built for reliability and scalability, and is designed to make file sharing simple and secure. With compliance to SOC 2, HIPAA, and GDPR, SFTP To Go ensures … protocols like SFTP, FTPS, S3, and HTTPS are used, with encryption for data both in transit and at rest. Multi-factor authentication a…
Search Results
Listings (3,876-3,900 of 10,000)
solving data storage obsolescence and cyber security issues. The vendor states that in 2017, the Department of Homeland Security selected NexiTech’s patented … NexiTech specializes in storage networking solutions and advanced cyber security techniques for actively defending against cyber thre…
weekly micro training, simulated phishing attacks, security policies, a security risk assessment and our Employee Vulnerability Assessment (EVA). EVA helps … Unlimited Clients Subscriptions provides clients with employee security awareness training and Dark Web Breach Assessments. The Breac…
video security and loss prevention system. The platform that combines video cameras with integrated data, along with analytics that inform security, loss … loss prevention and operations to protect an organization's people, patrons and profits. … video security and loss prevention syst…
An AI security analyst that helps organizations stay ahead of security threats. The tool streamlines investigations by intelligently combining common tools … tools, synthesizing threat intelligence and contextual insights into a single conversational user experience. … An AI security a…
Aurascape closes AI security gaps created by traditional security. Aurascape extends organizations' security architecture to detect, analyze, and control AI use … Aurascape closes AI security gaps created by traditional security. Aurascape extends organizations' security architecture to detec…
linking it with issues, and making reports of actions and outcomes, ultimately providing a solution to manage contacts, companies, and any customer-facing … consulting and makes add-ons such as CRM, Calendar, HelpDesk, which expand usage of Atlassian products. Teamlead's CRM for Jira is used …
conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and collaboration, and related purposes … conference rooms, and displays for businesses, used for informational purposes, interactivity and learning, communication and col…
Veracode provides advanced application security solutions, trusted by enterprises to develop and maintain secure software. Its platform identifies exploitable … exploitable risks, speeds up vulnerability remediation, and reduces security debt at scale using a proprietary AI-assisted remediati…
SOC, from Check Point, is a security analytics solution that aims to provide security teams with the confidence to expose and shut down attacks faster, before … platform, to increase security operations efficiency and ROI. Infinity SOC uses AI to pinpoint real attacks from millions of daily l…
the Evident Security Platform) is presented as a comprehensive Cloud Native Security Platform (CNSP) that delivers full lifecycle security and full stack … or custom signatures of threats and provides daily risk reports, and also detects what users were responsible for risk and provides remed…
programming and modeling, and project management facilities. In addition, AS can be used to build custom procedures to automate data analysis and repetitive … development and business intelligence tools for IBM zSystems mainframes. The flagship Rocket AS product is a tool used to query, repor…
Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker. … applying organization-wide policies and threat intelligence, and ensuring identities are verified and authenticated and devices are safe. It conditionally … access to data, ap…
rooms both on the spot and remotely. The platform integrates with popular apps like G Suite, Office 365, Microsoft Exchange, and iCalendar, so users can … door and a check-in feature that prevents ghost meetings or double bookings, the product ensures all team members have access to accurate…
developers and communities use open source security tools and standards to continuously secure their software projects, and provide proof of that security to their … developers and communities use open source security tools and standards to continuously secure their software projects, and pro…
Zscaler Internet Access
(SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps. … access to the internet and SaaS apps, ZIA ensures fast, direct, and secure connections to the internet and SaaS applications, eliminating the need for traditional … traditional …
platform to unify access governance, automate audit and compliance processes, and fortify application security. Pathlock helps complex organizations in the world … world to confidently handle the security and compliance requirements in their core ERP and beyond. … gains and cost savin…
prioritize trade-offs, inform stakeholders, and make decisions without having to spend hours cobbling information together.
LEAMAP from Lynx Information Systems (Lynx Exploration Archivist Map Scanning and Vectorising) is an application that converts seismic maps in hard copy
(formerly Carbonite Information Archiving or ZixArchive before that), stores an unlimited number of files and communications across email, SMS, and emerging platforms … (formerly Carbonite Information Archiving or ZixArchive before that), stores an unlimited number of files and communications…
save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting of blocks, thereby reducing … save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting…
Messaging Security Gateway, their email security platform for companies, enterprise to SMB, featuring email encryption with high level (99%) of spam and (the … Elements brings together vulnerability management, automated patch management, dynamic threat intelligence and continuous behavioral …
Manager generates and remembers secure passwords. Extra safeguards available include touch and face ID login, 2-factor authenticated login, and secrets (e.g … g. payment card information, notes, etc) storage.
Analyzer is log management and analysis tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualization … performance and availability of the monitored IT infrastructure. According to the vendor, key feature and business benefits include:…
optimize a business's security posture any time, and empower companies to safeguard their business-critical assets. Cymulate challenges security controls by initiating … showing the user exactly where a network is exposed and how to fix it—making security continuous, fast and part of every-da…



