product that prioritizes security initiatives by their financial risk reduction. RQ leverages industry data (loss and technical) and combines that with a company's … statistical, regression, and machine learning models. RQ uses attack surface information - including CVE scans, control assessm…
Search Results
Listings (5,001-5,025 of 10,000)
Kindite in Tel Aviv offers their eponymous cloud security platform that eliminates cloud-based data exposure risks by creating a zero-trust relationship … domain, while performing end-to-end encryption of data at rest, in transit, and in use.
New World software, and your data, is included. This provides secure and reliable administration, hardware and software maintenance, and support at no additional … access to information, simplified reporting, and time-saving workflow to help increase financial transparency, make informed busi…
modern development practices, while ensuring the security of sensitive data subject to GDPR, HIPAA, CCPA, and other regulations. The solution automates test … SQL Provision combines SQL Clone and Data Masker for SQL Server to enable software teams to deliver database environments at the speed…
offers access to assistants and content in a singular, voice-activated interface, with the goal of compromising the privacy, security, or integrity of automakers’ … solutions for global mobility, a portfolio of products, services, toolkits, and innovations that extends the technology to mobil…
insights directly from blockchain activity, identify security vulnerabilities, expose bad actors, and provide market intelligence for making informed investments … bring more transparency to the blockchain ecosystem, while building trust and accountability across the crypto markets in the pro…
those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their cloud-native infrastructure … those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their c…
provides session control, security, interworking, and demarcation. CUBE is a software product available for licensing on the Cisco IOS® and Cisco IOS XE Software
Level 1 PCI security compliance, the same level used by banks and large financial institutions, along with search engine optimized templates and no transaction … hits, audience reach, and search engine optimization (SEO). The vendor states the information can be used to improve a website and …
corporate owned and BYOD devices. Leveraging Zimperium z9, zIPS detects threats across the kill chain: device, network, phishing, and app attacks. … Zimperium in Dallas offers zIPS, a machine learning-based, on-device mobile security solution purpose built for enterprise organizations. Zimper…
in deep intelligence, to enable governments, Fortune500 and SMBs to meet strict data security and compliance standards. … file-sharing platform allows users to collaborate and share sensitive data outside firewalls, securely and compliantly. The solution is designed for applications ……
of data among devices, such as computers, tablets and smartphones, and boasts AES 256, and 2FA security. … Switzerland, is a service that allows individuals and businesses to securely save, back up, synchronise and share their precious files via a desktop computer
authentication and AD integration, while also providing visibility, transparency and control. The solution provides clients with adaptive security and trust and … Gaithersburg, MD, provides log-in capabilities through strong authentication and integrations. The authentication solution provide…
Defender for Office 365 is a security solution used to protect Office 365 against advanced threats, such as phishing and business email compromise. It … helps prevent volume-based and targeted attacks, including business email compromise, credential phishing, ransomware, and advanced malware …
improve productivity and reduce costs, and SteelHead SD combining SD-WAN and WAN Optimization, providing a single, unified orchestration and connectivity fabric … across the entire distributed enterprise network with embedded security, optimization, and visibility.
consulting, design and development company focused on creating immersive XR trainings & simulations for Healthcare, MedTech, Pharma, Aerospace & Defense. They … gamification for training, education, and collaboration scenarios, where users can explore, interact, learn and build skills as well…
SMS, Email, and Slack by means of instant and day-end report features. Bekchy provides SaaS and cloud-based service with monthly-annual and different payment … education, tourism and media sectors. It provides basic and advanced protection for internet portals, CRM, B2B, e-commerce websites…
Backup protects users from data loss by continuously monitoring files and folders, and backing them up to the cloud, a network share, or local drive when … this design is more desirable than whole-disk backups for some situations. And if the worst should happen, users can restore a backup wi…
Threat Sharing is an open source software and set of standards to share, create and validate threatintel and intelligence. As an open source project MSP … MSP Threat Sharing is free to participate in, and use. … to navigate between events and their correlations. An event graph function…
conduct compliance and security access reviews at a fraction of the time and cost. It delivers instant cloud-based access certification and attestation campaigns … identity governance. Also includes user reports identity policy violation and include built-in tracking tools help streamline the…
analyze, and mitigate cybersecurity risks with full transparency and control. The solution boasts out-of-the-box yet configurable workflows and controls … from CENTRL, is a cyber security risk assessment software solution that is designed to streamline cybersecurity assessments and transform…
Cellusys IoT presents a Security, Roaming, and Analytics Solutions for MVNOs and Enterprises. Its module Roaming Control is a Steering of Roaming solution … combining a rules engine with reporting and analytics, users can control the cost of outbound IoT devices and steer devices to the optim…
that combines a global private backbone, a network security stack, and support for cloud resources and mobile devices. Now from Aryaka (acquired May, 2021) … firewall-as-a-service solutions, secure web gateway, SD-Wan and traffic optimization, and SASE intrusion protection.
tracking system for cleaning and security contractors in North America, users get tools to generate more applicants, screen for fit and manage compliant onboarding … processes, the applicant tracking system helps users to find, hire and onboard the right cleaners and guards. The solution can …
who in the organization can access HSMs and the scope and assignment of their roles, with full administrative and cryptographic control. Microsoft has no … Azure Dedicated HSM are hardware security modules that used in the cloud enabling users to maintain full administrative and cryptographic…