safeguard cryptographic keys and other secrets used by cloud apps and services. Azure Key Vault can be used to encrypt keys and small secrets like passwords … passwords that use keys stored in hardware security modules (HSMs).
Search Results
Listings (4,876-4,900 of 10,000)
features such as payment security and enterprise integration. It was acquired by First Data in July 2017, and is now owned and supported by Fiserv since
cloud-first, security-sensitive, and global enterprises, as well as the hybrid workforce. Its Secure Networking approach uses one operating system and consolidates … consolidates SD-WAN, next-generation firewall (NGFW), advanced routing, and ZTNA application gateway functions. … availa…
by detecting and highlighting issues in their code in real time. Like a spell checker, SonarLint detects Bugs, code smells, and Security Vulnerabilities … Vulnerabilities as code is written, and offers guidance. … of the Sonar solution, is a free and open-source IDE plugin, that is a d…
Zorus offers security solutions for MSP, including Zorus Filtering, a web content filtering solution, and Zorus Engagement, presented as a "respectful" … solution allowing the user to monitor active tabs, idle time, and toggling between browser windows and desktop apps. … active tabs, …
company of the same name in New York, that enables users to run security token offerings and access innovative investment opportunities worldwide with a turnkey
(March, 2014). A dynamic application security testing (DAST) software, it identified vulnerabilities in cloud and web applications. The product is no longer … for application security and testing. A dynamic application security testing (DAST) software, it identified vulnerabilities in cloud a…
devices (e.g. flash drives, locked-down computers, etc.) for accessibility and security. … devices (e.g. flash drives, locked-down computers, etc.) for accessibility and security. Formerly known as Thinstall, the application is no longer supported
Azure Firewall is a cloud-native, intelligent network firewall security service that offers threat protection for Azure cloud workloads. It is a fully … fully stateful firewall as a service, featuring built-in high availability and unlimited cloud scalability. … featuring built-in high…
helps real estate professionals share content and grow their business with Facebook, Twitter, LinkedIn, and more. Whether it’s a new listing, news article … tip, or an upcoming open house, Postamo allows agents to promote their information on multiple social networks . Every page that is sh…
enterprises. It delivers data security and recovery in the cloud, powered by advanced AI, to help organizations see, manage, and recover data wherever it lives … enterprise. Commvault Cloud unifies cloud-based data security with rapid, enterprise-scale recovery and advanced AI to secure an or…
professional installation company. Portal's catalog of Audio/Video and Security products, and its simple proposal tool, make it easier for integrators to sell … images and wholesale prices, Portal allows installers to build professional bids for end users, deliver them over the web (or in pe…
lake with Lake Formation consists of defining data sources and what data access and security policies desired.
Microsoft Power BI
collaborate on interactive dashboards and reports, and scale across their organization with built-in governance and security. … a visualization and data discovery tool from Microsoft. It allows users to convert data into visuals and graphics, visually explore and analyze data, collaborate &he…
Plytix is a product information management system for small and medium sized businesses. The platform enables ecommerce businesses to transform their siloed … sales channels and B2B partners. Key features include: Flexible product management system that allows users to define unlimited cat…
solution to secure data and analytics, on-site conversion and paid marketing from bots and invalid users, with a Go-to-Market Security platform. The solution … solution prevents automated and human-driven threats that endanger customer trust, privacy compliance, marketing effectiveness, and b…
enterprise legal management is a solution designed to link every legal matter to its corresponding claim, achieve real-time access to data and reduce litigation … approach to legal management and make definitive links between legal matters and claims, and describes its benefits:Ensure securit…
send, and monitor all digital channel communications, and implement automatic delivery of invoicing and account statements, manage subscriptions and customer … solutions to help medium and large enterprises face the challenges of managing large volumes of information with software and profess…
relationship management platform, a sales pipeline opportunities module, an order management system that handles print orders, events, and digital products … sales CRM and opportunities pipeline, a centralized ad order entry system, a built-in electronic signature system, production and proje…
digital gifting and rewarding solution which help enterprise to offer employees, partners, customers gift cards as part of incentive and reward program … program. Glee aims to give companies the flexible and simple solutions they need to drive results in their reward program. … Upload …
Dutch company BeOne Development offers security awareness training modules from pre-packed modules to more customized plans dependent on the needs of the
Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches. … vulnerability management with Intruder. Broad threat coverage, security checks for infrastructure, web apps and APIs, in one platformProa…
communications from employees' email client. Administrators can set overarching security policies, which are applied automatically in the Mimecast service. … enables the sharing of sensitive information and files initiated directly from within the employee's email client.Message and file acce…
clinicians and pharmacists making prescribing and dispensing decisions to information about avoidable medication errors, inappropriate dosing, and adverse … It also provides the data backbone and vital support to healthcare businesses, like payers, PBMs, wholesalers, and manufacturers in to h…
transactions. It safeguards critical web assets, enhances internal security capabilities, and ensures compliance with regulatory requirements. … internal security capabilities, and ensures compliance with regulatory requirements. UltraSecure comes in three packages – Standard, Plus, and Premi…



