with high security and stability. It is designed to meet organizational requirements to improve performance for mission-critical workloads and meet future … with high security and stability. It is designed to meet organizational requirements to improve performance for mission-critical workl…
Search Results
Listings (4,976-5,000 of 10,000)
BlueClosure, from Italy-based Minded Security, offers realtime dynamic data tainting protection, that can analyse any codebase written with JavaScript
United States, and New Zealand. Features include mobile ticket scanning to free event templates, multiple ticketing options, and repeat event management … more than 2,000 event organisers worldwide, with the goal of accommodating events, regardless of size or complexity. They charge 30 c…
From physical and virtual cards to emerging alternative payments and tokens, the solution helps deliver a customer experience boasting security, flexible cloud-ready … cloud-ready technology and multi-language, multi-currency, multi-institution capabilities. … the user's digital and in…
of professional cameras for warehouses and retail stores. It offers technologies such as analysis and security technology that uses deep learning to take … take advantage of innovations such as Artificial Intelligence (AI) and the Internet of Things (IoT). … of professional cameras for…
2, Polygon’s zero proofs and simplified pricing on Fuse Network transforms scalability, economics, and security for dApps and payments. … 2, Polygon’s zero proofs and simplified pricing on Fuse Network transforms scalability, economics, and security for dApps and payments.
from Ohio-based Keyfactor, (formerly Certified Security Solutions, or CSS) aims to makes it easy and affordable to build in high-assurance secure identity
personalized phishing simulations, gamified security awareness training, threat alerts, cyber hygiene practices, and a Behavioral Risk Score™ that tracks a … Phished is a cyber security awareness company that helps organizations to obtain a zero-incident-rate caused by human error. Their full…
Truffle Security headquartered in San Francisco builds software that helps users protect information. Their flagship product, TruffleHog, runs behind the … the scenes to scan the user's environment for secrets like private keys and credentials, so data can be protected before a breach occurs.…
for web apps from common web-hacking techniques such as SQL injection and security vulnerabilities such as cross-site scripting.
work-from-anywhere a reality, all while maintaining constant visibility of users, security, costs, and provisioning through a single-pane-of-glass within their chosen hybrid … visibility of users, security, costs, and provisioning through a single-pane-of-glass. Features Manages multiple use…
Oleria provides identity security to protect enterprises, offering fine-grained access visibility, including access usage insights, at an individual resource … resource level, so CISOs can discover who has access to what, how they got it, and what they are doing with it. … Identity Gov…
transacting with customers, VIP POS for tracking and ordering needed table posters, coasters, signage and the like, and Brand Builder, which is the app's product … as real-time inventory tracking, the KARMA survey and data collection add-on for collecting sales and brand relevant data during …
scheduling experience that is distinct to a business with multiple display options and customizable notifications. One link to rule them all. Scheduling links can … be customized to offer customers a choice of services, locations, pricing, and times. Workflows can be customized based on the c…
Strong Network allows the management of containers for DevOps online (as opposed to locally on developers laptop) and access them through a cloud IDE or … connection (in the case of a local IDE). These containers provide management of access keys and credentials to multiple types of resources…
compliance laws (e.g. HIPAA), such as hospitals, and emphasizes regular and ad hoc cyber security analysis and compliance testing. The IRM suite provide means … means to ensure audit readiness, track risk readiness and response, and meet similar needs.
featuring managed security, backup and disaster recovery, and other features. The hosted private cloud solutions allow users to run and optimize workloads … workloads in a preferred location and infrastructure, without an major rework, and without re-architecting applications.
to make it easier and more economical to store, access, replay, and analyze data, by providing long-term retention of logs, metrics, and traces. It stores … stores data in open formats for fast retrieval, and offers policies for retention, security, and access control. … to make it eas…
SRC headquartered in New York offers DNSentinel, a security analytics tool which allows the user to perform domain name analysis, or perform data mining
SecOps Solution is a full-stack vulnerability and patch management platform. It identifies the top 1% of security risks that could have the maximum impact … engineering effort in patchwork and remediation. It is an AI-powered agentless platform with proprietary scanners built to identify and…
access to reports and dashboards using a variety of widgets and multiple filters to help identify trends and review important information for all guests. … data streams, automate marketing campaigns and measure their ROI. For-Sight lets users visualise key metrics and make informed decisions …
provides staff with a complete view of customer information in a central source to enable customer retention and success by putting actionable customer data … which eliminates the need for customers to explain issues multiple times, and enables CSRs to resolve issues faster.
acquisition, is a website security platform featuring at minimum daily site and database scanning, as well as website backup for files and database. Advanced … Advanced features include patching (e.g. for Wordpress), CDN and WAF, and site rescue if a site has been hacked.
finds and blocks both known and unknown network cyberthreats. It uses SecIntel, Juniper’s security intelligence feed, along with sandboxing and machine … machine learning to identify day-one threats. The ATP solution includes and supercedes the former Cyphort product (acquired September 2017…
in India and USA for small, medium & large business presented as an affordable and easier to use solution, featuring 3rd party integration and inbuilt data … data security features. … India and USA for small, medium & large business presented as an affordable and easier to use solu…


