Endpoint Security - Host-based Intrusion Detection System (HIDS)13

Select Up to 5 Products to Compare

  • Product Info
  • Resources
  • Awards
  • Certifications & Compliance
Product Vendor   Description License
Gartner SC Magazine (US) White Papers     Awards CC SCAP OPSWAT Gold    
Recently Updated  
Critical System Protection Monitoring Edition Symantec Corporation   Symantec Critical System Protection Monitoring Edition detects changes and behaviors on virtual, physical and multi-OS systems to reduce operational downtimes and meet critical security and compliance requirements. The real time monitoring process oversees system, data and application files, registry keys, configuration settings and user and application behaviors on servers with minimal system impact. Symantec Critical System Protection Monitoring Edition detects changes and behaviors on virtual, physical and multi-OS systems to reduce operational... Commercial Read Review                  
Triumfant Resolution Manager Triumfant   Triumfant Resolution Manager is a completely new approach to endpoint security, using granular change detection and analysis to continuously enforce security configurations and identify malicious attacks. The depth of Triumfant's scan scope and unique ability to detect problems is only surpassed by its equally unique ability to synthesize a situational, contextual remediation to immediate and automatically fix what it finds. Resolution Manager stands alone in its ability to proactively analyze complex computing environments, enforce configurations and policies, and automatically synthesize situational remediations to ensure the security and continuity of information services. Triumfant Resolution Manager is a completely new approach to endpoint security, using granular change detection and analysis to continuously enforce... Commercial                    
Advanced Intrusion Detection Environment (AIDE) Advanced Intrusion Detection Environment (AIDE)   AIDE works by creating a database containing information about the files on your system. The database is created from rules laid out in the configuration file aide.conf. When AIDE is run, this database is referenced to check for changes. Any changes not permitted by the configuration file are reported. AIDE works by creating a database containing information about the files on your system. The database is created from rules laid out in the... Commercial           SANS WhatWorks - 3.3 System Integrity Checking Tools
SANS
         
Blink Endpoint Protection eEye Digital Security   Blink delivers integrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against known exploits, zero day attacks, and all other attack vectors. Blink protection modules are also integrated into our flagship Retina solution bundle. Blink delivers integrated multi-layered endpoint protection in a single, lightweight client that replaces multiple security agents, protecting against... Commercial Read Review Read Review                
HoneyPoint Security Server with Wasp MicroSolved Inc   HoneyPoint Security Server© (HPSS) can help your organization secure its information assets by detecting attacks earlier, automatically disrupting attacker activity and by giving you intelligence about the source, intent and capability of attackers. Its powerful features and flexible usage scenarios empower organizations to manage threats and gain deeper insight into your risks which adds to the accuracy of your security decisions. HPSS can be leveraged without false positives, increases in security resources or signature updates which makes it a true "deploy and forget"solution! HoneyPoint Security Server© (HPSS) can help your organization secure its information assets by detecting attacks earlier, automatically disrupting... Commercial                    
Infogix ACR™ Infogix   Automated Information Controls Software Solution for the Mainframe and Host-Based Environments The Infogix ACR product family is Infogix's Automated Information Controls platform of choice for mainframe and host-based computing environments. Within this product family, we offer: ACR/Summary® * Compares summary-level information such as record counts and totals across applications, files, databases, and reports * Summary-Level Balancing: Balance record counts and totals across business applications and processes * Cycle-to-Cycle Balancing: Compare and balance data values from previous cycles * File Verification: Validate that correct files are being processed and there is no duplication Automated Information Controls Software Solution for the Mainframe and Host-Based Environments The Infogix ACR product family is Infogix's Automated... Commercial Read Review                  
Neon DB2 Auditing for z/OS Neon Software Inc   NEON Enterprise Software developed and maintains technology for monitoring and auditing activity of DB2 on z/OS. NEONs Database Activity MonitorTM technology was purpose-built for auditing, and is optimized to collect all the data required by auditors using the fewest system resources possible. NEON Enterprise Software developed and maintains technology for monitoring and auditing activity of DB2 on z/OS. NEONs Database Activity MonitorTM... Commercial                    
PointSecure OpenVMS Pointsecure: OpenVMS Security & Auditing   PointSecure is the leading provider of security and auditing solutions for OpenVMS systems. Highly recommended by HP, our solutions have been declared "virtually unhackable" and were banned from Defcon. Our solutions protect your OpenVMS systems from both external and internal security threats while ensuring compliance with corporate security policies and governmental regulations such as HIPAA, GLBA and BS779. Our capabilities for intrusion detection, real-time monitoring and access control are second to none. If OpenVMS is critical to your organization's business, then you should be talking to PointSecure. PointSecure is the leading provider of security and auditing solutions for OpenVMS systems. Highly recommended by HP, our solutions have been declared... Commercial     Read Review              
Responder Pro HBGary   The ultimate in Windows™ physical memory and automated malware analysis all integrated into one application for ease of use, streamlined workflow, and rapid results. The Professional platform is designed for Incident Responders, Malware Analysts, and Computer Forensic Investigators who require rapid results. Responder Professional provides powerful memory forensics and malware identification with Digital DNA™. Malware analysis includes automated code disassembly, behavioral profiling reporting, pattern searching, code labeling, and control flow graphing. This is a huge step forward for the information security and computer forensic communities. Finally, these long-awaited capabilities are available to complement enterprise security best practices in the areas of host intrusion detection, computer forensics and security assessments, The ultimate in Windows™ physical memory and automated malware analysis all integrated into one application for ease of use, streamlined workflow, and... Commercial   Read Review       Cool Vendors in Application Security
Gartner
         
Samhain Samhain Labs   The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as standalone application on a single host. The Samhain host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit... Commercial           SANS WhatWorks - 3.3 System Integrity Checking Tools
SANS