that applies artificial intelligence and learning models to identify known and unknown threats at the device, network and application levels. … provider in New York that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or pr…
Search Results
Listings (5,001-5,025 of 10,000)
Software is offered to ensure accurate measurement, data security and support to attract new partners and build profitable relationships. CAKE's solution is … program through real-time insights into partner and campaign performance, customizable alerts, granular data and unique commission str…
ports, and boast reliable connectivity over long distances to eliminate bottlenecks. The switches bost a quiet, fanless design, in-built security, and smart-managed … smart-managed layer 2+ Ethernet switch series ready to deploy in 8-, 24- and 48-port for non-PoE and Class 4 PoE (i.e. PoE+) …
New World software, and your data, is included. This provides secure and reliable administration, hardware and software maintenance, and support at no additional … access to information, simplified reporting, and time-saving workflow to help increase financial transparency, make informed busi…
Threat Sharing is an open source software and set of standards to share, create and validate threatintel and intelligence. As an open source project MSP … MSP Threat Sharing is free to participate in, and use. … to navigate between events and their correlations. An event graph function…
resource allocation, streamlined workflow management, and enhanced customer service. By leveraging its telematics and IoT capabilities, the platform helps businesses … ZenduiT offers telematics and IoT-powered software solutions. Their technology platform is designed to help fleet and field s…
engagement and action through targeted welcome messages with personalized appeals. Smart online and mobile donation forms dynamically tailor the ask and provide … options like recurring, matching and tribute gifts to optimize conversion and maximize giving. Passions, preferences and giving …
consulting, design and development company focused on creating immersive XR trainings & simulations for Healthcare, MedTech, Pharma, Aerospace & Defense. They … gamification for training, education, and collaboration scenarios, where users can explore, interact, learn and build skills as well…
on analyzing event based security logs from cumbersome sensors and software installed on the endpoint. Rather than analyzing security/event logs, Infocyte … enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, …
Additionally, Industry Weapon offers a range of digital signage hardware and displays. … the platform makes content creation, management, and scheduling easy. Everything you need to develop, deploy and automate your content can be managed in … in CommandCenterHD with the drag and drop …
ISO 27001. The platform helps companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for … driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, and create Trust with Pr…
enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and many other fields, and, according … enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and…
to detect and block known and suspicious threats before they ever reach enterprise devices. Natively integrated across the Fortinet Security Fabric, the … the FortiGuard IPS Service aims to deliver IPS performance and efficiency while creating a coordinated network response across the organiz…
disparate needs of security and access of the digital worker into a single cloud delivered scale-out platform, that can be deployed in minutes, and managed via … trust broker to mediate connections between a specific private application and an authorized user.
malicious script detection and proactive prevention along with an integrated hunting and remediation engine. The solution hardens servers and applications reducing … reducing the attack surface, by providing actionable intelligence about web security posture based on real world best practices…
responses that are often missed. Corporations and governments can use Clearspeed to build trust in their people and vetting processes in hiring, claims, applications … based on an individual’s vocal responses. It can be applied for fraud, security, or safety risk screening to clear the low-ri…
STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords … log in credentials, and other password policy enforcement features. StealthINTERCEPT also includes more advanced authenticati…
analysis, and storage, to provide IT teams with in-depth network conversation details for troubleshooting, performance optimization, and security investigations … monitoring technologies. Network Instruments was acquired by JDSU in 2015, and then split off into Viavi Solutions.
spreadsheets, XML and other data sources in a single location. iDashboards' built-in security framework provides role-based user permissions and access control … software to custom build dashboards, perform what-if analytics, enable alerts and generate reports based on the displayed data in a…
Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious user or device behavior with … built-in intelligence. Mainstream support for the product ended in January 2021, and the product is no longer available for sale. Similar fu…
Amazon Inspector is a security assessment service for Amazon EC2 instances and the applications running on them. Pricing is based on two dimensions, the … the number of EC2 instances included in each assessment, and the type(s) of rules package selected. An Inspector assessment can have a com…
enforce internet-use policies, analyze the nature and intent of content and active code entering the network, and use DLP technology to scan outbound traffic … Gateway) is presented by the vendor as high-performance on-premises web security, that can be deployed as dedicated hardware or a vir…
acquire and retain members and achieve revenue goals. According to the vendor, this solution enables users to: Centralize all the information they … visitors, donors and members. Boost efficiency to focus on their mission. Streamline their external and internal communication efforts. …
TikTok, and Twitch with filters that help find influencers faster. Search by: LocationCategoryFollower countEngagement rateContact info and social linksAudience … demographics, and authenticity. 🗂️ Then, organize favorite influencers in lists to compare their stats. To export contact info…
recruiters can capture resumes and evaluate prospects instantly, quickly track their data on a dashboard, and manage recruiting events all in one place. The Rakuna … the mobile app for campus recruiting events, and Rakuna Recruit Dashboard, the candidate relationship management dashboard for …