provides social engineering simulation across all communication channels and delivers training to employees to change their behavior. The approach couples … simulation with personalized, result-driven employee training. Collecting and feeding results back into Phin’s simulation engine automat…
Search Results
Listings (301-325 of 10,000)
FortyNorth Security is a computer security consultancy that specializes in offensive security, with the goal of helping users identify, validate, and assess … assess the risk of any security vulnerability that may exist within an organization. Services they conduct include: Red Team Assessmen…
data from SIEMs, security data lakes, security tools, object storage, and non log data sources such as Cloud Control Plane, Github, and Jira. It correlates … data leakage.Integrates into the IT security environment: Works hand-in-glove with security and collaboration tools and workflows. Bene…
environment starts with protecting the identities– human and non-human – that access machines. Token Security takes a machine-first approach to securing enterprise … dependent on each identity, and where and how each identity is being used. This includes each identity’s entitlements and their…
message digests, digital signature creation and verification, bulk encryption and decryption, key generation and key exchange. RomSTL™Secure Data in Motion … CertificatesRomCert™ makes embedding security certificate management into resource-sensitive IoT devices fast, easy and reliable while …
Framework Security offers Cybersecurity Management from crisis control to proactive planning, by providing expert guidance for the toughest cybersecurity
reporting, volunteer management, small groups and contact management, nursery security and check-in, event registration, online giving and online registration … company, offers church management software providing membership tracking, contribution processing, attendance tracking, fund account…
IoT Device Management helps users register new devices by using the IoT management console or API to upload templates populated with information like device … manufacturer and serial number, X.509 identity certificates, or security policies. Users can then configure a fleet of devices with th…
helped venue security and event management teams to improve operational efficiencies and process accreditation for over six million workers and participants … self-managed, scalable and integrates with existing access control systems and technology platforms to provide a way to protect venues…
Securicy) is an information security and privacy management platform based on universal best practices to enable customers to create, promote, and prove their … their commitment to security no matter which security framework or privacy regulation they wish to comply with. … Securicy) i…
From inquiries to events (school tours and back-to-school night) SchoolMint Connect makes it easier to gather the right information to grow school enrollment … enrollment. Designed and built for PK-12 schools, this customer relationship management (CRM) solution (or Family Relationship Manage…
Community is a board management solution designed to help public and elected boards operate more efficiently. Users can prepare agendas and manage meetings … meetings, ensure security of sensitive information, and enable transparency to promote positive community engagement. … Communit…
Unicenter Network and Systems Management (Unicenter NSM) from CA Technologies reached end of life (EOL) in 2015. … Unicenter Network and Systems Management (Unicenter NSM) from CA Technologies reached end of life (EOL) in 2015.
The CGI Asset & Resource Management (ARM) Suite provides tools to streamline utilities' operations, providing EAM, workforce management, resource optimization … optimization, and other capabilities.
offers the PragmaLINE platform to utilities, providing an outage and storm management application.
The GMS Accounting and Financial Management Reporting System, from Grant Management Systems in Kensington, is not a traditional commercial accounting or … the highly specialized requirements of nonprofit and public organizations accounting for contracts and grants or by program activity.
of the work and a cost estimate. A cost, time and resource management module is usually used for generating the onshore man-hour estimate and cost estimate … carry out the work scope and the deliverables to be produced. Help deliver projects and manage progress for effectiveness and cl…
implementation and support team helps integrate hCue with existing processes and workflows. The vendor states benefits include:Keep company information up-to-date … up-to-date and accessible in a central databaseRespond quickly to information requests Avoid fines and penalties by staying ahea…
Heimdal’s PASM is a privileged access and session management solution built for IT and security teams to control and secure remote access to critical systems … Audit Trails and Reporting: Employs comprehensive tracking and reporting functionalities for proactive credential misuse prevention a…
multi-client management via a multi-tenant dashboard. Demonstrate compliance value with built-in audit reports and logs. Customize escalation and security policies … escalation and de-escalation. Ensure audit readiness with seamless compliance reporting and tracking. Streamline workflows with…
CyLumena is an Information Security Company of SDLC Management, INC. that was established in 2017 and is headquartered in Pittsburgh. They provide cyber … cyber security strategy & implementation services. CyLumena is a CitiusTech company since the June 2021 … certification, and provid…




