Professional Documents
Culture Documents
Blue COAT –
1. web gateway appliances that scan internet traffic for security threats,
2. authenticate users and manage encrypted traffic,
3.
4. as well as products to monitor and filter employee internet activity.[2
Blue Coat Systems was a company that provided hardware, software, and services designed
for cybersecurity and network management. In 2016, it was acquired by and folded into Symantec.
Blue Coat devices are what is known as a "dual-use" technology, because they can be used both to
defend corporate networks and by governments to censor and monitor the public's internet traffic.
[95]
The appliances can see some types of encrypted traffic,[96] block websites or record website traffic.
[2]
TRIPWIRE
Tripwire Enterprise, the company's flagship product for IT configuration control by detecting,
assessing, reporting and remediating file and configuration changes. In January 2010, it announced
the release of Tripwire Log Center, log and security information and event management (SIEM)
software that stores, correlates and reports log and security event data.
RSA Security
®
Evolved SIEM
RSA NetWitness Platform accelerates threat detection and response by providing deep visibility
into threats anywhere and by incorporating threat intelligence, business context and automated
capabilities for incident response.
Learn more
Threat defense
RSA NetWitness Platform analyzes data from across your network, endpoints, virtual
infrastructure and cloud environments to help security teams detect advanced threats that have
bypassed preventative controls.
Learn more
Log monitoring
RSA NetWitness Logs allows you to centrally manage and monitor log data from across cloud-
based and on-premises infrastructure. It identifies suspicious activity that evades signature-based
security tools.
Learn more
Multi-factor authentication
RSA SecurID Access protects SaaS applications and traditional enterprise resources with a full
range of authentication methods—including mobile push to approve and biometrics—and
dynamic, risk-driven access policies.
Learn more
Identity governance
RSA Identity Governance and Lifecycle simplifies access governance, streamlines access
requests and fulfillment, and provides a unified view of access across all of your systems and
applications.
Learn more
®
Audit management
RSA Archer Audit Management puts you in control of the complete audit lifecycle, enabling
improved governance of audit-related activities while providing integration with your risk and
control functions.
Learn more
Business resiliency
RSA Archer Business Resiliency allows you to catalog your organization’s mission critical
processes and systems and develop detailed business continuity and disaster recovery plans so
you can protect your organization from disruption.
Learn more
Compliance management
RSA Archer Regulatory & Corporate Compliance Management provides a single, central,
searchable repository for regulatory data, along with capabilities for establishing a sustainable,
repeatable and auditable compliance program.
Learn more
3D Secure authentication
RSA Adaptive Authentication for eCommerce is RSA’s 3D Secure solution. It enables
merchants and credit card issuers to maintain a consistent, secure online shopping experience
while limiting chargeback losses.
Learn more