sectors such as insurance, natural catastrophe response and recovery, security, maritime monitoring and finance. … natural catastrophe response and recovery, security, maritime monitoring and finance. Data can be collected day or night, and even through cloud cove. … sectors such as in…
Search Results
Listings (4,601-4,625 of 10,000)
software for separately encapsulating and managing user data in the datacenter, providing accessibility and security.
analytics platform providing insight into IT asset usage and provisioning, features of network security, and help desk analytics.
version of its popular endpoint security solution, featuring advanced malware detection and prevention, ransomware protection, and hacker deterrents. … its popular endpoint security solution Intercept X, featuring advanced malware detection and prevention, ransomware protection, and hacker de…
name in Palo Alto is a messaging, collaboration and communication platform providing high security and compliance for the businesses that need it. … defense, intelligence, security, and critical infrastructure organizations, Mattermost aims to ensure focused, adaptable, secure, and resilient …
for building and automating an organization's infosec compliance program. It is used to implement controls, manage audits, respond to security questionnaires … questionnaires, and ensure continuous compliance. … implementation and continuous complianceAudit automation & management …
generation service that targets people who actively need to sell their homes, and get them in the early stages of the home sale consideration cycle (oftentimes … even contacted an agent). They sell full lead records with all available information like Name, Email, Best Phone Number, Full Addr…
Francisco provides a mobile security solution for enterprises with their multi-level solution to protect users, endpoints, and corporate applications from … to applications, secure data and devices against cyber threats and help users apply policies to filter internet access and reduce risk e…
Carbon Black EDR is an on-premise incident response and threat hunting solution designed for security operations center (SOC) teams with offline environments … on-premises requirements. It records and stores endpoint activity data so that security professionals can hunt threats in real time a…
includes features such as customization for businesses of any size and bank-level security. … tracking, and enterprise-grade security make it more secure than pen and paper methods and come default out-of-the-box. How it works: Prepare and SendUpload … cloud storage or a computer. Th…
(ISC)2 offers a variety of computer-based and delivered pre-built security training modules packaged in their offering Official@Work, a solution which
applications. Examples include strong security, advanced QoS, comprehensive IPv6 support, Layer 3 static routing, and true stacking.
their Cloud Security platform to deliver 4 channels of phishing protection for popular B2B software platforms: chat, email, collaboration, and file sharing
enterprise data management, increases data accuracy, and that facilitates consolidation, central governance and data quality management. The SAP Master … Governance is a master data management solution that helps users to implement a cohesive and harmonized master data management strategy ac…
Ciphertex CX, from Ciphertex Data Security in Chatsworth, California is a line of secure storage appliances.
Tempered Networks is network security technology from the company of the same name in Seattle, Washington. … it easier to create and maintain hyper-secure networks across complex infrastructure anywhere, including IT/OT/ICS/SCADA, remote and in the cloud. Airwall … micro-segmented, enc…
Trellix Embedded Control (formerly McAfee Embedded Control) is an endpoint security product for IoT / edge devices.
effectively by people with no prior experience of HR from day one, and provides ongoing training and support as part of monthly subscriptions to help customers … processes online. With both HR and rota management software's, Breathe boasts users among more than 10,000 UK-based businesses and …
traffic analysis (NTA) software, the Threat Detection & Response Platform, which is designed to detect and remediate intrusion, as well as supply context with … preventing and stopping modern hybrid attacks that evade traditional security controls. The Vectra AI Platform delivers AI-driven th…
supports enterprises and smaller companies with their Microsoft Dynamics 365 implementation projects, offering expertise, know-how and industry knowledge … knowledge to guarantee scalability, security and confidence with every Microsoft Dynamics implementation. … supports enterprises a…
F5 on IBM Cloud lets you see and control all traffic passing through your network. F5’s highly scalable, resilient and reusable services dynamically adapt … adapt to ensure application availability, performance and security.
Cisco Secure Routers embed security at the core, with integrated next-generation firewall (NGFW) and post-quantum cryptography that deliver embedded, advanced … advanced protection, giving SecOps and NetOps unified visibility and control. … embed security at the core with integrated ne…
disposition program aims to ensure security and sustainability with a program that includes recycling, remarketing and destroying retired IT assets that
trust security solution, Menlo Secure Application Access enables least-privileged access on a resource by resource basis, supporting access and application … application protection for both private and SaaS applications. … trust security solution, Menlo Secure Application Access enable…
delivers a broad range of advanced networking, storage, and security services for complex compute and AI workloads.

