Truffle Security headquartered in San Francisco builds software that helps users protect information. Their flagship product, TruffleHog, runs behind the … the scenes to scan the user's environment for secrets like private keys and credentials, so data can be protected before a breach occurs.…
Search Results
Listings (4,976-5,000 of 10,000)
personalized phishing simulations, gamified security awareness training, threat alerts, cyber hygiene practices, and a Behavioral Risk Score™ that tracks a … Phished is a cyber security awareness company that helps organizations to obtain a zero-incident-rate caused by human error. Their full…
Oleria provides identity security to protect enterprises, offering fine-grained access visibility, including access usage insights, at an individual resource … resource level, so CISOs can discover who has access to what, how they got it, and what they are doing with it. … Identity Gov…
from Ohio-based Keyfactor, (formerly Certified Security Solutions, or CSS) aims to makes it easy and affordable to build in high-assurance secure identity
for web apps from common web-hacking techniques such as SQL injection and security vulnerabilities such as cross-site scripting.
work-from-anywhere a reality, all while maintaining constant visibility of users, security, costs, and provisioning through a single-pane-of-glass within their chosen hybrid … visibility of users, security, costs, and provisioning through a single-pane-of-glass. Features Manages multiple use…
SRC headquartered in New York offers DNSentinel, a security analytics tool which allows the user to perform domain name analysis, or perform data mining
to make it easier and more economical to store, access, replay, and analyze data, by providing long-term retention of logs, metrics, and traces. It stores … stores data in open formats for fast retrieval, and offers policies for retention, security, and access control. … to make it eas…
featuring managed security, backup and disaster recovery, and other features. The hosted private cloud solutions allow users to run and optimize workloads … workloads in a preferred location and infrastructure, without an major rework, and without re-architecting applications.
compliance laws (e.g. HIPAA), such as hospitals, and emphasizes regular and ad hoc cyber security analysis and compliance testing. The IRM suite provide means … means to ensure audit readiness, track risk readiness and response, and meet similar needs.
transacting with customers, VIP POS for tracking and ordering needed table posters, coasters, signage and the like, and Brand Builder, which is the app's product … as real-time inventory tracking, the KARMA survey and data collection add-on for collecting sales and brand relevant data during …
scheduling experience that is distinct to a business with multiple display options and customizable notifications. One link to rule them all. Scheduling links can … be customized to offer customers a choice of services, locations, pricing, and times. Workflows can be customized based on the c…
Strong Network allows the management of containers for DevOps online (as opposed to locally on developers laptop) and access them through a cloud IDE or … connection (in the case of a local IDE). These containers provide management of access keys and credentials to multiple types of resources…
acquisition, is a website security platform featuring at minimum daily site and database scanning, as well as website backup for files and database. Advanced … Advanced features include patching (e.g. for Wordpress), CDN and WAF, and site rescue if a site has been hacked.
finds and blocks both known and unknown network cyberthreats. It uses SecIntel, Juniper’s security intelligence feed, along with sandboxing and machine … machine learning to identify day-one threats. The ATP solution includes and supercedes the former Cyphort product (acquired September 2017…
connects consumers with notaries and attorneys for a digital signing and mortgage closing experience. It helps lenders and settlement agents, too, because … because there are fewer chances for errors, better security and easy electronic document vault integration. … connects consumers …
helps security teams make faster, confident decisions, by collecting data from any source and contextualizing it to improve threat detection and triage … triage. Users can respond to threats at speed and create automations with LimaCharlie’s Detection, Automation & Response Engine. … …
in India and USA for small, medium & large business presented as an affordable and easier to use solution, featuring 3rd party integration and inbuilt data … data security features. … India and USA for small, medium & large business presented as an affordable and easier to use solu…
provides staff with a complete view of customer information in a central source to enable customer retention and success by putting actionable customer data … which eliminates the need for customers to explain issues multiple times, and enables CSRs to resolve issues faster.
access to reports and dashboards using a variety of widgets and multiple filters to help identify trends and review important information for all guests. … data streams, automate marketing campaigns and measure their ROI. For-Sight lets users visualise key metrics and make informed decisions …
the company formed from the merger of McAfee and FireEye that provides business-grade security products, and the company recommends alternatives. … the company formed from the merger of McAfee and FireEye that provides business-grade security products, and the company recommends alternatives.
Azure ATP) is a cloud-based security solution that leverages on-premises Active Directory signals to identify, detect, and investigate advanced threats … threats, compromised identities, and malicious insider actions directed at the organization. … compromised identities, and malicious…
startup innovated by EDX Labs, a Research & Development company based out of Bahrain. The DMARC360 “Security as a Service" is based on the global framework … framework of DMARC that is now being mandated by various regulators and rapidly being adopted across the globe. … solution aims …
services and products. These include hardware encrypted portable storage devices, backup solutions, file repair software, data recovery, and digital forensics … forensics services to help clients achieve their security objectives. … achieve their security objectives. SecureData has a …
anyone in an enterprise can understand customer behavior, market dynamics, and security risks. … predictive analytics. It is presented by the vendor, Software AG, as intuitive and easy-to-use, taking predictive analytics beyond the data science team so anyone … anyone in an enterprise …


