CloudLinux brand, helps organizations take care of support, maintenance, and security for Enterprise Linux systems, through Live Patching Services. … patching for Linux Kernels, with centralized management and common automation and vulnerability management tools integration.KernelCare for IoT…
Search Results
Listings (4,426-4,450 of 10,000)
headquartered in Palo Alto, offers a data privacy vault designed to deliver security, compliance and governance via a simple API. … to deliver security, compliance and governance via a simple API, dedicated to ensuring that sensitive data is stored and utilized safely and securely. It &hellip…
Carbonetes is a cloud-native application and container security tool, from the company of the same name headquartered in Houston, Texas. … Carbonetes offers container security analysis, or Container Application Security Testing (CAST). Users can create and manage policies across each analyzer…
(SaaS) platform, combines real-time order and shipment information with all of the transportation updates and external factors that can disrupt or influence
help to ensure that the attacks are stopped immediately, and they provide detailed information about the attacks on the company. … Advanced Threat Protection protects companies from Ransomware attacks, phishing, and ceo fraud. Hornetsecurity ATP enables users to protect their business against…
as a Geographic Information System (GIS) designed specifically for use by transportation professionals to store, display, manage, and analyze transportation … transportation data. TransCAD combines GIS and transportation modeling capabilities in a single integrated platform. TransCAD can be u…
service and information in one place. It automates communication processes, allowing users to accurately define what to communicate, to whom and when. All … service and information in one place. It automates communication processes, allowing users to accurately define what to communicate, to …
brands with fans.Based on customer behavior data, purchase data, and attribute information, a variety of communications can be conducted. … MONJU, a company founded by Synergy Marketing, Nakagawa Masashichi Shoten, and VeBuIn. Synergy!BCS is a CRM product from Japan, developed based on the co…
Content Platform helping B2B marketers create and amplify video content to drive engagement, brand authority, and revenue. … engaging and consumable video content, and capitalizing on brand authority and intent. Goldcast ultimately uses video to boost audience engagement and brand … Z…
company providing services in cyber & cloud security, governance risk and compliance, infrastructures, data analytics & AI and software development. … providing services in cyber & cloud security, governance risk and compliance, infrastructures, data analytics & AI and software develo…
programs and bands, from Vanco, streamlines these administrative tasks, and can be used to create and maintain a secure database of important student and member … member information, track fundraisers, bank accounts, and budgets with its internal financial system, and manage a library, invent…
documents and trace printouts to the source with extensive logging of content. A predefined policy can block printing if it detects sensitive information in a … sensitive content when printing. Used to control and trace printed documents on an existing printers and MFPs, including home printe…
provider with expertise in Process Consultancy, Information Systems Design & Development, e-Learning & Branding solutions. KnowledgeQ's USP is the ability … ability to leverage varied domain experience in providing holistic products and services that don't remain on shelves but provide real v…
helps users keep PII & PHI Safe with IRI CellShield, a data masking software solution designed to protect the sensitive information in Microsoft Excel® … comply with data privacy laws. It features point-and-click functionality to protect columns with reversible and non-reversible masking func…
forms to speed up documentation, and visual client files. EchoVantage also includes client engagement tools like its portal and appointment reminders, so clients … can actively participate in their care, as well as sign, review and communicate information. … forms to speed up documenta…
right form of protection for each type of data across an organization's information ecosystem, enabling users to meet a wide range of recovery objectives
organisations with adaptive learning flows that transform how employees react and respond to the growing amount of phishing emails. … Hoxhunt is a Human Risk Management platform for security awareness used to drive behavior change and lower risk. Hoxhunt combines AI and behavioral science &he…
customers with an immersive shopping experience to make better purchase decisions and boost performance. This creates an engaging online shopping experience to … plus, the interactiveness of AR solutions offers customers essential information to make a well-informed buying decision, reducing …
provides secure questionnaires, confidently shares security and compliance programs with customers and completes compliance certifications by automating … provides secured questionnaires, confidently shares security and compliance programs with customers and completes compliance certificati…
CertiK is a blockchain security platform using Formal Verification technology on smart contracts and blockchains. Formal Verification mathematically … mathematically proves program correctness and hacker-resistance. … applications to be built with security and correctness. Capabilit…
users to discover, benchmark, and harden the security environment against digital risks across networks, endpoints, and cloud environments.
libraries, embedded memories, analog IP, wired and wireless interface IP, security IP, embedded processors and subsystems. … embedded memories, PVT sensors, analog IP, wired and wireless interface IP, security IP, embedded processors and subsystems. To accelerate the product development &hel…
advanced biometrics, designed to provide maximum security and frictionless access to products, services and systems. … provide maximum security and frictionless access to products, services and systems. It can be used to manage credentials and provide fast and secure access … usual use…
modern application delivery at any scale and in any environment, providing performance, observability and security. … application delivery at any scale and in any environment, with the goal of providing performance, observability, and security. HAProxy Enterprise combines … features of…
providing a crowdsourced approach for continuous security testing and a solution for controlling and monitoring ethical hacking projects. … software bugs, ensuring the security of company systems. CONTROL AND VISIBILITY HackGATE offers control and monitoring of security testing projects throu…
