Applied Visions Inc., Secure Decisions Division

Rating: 0 - Write A Review
6 Bayview Avenue
Northport, NY 11768-1502
About Applied Visions Inc., Secure Decisions Division
  • Secure Decisions provides tools and services to help you analyze massive amounts of critical data to make better decisions. Our visual analytics products let you see and understand the security state of your critical infrastructure, including fixed and mobile computing assets.

    Our SecureScope, VIAssist and MeerCAT visualization systems are the results of our leading-edge research on enhancing the effectiveness of analysts in this domain. SecureScope™ visualizes data collected from a single sensor, or a combination of sensors, such as an IDS, IPS, Firewall or Audit Log. VIAssist™ is an award-winning visualization suite that converts network data into graphical representations to demonstrate network patterns and trends. MeerCAT is used to visualize the location, security state, and communication patterns of your own authorized wireless assets as well as the wireless assets that may be threatening your enterprise.
Competitors of Applied Visions Inc., Secure Decisions Division
  • Thales e-Security Inc

    Thales e-Security is a leading global provider of data protection solutions with more than 40 years experience securing the world’s most sensitive information. Our customers—businesses, governments, and technology vendors with a broad range of challenges—use Thales products and services to...
  • Courion Corporation

    Courion Corporation, the leader in identity and access management (IAM) solutions that effectively and securely manage user access risk, helps companies effectively manage risks associated with information access. More than 14 million users in 500 organizations worldwide rely on Courion’s...
  • RSA, The Security Division of EMC

    RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing...