OpaqueVEILTecSec
|
TripwireFortra
|
|||||
Related Products
|
||||||
About
CKM® Runtime Environment, the core of TecSec’s Constructive Key Management® (CKM®) system, has an updated name! In an every changing market that is becoming more knowledgeable about security solutions, standards and products, TecSec has made a name change for our core technology in order to avoid any confusion between CKM the standard and CKM®, the product. CKM® Runtime Environment (RTE) is now known as OpaqueVEIL® and is the core of the VEIL® suite of products. The VEIL® suite, like its predecessor is a standards-based and patented cryptographic key management technology that provides information security and access control through cryptography. OpaqueVEIL®, as the underlying technology of all CKM Enabled® products, is comprised of a collection of software components that are required to utilize CKM technology. OpaqueVEIL® masks the detailed inner workings of cryptography and key management, making the results simple and programmer-friendly.
|
About
Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Computer Security software for businesses
|
Audience
Enterprise and industrial organizations that need a powerful cybersecurity solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationTecSec
United States
www.tecsec.com
|
Company InformationFortra
Founded: 1982
United States
www.tripwire.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
|
Computer Security Features
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Network Monitoring Features
Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting
|
|||||
Integrations
CYBERShark
Check Point IPS
Check Point Infinity
Claroty
Multi-Domain Security Management
NorthStar Navigator
Optiv Managed XDR
WatchTower Security Management App
|
Integrations
CYBERShark
Check Point IPS
Check Point Infinity
Claroty
Multi-Domain Security Management
NorthStar Navigator
Optiv Managed XDR
WatchTower Security Management App
|
|||||
|
|
|