functionality and are deployed across small, midsize, and enterprise level campuses, and support SD-WAN, integrated voice and security, wireless functionality … functionality, and dedicated line access.
Search Results
Listings (4,751-4,775 of 10,000)
Lissi provides tools for organisations and individuals to manage and control their digital identity, credentials and relationships. Available on cloud as … Connect) or issue and request identity data from third-parties (on-premise). Additionally, the Lissi Wallet can be used to store identity…
accounting and legal professionals with detailed and accurate corporate action taxability information for portfolio and tax lot accounting, cost basis and withholding … compliance. Clients rely on a staff of attorneys and accountants with more than 200 years of combined tax and legal experien…
components they own and keep them in a healthy state, and identify operational problems, reflect on component performance and health, and create action items … used to keep track of technical architecture and the teams that collaborate around it and connect information across the toolchain in…
volunteer, and marketing tools used to create more responsive donor experiences and grow giving. The CRM unifies fundraising, marketing, and donor development … their inbox, mailbox, and smartphone.Signals & Intel - Demographic, wealth, and social data used to drive donor connections and …
Telefónica Tech Cyber Security & Cloud provides CCaaS and omnichannel solution that best suits the user's company's needs. Optionally, they are also a … a certified Genesys partner, boasting 20 years of experience implementing and managing these services.
An email security solution available from 1997, MailRoute features integrations with Google Workspace and Microsoft 365, that includes granular controls … controls and advanced admin tools for defense contractors, governments, and GCC High for Gov Cloud users. … Continually managed and…
Labs in London offers a managed security service and platform, designed to allow companies to respond to identified risks and instantly implement protective … protective controls such as web filtering, data loss prevention and network zoning.
secure, private, and isolated virtual network. The user can customize IP address ranges, subnets, security groups, and bandwidths, and assign Elastic IP … secure, private, and isolated virtual network. The user can customize IP address ranges, subnets, security groups, and bandwidths, and ass…
develop and modernize their software. The technologies in Application Foundations help build, deploy, and operate applications with security in mind and at … develop and modernize their software. The technologies in Application Foundations help build, deploy, and operate applications with sec…
cloud access security broker (CASB) and zero trust network access to secure access of users and devices across network, web, cloud, and private apps. … cloud access security broker (CASB) and zero trust network access to secure access of users and devices across network, web, cloud, and pri…
understand business context and are powered by leading LLMs (GPT-4, Claude, Mistral, Gemini). With enterprise-grade security and integration into existing … existing workflows, teams can build and deploy custom AI assistants without coding. … understand business context and are powered…
CheckPoint is a digital access management and engagement system for venues. It automates and digitizes the registration, ticketing, and check-in process while … venues, vendors, and exhibitors to engage with guests directly to their phone's lock screen.CheckPoint is an event management tool f…
Nintex
Nintex offers a platform that helps companies discover, automate, and optimize business processes. … processes, and AI agents work together under governance and control. Nintex started as a native process engine focused on helping both developers and business … platform on which busine…
CyberHoot is presented as a simple, fast and effective employee Security Training Platform from the company of the same name headquartered in Portsmouth … Portsmouth. The platform includes 700+ Training Videos, 25+ Policy Templates, and Phish Testing. … CyberHoot is a security awarenes…
access service edge (SASE) solution, designed to replace MPLS and multiple networking and security point solutions with a converged WAN transformation platform
offers OpenHire, a recruiting and ATS system. It offers recruiting access through social media channels, data security, and EEO compliance for mid-sized … OpenHire is a recruiting management and applicant tracking system acquired by SilkRoad in 2004 and available as a web-based service. Begin…
Email is a combined email productivity and security suite, providing anti-phishing, email archiving, email backup and archiving, as well as access to AnyMeeting … Email is a combined email productivity and security suite, providing anti-phishing, email archiving, email backup and archiving, a…
of iplocation.net, offers IP location and IP address tools to help the Internet community with security, privacy and online communications.
used to automate SCRA compliance scrubs, ensure document security through OCR and ICR technology and perform flex indexing.
smaller businesses, designed to offer a faster and affordable way to process RFPs, RFIs, security questionnaires and other important document. … to offer a faster and affordable way to process RFPs, RFIs, security questionnaires and other important document. Responding to RFPs and other quest…
suite of web-based and network solutions for Box Office and Online ticketing, including integrated venue access control services, mobile and print-at-home ticket … theater, casino show rooms, motorsports, Museums, and Thoroughbred horse racing. Founded in 2001 and based in Charlotte, NC, Tic…
access to vital medical information, decrease the time and energy spent during initial camper check-in, reduce risk and liability, and help keep safety in … designed by camp doctors, nurses and directors. The web-based solution manages health forms, medications/allergies and health logging f…
identify, track, and troubleshoot their IT infrastructure. UVexplorer automatically discovers information about the devices on a network and the connections … between them. It can be used to monitor the status of critical devices and services, and users can receive notifications when problems…
verify people's employment & income information to help lenders, pre-employment screeners, government agencies, landlords, and other authorized verifiers … verifiers seeking to credential the applicants, online and 24x7. It helps employers outsource and automate the inbound employment/income …

