process from finding and analyzing the perfect influencers, communicating with them, to managing campaigns, tracking post performance, and automating reporting … database of 300 million+ includes influencers across Instagram, TikTok, and YouTube, and features advanced search functionalities. …
Search Results
Listings (4,976-5,000 of 10,000)
INX +BI aims to assist the entire workforce management process by simplifying reporting and graphing through a single screen, drill-down dashboard display … Home page - Events
GCP. Kogni's data and privacy governance capabilities address all your data and privacy regulatory from GDPR, PCI, HIPAA, HITRUST, and FERPA just to name … capabilities for even the most uncommon data sources and data formats. Kogni is cloud-agnostic and can identify sensitive data in already…
marketing platform used by over 200 DMOs to, source, organize, publish, and optimize UGC and owned visuals that resonate with today’s travelers. … Flexible rights management: Customize how you ask for rights to social media photos and create a great experience … third parties: We make…
resources and data. This enables corporations and agencies to discover, locate, and mitigate radio borne threats, arising from managed, unmanaged and rogue … offers their Internet of radios security technology, allowing corporations, governments, or other entities to track and prevent access…
brings Azure security and cloud-native services to hybrid and multicloud environments. It enables the user to secure and govern infrastructure and apps anywhere … faster with familiar tools and services to run them on any Kubernetes platform, and modernize the data estate with Azure data and …
KYC aims to provide a global online identity verification solution for KYC and AML screening. Argos KYC provides online identity verification solution services … convenience. Take two photos - ID card and face - to start and complete the KYC process. … With the OCR technology, informat…
Google Calendar events to worklogs for added value and productivity. Make accurate decisions based on approved and up-to-date information with dynamic reports … reports. Plan for time and future bids based on historical estimates, and measure and report on CAPEX and OPEX with precision. &hell…
Defense is a validated and integrated threat detection and response architecture that hunts down and eliminates the advanced and unknown threats that routinely … combination of technology, security intelligence, and analytics which, when wielded by professionals with expertise, allows LMNTRIX…
Open PHA Desktop and Open PHA Cloud are tools for performing, analyzing, and maintaining HAZOP, LOPA, and Security PHA Review studies, from Kenexis headquartered … Columbus, Ohio. Open PHA Desktop is free and a standalone desktop application available on Windows, Mac, and Linux based operatin…
provides security, flexibility, and frictionless payment for premiums that enables users to report and reconcile payments across inbound and outbound payment … methods, channels, and batches. The solution supports Pay by Text, Hosted payment forms that are customizable, and support branding a…
technology, unbound creativity with research and analytics, and agile development with strict engineering and security standards. Mobiquity blends teams of consultants … digital consultancy that partners with brands to design and deliver compelling digital products and services for their cust…
operating system and security policies that enforce role and process separation and isolation for automated, byte-level content inspection and sanitization … Forcepoint Data Guard enables highly complex, bi-directional, automated data and file transfers between physically separated networks. …
visibility, detection and mitigation outcomes to reduce fraud and cloud hosting, bandwidth and compute costs, improve user experiences, and optimize their business … January 2020) provides security to protect a website from bots, fake users, and unauthorized transactions, preventing large sca…
Kindite in Tel Aviv offers their eponymous cloud security platform that eliminates cloud-based data exposure risks by creating a zero-trust relationship … domain, while performing end-to-end encryption of data at rest, in transit, and in use.
webinars. It is packed with branding, engagement, and production features, to help users to build interactive and professional webinars. … The Cvent Webinar platform supports any event type, from marketing webinars to internal meetings. … tracks metrics like registration volume, attend…
modern development practices, while ensuring the security of sensitive data subject to GDPR, HIPAA, CCPA, and other regulations. The solution automates test … SQL Provision combines SQL Clone and Data Masker for SQL Server to enable software teams to deliver database environments at the speed…
offers access to assistants and content in a singular, voice-activated interface, with the goal of compromising the privacy, security, or integrity of automakers’ … solutions for global mobility, a portfolio of products, services, toolkits, and innovations that extends the technology to mobil…
insights directly from blockchain activity, identify security vulnerabilities, expose bad actors, and provide market intelligence for making informed investments … bring more transparency to the blockchain ecosystem, while building trust and accountability across the crypto markets in the pro…
those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their cloud-native infrastructure … those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their c…
corporate owned and BYOD devices. Leveraging Zimperium z9, zIPS detects threats across the kill chain: device, network, phishing, and app attacks. … Zimperium in Dallas offers zIPS, a machine learning-based, on-device mobile security solution purpose built for enterprise organizations. Zimper…
Level 1 PCI security compliance, the same level used by banks and large financial institutions, along with search engine optimized templates and no transaction … hits, audience reach, and search engine optimization (SEO). The vendor states the information can be used to improve a website and …
provides session control, security, interworking, and demarcation. CUBE is a software product available for licensing on the Cisco IOS® and Cisco IOS XE Software
in deep intelligence, to enable governments, Fortune500 and SMBs to meet strict data security and compliance standards. … file-sharing platform allows users to collaborate and share sensitive data outside firewalls, securely and compliantly. The solution is designed for applications ……
of data among devices, such as computers, tablets and smartphones, and boasts AES 256, and 2FA security. … Switzerland, is a service that allows individuals and businesses to securely save, back up, synchronise and share their precious files via a desktop computer