access to vital medical information, decrease the time and energy spent during initial camper check-in, reduce risk and liability, and help keep safety in … designed by camp doctors, nurses and directors. The web-based solution manages health forms, medications/allergies and health logging f…
Search Results
Listings (4,776-4,800 of 10,000)
verify people's employment & income information to help lenders, pre-employment screeners, government agencies, landlords, and other authorized verifiers … verifiers seeking to credential the applicants, online and 24x7. It helps employers outsource and automate the inbound employment/income …
identify, track, and troubleshoot their IT infrastructure. UVexplorer automatically discovers information about the devices on a network and the connections … between them. It can be used to monitor the status of critical devices and services, and users can receive notifications when problems…
editing capabilities, OCR, collaboration tools, and security options like redaction and document encryption. … a solution for creating, editing, organizing, and securing PDF documents. Designed for professionals and businesses of all sizes, features include editing … mobile, and the cl…
providing intelligent operations, self-service and orchestration, security compliance and visibility, and control of cloud costs. It is used to optimize … optimize capacity, proactively detect performance anomalies, and automate operational tasks. … business and allocate resources for …
by providing real-time insights and proactive IT management. It optimizes productivity and security across devices and apps, featuring sentiment analysis … analysis, predictive analytics, and integration with IT systems. … Proactive IT and Security Management: Equips IT, Security, and …
suite of web-based and network solutions for Box Office and Online ticketing, including integrated venue access control services, mobile and print-at-home ticket … theater, casino show rooms, motorsports, Museums, and Thoroughbred horse racing. Founded in 2001 and based in Charlotte, NC, Tic…
end-to-end digital identity platform that offers a consistent level of security across multiple channels. … Incode brings authentication, onboarding, and ID verification under one platform in a modular way. Incode Omni Platform, with its orchestration capabilities … verification experi…
Levo is an API Security solution, designed to take a proactive, fix first approach designed to help enterprises scale securely. … drag on, and incidents that erode margins and trust. So Levo is offered to unify API and AI security at runtime, bringing passive detection and inline protection …
all products - Works offline, synchronize all product images and information. - Create and share catalogs with images directly from the application. - … KeTengo is a B2B Sales Catalog and Order Capturing application that helps businesses generate sales, productivity and workflows. It enabl…
MIP Fund Accounting
human resources, timekeeping, fixed asset management, grant management, and dashboards for nonprofits and government agencies. … payable and receivable, budgeting, payroll, human resources, allocations management, procurement, fixed assets, grant management, and advanced security functionali…
information management and meets the most stringent security standards. Next to the SaaS products, movingimage experts support companies of any size in creating … worldwide using video. From creation to hosting and distribution, movingimage supports video applications, Live and On-Demand. T…
such as AWS or Google Cloud. It is a modular solution for connectivity, security, and application delivery services.
Crowdsourced Security Testing Platform, which they describe as providing a comprehensive, continuous penetration test with actionable results, and a sense of … element to the protection they offer, as well as an additional level of security expertise. The Synack Platform consists of the foll…
suite of IoT / edge device security products, including anti-tamper protection, counterfeit prevention, pMon device monitoring, and the PowerIQ analytics software
per user and 2TB pooled. The Enterprise edition supports 250 participants in a meeting, as well as up to 100k viewers of a Live Streamed event, and 1TB per … Google Meet and Google Apps without needing to involve a personal gmail account. Google Workspace Essentails includes Google Slides, Sh…
with ease. Lucanet provides users transparent data and intelligent workflows to manage their strategic and reporting needs. … Lucanet's financial reporting software, designed to deliver timely and accurate information to the … steps and group structures, regardless of complexity. Lucan…
Less Annoying CRM
a customer relationship management (CRM) solution built specifically for small businesses to help clients manage contacts and track leads. … contact info, track leads, and schedule follow-ups. It is designed for small business looking for a way to increase sales and get organized, but that …
data collection, storage, preparation, analysis, visualization, and finally security and access protection.
Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious behavior. The product has been … Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious behavior. The pr…
suite of colocation and infrastructural services with support including security consulting, compliance consulting (e.g. HIPAA), and disaster-recovery-as-a-service … suite of colocation and infrastructural services with support including security consulting, compliance consulting (e.g. HIPAA)…
blind spots as workloads are moved to the cloud, reducing security and non-compliance risks and helping to remediate performance issues. … blind spots as workloads are moved to the cloud, reducing security and non-compliance risks and helping to remediate performance issues, so that users can…
verification, programmatic policy governance, security review automation, and predictive risk assessments to cut costs and reduce liability. … trust, that uses AI and API-driven continuous control verification, programmatic policy governance, security review automation, and predictive risk as…
Collection Systems (ADCS) and a variety of item tracking options including first expired/first out handling, they take warehouse management to a new level of efficiency … 365 Business Central (Previously Dynamics NAV) to help control, optimize and automate warehouse operations. With access to…
cognitive analytics and automation to provide a modern digital workplace with advanced security capabilities. Kyndryl measures and optimizes the employee … employee digital experience, and proactively secures and fixes things before they break. … cognitive analytics and automation to p…
