give users perfect network visibility, full path analysis, security policy verification, and change prediction. … network security teams with the same searchable and actionable information about network topology through an interface that’s highly visual, and capable … give users perfec…
Search Results
Listings (4,901-4,925 of 10,000)
developed by Blue Sky eLearn and now supported by Momentive, is a clinical trial training platform designed to streamline and expedite clinical trials in … in the pharmaceutical and life sciences industries. … registration and invitation management, event moderation, post-event reporti…
interface and UX that allows asset owners to digitally and compliantly issue, allocate and manage security tokens, whilst providing an improved and highly … interface and UX that allows asset owners to digitally and compliantly issue, allocate and manage security tokens, whilst providing an i…
platform for enterprise virtualization and security teams, used to deliver a secure virtual infrastructure and simplify micro-segmentation planning by … providing application visibility, reputation scoring, and security. The product is discontinued, and no longer available. … platform…
provides the security orchestration & operations platform BOSS. They state the solution is designed to remove concerns and cyber distractions and enable users … platform supports real-time threat identification, correlation, validation, and remediation.
managed detection and response (MDR) service boasting users among large banks, airlines and enterprises to deliver managed detection and response. The service … protects organizations from skilled cyber adversaries with security that detects 24/7, and responds. … threat hunting experti…
Renteon offers agencies tools and features to enhance efficiency and elevate the rental experience for both agencies and customers alike.At the heart of … ensure that agencies have the flexibility to adapt and scale.Renteon's mobile app is available for both iOS and Android platforms. This ap…
accessible in one place without having to worry about passwords, credentials, and security. … tool for modern distributed teams. It is designed to reduce onboarding time and provide a dedicated browser for work where all work applications are accessible … sidebar, and also provides sin…
doesn’t have to make as many hops to and from these locations, allowing for better security, resiliency, costs, and end-user experiences. … doesn’t have to make as many hops to and from these locations, allowing for better security, resiliency, costs, and end-user experiences. SP// Virtual &…
Appliance (formerly Cisco Web Security Appliance [WSA]), powered by Cisco Talos, protects by automatically blocking risky sites and testing unknown sites before … link to them, helping with compliance. It is available models S690, S390, and S190.
national, state, county, and international criminal background searches, sex offender search, driver record search, and social security trace. … national, state, county, and international criminal background searches, sex offender search, driver record search, and social security trace.
services and more. Leveraging Seos® as its underlying credential technology, HID Mobile Access is used to increase convenience, boost efficiency and maximize … maximize security. … services and more. Leveraging Seos® as its underlying credential technology, HID Mobile Access is used to…
workflow and security features like the "self-destruct" document which persists for a limited amount of time, as needed, to limit exposure and risk. … Ansarada harnesses the power of AI and machine learning to highlight risks and opportunities, raise and protect potential, and optimize proces…
services for self-service deployment, monitoring, logging and security, as well as middleware, data and analytics. … of middleware, data and analytics. Key Features and Benefits Security Helps ensure security for data in transit and data at rest across all platform … Kubernetes, …
visibility, correlated threat intelligence, and automated response so that security investigators can focus and act on only the most urgent threats.
leveraging security-as-code, Bridgecrew’s platform identifies and automatically fixes cloud infrastructure misconfigurations in both run-time and build-time
Protection is an email security solution that uses machine learning to provide protection against threats. It combines email gateway defenses and API-based inbox … inbox defense to prevent attacks, respond to threats in real time, and secure Microsoft 365 data. … defenses and, API-base…
the simple things simple by offering a lightweight way to forward and centralize logs and files. … is a lightweight shipper for logs from Elastic, for collecting logs from security devices, cloud, containers, hosts, or OT, Filebeat helping users keep the … the simple things simple by o…
acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to … vendor, Avanan's one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance,…
of assets; balance workloads; and drag & drop work orders, to make planning and scheduling easier, more flexible and more efficient.Need to manage … scheduling and assigning work with the ability to see workforce availability in real-time; assign work by owner, lead, or supervisor; plan w…
professional standard, customised to the individual needs of each client and personalised with their clinic logo. Designed to be used in the clinical setting … designed to make it easy to find the exercises, pre-set protocols or information sheets required.
IFI produces a global patent database that combines information from more than 100 countries around the world, used by companies from high tech companies … provides name standardization, expiration date calculation, patent status, and machine translations. The database weaves together more th…
Agile Analytics is a set of reports and dashboards built on Microsoft Power BI that can connect to Dynamics 365 to provide the user better insights from … platform through which all authorised team members can access specific information on individual customers, in order to provide them with …
collaborate, and share information, such as documents, plans, photos, and videos, from a centralized location, with all activity captured and searchable … processes to help users work smarter and faster. Infor Ming.le is fully embedded with organizational systems like ERP and financials. All …
an IP API that provides geographical information about website visitors with any IPv4 or IPv6 address in JSON and XML format over a secure HTTPS connection … ASN, Company Details, device data from User Agent String, VPN, Proxy, Tor and threat intelligence data served globally with latency bas…

