Your Search


Products: Governance, Risk & Compliance


  1. #
  2. A
  3. B
  4. C
  5. D
  6. E
  7. F
  8. G
  9. H
  10. I
  11. J
  12. K
  13. L
  14. M
  15. N
  16. O
  17. P
  18. Q
  19. R
  20. S
  21. T
  22. U
  23. V
  24. W
  25. X
  26. Y
  27. Z
  28. Show all


37 - 48 of 66 results


Items per page:

Sort By
  • Nexus Auditor

    Company:   Sonatype

    • N125

    Document the parts inside your software or COTS applications with a detailed bill of materials. Automatically pinpoint open source security vulnerabi...

  • Outsourced Data Protection Officer...

    Company:   The DPO Centre

    • F205

    The DPO Centre’s outsourced data protection officer service delivers flexible, tailored data protection support, advice and expertise to your organisa...

  • Panda Data Control

    Company:   Panda Security

    • D60

    Uncontrolled access to your company's personal and sensitive data is an everyday security threat that may lead to serious financial loss and reputatio...

  • Panda Patch Management

    Company:   Panda Security

    • D60

    Panda Patch Management is a user-friendly solution for managing vulnerabilities of the operating systems and third-party applications on Windows works...

  • Penetration Testing

    Company:   DigitalXRAID

    • F203

    Penetration Testing is by far the most effective way to identify potential threats to your cyber security. By running simulations of genuine hacking t...

  • Point-to-Point Encryption

    Company:   TokenEx

    • H118

    TokenEx’s Cloud Security Platform can integrate with encrypted PIN-pad devices to tokenize credit card data ingested via point-of-sale systems or cont...

  • Policy Optimizer

    Company:   FireMon

    • M120

    FireMon’s Policy Optimizer automates rule recertification and review to ensure the rulebase is up-to-date, well-documented and audit-ready.

  • Policy Planner

    Company:   FireMon

    • M120

    FireMon’s Policy Planner automates the change workflow giving you total control and precision for the entire rule lifecycle: Request, Design, Review, ...

  • Process-level Visibility and Control...

    Company:   Guardicore

    • B120

    Granular visibility and policy definition for application-layer control and micro-segmentation across all data center workloads.

  • Protected Tokenization Field

    Company:   TokenEx

    • H118

    TokenEx’s protected tokenization field secures your checkout page with maximum flexibility, integrating seamlessly with the existing look and feel of ...

  • Remote Management by DataLock® for...

    Company:   SECUREDATA, Inc.

    • G85

    The Datalock® Remote Management console allows the admin to take full control of where and when the drive can be unlocked, the ability to remotely wip...

  • Risk Analyzer

    Company:   FireMon

    • M120

    FireMon’s Risk Analyzer pairs vulnerabilities with network policy to pinpoint exposures before they become exploited and provide a clear path forward ...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.