against network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, and information theft. … network and application downtime (or slow time), application vulnerability exploitation, malware spread, network anomalies, information …
Search Results
Listings (3,876-3,900 of 10,000)
computer vision intelligence company providing enterprise security operations to prevent security incidents. … enterprise security operations to prevent security incidents. The Ambient.ai platform applies AI and computer vision intelligence to existing sensor and camera … camera infr…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … Defense supports security with manag…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … Intelligence Suite aims to accelerat…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … sensors, threat intelligence and dat…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … since 2004, and boast a deep underst…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … that extends security operations cap…
partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills … instills confidence in their readiness to defend against and respond to cyber threats. … resilience in the face of risk. It h…
infrastructure to bring together several security solutions within a single platform, capable of detecting and responding to security incidents. … integrated SOAR tool (Security Orchestration, Automation and Response) that centralizes information relating to IT security, processes it and prop…
Cerby is an identity security platform built for disconnected apps, providing IT and Security teams with full control over apps that lack APIs or support … Cerby is an identity security platform built for disconnected apps, providing IT and Security teams with full control over apps that lack…
with its CAD counterpart to share information between agencies, departments, and jurisdictions, and update state and federal reporting features. … with its CAD counterpart to share information between agencies, departments, and jurisdictions, and update state and federal reporting features. …
platform to assess, diagnose, and resolve incidents across mission-critical workloads. With it, users can extend the event analytics from IBM Netcool Operations … Insight with real-time analysis of unstructured data, holistic correlation, and ChatOps integration; or, users can augment an exis…
modeling, and big data machine learning techniques. This helps organizations predict future outcomes more accurately, plan for unknown events, and discover … modeling, and big data machine learning techniques. This helps organizations predict future outcomes more accurately, plan for unknown …
Infrastructure (OCI) Functions is a serverless, event-driven service that lets developers build, run, and scale applications without provisioning or managing … when the function is running. Functions integrate with other OCI services and Oracle SaaS applications. Based on an open framework, O…
Zscaler Internet Access
(SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps. … access to the internet and SaaS apps, ZIA ensures fast, direct, and secure connections to the internet and SaaS applications, eliminating the need for traditional … traditional …
clubs, with an enterprise plan. The user can share a public calendar of events by creating a public calendar for a business, venue, or school club. … devices, external public and internal private schedules for control of communication.EventsHold one day or multi-day events with its event sche…
Analyzer is log management and analysis tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualization … performance and availability of the monitored IT infrastructure. According to the vendor, key feature and business benefits include:…
solving data storage obsolescence and cyber security issues. The vendor states that in 2017, the Department of Homeland Security selected NexiTech’s patented … NexiTech specializes in storage networking solutions and advanced cyber security techniques for actively defending against cyber thre…
conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and collaboration, and related purposes … conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and col…
weekly micro training, simulated phishing attacks, security policies, a security risk assessment and our Employee Vulnerability Assessment (EVA). EVA helps … Unlimited Clients Subscriptions provides clients with employee security awareness training and Dark Web Breach Assessments. The Breac…
video security and loss prevention system. The platform that combines video cameras with integrated data, along with analytics that inform security, loss … loss prevention and operations to protect an organization's people, patrons and profits. … video security and loss prevention syst…
Jit.io is a lean security suite offering DevSecOps tools, from Jit Security headquartered in Tel Aviv.
linking it with issues, and making reports of actions and outcomes, ultimately providing a solution to manage contacts, companies, and any customer-facing … consulting and makes add-ons such as CRM, Calendar, HelpDesk, which expand usage of Atlassian products. Teamlead's CRM for Jira is used …
An AI security analyst that helps organizations stay ahead of security threats. The tool streamlines investigations by intelligently combining common tools … tools, synthesizing threat intelligence and contextual insights into a single conversational user experience. … An AI security a…
programming and modeling, and project management facilities. In addition, AS can be used to build custom procedures to automate data analysis and repetitive … development and business intelligence tools for IBM zSystems mainframes. The flagship Rocket AS product is a tool used to query, repor…


