import data and manage Organizational Units and Groups. The sign-in process uses a single Google Account and Universal Navigation. Managing user and company … groups, or users, and automate updates for new or relocated users. BulkSignature also offers campaign management tools. Users can sche…
Search Results
Listings (3,776-3,800 of 10,000)
safety and security video platform. Turing Vision’s cloud-based platform and video security technology allows users to search, be alerted, and analyze … safety and security video platform. Turing Vision’s cloud-based platform and video security technology allows users to search, be alerted, a…
operating system and application updates to increase security, and take advantage of integrated health monitoring and load balancing. … cloud applications and APIs. It enables users to build the web and cloud applications needed while also simplifying the management of applications with &hell…
Blink is a security automation copilot for security practitioners. With the generative AI in Blink, anyone can generate an automated workflow to handle … handle repetitive tasks or enforce security policies simply by typing a prompt. … Blink is a security automation copilot for securit…
enterprises.4me® combines ITSM with ESM and SIAM capabilities making it possible for all internal departments, such as IT, HR and Facilities, to work seamlessly … Portfolio Management … Waterline Portfolio Management analysis … Agile Project Management
cloud-based information platform that provides its users a centralized, collaborative experience across the company’s reality capture applications and customer … the Stream mobile app, enables faster 3D data capture, processing and project management anywhere in the world. Sphere systematize…
teams and technology. Supporting connectivity, Hub intranet is where employees can connect and collaborate with each, and connect to resources and tools … this include News and Events promote company updates and staff success stories. Peer recognition through employee shout outs. Polls and …
mapper, and security auditing software. Its core features include port scanning identifying unknown devices, testing for security vulnerabilities, and identifying
A solution to validate security posture, continuously. Using safe-to-use in production Breach & Attack Simulations, Validato simulates offensive cyber … cyber attack methods to test and validate security posture configurations. … test security control configurations… and then map back …
through an application security platform that detects, verifies, and fixes conventional technical vulnerabilities and complex security issues like business … code faster through a security platform that detects, verifies, and fixes conventional technical vulnerabilities and complex security i…
offers their online ticket sales system supporting different volumes of events with differing pricing tiers, touting a relatively low cost of service compared
businesses scale rapidly and efficiently, avoiding bloated technology footprints and unnecessary spending. It identifies vendor overlaps and potential compliance … while uncovering cost savings and managing the approval and renewal processes. This helps business leaders scale rapidly and effi…
Wiz
visibility solution for enterprise security. It provides a 360° view of security risks across clouds, containers and workloads. … application, vulnerabilities and secrets, presenting all the information in one place, with an aim to deliver quicker insights and informed decision-making &helli…
software offers MyChart, a patient portal for sharing health records and information, guidance, or communicating, as well as patient scheduling.
designed to transform every call into useful information that improves customer satisfaction, compliance and performance. … highlighting strengths and areas for improvement. Managers can track individual and team performance with precision, ensuring objective feedback and targeted coaching &h…
Brand Concierge helps a brand's customers to find information quickly, and actively guides them from discovery to decision through personalized conversations … users, understands intent, and responds using first-party data and approved content. A retail shopper can ask about fall trends and g…
in the right place and for risk management teams to understand the context so they can apply the proper security and disposition policies. … classify, protect, manage, and govern data across multiple collaboration systems. CAM streamlines the process of managing and governing data, making it …
offer the Data Control Platform for zero trust data security and access monitoring & management, and SaaS Shield as a data privacy service for cloud providers … manage, and segment sensitive cloud data. They provide a data privacy framework designed to make it easy to build applications that …
An industrial security appliance offered as a component of organizations' IoT/OT security journey. It bundles the security of Cisco Secure firewalls with … the visibility and control of industrial protocols and applications from automation vendors such as Omron, Rockwell, GE, Schneider, and S…
cloud-delivered security as a service that enables flexible, anytime and anywhere secure access for work from anywhere users. Leveraging FortiOS and the Fortinet … Fortinet Security Fabric, FortiSASE aims to provide frictionless orchestration between cloud-delivered NGFW, Web Security, IPS, D…
Autodesk’s Revit is a Building Information Modelling (BIM) tool. It enables architectural, MEP, structural, and engineering design, and provides analysis to support … Revit is a Building Information Modelling (BIM) product. It enables architectural design, MEP and structural design, detailing…
Delivery keeps digital assets and product information in one place with the goal of supporting fast, seamless creation and delivery. … Delivery keeps digital assets and product information in one place with the goal of supporting fast, seamless creation and delivery.
acceleration software to speed up contract decision making & provide better information to make decisions and evaluate. … remediate, and then progress issues to resolution.Collaboration tools - Share and liaise on issues with colleagues, to increase stakeholder visibility, and get … fa…
Organization (C3PAO), Ariento provides cybersecurity, information technology (IT), and compliance services to small and mid-sized organizations. … certification, and assessments.Managed Services - Turnkey IT, managed security (MSSP), and enclaves.Procurement & Resale - Microsoft, Cisco, a…
Oak's GOST is a search and retrieval platform that screens entities and prioritizes information to identify threats to operations and business at scale. … Oak's GOST is a search and retrieval platform that screens entities and prioritizes information to identify threats to operations and …

