LogicMonitor

LogicMonitor

LogicMonitor has a global presence with offices in Santa Barbara, Austin, Boston, New York City, London, China, Australia, and Singapore.

Within minutes, LogicMonitor makes it possible for businesses to monitor their complete infrastructures.

LogicMonitor comprehensively monitors infrastructures, from on-premises to the cloud.

Infrastructure Monitoring

Monitor cloud, on-premises and hybrid environments in a single platform

LogicMonitor enables organizations to see what’s coming before it happens. With advanced AIOps features, powered by LM Intelligence, we help teams proactively identify and resolve IT infrastructure issues before they can adversely affect business-critical systems and end-user performance. Reduce MTTR with advanced forecasting, root cause analysis, anomaly detection, and dynamic thresholds across your entire technology stack.

Log Analysis

Automatically analyze 100% of your log data to uncover root causes for your alerts and surface previously unknown issues predictively.

Network

Get visibility into the health and performance of all of your networking equipment and other IT infrastructure in one, unified monitoring platform.

LogicMonitor utilizes a lightweight, agentless collector to discover everything you need to know about your network automatically. Just enter a hostname or an IP address and within minutes you’ll have the monitoring, alerting and graphing you need to maintain and optimize network infrastructure. Get the coverage you need for even the most complex networks – whether resources are on-premises, spread across multiple data centers, or in the cloud.

Cloud

LogicMonitor offers comprehensive monitoring to give you full observability across modern cloud environments, whether public, private, or hybrid. Agentless discovery automatically discovers, applies, and scales monitoring for dynamic cloud infrastructures – such as AWS, Azure, and GCP – ensuring that monitoring is always up to date.

Server Monitoring

The cloud-based performance monitoring platform that provides a unified view for server monitoring and all other infrastructure together.

Comprehensive server monitoring requires more than simple CPU and memory alerting, but shouldn’t need a lot of configuration. With LogicMonitor, enter an IP address, and you are done. LogicMonitor will automatically detect, monitor, and alerts on: CPU, Memory, Network and many other OS metrics for Windows, Linux, Solaris, AIX and more. Everything down to individual volume latency, TCP stats, and NTP.

Website Monitorig

Ensure website performance and availability using Service Checks. Perform on-the-spot service checks and enable synthetic transactions

Confirm your websites are up and accessible from one or multiple external test locations, or monitor from within your network and ensure your employees can access critical internal sitesContainers

Monitoring for Romote Workforces

Remote monitoring solutions provide deeper visibility into the performance of business-critical apps and infrastructure. Monitor everything from SaaS applications to engineering services, and ensure your remote workforce has access to the tools they need to drive the business forward.

Application Monitoring

Monitor the performance and availability of your business-critical applications from a single unified platform.

Track application availability and performance metrics alongside the rest of your IT infrastructure: cloud, server, containers, storage, database, networks, and more. See how business-critical applications are performing and ensure that Apache, Docker, Tomcat, Nginx, and more, are always online.

Storage Monitoring

LogicMonitor automatically discovers everything you need to know about your storage systems and delivers the monitoring, alerting, and graphing you need to maintain high availability and performance.

Storage systems are the foundation on which your technology stack is built, so knowing what they’re doing – and what they’re not – is critical to running IT operations. Improve storage and mitigate downtime with cloud-based performance monitoring built for the modern age.

Container and Microservices Monitoring

Get visibility into your microservices and containerized applications alongside the rest of your hybrid IT infrastructure in a single monitoring platform.

LogicMonitor automatically discovers containers, microservices, and underlying resources, so you can save your team valuable time without having to worry about whether your monitoring is keeping up.

Database Monitoring

Monitor database health and performance in real-time

 

 

Keeper

Keeper

Creators of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. The Keeper leadership team is committed to customer success. We have deep expertise in cybersecurity software, cloud computing and mobile device technologies.

Keeper

Cybersecurity starts with password security. Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

Keeper manages your passwords to prevent data breaches, improve employee productivity, cut helpdesk costs and meet compliance standards.

Best-in-Class Security
Keeper uses a proprietary zero-knowledge security architecture and is the most audited and certified product on the market. Keeper protects your business and client data with the privacy, security and confidentiality requirements of your industry.

Ease of Use
Keeper has an intuitive user interface for computers, smartphones and tablets that can be deployed rapidly with no upfront equipment or installation costs.

Ultimate Flexibility
Keeper’s configurable roles, role-based permissions and admin privileges align with your organizational structure and policies. Keeper scales for businesses of all sizes.

Mitigates Risk of Data Breaches
Keeper creates random, high-strength passwords for all your websites and applications then stores them in a secure vault on all your devices.

Bolsters Password Security and Privacy
Each employee gets a private, encrypted vault for storing and managing their passwords, credentials, files and private client data.

Boosts Employee Productivity
Saves employees time, frustration and eliminates the need for them to reset, reuse and remember passwords.

Strengthens Compliance Standards
Supports role-based controls, 2FA, auditing, event reporting and industry compliance with HIPAA, DPA, FINRA, GDPR and more.

Open/Close all the descriptions

Keeper Business

Secure business passwords to prevent data breaches, improve employee productivity and meet compliance standards

  • Encrypted vault for every user
  • Folders and subfolders
  • Shared team folders
  • Access from unlimited devices
  • Policy engine and enforcements
  • Security Audit
  • Activity reporting
  • Team management
  • Basic Two-Factor Authentication (SMS, TOTP, smartwatch and FIDO U2F)

Open/Close all the descriptions

Keeper Enterprise

Keeper Enterprise Password Manager supports large and complex enterprise deployments.
Keeper can be deployed at enterprise scale with advanced features including automated user provisioning, Active Directory sync, Single Sign-On (SAML 2.0) authentication, SCIM and developer APIs. Keeper maps your corporate structure using hierarchical organizational units and delegated administration.

  • Everything in Keeper Business, plus:
  • Single Sign-On (SAML 2.0) authentication
  • Automated Team Management
  • Advanced Two-Factor Authentication (DUO & RSA)
  • Active Directory and LDAP sync
  • SCIM and Azure AD provisioning
  • Email auto-provisioning
  • Command line provisioning
  • Developer APIs for password rotation and backend integration

Open/Close all the descriptions

BrachWatch add-on

It is essential that you know when one of your passwords has been subject to a data breach. BreachWatch monitors the dark web for breached accounts and alerts you so you can take action to protect your online identity. BreachWatch is fully integrated with your Keeper Password Manager.

Lansweeper

Lansweeper

Lansweeper originated in Belgium in the mid 2000s Lansweeper SA designs and develops application software. The Company offers a security platform that provides IP range scanning, network and IT asset management, license compliance audits, and automated software deployment solutions. Lansweeper serves customers worldwide

IT Asset Management Software That Finds & Manages All Assets Across Your Enterprise. Track Hardware, Software, and Users. Agentless Network Discovery.

Open/Close all the descriptions

Cross-Platform IT Asset Discovery

Discover all IT assets in your network without having to install any software on your machines. Lansweeper finds & gathers information on all assets, listing hardware specs, installed software, user details, and much more. Eliminate one of the biggest hurdles in IT, getting complete end-to-end visibility of your network, and save valuable time and resources.

Create a complete and up-to-date inventory thanks with Lansweeper’s Network Discovery. Scan Windows, Linux, and MAC devices. Find and organize printers, routers and switches and track assets not yet deployed or disconnected from your network. Discover SNMP-enabled devices on your network to create a detailed network inventory.

Open/Close all the descriptions

One Centralized IT Inventory

All your Hardware, Software, and Users, all in one place. Lansweeper consolidates all asset details in a centralized web-based, System of Record. It offers corporations complete visibility into their distributed IT environments, informing them which assets they own, where they are located, who is using them, and much more. Clicking on an individual asset record lets you see all the granular information Lansweeper has collected.

Hardware Inventory

Build a comprehensive hardware inventory from scratch. Lansweeper scans your entire network to collect information about computers and their hardware components.

Software Inventory

Automatically scan software on Windows, Linux and Mac devices, and get a complete software inventory and license audit of your IT environment.

User Inventory

Manage a complete inventory of users in your IT estate. Get a complete overview of local users, AD users, and assets they are related to.

Open/Close all the descriptions

Get Answers Through Analytics

Get the answers you need in no time. Need a quick overview on all the printers in the office or serial numbers of all your PCs? Need a run-down of all new devices that were found in the last 24 hours? Choose from over 400 ready-made, out of the box network reports or build custom reports within minutes.

Okta

Okta

Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to both secure and manage their extended enterprise, and transform their customers’ experiences. With over 6000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely adopt the technologies they need to fulfill their missions. Over 5,600 organizations, including 20th Century Fox, JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to securely connect their people and technology.

The Okta Identity Cloud provides secure identity management with Single Sign-On, Multi-factor Authentication, Lifecycle Management (Provisioning), and more.

  • Single Sign-on: Reliable integration for SSO to all your web and mobile apps, with a full-featured federation engine and flexible access policy.
  • Adaptive Muti-factor Authenthication: app mobile, SMS/Voice/Email OTP, Software OTP. Okta supports a variety of native and 3rd party authentication factors.
  • Universal Directory: One place to manage all your users, groups and devices, mastered in Okta or from any number of sources.
  • Lifecycle Management:. Automate all lifecycles with any business process for external and internal users
  • API Access Management: Your custom apps are increasingly modern with an API backend. Secure enterprise data and enable developers to focus on the user experience.
  • Advanced Server Access: Zero Trust access management for infrastructure that just works. Extend core Okta Identity & Access to your Linux and Windows servers via SSH & RDP in an elegant manner built for the modern cloud.

 

Netwrix

Netwrix

Netwrix Corporation is a software company focused exclusively on providing IT security and operations teams with pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT infrastructures to protect data regardless of its location. Over 10,000 organizations worldwide rely on Netwrix to detect and proactively mitigate data security threats, pass compliance audits with less effort and expense, and increase the productivity of their IT teams.

Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.

Open/Close all the descriptions

Netwrix auditor - it is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments

Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage.

Netwrix Auditor delivers visibility and control across the broadest variety of on-premises and cloud-based IT systems in a unified way. Coupled with our cross-system reporting, this broad coverage provides a single pane of glass for understanding what’s going on across your entire hybrid cloud IT infrastructure.

Detect Data Security Threats – On Premises and in the Cloud
Delivers security intelligence about critical changes, configurations and data access and enables investigation of suspicious user behavior before data is compromised.

Pass Compliance Audits with Less Effort and Expense
Provides the evidence required to prove that your organization’s IT security program adheres to PCI DSS, HIPAA, SOX, ISO/IEC 27001, GDPR and other standards.

Increase the Productivity of Security and Operations Teams
Relieves IT departments of manual crawling through log data to get the information about who changed what, when and where a change was made, or who has access to what.

Snow Software

Snow Software

Snow Software is the largest dedicated developer of Software Asset Management (SAM) solutions, designed to ensure that the hundreds of billions spent on enterprise software is money well spent – ensuring organizations have the appropriate licenses for the software they use – not too many, not too few.

With more local offices and regional support centers than any other SAM solutions provider, more than 4,500 organizations around the world rely on Snow Software’s on-premise and cloud-based SAM solutions to manage software licensing across more than 11 million devices, from mobile to desktop, datacenter to the cloud.

Open/Close all the descriptions

Snow License Manager - The world’s leading Software Asset Management solution for software, SaaS and IaaS, with cloud & on-premise delivery options

Snow License Manager is designed to reduce the risk, cost and complexity associated with software assets and licensing. Thousands of organizations around the world rely on Snow License Manager to help them avoid overspending on software entitlements and cloud resources while ensuring that they are fully compliant with licensing rules.

Snow License Manager is the hub of Snow’s advanced Software Asset Management (SAM) platform – providing a unified view of all the software, cloud and hardware assets, license entitlements and application usage metrics.

Multiple stakeholders from across the organization can access tailored reports that enable them to instantly:

  • Create Effective License Positions (ELPs) for all software vendors, including Microsoft, IBM, Adobe and more
  • Track software and cloud usage and expenditure
  • Identify and monitor usage of deployed assets and cloud subscriptions
  • Identify opportunities to reduce licensing & support costs.
Snow Inventory - Discover devices, software and cloud services on all platforms, audit software installs and track usage

Whether you work in IT Operations, IT Service Management, Procurement or SAM, Snow Inventory shines a light on all hardware, devices, cloud services and software assets.

Snow Inventory discovers all assets including hardware configuration, software deployments and usage. This insight gives stakeholders such as Software Asset Management, IT Asset Management, Service Desk, Security and IT Operational teams the overview and detailed information they need to inform critical business decisions.

Snow Inventory supports all major enterprise computing platforms, including:

  • Cloud SaaS
  • Cloud IaaS
  • Windows
  • Mac
  • Linux
  • UNIX
  • iOS
  • Windows Phone
  • Thin Client
  • VDI
  • Android

Snow Inventory provides complete asset discovery as well as revealing blind spots on the network and in cloud software and infrastructure. From computers to servers, mobile and tablets to all connected network devices such as routers, printers, and firewalls, all device types are discovered and reported in Snow. Even devices that are not connected to the network at point of audit are included, as are devices with no client agent on them.

VMware Workspace ONE

VMware Workspace ONE

VMware has grown from five technologists working in a small apartment, to a leading innovator in enterprise software. Today the company’s compute, cloud, mobility, networking, and security offerings provide a dynamic and efficient digital foundation to over 500,000 customers globally. VMware technologies have fundamentally changed IT, and with it, the possibilities open to business. Now VMware and its customers have the freedom to build their own digital futures.

Digital Workspace
Make it easy for employees to work anywhere, any time, on any device, without compromising security.

Open/Close all the descriptions
>

Workspace ONE

Intelligence-driven digital workspace platform that delivers and manages any app on any device

Deliver an Engaging Employee Experience with an Intelligence-driven Digital Workspace Platform
Simply and securely deliver and manage any app on any device with VMware Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment.

What Workspace ONE Delivers

Engaging Employee Experiences From Onboarding to Offboarding
Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device.
Unified Endpoint Management
Consolidate management silos across mobile devices, desktops (including Windows 10 and macOS), rugged devices and “things”. Reduce costs and improve security with real-time, over-the-air modern management across all use cases (including BYO).
Intelligence Across the Digital Workspace
Aggregate and correlate data across your entire digital workspace to drive insights, analytics and powerful automation of common IT tasks that improve user experience, strengthen security and reduce IT cost.
Virtual Desktops and Apps
Radically transform traditional VDI and published apps with integrated VMware Horizon and VMware Horizon Cloud, which provides unprecedented simplicity, flexibility, speed and scale – all at a lower cost. A common control plane across the “multi-cloud” enables an architecture and cost model to meet your requirements.
Secure and Simple Application Access
Boost productivity and delight employees with secure, password-free single sign-on (SSO) to SaaS, mobile, Windows, virtual and web apps on any phone, tablet or laptop — all through a single app catalog.
Simplify Zero Trust Security
Combine intrinsic security across device, users, and apps to simplify the enablement of Zero Trust access control. Industry-leading modern management of all devices and access management across all applications makes zero trust access models a reality.

Workspace ONE UEM Powered by AirWatch

Unified endpoint management (UEM) technology that powers Workspace ONE

Manage Every Device and Every Use Case with Unified Endpoint Management
Reduce costs and improve security with modern, over-the-air management of every endpoint – including desktops, mobile, rugged, and IoT – and ensure enterprise security at every layer with Workspace ONE UEM, powered by AirWatch technology.

What Workspace ONE Unified Endpoint Management (UEM) Does
Unifies Endpoint Management
Manage the full lifecycle of any endpoint – mobile (Android, iOS), desktop (Windows 10, macOS, Chrome OS), rugged and even IoT (Linux and others) – in a single management console. Support all your mobility use cases: corporate-owned, BYOD, purpose-built or shared devices.
Modernizes Desktop Management
Optimize desktop OS (Windows 10, macOS, Chrome OS) lifecycle management for a mobile world. The most complete, modern management technology simplifies deployment, provides 100% cloud policy management, streamlines app delivery, automates patching and ensures security.
Automates Processes and Delivers Intelligent Insights
Leverage powerful insights and rules-based automation to optimize employee digital experience, ease the strain on IT and get to a proactive management and security model. Learn more about our intelligence-driven digital workspace platform.
Protects Corporate Apps and Data on Any Network
Provide an intrinsic and comprehensive security approach that encompasses the user, endpoint, app, data and network. Conditional access and granular compliance policies protect company data and ensure hands-free, instant remediation against modern day security threats.
Improves Employee Productivity
Deliver frictionless and secure access to all your business apps – mobile, desktop, SaaS, virtual. The apps include VMware Workspace ONE secure mobile productivity apps – catalog, email, calendar, contacts, web browser, notes, content and more.
Powers Your Digital Workspace
Unified Endpoint Management technology is an essential element in delivering on the promise of a complete digital workspace that reduces IT costs, bolsters security and proactively improves employees’ digital experience.

Workspace ONE UEM Key Highlights

  • Cloud-first, multitenant model to support and better control growing business requirements
  • Real-time desktop modern management from cloud, enhanced with Intelligence automation
  • Automate Windows 10 modern management migration with Workspace ONE AirLift
  • Special purpose mobility with support for ruggedized devices, wearables and IoT
  • Secure Microsoft Office 365 with MAM and conditional access policies across all OS
  • Remote wipe compromised devices instantly to remove sensitive company data
  • Enterprise-grade security fit for government agencies and regulated industries
  • Unified app catalog for one-touch, secure access to any app across any device
  • Robust API framework to support enterprise systems, services, identity, apps, content
Wandera

Wandera

The Wandera team are proven innovators in enterprise cloud services and security. The team founded ScanSafe (now part of Cisco), pioneer of the cloud secure web gateway market and trusted provider to thousands of global enterprises.
The same passion for innovation and focus on customer experience is behind Wandera and the design of our unique transparent gateway architecture. They are excited to help their customers navigate the next generation of enterprise mobility challenges beyond traditional EMM. Recognized by Gartner as a Cool Vendor, and by Computing for Mobile Security Vendor Excellence.

 

Wandera

Open/Close all the descriptions

Security & Management for your Mobile Data

The explosion of billions of mobile devices has created the largest technology footprint for hackers to steal corporate and personal data. At the same time, the escalation of app creation and video content, together with the adoption of 4G, means the demand for data has grown exponentially. Businesses are suffering because they cannot protect, predict or control mobile data.
Wandera helps enterprises prevent threats, enforce policy, all while reducing mobile data usage.

The true strength of the architecture is the ability for administrators to take action using automated policy controls,
including alerts, filters, blocks, caps, and device quarantining to prevent security threats, ensure compliance and manage usage.

The core solution is Wandera’s industry leading protection against the full spectrum of mobile attacks. From device configuration risks, insecure app vulnerabilities, malicious infrastructure and traditional network attacks, Wandera prevents threats in real-time.

Wandera + Airwatch Integration

Wandera and Airwatch partner to provide seamlessly integrated mobile threat prevention

Wandera’s Mobile Data Gateway (MDG) and Enterprise Mobility Management (EMM) suites are becoming central components in enterprise mobility strategies. These two entities combined provide the most comprehensive device and data management capabilities for mobile environments to date. With each picking up where the other leaves off, the two systems work in conjunction with each other to provide unmatched device management, visibility, security, and control.
EMM suites focus on device-level management, which is more persistent in nature. This includes the ability to set policies for password requirements, identity management, network enablement and app distribution.

Wandera’s EMM Connect solution enables deep integration between the Wandera Mobile Data Gateway and AirWatch. By linking the two entities together, an enterprise can realize maximum management efficiency, unified threat outbreak response, and multi-level policy based controls

Wandera Private Access

Wandera introduces ZTNA security solution that’s four times faster than VPNs.

Wandera Private Access (WPA) is a cloud-delivered service that provides secure remote access to applications hosted in the datacenter or in the cloud, using Zero Trust Network Access (ZTNA) principles.

Wandera Private Access empowers secure remote work and offers a seamless and consistent user experience from any connected device (running iOS, Android, Windows 10, and Mac) to any application wherever it is hosted. It eliminates the broad discoverability and reachability of data and apps that users shouldn’t have access to, and dramatically increases visibility for admins as well as their ability to take action.

Further, WPA provides teams the flexibility to work any time, anywhere by connecting them to the applications they need. Streamlined authentication processes improve security and enable fast seamless remote working.

WPA is a cloud-based service that requires no on-premise equipment and the service edge dynamically scales to handle unlimited client connections.

 

PKWARE

PKWARE

PKWARE, Inc. is an enterprise software company founded in 1986, by Phil Katz, co-inventor of the ZIP standard. PKWARE provides encryption and data compression software used by thousands of organizations in banking, financial services, healthcare and government.
Today PKWARE is revolutionizing data security with PK Protect, the world’s most advanced suite of data protection solutions.

Open/Close all the descriptions

PKZIP

Reduce file sizes by up to 95% and improve system performance
Year after year, the amount of data being stored and exchanged around the world increases at an exponential rate. Costs for data storage and transmission continue to grow, whether organizations maintain their files on premise or in the cloud. An efficient, flexible solution for data compression is essential for managing costs and resource demands.
Having introduced the ZIP file format nearly three decades ago, PKZIP continues to set the worldwide standard for data compression and file management

Unmatched performance
With PKZIP, organizations can compress files by up to 95%, reducing storage costs and greatly improving file transmission times. PKZIP can handle even the largest compression tasks, with capabilities to include more than 2 billion files in a single archive and compress files over 9 exabytes in size. PKWARE’s lossless compression technology ensures that all data (including file metadata) is retained when a file is zipped.
Flexibility and administrative control
PKZIP is compatible with all major enterprise computing platforms and supports multiple archive formats, making it easy to exchange data across the organization efficiently and effectively. Users can compress files in several archive formats, including ZIP, TAR, BZ2, and many others.
Enterprise customers can use PKZIP’s policy manager to standardize compression activities according to organizational policies and best practices, helping maximize efficiency, system performance, and resource savings.

Features:

  • PKZIP provides exceptional performance and ease of use across all enterprise operating systems.
  • Compression
  • Command Line Interface
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

SecureZIP

Enterprise-grade data encryption
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries.
PKWARE’s SecureZIP enables organizations of all kinds to implement persistent data protection while gaining visibility into where files are used, shared, and stored.

Compression and encryption in one solution
SecureZIP combines PKWARE’s industry-leading compression technology with strong encryption, allowing organizations to reduce data storage and transfer costs while ensuring the security of their information as it moves across hardware platforms, applications, mobile devices, and the cloud.

Industry-leading protection
Available for all major computing platforms, SecureZIP supports passphrase-based and digital certificate-based encryption, offering flexible security for any business environment. SecureZIP also supports two-factor authentication using smart cards or tokens, allowing for an additional layer of security.
With SecureZIP, organizations of any size can reduce the burden of data storage and transmission, while maintaining compliance with internal and external security mandates.

Features:

  • SecureZIP makes it easy to protect sensitive information and reduce the demands on IT infrastructure.
  • Persistent File Encryption
  • X.509 and OpenPGP Encryption
  • Cross Platform Functionality

Available for:
Server
IBM i
Linux for z system
IBM z/OS.

Smartcrypt

Next-generation Encryption and key management
The world has changed. Information is everywhere. And you have no idea where it is.
Every day, thieves, snoops, and idiots exploit the gaps in enterprise information security. It’s time to stop believing in solutions that focus solely on network and device access. Today’s threats require us to protect the data itself.
PKWARE’s Smartcrypt is a revolution in enterprise data protection, allowing customers to protect their data at rest and in use, even when it moves outside the organization.

Smart encryption technology
Smartcrypt delivers persistent data protection without the tradeoffs that (until now) have prevented organizations from adopting strong encryption. Previously challenging tasks such as key generation, synchronization, and exchange are completely automated, making the encryption process transparent to end users and easier for administrators to control.

The Smartcrypt platform consists of four components:

Application: An end user application that encrypts and decrypts protected data on any enterprise operating system.
Manager: A web-based management console that gives administrators organization-wide control over encryption activities.
SDK:The Smartcrypt Software Development Kit provides a simple way for developers to embed persistent data protection into existing applications.
TDE: Smartcrypt Transparent Data Encryption (TDE) protects sensitive information at rest on enterprise servers and enables compliance with a wide range of regulatory requirements and customer privacy mandates.

Together, these components create a flexible data security solution that’s compatible with even the most complex enterprise architecture.

Eliminating the threat
Data breaches can burden organizations with massive penalties, sky-high legal fees, and reputation damage than can take years to repair. Smartcrypt, PKWARE’s next-generation encryption and key management solution, eliminates these risks, ensuring that data remains protected everywhere it is used, shared, and stored.

Features:
Smartcrypt delivers a revolutionary combination of functionality, ease of use, and flexibility, allowing organizations to configure an optimal data security solution.

  • Persistent File Encryption
  • Application Layer Encryption
  • Encryption Key Management
  • Key Generation
  • Key Synchronization and Exchange
  • Policy Management and Control
  • Data Security Intelligence
  • X.509 and OpenPGP Encryption
  • Digital Signing and Authentication
  • Compression
  • Cross Platform

PK Protect

Powered by PKWARE e Dataguise technology

The PK Protect product suite comprises everything customers need to secure their most sensitive data and meet their compliance goals by finding sensitive data in structured, unstructured, and semi-structured content supporting detection, remediating sensitive data exposure for risk and compliance obligations, and tracking how and where sensitive data is being accessed.

Make sensitive data discovery and protection easier with a solution that’s intuitive to implement and use, and saves you time, resources, compliance costs, and complication. With the PK Protect Suite, businesses are empowered to work safely with sensitive data to make better business decisions, gain greater customer insights, move to the cloud, and generate new revenue streams.

Meet requirements under GDPR, CCPA, PCI-DSS, HIPAA, ITAR and other regulatory and industry mandates.

Protect data with a mix of masking and encryption based on who needs access and how the data will be used/viewed.

The suite encompasses the following solutions:

  • PK Discovery

Without requiring a single line of code, PK Discovery delivers fine-grained, aggregated optics into what sensitive data you have and where it resides. Find information stored on file servers, big data repositories, databases, endpoint devices, and across the enterprise. Integration with other PK Protect Suite capabilities can then trigger automatic encryption, masking, redaction, or other remediation for sensitive information.

  • PK Classification

Keeping a fast, dynamic and continuous record of the types of sensitive data an organization has. Data classification solutions are an essential component of helping organizations categorize data based on custom or predefined policies used to ensure the security of personal and sensitive data. Systematic, enterprise-wise classification simplifies compliance, improves end-user awareness of security policies, and makes other security technology more effective.

  • PK Encryption

Dynamically encrypting data in motion or at rest on the broadest platform in the industry

Quickly secure files and data without application changes, additional infrastructure, or professional services, and all without disrupting existing workflows. PK Encryption empowers both persistent encryption that applies protection directly to the data, or transparent data encryption for protecting stored data on enterprise servers.

  • PK Masking

Maintain control of sensitive data by masking it consistently across data stores. Static masking options can keep the data masked at rest, while dynamic masking options only mask data when it is in use. Automatically mask sensitive data in a DBMS to fully leverage the entire data set for more accurate and meaningful insight and measurement without compromising data security

  • PK Privacy

Control your company’s data privacy at the data, enterprise, and individual level with powerful PK Privacy engineering solutions, powered by Dataguise technology.

Today, businesses are required to stay on top of the privacy rights of hundreds of thousands—perhaps even millions—of individuals protected by multiple regulations. Meeting these requirements for privacy starts with understanding the variables and makeup of your different data subject groups relevant to each regulatory restriction. With PK Privacy, organizations have the methodologies, tools, and techniques to achieve required and acceptable levels of privacy.

This right-to-know discovery solution indexes identities and the data about those identities. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information as requested. Continuous monitoring for privacy data makes it easy to respond to a DSAR with the right policy.

Enable pseudonymization, anonymization, and de-identification of private personal data.

WinZip

WinZip

Developed by WinZip Computing now acquired by Corel Corporation

Winzip Standard e Winzip Pro

Zip, protect, manage and share your files with WinZip.

  • Zip and unzip instantly.
  • Manage all your files in one place.
  • Share directly to cloud, social media and IM.
  • Convert to PDF, add watermarks and resize photos.
  • Connect and share on the go with ZipShare