effectively by people with no prior experience of HR from day one, and provides ongoing training and support as part of monthly subscriptions to help customers … processes online. With both HR and rota management software's, Breathe boasts users among more than 10,000 UK-based businesses and …
Search Results
Listings (4,626-4,650 of 10,000)
retention and governance policies for the entire enterprise. And Everteam.archive allows users to manage and retain electronic and physical records in line … identify, organize and manage content to reduce costs, address compliance and lower risk. Everteam.policy enables users to capture, doc…
environment. Ensuring that applications are running well and the ability to quickly find and fix errors are daily requirements. C\Prof provides added details … offers transaction profiling for IBM® CICS® trace data. IBM® Customer Information Control System (CICS®) Transaction Server for z/OS …
that lets users find crucial information within structured or unstructured content, connecting activities, places, things and time. Then, it takes its linguistic … linguistic processing technology and presents discovery in an interface with data visualizations. ayfie Inspector provides a defe…
real-time, in-meeting sales tools and intelligence. By integrating directly into a virtual meeting, Aircover can surface information when the customer is live … conversation, providing insights for sales leadership, sales enablement, and marketing around the voice of the customer. … re…
access live video sessions, manage appointments, send insurance and payment information, even if they don’t have access to high-speed internet. … providers to offer virtual visits through live video consults, text-based image and document exchange without the patient downloading an app or log…
safeguarding the privacy of the people they both serve and employ – if sensitive information (data and digital credentials) is protected by the Haventec platform
F5 on IBM Cloud lets you see and control all traffic passing through your network. F5’s highly scalable, resilient and reusable services dynamically adapt … adapt to ensure application availability, performance and security.
supports enterprises and smaller companies with their Microsoft Dynamics 365 implementation projects, offering expertise, know-how and industry knowledge … knowledge to guarantee scalability, security and confidence with every Microsoft Dynamics implementation. … supports enterprises a…
Cisco Secure Routers embed security at the core, with integrated next-generation firewall (NGFW) and post-quantum cryptography that deliver embedded, advanced … advanced protection, giving SecOps and NetOps unified visibility and control. … combining security, routing, assurance, and …
Tempered Networks is network security technology from the company of the same name in Seattle, Washington. … it easier to create and maintain hyper-secure networks across complex infrastructure anywhere, including IT/OT/ICS/SCADA, remote and in the cloud. Airwall … micro-segmented, enc…
Ciphertex CX, from Ciphertex Data Security in Chatsworth, California is a line of secure storage appliances.
Trellix Embedded Control (formerly McAfee Embedded Control) is an endpoint security product for IoT / edge devices.
changes that may truly impact security and introduce risk. Tripwire uses agents to continuously capture detailed who, what, and when details in real time, … detect all change, capture details about each one, and use those details to determine the security risk or non-compliance. … low-…
requirements for fast deployment, cost effectiveness and convenience. It complies with security and privacy protocols. Delivered with a range of flexible … flexible workflows, MESA can be adapted to both the functional needs and the security policies of most authorities. … s Applicatio…
acquired by OpenText), is a hosted messaging gateway and security platform featuring anti-spam and email encryption / data loss capability. … acquired by OpenText), is a hosted messaging gateway and security platform featuring anti-spam and email encryption / data loss capability.
features for processing and managing card-not-present payments and echecks, presented as a full PCI-DSS compliance payment security … features for processing and managing card-not-present payments and echecks, presented as a full PCI-DSS compliance payment security
McAfee / Intel Security, based on McAfee technology and technology acquired with the company PasswordBox (2015). It has been discontinued and is no longer … McAfee / Intel Security, based on McAfee technology and technology acquired with the company PasswordBox (2015). It has been discontin…
application security service that includes full-spectrum L3-L7 DDoS protection (volumetric and application) to protect applications from disruptions and ensure … application security service that includes full-spectrum L3-L7 DDoS protection (volumetric and application) to protect applications…
trust security solution, Menlo Secure Application Access enables least-privileged access on a resource by resource basis, supporting access and application … application protection for both private and SaaS applications. … trust security solution, Menlo Secure Application Access enable…
delivers a broad range of advanced networking, storage, and security services for complex compute and AI workloads.
disposition program aims to ensure security and sustainability with a program that includes recycling, remarketing and destroying retired IT assets that
Birmingham, offers security awareness training with micro-learning, video-based courses, testing and gamification as well as phishing simulations and administrative
the ideal solution for data-in-motion security, including time-sensitive voice and video streams, for enterprise, and government organizations. … the ideal solution for data-in-motion security, including time-sensitive voice and video streams, for enterprise, and government organizations.
structured response workflows, and an integrated technology stack - combining scalable telemetry, behavioral analytics, and AI-powered automation - to strengthen … strengthen organizations' security operations. … structured response workflows, and an integrated technology stack - combi…


