Detection and Response service that combines 24/7 CSOC expertise, cutting-edge network and endpoint detection technologies, advanced security analytics … analytics and Redscan Labs threat intelligence to help organisations rapidly identify and remediate cyber threats.
Search Results
Listings (4,876-4,900 of 10,000)
solution will automate service account governance to provide security teams with central oversight and control. … A service account governance solution, encompassing discovery and provisioning through decommissioning. Service accounts fly under the radar of IT, expanding … solution wil…
packages, assigned tasks and easy digital signatures for needed paperwork. People Management: Access employee directories and store important documents … on performance, training and certifications and more in employee profiles.Paid Time Off (PTO): Create custom PTO policies and approve or de…
both iOS and Android. Users can scale to the most demanding enterprise needs in terms of user numbers and data volume. With multi-factor and biometric … biometric security built in, users can confidently deploy highly sensitive information to their mobile workforce and revolutionize how peopl…
helps real estate professionals share content and grow their business with Facebook, Twitter, LinkedIn, and more. Whether it’s a new listing, news article … tip, or an upcoming open house, Postamo allows agents to promote their information on multiple social networks . Every page that is sh…
features such as payment security and enterprise integration. It was acquired by First Data in July 2017, and is now owned and supported by Fiserv since
by detecting and highlighting issues in their code in real time. Like a spell checker, SonarLint detects Bugs, code smells, and Security Vulnerabilities … Vulnerabilities as code is written, and offers guidance. … of the Sonar solution, is a free and open-source IDE plugin, that is a d…
safeguard cryptographic keys and other secrets used by cloud apps and services. Azure Key Vault can be used to encrypt keys and small secrets like passwords … passwords that use keys stored in hardware security modules (HSMs).
Zorus offers security solutions for MSP, including Zorus Filtering, a web content filtering solution, and Zorus Engagement, presented as a "respectful" … solution allowing the user to monitor active tabs, idle time, and toggling between browser windows and desktop apps. … active tabs, …
cloud-first, security-sensitive, and global enterprises, as well as the hybrid workforce. Its Secure Networking approach uses one operating system and consolidates … consolidates SD-WAN, next-generation firewall (NGFW), advanced routing, and ZTNA application gateway functions. … availa…
Oracle acquired Palerra in September 2016, a cloud security company. The Palerra platform was offered as Oracle CASB Cloud Service, which was discontinued … Oracle acquired Palerra in September 2016, a cloud security company. The Palerra platform was offered as Oracle CASB Cloud Service, whic…
IRONSCALES is presented as a Self-Learning Email Security Platform To Proactively Fight Phishing Attacks, from the company of the same name in Atlanta … a plan free of charge and includes email security features including Phishing Simulation & Training, and a Threat Management Dashboard. …
(March, 2014). A dynamic application security testing (DAST) software, it identified vulnerabilities in cloud and web applications. The product is no longer … for application security and testing. A dynamic application security testing (DAST) software, it identified vulnerabilities in cloud a…
devices (e.g. flash drives, locked-down computers, etc.) for accessibility and security. … devices (e.g. flash drives, locked-down computers, etc.) for accessibility and security. Formerly known as Thinstall, the application is no longer supported
Azure Firewall is a cloud-native, intelligent network firewall security service that offers threat protection for Azure cloud workloads. It is a fully … fully stateful firewall as a service, featuring built-in high availability and unlimited cloud scalability. … featuring built-in high…
company of the same name in New York, that enables users to run security token offerings and access innovative investment opportunities worldwide with a turnkey
enterprises. It delivers data security and recovery in the cloud, powered by advanced AI, to help organizations see, manage, and recover data wherever it lives … enterprise. Commvault Cloud unifies cloud-based data security with rapid, enterprise-scale recovery and advanced AI to secure an or…
lake with Lake Formation consists of defining data sources and what data access and security policies desired.
professional installation company. Portal's catalog of Audio/Video and Security products, and its simple proposal tool, make it easier for integrators to sell … images and wholesale prices, Portal allows installers to build professional bids for end users, deliver them over the web (or in pe…
Microsoft Power BI
collaborate on interactive dashboards and reports, and scale across their organization with built-in governance and security. … a visualization and data discovery tool from Microsoft. It allows users to convert data into visuals and graphics, visually explore and analyze data, collaborate &he…
enterprise legal management is a solution designed to link every legal matter to its corresponding claim, achieve real-time access to data and reduce litigation … approach to legal management and make definitive links between legal matters and claims, and describes its benefits:Ensure securit…
of assets; balance workloads; and drag & drop work orders, to make planning and scheduling easier, more flexible and more efficient.Need to manage … scheduling and assigning work with the ability to see workforce availability in real-time; assign work by owner, lead, or supervisor; plan w…
send, and monitor all digital channel communications, and implement automatic delivery of invoicing and account statements, manage subscriptions and customer … solutions to help medium and large enterprises face the challenges of managing large volumes of information with software and profess…
acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to … vendor, Avanan's one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance,…
solution to secure data and analytics, on-site conversion and paid marketing from bots and invalid users, with a Go-to-Market Security platform. The solution … solution prevents automated and human-driven threats that endanger customer trust, privacy compliance, marketing effectiveness, and b…


