confidence, and save costs by eliminating the need to maintain servers. Users can invoke functions (snippets of code) in response to web events, and are charged … charged when resources are active, or scale up or down instantly and automatically based on demand without the need for pre-provis…
Search Results
Listings (3,926-3,950 of 10,000)
the former Websense was the company's brand for the Internet security platform and web security gateway from that company. Since Websense was merged to form … the former Websense was the company's brand for the Internet security platform and web security gateway from that company. Since Webse…
provides includes security and compliance, data analytics strategy, IT transformation, and roadmapping. Trianz also provides managed security services. … Clara enables business and technology leaders to orchestrate strategy and execution by leveraging Cloud, Analytics, Digitalization, and Sec…
for SMB and Enterprises. Services include phish protection, email filtering and anti-spam, email archiving, as well as enhanced gateway security and filtering … filtering, inbound email security, email service backup and outbound SMTP, as well as email forwarding and backup. … for SMB …
party applications can manage all eBL events such as eBL notifications, title transfer, amendment, surrender and switch to paper. … party applications can manage all eBL events such as eBL notifications, title transfer, amendment, surrender and switch to paper. Plugging Bolero’s electronic &…
Drivewyze Safety+ is an app used to prevent fleet incidents and citations with a proactive, in-cab safety driver coaching assistant. Safety+ helps users … with drivers before potential hazards are encountered, giving drivers information to safely respond to the road ahead. Its in-cab safety n…
a unified security platform that detects security incidents anywhere across a business and automatically responds to shut down the threat and minimise the … a unified security platform that detects security incidents anywhere across a business and automatically responds to shut down the threa…
allows the user to visualize, explore and analyze business data to better plan, optimize and monitor business processes and performance. … Bing Maps is a geographic information and location intelligence solution, that when integrated as a data visualization dashboard for Microsoft Power BI &h…
cloud-based Document and Drawing Management System built for modern teams. It streamlines how organizations store, organize, and access technical documents—engineering … documents—engineering drawings, legal files, and HR records. With built-in 3D CAD viewing, version control, role-based acce…
initiatives and solve security and compliance challenges by bringing together identity governance (IGA), granular application access, cloud security, and privileged … privileged access to secure the entire business ecosystem and provide a frictionless user experience. … initiatives and…
media monitoring platform from consumer intelligence company Market Force Information, headquartered in Colorado.
SCA, developed by WhiteHat Security, is an application security solution, that analyzes applications for third parties and open source software to detect
properly governed according to compliance standards and security policies, SSH Communications Security in Helsinki offers the Universal SSH Key Manager.
servers across the globe, NordVPN aims to bring users both security and speed. … NordVPN by Nord Security is a virtual private network (VPN) solution for individuals or small businesses with a limited number of devices. With 5100 servers … giving users speed and security while browsing…
sales reprensentatives tools and information to improve engagement with customers, supported by a mobile Android application and its web Back-office. … relationship management and 360° visibility and that offers tools for the company's sales departments to manage their activity, such as: Mana…
enterprise-grade management, including HA, security, and monitoring and logging on the IBM PowerPC architecture. It is built on Kubernetes and a variety of … Kubernetes-based private container cloud platform and take advantage of the Power Architecture for data and cognitive workloads.
encrypted audio-visual interaction for legitimate information dissemination, accurate identification, and privacy. … legitimate information dissemination, accurate identification, and privacy. The solution is fortified to comply with RBIs KYC guidelines and meets the strictest … strict…
software solution designed to help users enforce and maintain confidentiality across all sensitive client information wherever it resides in the firm. … software solution designed to help users enforce and maintain confidentiality across all sensitive client information wherever it resides in…
TBSM delivers real-time information used to respond to alerts in line with business requirements, and optionally to meet service-level agreements (SLAs) … Service Manager or TBSM delivers real-time information used to respond to alerts in line with business requirements, and optionally to mee…
Lynx Information Systems in London offers LEASSV (Lynx Exploration Archivist Seismic Scanning and Vectorising), which as the name might suggest is a tool
to strengthen their security posture with the CounterCraft Cyber Deception Platform, that fits into existing security strategies and delivers high-end deception … deception for threat hunting and threat detection using controlled, credible synthetic environments. … to strengthen their …
an online point-of-sale solution and an e-commerce focused online point-of-sale platform with features to manage and grow a business. It can be used to … Users - The user module is used to add, & manage, billers, customers & suppliers information … calendar module is used to add & mana…
Center, or PDC) is a security service designed to relieve security operators of the repetitive tasks needed to qualify, investigate, and document alerts. With … time and resources on data gathering. Cofense aims to take the workload off staff, giving them support qualifying and investigating …
NetWitness Orchestrator provides security orchestration and automation (O&A) to improve a security operations center’s efficiency and effectiveness. Supported … Supported by preconfigured and customizable playbooks, NetWitness Orchestrator empowers teams to collaborate and streamlines and aut…
ongoing maintenance and support of compliance and certifications, internal audits, security improvement guidance and advice, and policy and procedures development … StickmanCyber is cyber security as a service provider offering 24/7×365 monitoring, incident response, as well as endpoint detec…

