features for processing and managing card-not-present payments and echecks, presented as a full PCI-DSS compliance payment security … features for processing and managing card-not-present payments and echecks, presented as a full PCI-DSS compliance payment security
Search Results
Listings (4,626-4,650 of 10,000)
acquired by OpenText), is a hosted messaging gateway and security platform featuring anti-spam and email encryption / data loss capability. … acquired by OpenText), is a hosted messaging gateway and security platform featuring anti-spam and email encryption / data loss capability.
Birmingham, offers security awareness training with micro-learning, video-based courses, testing and gamification as well as phishing simulations and administrative
application security service that includes full-spectrum L3-L7 DDoS protection (volumetric and application) to protect applications from disruptions and ensure … application security service that includes full-spectrum L3-L7 DDoS protection (volumetric and application) to protect applications…
the ideal solution for data-in-motion security, including time-sensitive voice and video streams, for enterprise, and government organizations. … the ideal solution for data-in-motion security, including time-sensitive voice and video streams, for enterprise, and government organizations.
structured response workflows, and an integrated technology stack - combining scalable telemetry, behavioral analytics, and AI-powered automation - to strengthen … strengthen organizations' security operations. … structured response workflows, and an integrated technology stack - combi…
changes that may truly impact security and introduce risk. Tripwire uses agents to continuously capture detailed who, what, and when details in real time, … detect all change, capture details about each one, and use those details to determine the security risk or non-compliance. … low-…
requirements for fast deployment, cost effectiveness and convenience. It complies with security and privacy protocols. Delivered with a range of flexible … flexible workflows, MESA can be adapted to both the functional needs and the security policies of most authorities. … s Applicatio…
environment. Ensuring that applications are running well and the ability to quickly find and fix errors are daily requirements. C\Prof provides added details … offers transaction profiling for IBM® CICS® trace data. IBM® Customer Information Control System (CICS®) Transaction Server for z/OS …
that lets users find crucial information within structured or unstructured content, connecting activities, places, things and time. Then, it takes its linguistic … linguistic processing technology and presents discovery in an interface with data visualizations. ayfie Inspector provides a defe…
real-time, in-meeting sales tools and intelligence. By integrating directly into a virtual meeting, Aircover can surface information when the customer is live … conversation, providing insights for sales leadership, sales enablement, and marketing around the voice of the customer. … re…
access live video sessions, manage appointments, send insurance and payment information, even if they don’t have access to high-speed internet. … providers to offer virtual visits through live video consults, text-based image and document exchange without the patient downloading an app or log…
safeguarding the privacy of the people they both serve and employ – if sensitive information (data and digital credentials) is protected by the Haventec platform
retention and governance policies for the entire enterprise. And Everteam.archive allows users to manage and retain electronic and physical records in line … identify, organize and manage content to reduce costs, address compliance and lower risk. Everteam.policy enables users to capture, doc…
real-time and post-event with analytics that allow the user to drill down to understand exactly who watched what. Users can also customize the look and feel … CineSend On Demand helps customers launch and maintain secure video portals, from single-video events that are time-limited to complex…
by providing cybersecurity and compliance services. They offer managed security, consulting, and compliance solutions. … For mid-size and large organizations across multiple industries, TrustNet helps build trusted relationships with customers, partners, and employees by … by providing…
often not information, but noise. It’s multiplying and it’s all discoverable. So Logikcull, from Reveal, is designed to automatically organize and cull the … the noise. This is to help legal & IT teams quickly find and preserve the signal, and meet their deadlines. Logikcull boasts users amon…
provides real-time and historical location-based environmental data. It collects real-time location-based information about the environment and quality of life … life. Data is presented with visuals in web and mobile applications. triode; It is an IoT device and software infrastructure that m…
design, tube and pipe, cable & harness, presentations, rendering, simulation, and machine design. It also features TrustedDWG® compatibility and Model-Based … 3D mechanical design, documentation, and product simulation tools. These blend parametric, direct, freeform, and rules-based design c…
Pre-Employment and Tenant background checks to companies across the nation and internationally. They provide users with the necessary foresight and due diligence … Through their platform and software they help companies large and small on their screening needs, boasting quality of information…
matter at scale through data-driven direct mail and gifting. Through Reachdesk companies can deliver gifts and direct mail with the goal of building deeper … customers, prospects and employees at the click of a button. Reachdesks' integrations to the user's tech stack aim to power a clear and…
realities companies face, built to help prioritize security initiatives, align them with the client's business, and get it all done yesterday. … out process and collateral to run any facet of a security program. Security Policy Development Security policies set the standard for security stra…
cloud-delivered security service edge (SSE) solution, grounded in zero trust, designed to give users an exceptional user experience and protected access … cloud-delivered security service edge (SSE) solution, grounded in zero trust, designed to give users an exceptional user experience and pr…
acquired with Apex Security, Tenable AI Exposure discovers how users interact with AI platforms, including who’s using them, for what purpose and the data involved … risky integrations and AI-specific threats traditional security tools miss. The application will identify and remediate when AI…
a new generation of stackable fixed access switches that deliver security, scale, and flexibility purpose-built for an AI enterprise. … power, converged switching and routing, and continuous zero-trust security. They support post quantum cryptography algorithms and encryption, are ready for …


