RSA News: TITUS Enhances Security Suite

Roundup of News from Security Solutions Providers Attending RSA 2014
RSA News: TITUS Enhances Security Suite

TITUS introduces the latest version of TITUS Security Suite for Microsoft SharePoint, featuring enhanced mobile access security capabilities. The version enhances SharePoint security by automating critical functions like managing permissions, limiting mobile access, and applying security labels to documents. This promotes strong, consistent data governance over information stored in SharePoint. TITUS leverages existing document metadata and trusted user claims to ensure that security is applied automatically and consistently across all corporate documents stored in SharePoint.

See Also: Detecting and Mitigating Fraud Through Trust Building

For more information, visit TITUS.

Prevalent Unveils Vendor Threat Monitor

Prevalent unveiled Vendor Threat Monitor, the new vendor threat intelligence platform which works in concert with Prevalent's Vendor Risk Manager. It allows organizations and IT professionals to continuously and proactively monitor key threat vectors from third-party providers across several relationship risk areas.

The combination of Prevalent VTM and Prevalent VRM goes beyond point-in-time assessments by providing organizations with monitoring and automated alerts of third-party risks and threats. This "real-time" risk and assessment helps enterprises adhere to industry compliance requirements and provides peace-of-mind by proactively identifying potential third-party risks before they become legal liabilities to the business.

For more information, visit Prevalent.

Tripwire's Key Products Discover Conditions, Vulnerabilities

Tripwire, Inc. announced that key products now discover more than 90,000 conditions, including vulnerabilities, configurations and operating systems, and more than 14,000 applications. Tripwire solutions ensure that assets on customer networks are accurately profiled, evaluated for vulnerabilities and audited for compliant configurations.

Tripwire provides timely vulnerability intelligence through the company's Vulnerability and Exposure Research Team (VERT), dedicated security and vulnerability researchers, a state-of-the-art lab and attention to the changing threat environment. Tripwire's VERT identifies emerging vulnerabilities and creates detection signatures that are constantly updated in Tripwire vulnerability and risk management solutions, delivering vulnerability discovery coverage.

For more information, visit Tripwire.

Skybox Security Launches Risk Control 7.0

Skybox Security launches Skybox Risk Control 7.0, a comprehensive vulnerability management solution. Highlighting the Risk Control 7.0 release is a new remediation dashboard, which provides a central view for IT security professionals to effectively monitor and track vulnerability remediation activities in large organizations.

Skybox's context-aware remediation approach allows IT practitioners to convert volumes of vulnerability data into detailed remediation instructions, supporting an end-to-end vulnerability management process. Skybox identifies concentrations of vulnerabilities by vendor, business unit, security bulletins, or by geographic location in a company, enabling organizations to reduce overall vulnerability levels quickly, with minimal effort.

For more information, visit Skybox Security.

For more RSA-related vendor news, click here.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Megan Goldschmidt

Megan Goldschmidt

Associate Editor

Goldschmidt is the former Associate Editor for ISMG. A recent graduate of Ithaca College, she has worked for multiple publications in NJ and NY, including the Trentonian and the Rochester Business Journal, instilling a passion for writing, editing and social media.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.