those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their cloud-native infrastructure … those who need to develop their expertise; and software offerings for those looking to improve security and reduce costs for their c…
Search Results
Listings (5,001-5,025 of 10,000)
corporate owned and BYOD devices. Leveraging Zimperium z9, zIPS detects threats across the kill chain: device, network, phishing, and app attacks. … Zimperium in Dallas offers zIPS, a machine learning-based, on-device mobile security solution purpose built for enterprise organizations. Zimper…
Level 1 PCI security compliance, the same level used by banks and large financial institutions, along with search engine optimized templates and no transaction … hits, audience reach, and search engine optimization (SEO). The vendor states the information can be used to improve a website and …
provides session control, security, interworking, and demarcation. CUBE is a software product available for licensing on the Cisco IOS® and Cisco IOS XE Software
Additionally, Industry Weapon offers a range of digital signage hardware and displays. … the platform makes content creation, management, and scheduling easy. Everything you need to develop, deploy and automate your content can be managed in … in CommandCenterHD with the drag and drop …
in deep intelligence, to enable governments, Fortune500 and SMBs to meet strict data security and compliance standards. … file-sharing platform allows users to collaborate and share sensitive data outside firewalls, securely and compliantly. The solution is designed for applications ……
of data among devices, such as computers, tablets and smartphones, and boasts AES 256, and 2FA security. … Switzerland, is a service that allows individuals and businesses to securely save, back up, synchronise and share their precious files via a desktop computer
authentication and AD integration, while also providing visibility, transparency and control. The solution provides clients with adaptive security and trust and … Gaithersburg, MD, provides log-in capabilities through strong authentication and integrations. The authentication solution provide…
improve productivity and reduce costs, and SteelHead SD combining SD-WAN and WAN Optimization, providing a single, unified orchestration and connectivity fabric … across the entire distributed enterprise network with embedded security, optimization, and visibility.
Defender for Office 365 is a security solution used to protect Office 365 against advanced threats, such as phishing and business email compromise. It … helps prevent volume-based and targeted attacks, including business email compromise, credential phishing, ransomware, and advanced malware …
help of AI, custom automation and a dashboard. Lasso Moderation provides solutions for chat, comment, communities, reviews and other user-generated content … Custom rules can be created to automatically flag or remove content and users. This allows users to customize the platform exactly as n…
acquire and retain members and achieve revenue goals. According to the vendor, this solution enables users to: Centralize all the information they … visitors, donors and members. Boost efficiency to focus on their mission. Streamline their external and internal communication efforts. …
insurance offices, health and medical offices, schools and colleges, real estate offices, community banks and credit unions, and small government city offices … paper and efficiently complete their document work. Revver does this by helping customers store and organize documents, quickly find…
conduct compliance and security access reviews at a fraction of the time and cost. It delivers instant cloud-based access certification and attestation campaigns … identity governance. Also includes user reports identity policy violation and include built-in tracking tools help streamline the…
analyze, and mitigate cybersecurity risks with full transparency and control. The solution boasts out-of-the-box yet configurable workflows and controls … from CENTRL, is a cyber security risk assessment software solution that is designed to streamline cybersecurity assessments and transform…
Cellusys IoT presents a Security, Roaming, and Analytics Solutions for MVNOs and Enterprises. Its module Roaming Control is a Steering of Roaming solution … combining a rules engine with reporting and analytics, users can control the cost of outbound IoT devices and steer devices to the optim…
that combines a global private backbone, a network security stack, and support for cloud resources and mobile devices. Now from Aryaka (acquired May, 2021) … firewall-as-a-service solutions, secure web gateway, SD-Wan and traffic optimization, and SASE intrusion protection.
tracking system for cleaning and security contractors in North America, users get tools to generate more applicants, screen for fit and manage compliant onboarding … processes, the applicant tracking system helps users to find, hire and onboard the right cleaners and guards. The solution can …
who in the organization can access HSMs and the scope and assignment of their roles, with full administrative and cryptographic control. Microsoft has no … Azure Dedicated HSM are hardware security modules that used in the cloud enabling users to maintain full administrative and cryptographic…
acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice … diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. … customers to acquire ne…
that applies artificial intelligence and learning models to identify known and unknown threats at the device, network and application levels. … provider in New York that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or pr…
Software is offered to ensure accurate measurement, data security and support to attract new partners and build profitable relationships. CAKE's solution is … program through real-time insights into partner and campaign performance, customizable alerts, granular data and unique commission str…
ports, and boast reliable connectivity over long distances to eliminate bottlenecks. The switches bost a quiet, fanless design, in-built security, and smart-managed … smart-managed layer 2+ Ethernet switch series ready to deploy in 8-, 24- and 48-port for non-PoE and Class 4 PoE (i.e. PoE+) …
product that prioritizes security initiatives by their financial risk reduction. RQ leverages industry data (loss and technical) and combines that with a company's … statistical, regression, and machine learning models. RQ uses attack surface information - including CVE scans, control assessm…
SMS, Email, and Slack by means of instant and day-end report features. Bekchy provides SaaS and cloud-based service with monthly-annual and different payment … education, tourism and media sectors. It provides basic and advanced protection for internet portals, CRM, B2B, e-commerce websites…