You are on page 1of 6

Bit9 / Carbon Black

Carbon Black is a cybersecurity company based in Waltham, Massachusetts. The company


develops cloud-native endpoint security software that is designed to detect malicious behavior and
to help prevent malicious files from attacking an organization.

Bit9 stops advanced persistent threats by combiningreal-time sensors, cloud-based software


reputation services, continuous monitoring and trust-based application control and allowlisting—
eliminating the risk caused by malicious, illegal and unauthorized software.

Blue COAT –

The company was best known for

1. web gateway appliances that scan internet traffic for security threats,
2. authenticate users and manage encrypted traffic,
3.
4. as well as products to monitor and filter employee internet activity.[2

Blue Coat Systems was a company that provided hardware, software, and services designed
for cybersecurity and network management. In 2016, it was acquired by and folded into Symantec.

Blue Coat devices are what is known as a "dual-use" technology, because they can be used both to
defend corporate networks and by governments to censor and monitor the public's internet traffic.
[95]
The appliances can see some types of encrypted traffic,[96] block websites or record website traffic.
[2]

TRIPWIRE

Tripwire Enterprise, the company's flagship product for IT configuration control by detecting,
assessing, reporting and remediating file and configuration changes. In January 2010, it announced
the release of Tripwire Log Center, log and security information and event management (SIEM)
software that stores, correlates and reports log and security event data.

RSA Security
®

RSA NetWitness Platform


Threat Detection and Response
Threat detection and response
RSA NetWitness Platform provides pervasive visibility across modern IT infrastructures,
enabling better and faster detection of security incidents, with full automation and orchestration
capabilities to investigate and respond efficiently.
Learn more

Evolved SIEM
RSA NetWitness Platform accelerates threat detection and response by providing deep visibility
into threats anywhere and by incorporating threat intelligence, business context and automated
capabilities for incident response.
Learn more

Threat defense
RSA NetWitness Platform analyzes data from across your network, endpoints, virtual
infrastructure and cloud environments to help security teams detect advanced threats that have
bypassed preventative controls.
Learn more

Log monitoring
RSA NetWitness Logs allows you to centrally manage and monitor log data from across cloud-
based and on-premises infrastructure. It identifies suspicious activity that evades signature-based
security tools.
Learn more

Network detection and response


RSA NetWitness Network provides real-time visibility into all your network traffic—east-west,
north-south, on premises, in the cloud and across virtual infrastructure—with full packet capture.
Learn more

Endpoint detection and response


RSA NetWitness Endpoint monitors activity across all your endpoints, on and off your network,
so you can drastically reduce dwell time and the cost and scope of incident response.
Learn more

Security orchestration and automation


RSA NetWitness Orchestrator is a comprehensive security orchestration and automation solution
designed to improve the efficiency and effectiveness of your security operations center and cyber
incident response team.
Learn more

User and entity behavior analytics (UEBA)


RSA NetWitness UEBA leverages user, network and endpoint behavior profiling to identify
abnormal activity. It helps detect insider threats, brute force attacks, account manipulation and
other malicious activities.
Learn more
®

RSA SecurID Suite


Identity and Access Management
Identity and access assurance
RSA SecurID Suite ensures your users have secure, convenient and appropriate access to
resources and data across your environment and provides unified visibility and control across
islands of identity.
Learn more

Multi-factor authentication
RSA SecurID Access protects SaaS applications and traditional enterprise resources with a full
range of authentication methods—including mobile push to approve and biometrics—and
dynamic, risk-driven access policies.
Learn more

Identity governance
RSA Identity Governance and Lifecycle simplifies access governance, streamlines access
requests and fulfillment, and provides a unified view of access across all of your systems and
applications.
Learn more
®

RSA Archer Suite


Integrated Risk Management (security, operational , 3rd party risk management )
Integrated risk management
RSA Archer Suite empowers organizations to manage multiple dimensions of risk on one
platform, and quickly implement industry-standard processes and best practices to improve risk
management and decision-making.
Learn more

IT and security risk management


RSA Archer IT & Security Risk Management gives you comprehensive capabilities for
quantifying cyber risk and communicating your organization’s risk and security posture to the
board and senior management.
Learn more

Operational risk management


RSA Archer Enterprise & Operational Risk Management centralizes data from siloed risk
repositories and gives risk managers a range of capabilities for identifying, assessing, evaluating,
treating and monitoring risks consistently.
Learn more

Third-party risk management


RSA Archer Third Party Governance gives you an accurate picture of third-party risk. It
automates and streamlines oversight of vendor relationships and facilitates activities necessary to
fulfill regulatory obligations.
Learn more

Audit management
RSA Archer Audit Management puts you in control of the complete audit lifecycle, enabling
improved governance of audit-related activities while providing integration with your risk and
control functions.
Learn more

Public sector risk management


RSA Archer Public Sector Solutions help U.S. government agencies improve information
assurance program management, maximize existing infrastructure investments, and implement
an integrated approach to meeting FISMA and OMB requirements.
Learn more

Business resiliency
RSA Archer Business Resiliency allows you to catalog your organization’s mission critical
processes and systems and develop detailed business continuity and disaster recovery plans so
you can protect your organization from disruption.
Learn more

Compliance management
RSA Archer Regulatory & Corporate Compliance Management provides a single, central,
searchable repository for regulatory data, along with capabilities for establishing a sustainable,
repeatable and auditable compliance program.
Learn more

RSA Fraud & Risk Intelligence Suite


Omnichannel Fraud Prevention
Enterprise fraud management
The RSA Fraud & Risk Intelligence Suite provides companies with a portfolio of sophisticated
fraud detection and prevention capabilities designed to protect consumers from financial fraud
threats across channels.
Learn more

Omnichannel fraud prevention


RSA Adaptive Authentication is an advanced omnichannel fraud detection hub that provides
risk-based, multi-factor authentication for organizations seeking to protect their consumers from
fraud in digital channels.
Learn more

3D Secure authentication
RSA Adaptive Authentication for eCommerce is RSA’s 3D Secure solution. It enables
merchants and credit card issuers to maintain a consistent, secure online shopping experience
while limiting chargeback losses.
Learn more

Threat management services


RSA FraudAction™ offers attack takedown and cyber intelligence services and provides
organizations with complete coverage against phishing and Trojan attacks, rogue mobile apps
and rogue social media pages.
Learn more

Cyber intelligence services


The RSA FraudAction Cyber Intelligence service combines RSA’s extensive visibility into the
dark web and cybercrime underground with continuous monitoring of social media forums to
provide clients with proactive intelligence.
Learn more

You might also like