GRC Tools & Reviews

Find Vendors To Compare

Vendors by Industry + Search by Tech Matrix OR Search by Support Matrix
(−) Clear Results

(43) Results for IT Security Applications

View Profile
Visit Site

Neohapsis is a trusted provider of mobile and cloud security services. We work with more than 300 global enterprises to address their constantly evolving information security and compliance challenges. Leveraging our security expertise, advanced research and..
View Profile
Visit Site

Founded in 2002, ixAssociates was started by a group of industry specialists from the 'Big-4' consulting firms and the world's largest technology systems integrators. ixAssociates is a business and software solutions organisation focused on information cybe..
View Profile
Visit Site

Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. ..
View Profile
Visit Site

Bullzi Security offers compliance programs, information security services, physical security solutions, education programs, document security and investigative services. Bullzi Security is a publicly held Nevada corporation with operational locations in New..
View Profile
Visit Site

Lieberman Software released its first commercial product in 1994, but traces its roots back to 1978 when it was founded as a software consultancy. Since its inception, Lieberman Software has been a profitable, management owned firm. Lieberman Software pi..
View Profile
Visit Site

Brinqa is an Information Security and Vendor Management platform focused on IT Operations, Compliance, Data Management and Data Analytics. Brinqa's solutions include aggregating data from any source, correlating and analyzing the data, tracking metrics, ..
View Profile
Visit Site

Shared Assessment is a collaborative created by financial institutions and the Big 4 audit firms, the Shared Assessments tools provide rigorous standards for building and enhancing ERM, GRC and risk management capabilities. The 2013 Complete Bundle incl..
View Profile
Visit Site

Aveksa joins RSA Security Division to Help Transform Authentication and Identity Management Across Enterprise, Mobile and Cloud Environments. EMC Corporation announced it has acquired privately held Aveksa Inc., a leader in business-driven Identity and Acce..
View Profile
Visit Site

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point 3D ..
View Profile
Visit Site

Prodatasec consulting solutions include: Forensic Investigations, Business Continuity, Internal Security, External Security, Security Architecture, Security Policy & Procedure, Social Engineering Services, Database Security, IT Audit, and Training. [Ple..
View Profile
Visit Site

Hewlett-Packard has developed an IT Performance Suite of solutions for the enterprise. HP's solutions include Security & Risk Management, Application Security, Business Protection, Endpoint Security, and Network Management Security. HP's services and sol..