authentication and AD integration, while also providing visibility, transparency and control. The solution provides clients with adaptive security and trust and … Gaithersburg, MD, provides log-in capabilities through strong authentication and integrations. The authentication solution provide…
Search Results
Listings (5,001-5,025 of 10,000)
improve productivity and reduce costs, and SteelHead SD combining SD-WAN and WAN Optimization, providing a single, unified orchestration and connectivity fabric … across the entire distributed enterprise network with embedded security, optimization, and visibility.
Defender for Office 365 is a security solution used to protect Office 365 against advanced threats, such as phishing and business email compromise. It … helps prevent volume-based and targeted attacks, including business email compromise, credential phishing, ransomware, and advanced malware …
unified events and webinar platform, which helps B2B event marketers simplify their event tech stack. Instead of using 8-10 different tools and platforms … platforms for running one event end to end, Zuddl can be used to manage event programs from one platform. Zuddl unified event and webina…
solution designed for the cleaning industry. MaidSuite stores information, analyzes it and helps business users to make the most profitable decisions for … vendor, this solution considers important variables the way a user would and provides their company with the best, most efficient schedul…
conduct compliance and security access reviews at a fraction of the time and cost. It delivers instant cloud-based access certification and attestation campaigns … identity governance. Also includes user reports identity policy violation and include built-in tracking tools help streamline the…
analyze, and mitigate cybersecurity risks with full transparency and control. The solution boasts out-of-the-box yet configurable workflows and controls … from CENTRL, is a cyber security risk assessment software solution that is designed to streamline cybersecurity assessments and transform…
Cellusys IoT presents a Security, Roaming, and Analytics Solutions for MVNOs and Enterprises. Its module Roaming Control is a Steering of Roaming solution … combining a rules engine with reporting and analytics, users can control the cost of outbound IoT devices and steer devices to the optim…
that combines a global private backbone, a network security stack, and support for cloud resources and mobile devices. Now from Aryaka (acquired May, 2021) … firewall-as-a-service solutions, secure web gateway, SD-Wan and traffic optimization, and SASE intrusion protection.
tracking system for cleaning and security contractors in North America, users get tools to generate more applicants, screen for fit and manage compliant onboarding … processes, the applicant tracking system helps users to find, hire and onboard the right cleaners and guards. The solution can …
who in the organization can access HSMs and the scope and assignment of their roles, with full administrative and cryptographic control. Microsoft has no … Azure Dedicated HSM are hardware security modules that used in the cloud enabling users to maintain full administrative and cryptographic…
acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice … diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. … customers to acquire ne…
that applies artificial intelligence and learning models to identify known and unknown threats at the device, network and application levels. … provider in New York that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or pr…
Software is offered to ensure accurate measurement, data security and support to attract new partners and build profitable relationships. CAKE's solution is … program through real-time insights into partner and campaign performance, customizable alerts, granular data and unique commission str…
ports, and boast reliable connectivity over long distances to eliminate bottlenecks. The switches bost a quiet, fanless design, in-built security, and smart-managed … smart-managed layer 2+ Ethernet switch series ready to deploy in 8-, 24- and 48-port for non-PoE and Class 4 PoE (i.e. PoE+) …
customer service and operations, for small to medium businesses, to implement data driven standard processes that improve productivity and help businesses … share, track and follow-up events and to-dos. … customers, including activity history, key contacts, customer communications, and…
New World software, and your data, is included. This provides secure and reliable administration, hardware and software maintenance, and support at no additional … access to information, simplified reporting, and time-saving workflow to help increase financial transparency, make informed busi…
on analyzing event based security logs from cumbersome sensors and software installed on the endpoint. Rather than analyzing security/event logs, Infocyte … enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, …
Threat Sharing is an open source software and set of standards to share, create and validate threatintel and intelligence. As an open source project MSP … MSP Threat Sharing is free to participate in, and use. … to navigate between events and their correlations. An event graph function…
resource allocation, streamlined workflow management, and enhanced customer service. By leveraging its telematics and IoT capabilities, the platform helps businesses … ZenduiT offers telematics and IoT-powered software solutions. Their technology platform is designed to help fleet and field s…
consulting, design and development company focused on creating immersive XR trainings & simulations for Healthcare, MedTech, Pharma, Aerospace & Defense. They … gamification for training, education, and collaboration scenarios, where users can explore, interact, learn and build skills as well…
help of AI, custom automation and a dashboard. Lasso Moderation provides solutions for chat, comment, communities, reviews and other user-generated content … Custom rules can be created to automatically flag or remove content and users. This allows users to customize the platform exactly as n…
engagement and action through targeted welcome messages with personalized appeals. Smart online and mobile donation forms dynamically tailor the ask and provide … options like recurring, matching and tribute gifts to optimize conversion and maximize giving. Passions, preferences and giving …
recruiters can capture resumes and evaluate prospects instantly, quickly track their data on a dashboard, and manage recruiting events all in one place. The Rakuna … the mobile app for campus recruiting events, and Rakuna Recruit Dashboard, the candidate relationship management dashboard for …
ISO 27001. The platform helps companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for … driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, and create Trust with Pr…