics, in a unified Security Intelligence Platform. It is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance, and operations. LogRhythm delivers comprehensive, useful and actionable insight into what is really going on in and around an enterprise IT environment.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

EventLog Analyzer

User Satisfaction:
n/a

EventLog Analyzer is the most cost-effective Security Information and Event Management (SIEM) solution available in the market. EventLog Analyzer meets all critical SIEM capabilities such as log aggregation from heterogeneous sources, log analysis, compliance reporting, file integrity monitoring, user activity monitoring, object access auditing, event correlation, real-time alerting, log forensics, and log retention.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Accertify® Fraud Management

User Satisfaction:
n/a

Accertify® Fraud Management leverages vast and disparate enterprise data, driving better fraud detection with fewer false positives. Constantly evolving card-not-present fraud easily defeats fraud detection products that are inflexible or use limited data types. These products can lose their effectiveness over time allowing fraud rates to creep higher, putting the merchant right back where they started. Accertify® Fraud Management was developed to perform well beyond these limitations through our advanced, scalable and highly flexible Interceptas® Data Management Platform.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Actimize Integrated Fraud Management

User Satisfaction:
n/a

Actimize Integrated Fraud Management solutions deliver real-time, customer-centric fraud prevention that supports a holistic, enterprise-wide fraud management program. Fully integrated channel and line-of-business specific detection solutions that seamlessly share data for true cross-channel fraud management.Advanced and comprehensive set of fraud framework services that provide detection, decisioning, and operations capabilities.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FirstStrike® Fraud Detect

User Satisfaction:
n/a

Teaming with APEX you’ll develop the skills and expertise you need to isolate and report high-risk situations and transactions. FirstStrike Fraud Detect has automated analytics that provide prioritized risk scores on all of your vendors, and advance reports can be generated daily/weekly/monthly to identify vendors with high risk characteristics, based on more than 20 proven industry routines. FirstStrike can also provide validation against more than 20 prohibited entity listings to manage your compliance risk.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Arbutus Fraud Detection

User Satisfaction:
n/a

Fraud examiners and forensic investigators use data analysis technologies because they are the most effective way to examine large volumes of transactional data in order to detect and deter corporate fraud. Arbutus Fraud Detection is designed specifically for testing and comparing all types of organizational data, whether financial, operational or security. Arbutus Fraud Detection combines comprehensive data access, analysis and reporting into one intuitive and customizable query tool.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Fraud Analytics Suite

User Satisfaction:
n/a

Fraud Analytics Suite is a fraud detection tool that detects suspicious claims as early as the first notice of loss and automatically refers claims to investigators. Identify insurance fraud before the claim is paid, with CSC's Fraud Analytics Suite®. Fraud Analytics Suite is fraud detection software that can have a major positive impact on your loss ratio with its comprehensive approach to identifying suspicious claims.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FraudBreaker

User Satisfaction:
n/a

Conectys’ FraudBreaker is web based fraud detection software that captures your transaction data and performs real time checks on a wide range of risk factors. The results of these checks are instantly sent back to you with a risk score that allows you to disposition the transaction as safe (immediate confirmation of the transaction), escalate (needs manual review) or unsafe (rejection of the transaction).

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

CPA Detective

User Satisfaction:
n/a

CPA Detective is an affiliate fraud detection and compliance monitoring service that identifies and eliminates fraud and low-quality traffic sources to improve online advertising campaign performance. CPA Detective will optimize online advertising campaigns (CPA, CPL, CPC, PPC, and CPM ) as well as improve ROI and increase traffic quality. The service features a leading technology and sophisticated algorithms, as well as a team of dedicated compliance monitoring experts to help you enhance campaign performance as well as increase earnings for Cost Per Action (CPA) campaigns.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Fraud Analyst

User Satisfaction:
n/a

Fraud Analyst is a proven platform for risk-based authentication, fraud detection, and real-time identity verification that is helping to reduce online fraud by as much as 90 percent for all customer segments. Regardless of the online touchpoint - from logins to new account creation to online transactions - Fraud Analyst provides protection for every customer segment and user session, offering a layered approach to fraud detection and prevention that helps to secure online accounts from today's most advanced criminals.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Call SelectHub for a free 15-minute selection analysis: 1-855-850-3850

en.SafeWatch Anti-Fraud

User Satisfaction:
n/a

en.SafeWatch Anti-Fraud provides accurate, real-time credit card, wire and Internet fraud detection and prevention to protect your financial institution against fraud losses.en.SafeWatch Anti-Fraud is seamlessly integrated with EastNets top ranking anti-money laundering (AML) solutions used today by over 400 financial institutions and corporates in 80 countries. This integrated compliance framework enables financial institutions to aggregate data and processes across fraud and AML silos to improve business insight and streamline operational efficiencies.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

DB Change Manager XE2

User Satisfaction:
n/a

DB Change Manager XE2’s compare, synchronization, and auditing capabilities let you track and report on changes, roll out new releases, and pinpoint performance problems resulting from changes in data, schema and database configuration.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Mule Enterprise Security

User Satisfaction:
n/a

Mule Enterprise takes the guesswork out of managing performance, and lowers the risk of downtime. Monitor key statistics, set SLA alerts, diagnose and fix performance issues all from a single web-based console. Mule is architected to scale for both high throughput scenarios as well as highly distributed environments. Mule’s built-in high availability clustering and data-grid ensures zero message loss reliability for mission critical use cases.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NetApp® SnapLock® Compliance

User Satisfaction:
n/a

NetApp SnapLock compliance software helps you meet strict data retention regulations and internal IT governance rules. NetApp® SnapLock® Compliance and SnapLock Enterprise software are integrated, cost-effective solutions that enable you to meet both external and internal requirements for retaining, protecting, and accessing regulated and reference data.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NetIQ Change Guardian

User Satisfaction:
n/a

NetIQ Change Guardian™ helps IT security professionals manage change to critical files, system configuration and applications, and achieve compliance with regulations and internal security policies. Unmanaged change is a leading cause of security breaches and unauthorized user activity is one of the early indications of a targeted attack. With Change Guardian, you can proactively identify and respond to unmanaged changes that could lead to security breaches or failed audits, and identify potential breaches in real-time by monitoring privileged user activity across the enterprise.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NetIQ Secure Configuration Manager

User Satisfaction:
n/a

NetIQ Secure Configuration Manager™ helps you to proactively enforce security configuration policy across critical systems in evolving IT environments. Start reducing your risk of security breaches, failed audits, or costly downtime today.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FraudNet

User Satisfaction:
n/a

We make the process of preventing and detecting fraud easier and more effective, reducing potential losses and operating costs without hindering sales. As the leading provider of dedicated fraud prevention solutions, 41st Parameter’s best practices methodology and patented technologies are responsible for dramatic reductions in fraud losses and subsequent declining attack rates at some of the largest institutions in e-commerce, financial services, and travel services.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FraudMAP Online

User Satisfaction:
n/a

Financial Institutions of all sizes use FraudMAP Online to proactively identify account takeover and prevent fraudulent transactions before the money is gone. As the industry's most advanced anomaly detection solution, it delivers sophisticated online fraud detection capabilities plus easy to use investigation and forensics tools.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FraudMAP Mobile

User Satisfaction:
n/a

FraudMAP Mobile is the first and only anomaly detection solution purpose built for the mobile channel. It uniquely uses behavioral analytics to transparently monitor every mobile banking session and identify the suspicious activity in the mobile banking channel.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

FraudMAP ACH

User Satisfaction:
n/a

FraudMAP ACH is an anomaly detection solution purpose built for the ACH payments channel. It uniquely uses behavioral analytics to transparently monitor every ACH origination file and automatically identify the suspicious or unexpected batches, transactions, or modified line items. Financial institutions use FraudMAP ACH to find fraudulent ACH batches and payments very quickly in very large batch files without manual reviews and with very few false positives.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

IRIS

User Satisfaction:
n/a

IRIS provides a complete simulation environment that enables fraud analysts to tightly control risk and fraud. Interactive simulation technology guides fraud analysts through decision model generation. The effects of all potential changes are instantly visible, enabling fraud analysts to "feel" the effects of such changes immediately.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Kount Complete™, Kount SMB™

User Satisfaction:
n/a

Kount Complete, designed for enterprises with annual revenues exceeding $10,000,000, detects and prevents fraud for merchants, financial institutions, online communities, and other businesses with fraud issues that negatively effect corporate image, financial performance and customer satisfaction. For each transaction, Kount’s proprietary platform analyzes hundreds of relevant variables and activity across the globe in real-time, delivering a highly predictive risk assessment in less than one second.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NetWrix Change Reporter Suite

User Satisfaction:
n/a

NetWrix Change Reporter Suite automates and simplifies the auditing of critical IT systems across the entire IT infrastructure. No matter who changed what and where — be it Active Directory, file servers, Microsoft Exchange, filer appliances such as NetApp or EMC, virtual infrastructure, SQL Server databases — everything is centrally audited, consolidated, and presented in easy to understand reports, scheduled for ongoing review and forensic auditing of day-to-day administrative activities by your security team and periodic inspections by compliance auditors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

ProxySG

User Satisfaction:
n/a

ProxySG appliances are part of the Unified Security solution and provide complete control over all your web traffic with robust features that include user authentication, web filtering, data loss prevention, inspection and validation of SSL-encrypted traffic, content caching, bandwidth management, stream-splitting and more. ProxySG appliances deployed with Blue Coat WebFilter deliver the most comprehensive protection against web-based threats, including malware, phishing and botnet traffic from infected end user systems.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Trend Micro Endpoint Security

User Satisfaction:
n/a

Trend Micro endpoint security gives you the threat protection and data security you need to protect your users and your corporate information across every device and application. And we do it with unprecedented depth and breadth. You get multiple layers of advanced threat protection, including anti-malware, packer variant protection, encryption, device control, data loss prevention, vulnerability shielding, command and control blocking, browser exploit protection, application whitelisting, behavior monitoring, web threat protection, and more. All this is delivered via a light, lean client built for speed so neither the user experience nor your network is impacted.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Equiease

User Satisfaction:
n/a

The OptionEase application will accurately calculate your valuation inputs and meet your accounting needs. You’re provided with flexible expensing features which maintain historical information for your audit purposes. The application is IFRS compliant with full disclosure reporting. OptionEase is the industry leader in consistent auditability and contains a full read-only audit trail tracking every change (i.e., add, update, delete) within the system.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

ActiveGuard® Security and Compliance

User Satisfaction:
n/a

ActiveGuard is able to accurately collect and correlate vast amounts of data from virtually any application or device capable of producing a log file. This allows Solutionary to improve security while making it more efficient. ActiveGuard provides powerful cross-correlation and event-handling capabilities to recognize threats and reduce false positives, making security more operationally efficient. Using multiple detection methods – anomaly detection, statistical analysis and heuristic analysis – ActiveGuard is able to better identify and protect against advanced threats.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

TrustDefender™ ID, TrustDefender™ Cloud, TrustDefender™ Mobile, TrustDefender™ Client

User Satisfaction:
n/a

TrustDefender ID is a cloud-based, real-time device identification and identity verification solution that protects companies against cybercriminals and helps validate valuable returning customers and prospects. TrustDefender ID protects all online transactions including account creation, login authentication and payment authorization. TrustDefender Cloud is a cloud-based, real-time solution that helps companies identify potential fraud, malware, man-in-the browser (MitB) and Trojan attacks, and data breaches.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

McAfee Complete Data Protection Advance Suite

User Satisfaction:
n/a

The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Symantec Drive Encryption

User Satisfaction:
n/a

Drive encryption protects a disk in the event of theft or accidental loss by encrypting the entire disk including swap files, system files, and hibernation files. If an encrypted disk is lost, stolen, or placed into another computer, the encrypted state of the drive remains unchanged, ensuring only an authorized user can access its contents.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Real People... with Data

We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.

As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.

Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.