controlling user and system information used to authenticate and authorize user identities as a foundation to their strategy in offering and supporting Cloud … Cloud and SaaS solutions. Cyway, launched with a mission to be a Cybersecurity Business enabler for cloud and SaaS in the GCC and A…
Search Results
Listings (4,826-4,850 of 10,000)
Launchmetrics Events is an in-person, digital and hybrid events management solution specifically for the Fashion, Luxury and Beauty industry that enables … users to orchestrate and amplify events with the Voices who will inspire consumers and showcase the brand. Launchmetrics Events sits wi…
MailMarshal’s layered security helps to reduce false positives and protects against spam, gateway attacks, viruses, phishing attempts, and malicious URLs. It … MailMarshal’s layered security helps to reduce false positives and protects against spam, gateway attacks, viruses, phishing attempts…
Manager is a solution used to identify, prioritize and publish patches to address more third-party security updates than any solution on the market. Additional … Additional modules include Flexera's threat intelligence and vendor patching modules. … detailed information on the vulnerab…
An API security solution that discovers exposed API endpoints and sensitive data, continuously tests as APIs evolve, prioritizes business-critical vulnerabilities … vulnerabilities, and fixes them with actionable remediation code snippets. No traffic monitoring or complex integrations are req…
ReadySetConnect is a practice management software. It is designed to be a complete support tool for clinicians and educators by providing all patient charts … in one place for easy access. Users can track and review progress on goals, compare data, collaborate and get decision support. The ve…
sharing, mentoring, professional guidance, creation and promotion of events and more, transforming them into active brand ambassadors for a school. … alumni community and drives alumni engagement by offering a network that's "Willing to Help". The platform is available on every device, and de…
technology that controls hardware resources according to a proprietary information flow modeling language. Rather than attempting to shape system behavior … through a unique system architecture specification written by the developer and enforced solely by the processor.
is a software that enables users to discover, deliver and delete personally identifying information (PII). It helps to find sensitive data in semi- or unstructured
CPA and accountancy firm desktop hosting of Quickbooks, Microsoft Office, and other applications, promising price and infrastructure efficiency and flexibility … flexibility, as well as security and data storage. … CPA and accountancy firm desktop hosting of Quickbooks, Microsoft Offic…
(formerly of Secure Computing Corporation, now from McAfee) is an Internet security platform that reached end of life (EOL) in 2014.
The Cisco 6300 Series Embedded Services Access Points offered built-in security, resilient wireless mesh capabilities. The product line is currently being … The Cisco 6300 Series Embedded Services Access Points offered built-in security, resilient wireless mesh capabilities. The product line …
normalise, label and enrich the data with structure and then apply their Artificial Intelligence (AI) frameworks to deliver predictive and actionable job … search and HR data analytics platform. They state they process millions of datasets in real time including job descriptions, salaries, re…
Engineering, IT, and other initiatives. Their software supports Portfolio Planning, ongoing Project and Portfolio Management, and Resource management. According … views on project status and risk, streamlines reporting, facilitates the preparation for stage gate and other project reviews, …
consumers with immediate value in exchange for relevant information about their motivations, interests and preferences. … party, declared data from simple lead forms or surveys to product matches and personality quizzes. The Jebbit platform is designed to drive high engagement
simple to use and integrated into the same platform. It is a sales CRM that in addition to giving customers and vendors all the information they need, provides … simple to use and integrated into the same platform. It is a sales CRM that in addition to giving customers and vendors all the inf…
Marketing & Technology, is designed to centralize the commercial activity of a company or business, helping to manage the entire sales process and the business's … speed up commercial activities, making them more productive by using the information commercial departments needs residing in the…
have conflicting, mis-matched, or out-of-date information, giving users the ability to see both short-term and long-term trends. … built on a foundation collected from Election Officials in all 50 states and the District of Columbia – a unified national voter file, with records going ……
Endpoint is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious … Endpoint is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpo…
integrated campaign planning, omnichannel analytics, real-time dashboards and scorecards, and marketing KPIs right out of the box for fast time to value. Beckon … Beckon is enterprise software that is designed to deliver clean, trusted data and real-time marketing intelligence. According to …
An office and employee management software used to manage and organize office tools, equipment, employee onboarding, asset maintenance, contracts, relations … with employees and other administration in one intranet collaborative environment. Presented as a comprehensive ideal solution for sma…
virtual servers and desktops, and works across all major hypervisors. The solution presents an agentless, tuned option works on VMware NSX and VMware vCloud … vCloud Networking and Security.
as an ultra light, ultra simple, and ultra powerful service mesh. Developed by Buoyant and now available CNCF-hosted and open source, the developers say … say that Linkerd adds security, observability, and reliability to Kubernetes, without the complexity.
an IAM suite for enterprises large and small, configurable, with modules to cover governance, compliance, and security needs.
density, security, and performance with longevity. MX Series routers support digital transformation for service providers, cloud operators, and enterprises

