Best IT Security Software for HP-UX

Find and compare the best IT Security software for HP-UX in 2024

Use the comparison tool below to compare the top IT Security software for HP-UX on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Veeam Kasten Reviews
    Backup and restore applications to protect data. Your business must meet regulatory and corporate mandates. Load balancing, upgrades and load balancing can be done between cloud and on-premises. Veeam Kasten is a system that was specifically designed for Kubernetes. It provides enterprise operations teams with an easy-to use, scalable and secure backup/restore solution, disaster recovery and mobility of Kubernetes apps. Discovers Kubernetes apps and their dependencies automatically and seamlessly. Dynamic policies provide complete protection for rapidly changing applications. Manage stateful applications is made easy with an intuitive dashboard, Kubernetes native and REST APIs and CLI support. Deep integration with Kubernetes, databases and cloud infrastructure. Storage, CSI, authentication, OIDC, OAuth etc. Monitoring, logging and auditing.
  • 2
    Pandora FMS Reviews
    Top Pick
    With more than 50,000 customer installations across the five continents, Pandora FMS is a truly all-in-one monitoring solution, covering all traditional silos for specific monitoring: servers, networks, applications, logs, synthetic/transactional, remote control, inventory, etc. Pandora FMS allows you to quickly find and solve problems. It scales them so that they can be derived either from on-premise, multi-cloud, or both. You now have the ability to use your entire IT stack and analytics to solve any problem, even those that are difficult to find. You can control and manage any technology and application with more than 500 plugins, including SAP, Oracle, Lotus or Citrix, Jboss, VMware, AWS and SQL Server.
  • 3
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    Varies by component/scope
    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 4
    IRI CoSort Reviews

    IRI CoSort

    IRI, The CoSort Company

    From $4K USD perpetual use
    For more four decades, IRI CoSort has defined the state-of-the-art in big data sorting and transformation technology. From advanced algorithms to automatic memory management, and from multi-core exploitation to I/O optimization, there is no more proven performer for production data processing than CoSort. CoSort was the first commercial sort package developed for open systems: CP/M in 1980, MS-DOS in 1982, Unix in 1985, and Windows in 1995. Repeatedly reported to be the fastest commercial-grade sort product for Unix. CoSort was also judged by PC Week to be the "top performing" sort on Windows. CoSort was released for CP/M in 1978, DOS in 1980, Unix in the mid-eighties, and Windows in the early nineties, and received a readership award from DM Review magazine in 2000. CoSort was first designed as a file sorting utility, and added interfaces to replace or convert sort program parameters used in IBM DataStage, Informatica, MF COBOL, JCL, NATURAL, SAS, and SyncSort. In 1992, CoSort added related manipulation functions through a control language interface based on VMS sort utility syntax, which evolved through the years to handle structured data integration and staging for flat files and RDBs, and multiple spinoff products.
  • 5
    IRI DMaaS Reviews

    IRI DMaaS

    IRI, The CoSort Company

    $1000 per day
    IRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification.
  • 6
    Data443 Global Privacy Manager Reviews
    We make it easy for retailers to protect their customers' privacy rights and simplify SAR processing. Your privacy settings can set the standard for customer service and user experience. Your customers will have easy access to clear and understandable settings. Customers can access one place for all their privacy concerns. Give clear and precise explanations about the data you collect, as well as how it is used. In return, you will gain more trust. Your customers and you are not able to give consent in a vacuum. Customers can opt-in to or out of data collection. This gives them more control and increases your conversion rates. Customers can easily understand the report and see what data you have collected, how it's being used and how it's being protected. You can simplify the processing of Subject Access Requests (SARs), and enhance your customers' privacy experience.
  • 7
    IRI CellShield Reviews

    IRI CellShield

    IRI

    $35 one-time payment
    IRI CellShield®, protects sensitive information in Microsoft Excel®, allowing you to comply data privacy laws. You can protect your columns with reversible or non-reversible masking options. CellShield protects your data, no matter how many sheets they are. Multiple search methods are available to locate and report on PII across the LAN. Protect it all at once with CellShield. Intuitive graphical dialogs allow you to classify and mask it. CellShield's core technology uses the award-winning IRI FieldShield flat file and database data masking product. Data that is hidden in one platform can be seen in another. CellShield EE, the only fully-featured professional data discovery, masking and auditing package for Excel 2010, 2016, and 2019 (plus Office 365 workbooks) in your LAN, is available. CellShield EE goes beyond the security and scope a single password can provide by combining and automating all of these additional capabilities.
  • 8
    WatchTower Security Management App Reviews
    You can monitor your network using Check Point's WatchTower Security Management App and respond quickly to security threats from anywhere with your mobile phone. The intuitive WatchTower Security Management App allows you to monitor your network in real time, alerts you when it is at risk, and configure security policies for multiple gateways. You can view all devices connected to your network as well as any security threats. Real-time notification for malicious attacks and unauthorized device connections. Block malware-infected devices quickly and view details to assist with further investigation. You can customize notifications to your top security events. You can view all security events by category. Click the link to drill down for more information. You can configure security settings for multiple gateways. Securely manage advanced security policy settings via the web user interface.
  • 9
    Multi-Domain Security Management Reviews
    Multi-Domain Security Management provides more security and control by dividing security management into multiple virtual realms. Virtual domains can be created by businesses of any size based on business unit, geography, or security function. This will simplify management and strengthen security. Allows for the isolation of roles and granular administration of multi-tenant security management architectures. One security management configuration for VPN and Firewall, IPS, or other protections. All network security management domains can be viewed, accessed and controlled from one console. Multiple administrators can be created and centrally managed in multi-domain security management environments. Administrators can be granted permission to manage specific domains and other aspects of the multidomain system. Multiple administrators can work simultaneously on different security management domains.
  • 10
    StorMagic SvKMS Reviews
    We believe that enterprises should have a single point of contact for key management. SvKMS is a single platform that can manage all your encryption keys from anywhere. Customers receive an enterprise key manager that can manage any encryption workflow, at the edge, cloud, data center, or cloud. SvKMS offers enterprise-grade features in an easy to use interface at a surprising low cost. You can deploy anywhere, have high availability without borders, and integrate with any workflow. Advanced key management, powerful reports & authorization, lowest price on large scale. Easy configuration, simple administration, centralized management All encryption key management processes can be unified in a single virtual appliance. SvKMS provides a wide range of risk reduction options via GUI, integrated REST API-enhanced workflows, and KMIP standardization. SvKMS allows for rapid customization, dashboard auditing, and monitoring for all deployment scenarios.
  • 11
    Aruba ESP Reviews
    Aruba ESP (Edge Services Platform), a next-generation cloud-native architecture, enables you to accelerate your digital business transformation through automated network management and Edge-to-cloud cybersecurity. It also provides predictive AI-powered insights that can be accessed with up to 95% accuracy. Only ESP delivers faster everything, faster remediation, speedy security protection, scaling users and locations, and operational AIOps all on a single cloud-native architecture. Secure new devices with dynamic segmentation and policy enforcement rules Cloud-managed orchestration over wired, wireless, or WAN. You have the ultimate flexibility to use it in the cloud, on-premises or as a service. A cloud-native, uniform console that manages Wi-Fi, wired and WAN infrastructures gives you visibility and control over all domains. Aruba's Unified Infrastructure streamlines and improves IT operations on campus, branch, remote, and data center levels. All managed and orchestrated in the cloud, or on-prem, it also includes IoT networks.
  • 12
    Network Critical Reviews
    Network Critical's scalable, persistent visibility layer optimizes network infrastructure without compromising security or operations. Our systems and solutions are used in all sectors. Network Critical's visibility layers tools and systems data provide the necessary tools and data to monitor and control your network. Network Critical's persistent, scalable visibility layer provides tools and systems that provide critical network data to optimize, monitor and control changing network infrastructures without compromising security or operations. Network TAPs provide the base layer for smart network access and can monitor events on a local network. This ensures that all network security and monitoring platforms have complete visibility. It provides excellent performance and flexibility that is required to manage tools that protect network infrastructure, secure information, and keep up to date with the ever-changing attack environments.
  • 13
    HyTrust Reviews
    Organizations face the daunting task of addressing inconsistencies and gaps in policy enforcement in a multi-cloud environment. HyTrust CloudControl offers advanced privileged user access control, policy enforcement and forensic compliance for private clouds. HyTrust DataControl offers powerful data-at rest encryption and integrated key management to protect workloads in any cloud environment. Enterprises can protect their data by encrypting workloads. Scaling the management of encryption keys is one of the biggest challenges in workload encryption. HyTrust's mission aims to make cloud infrastructure private, public, and hybrid more trustable for government agencies, service providers, and enterprises. HyTrust offers solutions that automate security controls to software-defined computing, networking, and storage workloads.
  • 14
    Symantec Data Center Security Reviews
    Server monitoring and protection for private cloud environments. Security hardening and monitoring of private cloud and physical data centers, with support for Docker container. Agentless Docker container protection that integrates application control and management. Application whitelisting, granular intrusion prevention and real-time file integrity monitoring are some of the ways to block zero-day exploits. Secure OpenStack deployments using the full hardening Keystone identity service module. Monitoring of data center security. Monitoring the security of data centers in private clouds and on-premises environments.
  • 15
    Recovery Point Reviews
    Recovery Point is a pure play provider of cyber resilience, disaster recovery and business continuity solutions. Our goal is to protect your business' performance. With our comprehensive suite proactive services and solutions, your organization will be prepared for any disruption. Cyber preparedness, ransomware recovery and automation and orchestration using modern data protection, unparalleled recovery expertise, and modern data protection. Hybrid IT/business resilience for x86, Mainframe, and heterogeneous environment, blending legacy solutions with modern recovery solutions. We assess your current readiness and define your objectives using proven methodologies. This ensures a roadmap for operational resilience. Utilize proactive and predictive strategies to stay ahead of disruptions.
  • Previous
  • You're on page 1
  • Next