rooms both on the spot and remotely. The platform integrates with popular apps like G Suite, Office 365, Microsoft Exchange, and iCalendar, so users can … door and a check-in feature that prevents ghost meetings or double bookings, the product ensures all team members have access to accurate…
Search Results
Listings (3,901-3,925 of 10,000)
save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting of blocks, thereby reducing … save time during design, engineering, and production. The engineering information enables greater prefabrication and pre-outfitting…
SOC, from Check Point, is a security analytics solution that aims to provide security teams with the confidence to expose and shut down attacks faster, before … platform, to increase security operations efficiency and ROI. Infinity SOC uses AI to pinpoint real attacks from millions of daily l…
Veracode provides advanced application security solutions, trusted by enterprises to develop and maintain secure software. Its platform identifies exploitable … exploitable risks, speeds up vulnerability remediation, and reduces security debt at scale using a proprietary AI-assisted remediati…
LEAMAP from Lynx Information Systems (Lynx Exploration Archivist Map Scanning and Vectorising) is an application that converts seismic maps in hard copy
prioritize trade-offs, inform stakeholders, and make decisions without having to spend hours cobbling information together.
the Evident Security Platform) is presented as a comprehensive Cloud Native Security Platform (CNSP) that delivers full lifecycle security and full stack … or custom signatures of threats and provides daily risk reports, and also detects what users were responsible for risk and provides remed…
Manager generates and remembers secure passwords. Extra safeguards available include touch and face ID login, 2-factor authenticated login, and secrets (e.g … g. payment card information, notes, etc) storage.
numbers, view sales graphs and use additional management and marketing tools. With Picatic Pro, detailed ticket sales tracking and marketing evaluations are … users the tools to promote, manage and sell event tickets online. Users can publish branded listings, send invites and create custom p…
developers and communities use open source security tools and standards to continuously secure their software projects, and provide proof of that security to their … developers and communities use open source security tools and standards to continuously secure their software projects, and pro…
platform to unify access governance, automate audit and compliance processes, and fortify application security. Pathlock helps complex organizations in the world … world to confidently handle the security and compliance requirements in their core ERP and beyond. … gains and cost savin…
Blackthorn Events also includes Blackthorn Payments and Blackthorn Messaging, to handle all payment and SMS functionality. Blackthorn Events ultimatley … Blackthorn Events is used to manage events end-to-end from within Salesforce. The app is designed for event planners who don’t want to both…
Defender for Cloud Apps (formerly Microsoft Cloud App Security) is a multimode cloud access security broker. … applying organization-wide policies and threat intelligence, and ensuring identities are verified and authenticated and devices are safe. It conditionally … access to data, ap…
Messaging Security Gateway, their email security platform for companies, enterprise to SMB, featuring email encryption with high level (99%) of spam and (the … Elements brings together vulnerability management, automated patch management, dynamic threat intelligence and continuous behavioral …
optimize a business's security posture any time, and empower companies to safeguard their business-critical assets. Cymulate challenges security controls by initiating … showing the user exactly where a network is exposed and how to fix it—making security continuous, fast and part of every-da…
children, and other relatives, answering additional questions and filling in the inventory of assets. Then, the attorney can export the information in a couple … contact & asset information into several systems. The client works through the questionnaire at their own pace, entering infor…
cards, and lending etc. The platform includes automated workflows for KYC, AML, onboarding, a built-in regulatory risk engine, and case management, while … comprehensive documentation, sandbox environments, and observability tools, to accelerate time to market and reduces operational costs. I…
dashboard to ensure all data is backed up and available, and recover data in the case of an unexpected event. … keep data secure and ensures business continuity by protecting endpoint devices with an automated backup process that is easy to deploy and manage. With it
interactive round tables, visit sponsor booths and lounges, and take a break in the networking lounge and chat with other attendees. … design their own branded venue and then configure the various rooms. Designed to replicate the essence of in-person events in a compelling digital rendering
AlphaSense
delivering insights from public and private content—including company filings, event transcripts, news, trade journals, and equity research. The platform … AlphaSense is a market intelligence platform used by companies and financial institutions. Since 2011, their AI-based technology has help…
including benchmarking data and summaries of key findings from our executive roundtable discussions. Through online events PowerToFly users can present … present their company culture and benefits to an engaged audience, to increase brand awareness and see an uptick in job applications. &hell…
myHealthButton, a healthcare web portal supporting mobile access to critical information.
CybSafe is a platform that measures and tracks security behavior to improve security controls and awareness activities, from the company of the same name … name in London. CybSafe is a SaaS application, and it has a mobile application (CybSafe Connect) available. … security decisions, …
compliance, monitor for, respond to, and remediate security incidents on macOS with minimal impact to the device and end-user experience. Jamf Protect detects … detects Mac-specific threats, and prevents known malware from running on devices and quarantines them for later analysis. Jamf Prote…
crowdsourced security platform that networks the crowd of freelance security researchers and security organizations with corporations and institutions … dreamers of a hack-free world willingly gather their talent and resources to outsmart and outperform the darkside.



