Conferences i/o is an event management software system offered by Conferences i/o.
Search Results
Listings (776-800 of 10,000)
solution to manage any event type, whether in-person or virtual, on Salesforce. It includes configurable registration, speaker management, and as a Salesforce … real-time events without leaving the Salesforce (Nonprofit Cloud) environment. Fonteva Events also includes a mobile app to support …
is part of the Cvent Event Cloud, a comprehensive software platform to help you plan, promote, manage and measure your meetings and events. It will be retired … retired December 2019 and from April 2019 new customers will be onboarded to Cvent Event Management. … RegOnline will be reti…
Threat Management (UTM) Firewalls are integrated security platforms for modern businesses: firewall and threat protection combined with routing and switching … AR3050S and AR4050S are presented as an ideal choice for high speed Enterprise gateway applications. The UTM Firewalls feature an int…
Triple Point’s flagship energy trading and risk management (ETRM) software, Commodity XL®, is an ETRM software that works across multiple commodities in … challenges including price volatility, regulatory compliance, and enterprise risk management. Triple Point is an ION brand.
software supply chain security solution from the company of the same name headquartered in Tel Aviv, that provides visibility, security, and integrity across … integrates with DevOps tools and infrastructure providers, hardens their security postures by implementing consistent governance, and…
mobile-oriented giving and nonprofit fundraising suite of solutions. This includes 4EventDay, that includes event management functionality to ease and boost giving … mobile-oriented giving and nonprofit fundraising suite of solutions. This includes 4EventDay, that includes event management fu…
abstracts and papers, and Eventsforce Awards for end-to-end management of award entries, submissions, and events. … their suite of event software, including a web-based registration tool Eventsforce Registration, Eventsforce Abstract for submissions management of abstracts
records for overall buying attributes, personal & professional information, sales invoices, installments, and social media links, or create detailed customer … Solutions headquartered in Beirut, used to overlook and maintain consumer relationships, the data, sales and engagements that go alon…
built around an interactive activity stream, content, document and event management, and automated workflows, from Just Software AG headquartered in Hamburg
to collaborate and engage without compromising the security and compliance requirements of the enterprise. It is a legacy product line, and no longer available … for enterprise information management. It integrated OpenText's information governance capabilities with consumer-style file sharin…
presents an open, agile Data-Centric Security Platform. The Platform enables organizations to unifyData-Centric Security Solutions with existing Enterprise … cohesive Data-Centric Security framework also automates the protection of documents as they are discovered, classified, downloaded and …
The PKWARE data security platform monitors and protects sensitive information in files on endpoints, servers, and beyond. With PKWARE, users can protect … type of data and enforce an organization’s security policies in real time. PKWARE detects sensitive data as files are created and modified…
marketing and e-commerce. Freedom is notable for its highly customizable databases, providing full control over HTML layout and complex filter and search … cloud-based content management system from Accrisoft Corporation.Accrisoft Freedom specializes in membership and events management, socia…
businesses control over how their information is stored, shared, deleted and retained. In a world where sensitive information is constantly compromised, Vaporstream … Vaporstream helps users have leakproof conversations, send compliant and disappearing messages, and stay in control of informa…
existing infrastructure and network topology, so that the user can see security groups, route tables, resource information, and cost estimates, as well
includes abstract submission and review management, an event registration workflow, and a platform for hosting a virtual event. … payments and delegate numbersSee which delegates are presentersTrack who’s paid and who hasn’tChoose a currency and payment methods, structure fees and add &hellip…
Webroot Email Security Powered by Zix (formerly Zix Email Threat Protection) solution provides a suite of productivity, email security, and compliance tools … Microsoft 365 services, advanced email security, email encryption, large secure file sharing, and unified information archiving. The s…
with back office functions such as workforce and inventory management, cash management, events management, and sales forecasting. … table service restaurants, hotels, bars or nightclubs, and other venues. It consists of both hardware and software. Additionally, Maitre'D can be extended to
strong encryption and browser trust, and include unlimited reissues, and unlimited server licensing. In addition to securing information between client browsers … browsers and servers, Standard SSL Certificates also secure information between two servers and come with a website security packa…
entire WAN, including dynamic availability information on SD-WAN connections, transport data, security, and web- and network-traffic details. … Barracuda Firewall Insights is a security analytics platform that ingests, aggregates, and analyzes data automatically from any CloudGen Firewall dep…
SISA Information Security offers risk-based regulatory compliance services, as an audit and assurance firm that delivers both local and global regulatory … regulatory compliance services to help organizations build trust and confidence. … design, and implement the required security con…
malware and convert threat information into immediate action and protection. It includes additional inspection capabilities that broaden detection and expose … Integration between security solutions—from network and endpoint to investigation—enables instant sharing of threat information acro…
process with multi-layer security features to digitise customer identities worldwide, transforming them into valuable information for further compliance … process with multi-layer security features to digitise customer identities worldwide, transforming them into valuable information for furt…
Kumaran Systems, headquartered in Toronto, Ontario, states their BI Practice uses a complete integrated approach to help customers in their efforts to unlock the value buried deep in their data. Kumaran’s blended-shoring global delivery model, agile methodology where applicable helps leverage on bud…

