|
Event description
Class Number: 9
Previous details
New details
Class Number: 9 Class Items: Downloadable software for use as a tool to monitor computer system servers and workstations by monitoring, detecting and analyzing computer systems for user-based insider threats to data, and monitoring the computer systems of third-party contractors and of other business partners for cyber security threats to data; downloadable software for use in auditing of computer systems for cyber security threats; downloadable software for regulatory compliance of computer systems and computer systems audits; downloadable software used for simple and integrated video format reporting for live cyber incident response; downloadable software for conducting multi-factor searches for cyber security threats to computer systems and for generating the corresponding reports; downloadable software with incident response tools, namely, downloadable software for investigating data leakage from computer systems by monitoring user endpoints for suspicious activity, alerting administrators, and auditing user activity; downloadable software for managing user software licenses featuring affordable floating licensing subscriptions; downloadable software for detecting, blocking, and logging unauthorized USB device connections to endpoints to prevent data exfiltration; downloadable software for configuring manual approval during login, enforcing endpoint access restrictions, and ensuring that only authorized users can access critical systems; downloadable software to manage and monitor privileged accounts and their access to systems and data within a network; downloadable software for managing credentials, passwords, and privileged data, to ensure secure access to databases, operating systems, and web-based IT resources; downloadable software for controlling remote access to privileged accounts with real-time monitoring and session recording, to ensure compliance and security; downloadable software for implementing multi-factor authentication used to verify and manage privileged user identities; downloadable software used for integrating with directory services for the centralized management of privileged accounts across on-premises and cloud environments; downloadable software for discovering and onboarding new accounts into the privileged access management system and for ensuring consistent protection and monitoring of all systems; downloadable software for real-time monitoring and threat detection of privileged account activities, with automated response capabilities for security incidents; downloadable software for integration with third-party applications and cloud services, used to allow seamless integration with ticketing systems, SIEM tools, and other IT management systems; downloadable software for enforcing identity policies across diverse IT environments and ensuring authorized access to sensitive data and systems; downloadable software for securely storing and managing individual user credentials in a personal password vault.
|