identity governance and administration. Deep IACM does this by discovering deep into applications, databases and systems, where users and their access permissions … between all the layers. This information is used for downstream processes such as attestation, compliance, role management, audi…
Search Results
Listings (3,676-3,700 of 10,000)
very familiar and comfortable to them: grid-like spreadsheets. In the BRE, the rules are specified in business terms, not technical terms, and with expressions … Microsoft Excel. As a consequence, not only can rules be specified quickly and accurately, they are also easily understood by other…
structured/ unstructured info (short and long descriptions, technical sheets) to cleanse, enrich, deduplicate, and govern MMD by connecting all legacy systems … Records identification steps: 1. Material Categorization on custom taxonomy and UNSPSC or other, without mapping tables. 2. Materi…
platforms, comprising the DTN-X XTC Series, the DTN-X XT Series and the DTN-X XTS Series. The XTM and XTC are packet optical transports.
ACES Risk Management's (ARMCO) flagship product is ACES (Automated Compliance and Evaluation System) Web Audit Technology™ which enables full understanding … customizable technology that places audit plans, policies and procedures in motion to significantly reduce time and risk. Additionally,…
wellness and identity protection products that help businesses drive customer engagement and retention. The suite includes: -Credit monitoring and alerts-Credit … alerts-Credit scores and reports-Identity monitoring and alerts (including dark web monitoring)-Digital privacy tools-Financial ma…
Planon Space & Workplace Management solution supports all processes to plan, allocate, analyze, and change all connections between departments and spaces, people … people and spaces, assets and spaces, and workplaces and spaces. … Planon’s Integrated Workplace Management Solution (IWMS…
MistNet Network Detection and Response by LogRhythm (replacing the former NetMon Freemium) network security app, to provide network behavior analytics … analytics, check for policy compliance, and perform other routine security tasks at no cost.
provide a complete cybersecurity incident response, threat intelligence, and breach remediation platform.
provides a QR Code scanner to decode and capture all kinds of barcodes and QR Codes like Text, Phone number, WiFi information, SMS, Email, Weblink (URL), phone … number, vCard, meCard, Calendar events, Driver’s License, ISBN, and Geographic location. Features The scanner supports QR and bar …
StoneFly's Backup and Disaster Recovery as a Service (BDRaaS) offers centralized remote backup and disaster recovery (DR) solution with automated air-gapping … air-gapping, immutable storage, and 1-click direct restore for a mobile workforce, ROBO environments, and employees working from home…
support:User Experience design and PrototypingRequirements AnalysisSolution ArchitectureCodingTestingDeploymentHosting and Monitoring They offer various … official ABP Framework partner. Their team of software Microsoft Certified and Experienced ABP.IO professionals offers expertise required …
Associates's Customer Relationship Management (CRM) system helps to reduce costs by enabling operational control of customer and customer related activities for … permission and determines user functionality. At the same time, system structures are configured to the desired processes of indiv…
customers and organization. When specified linguistic, acoustic, and application criteria are met, employees receive automated assistance and guidance … Agent Assist™ is designed to analyze contact-center calls and desktop activities in real time and can automatically identify opportunities…
reliable wireless connectivity for mission-critical applications, and connects moving assets and can extend a network wirelessly wherever access is needed. … reliable wireless connectivity for mission-critical applications, and connects moving assets and can extend a network wirelessly wherev…
UX/UI team, and lead workshops to develop product and service strategy plans. Services include research and assessment, training and workshops, and customized … UX/UI team, and lead workshops to develop product and service strategy plans. Services include research and assessment, training and…
Amazon, Oracle, Huawei, etc. Cert Exams Prep content is available in PDF files and Practice Test Softwares (Real Exam Simulation Environment) which help candidates … candidates evaluate their exam preparation by identifying weak points and boost their confidence.
UK-based alcohol-themed software company PortSwigger Web Security, is an application security and testing solution.
workflows, and with less manual work. It also helps users shift to a proactive security stance by aiming to eliminate risk false positives and replacing … Torq's no-code security automation platform (formerly known as StackPulse) helps its users to improve their security posture, responding f…
solution from Nitel delivers control and security, as users can only connect to the applications they need. To enhance security, Nitel’s ZTNA service checks user … such as device type and antivirus version, ensuring that the devices used to access applications maintain your organization’s se…
part of the Fortinet Security Fabric, FortiAnalyzer provides security fabric analytics and automation to provide better detection and response against cyber … offers advanced logging and reporting capabilities, centralized security analytics across the Fortinet Security Fabric, and security a…
Intelligence (AMI) suite, providing a range of data center and mainframe security and visibility into security alerts.
Carta is an equity management platform that helps private companies manage their cap tables and issue securities electronically. Carta's tools help companies … statements, and other tools used to forecast, hire, and retain talent. The vendor states that Carta currently supports more than 40,…
compliance platform and protocol for issuing and managing digital securities on the blockchain, including dividends, distributions, and share buy-backs. Securitize’s … broker-dealers, custodians of crypto, escrow services, and other financial infrastructure for digital securities. … Se…
cybersecurity and reduces risk for organizations of all sizes through its security focused system design and suite of features which help implement and enforce … enforce security best practices. Its tools integrate cloud-managed video surveillance solution into an existing IT and security inf…

