multi-client management via a multi-tenant dashboard. Demonstrate compliance value with built-in audit reports and logs. Customize escalation and security policies … escalation and de-escalation. Ensure audit readiness with seamless compliance reporting and tracking. Streamline workflows with…
Search Results
Listings (326-350 of 10,000)
CyLumena is an Information Security Company of SDLC Management, INC. that was established in 2017 and is headquartered in Pittsburgh. They provide cyber … cyber security strategy & implementation services. CyLumena is a CitiusTech company since the June 2021 … certification, and provid…
Student Information was an SIS from Illuminate Education which features attendance and grade management, discipline, health, and reporting, and report card … Student Information was an SIS from Illuminate Education which features attendance and grade management, discipline, health, and report…
manage the in’s and out’s of the student experience such as class registration and planning, classroom management with attendance, grades, and discipline management … management, as well as student and parent portals. … Frontline’s Student Information System (SIS), from Frontline Educa…
provider of legal, regulatory, business information and analytics that help customers navigate the law faster, and to improve decision-making. The company … accessibility of India’s and International materials through their database.With the use of analytics, enterprise search, information re…
employee task management, messaging, lead and sales activities management and automation, note taking, and features supporting project-based or event-oriented … developed by Bestone Meest Information Technology Services (BMITS) headquartered in Noida, Uttar Pradesh. It is a customizable platf…
range of security information management, real-time analysis, threat verification and incident workflow automation. … Australian company Huntsman Security offers Next Gen SIEM SOAR (or Analyst Portal), a solution that when integrated with Huntsman Security’s Next Gen SIEM technology … …
macedonian information security research and development laboratory that specializes in information security hardening, consulting, network security, vulnerability … vulnerability research, software assessment, exploit development, and security advisories. … macedonian information secu…
Cyren DNS Security is an automated, location-based service for managing and protecting web usage. Delivered from the cloud as a SaaS service, it allows … can block malicious phishing and botnet sites, stop people from accessing porn or gambling sites, enforce “safe search,” and ensure a good …
laboratory information management system (LIMS) from TainoSystems in Quebec, dedicated to achieving regulatory compliance and data security and accessibility
automation and AI to aggregate information by collecting event data from various sources in the environment, correlating related incidents, and helping teams … IBM AIOps Insights is a solution for event and incident management that offers central IT operations teams a comprehensive view of t…
existing information security programs (administrative, physical and technical security controls), and develops, implements and manages information security … security programs tailored to each client’s specific security needs.
the latest threats in near real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siemplify … real-time, and enable security teams to detect, investigate and respond with speed and precision. It is based on the former Siempl…
Splunk Enterprise Security is an analytics-driven SIEM that helps to combat threats with actionable intelligence and advanced analytics at scale. … can investigate and correlate activities across multicloud and on-premises sources in one unified view to identify and remediate security incide…
Anomali Security Analytics combines native threat intelligence, AI-Powered analytics, and a Security Data Lake, empowering organizations to proactively … proactively detect and respond to threats. … Anomali Security Analytics combines native threat intelligence, AI-Powered analytics, a…
authentication, and advanced security reporting. Products in the suite includes Microsoft Intune mobile device management, Azure Information Protection, Microsoft … Microsoft Enterprise Mobility + Security is a suite of applications supporting mobile device and application security, MDM, as w…
Leasecake is a solution for lease & location management made for commercial brokers & tenants. Everyone owns or leases real estate in their business. … of business events in a portfolio, Leasecake will automate, organize, and notify customers of their key dates, make payments, document and c…
describe as an event networking platform for conferences and exhibitions, which now supports virtual events by allowing users to track speakers and agendas, … sponsor and attendee information, as well as engage with live chat or other interactive media.
An app-free alarm management platform providing customers with real-time notification and control of events, from Rapid Response Monitoring. Designed to … notifies customers instantly of an alarm via text message with important information needed to make critical decisions in real time, with …
of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. … of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. IDC helps IT …
is an event registration and ticketing platform, which the vendor states drives millions of events for companies, couples, non-profits, and event planners … create custom online RSVPs, and restrict respondents to a guest list, add invite-only Secondary Events, collect detailed information wit…
centralize security management and reduce demands on IT staff with Fusion’s Unified Threat Management (UTM) service. The multi-layered security service is … safeguard networks and information assets using a UTM device or UTM service on the network. It protects users against malware, viruses, …






