Software Magazine
Subscriber Login

Welcome to Software Magazine 's source for vendor information

    Help
Categories

New Search

Search Results: Security » Security Systems 5 Product(s) Found.

Sort By
◄  1  ►  
(ISC)˛

(ISC)˛

(ISC)2 CSSLP

For software developers, the CSSLP® certification from (ISC)˛ validates an individual’s application security competency within the software development lifecycle (SDLC). CSSLP professionals are not only seen as industry leaders in application security, but also as leaders within their organizations. A CSSLP professional benefits from proficiency in: • Developing an application security program in their organization • Reducing production costs, application vulnerabilities and delivery delays • Enhancing the credibility of their organization and its development team • Reducing loss of revenue and reputation due to a breach resulting from insecure software The Certified Secure Software Lifecycle Professional (CSSLP) is for everyone involved in the SDLC with at least 4 years of cumulative paid full-time work experience in one or more of the eight domains of the CSSLP CBK. Learn more at https://www.isc2.org/csslp/default.aspx. Last Updated: 02/12/14
Category: Security » Security Systems
Contact: Marketing
Email: csslpsupportteam@isc2.org
Phone: (866) 462-4777
URL: http://www.isc2.org
View More Detail or Request Additional Information
View All (ISC)˛ Listings
 
Metaforic

Metaforic

Metaforic Core

Metaforic Core™ software analyzes code both statically and dynamically, then automatically injects an optimized schema of various software antibodies into a copy of the source code, which developers then compile and build as normal. Developers never have to interact with the immune system; it is part of the automated build process. Metaforic Core provides the foundation for all Metaforic software protection; it is a prerequisite for additional Metaforic capabilities: • Metaforic Authenticator™– Ensures an application is in constant communication with an authentication device or cloud service. • Metaforic Concealer™– Hides sensitive data and obfuscates sensitive code. • Metaforic Enhanced Integrator™– Facilitates easy deployment into complex build environments. Last Updated: 07/05/12
Category: Security » Security Systems


View More Detail or Request Additional Information
View All Metaforic Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

Our Products

UNIS’ product line falls into three categories: • automation • data security • integrated embedded complexes UNIS has designed and applied an entire array of automated systems that can be applied to various aspects of a company’s business processes. Our design covers all the phases of system development: • design of the project architecture; • development of the relevant software; • building of hardware components; • personnel training and client support. An example of a complex, fully-automated system is the UNIS-proprietary “AScpr” Automated System for cell phone registration). This system, built by government contract, automatically registers all imported cell hones, so as to prevent contraband trade in Ukraine. The system is designed for maximum reliability. The use of cluster technologies on all levels allows for uninterrupted operation 24/7. A few specifics: • number of IMEI codes in the system: 119 million. • number of SMS and WEB queries processed daily: 300,000. • time spent on processing a single query: less than 0.05 seconds. Despite their complexity, neither of our automated and secure systems has even countered a single breach or breakdown in operations. UNIS is continuously researching and developing methods of data encryption. We have developed several unique methods of encryption, such as: • distribution of encryption keys, based on elliptic curves; • initialization of a random sequences generator. Our research has yielded the following unique software products: • a cryptographic data protection utility for use in automated systems; • a hardware-software certification authority solution. UNIS has developed a software utility for use as a component of automated systems for cryptographic data transformations. This utility provides for the following possibilities: • the use of electronic digital signatures; • the use of Certificate Revocation Lists (CRL); • the use of TSP and OCSP services. Our certification authority solution is designed to carry out regulated procedures and to service our client’s public key certificates. This product, which employs an integrated hardware-software solution, can automatically generate, block, invalidate and/or renew digital certificates, publish timely information regarding the certificate’s status and provide time stamping services. In addition to strictly software-based solutions, UNIS also develops embedded solutions of encryption with a separate software component. These modules are distinguished by a higher level of security of information and may be utilized in various ways, for example as a component of a computer system. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

ARGOS

“ARGOS” – a data encryption system that connects with a computer through a USB interface, so that all cryptographic data transformations take place inside the microprocessor, which, in turn, eliminates the possibility that the secret key may be copied, or that the data may be captured by spy software. Some product features: • data encryption; • calculation of hash-functions; • electronic signature verification; • random sequences generation (with the use of an internal hardware noise generator); • unauthorized access protection. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 
Ukrainian National Information Systems (UNIS)

Ukrainian National Information Systems (UNIS)

AMON

“AMON” – a voice flow encryption system, designed for the encryption of voice flow. This unique product can be used for the creation of a secure channel for audio communication between a group of users in a GSM network. The odds of encountering a breach in such a communication link are about one in a trillion. Last Updated: 01/08/13
Category: Security » Security Systems
Contact: Roman Zvarych
Email: roman@ukrainesystems.com
Phone: 380 44 253-2950
URL: http://www.ukrainesystems.com
View More Detail or Request Additional Information
View All Ukrainian National Information Systems (UNIS) Listings
 
◄  1  ►  
New Search
Send to Friend