customer service and operations, for small to medium businesses, to implement data driven standard processes that improve productivity and help businesses … share, track and follow-up events and to-dos. … customers, including activity history, key contacts, customer communications, and…
Search Results
Listings (5,001-5,025 of 10,000)
Threat Sharing is an open source software and set of standards to share, create and validate threatintel and intelligence. As an open source project MSP … MSP Threat Sharing is free to participate in, and use. … to navigate between events and their correlations. An event graph function…
of governments, public and private companies, private lenders, accountants and developments agencies that service between 10 and 30,000 loans. This solution … Construction, Litigation and Lines of Credit. Users can create customized fields along with drop down menus, custom payment types, a…
SMS, Email, and Slack by means of instant and day-end report features. Bekchy provides SaaS and cloud-based service with monthly-annual and different payment … education, tourism and media sectors. It provides basic and advanced protection for internet portals, CRM, B2B, e-commerce websites…
resource allocation, streamlined workflow management, and enhanced customer service. By leveraging its telematics and IoT capabilities, the platform helps businesses … ZenduiT offers telematics and IoT-powered software solutions. Their technology platform is designed to help fleet and field s…
engagement and action through targeted welcome messages with personalized appeals. Smart online and mobile donation forms dynamically tailor the ask and provide … options like recurring, matching and tribute gifts to optimize conversion and maximize giving. Passions, preferences and giving …
recruiters can capture resumes and evaluate prospects instantly, quickly track their data on a dashboard, and manage recruiting events all in one place. The Rakuna … the mobile app for campus recruiting events, and Rakuna Recruit Dashboard, the candidate relationship management dashboard for …
Digital Science company ReadCube now offers Papers, a reference management application. … to make the world of research more accessible and connected - serving researchers, publishers, academic and commercial organizations. Papers offers a cross-platform … cross-platform suite of refe…
ISO 27001. The platform helps companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for … driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, and create Trust with Pr…
enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and many other fields, and, according … enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and…
to detect and block known and suspicious threats before they ever reach enterprise devices. Natively integrated across the Fortinet Security Fabric, the … the FortiGuard IPS Service aims to deliver IPS performance and efficiency while creating a coordinated network response across the organiz…
disparate needs of security and access of the digital worker into a single cloud delivered scale-out platform, that can be deployed in minutes, and managed via … trust broker to mediate connections between a specific private application and an authorized user.
malicious script detection and proactive prevention along with an integrated hunting and remediation engine. The solution hardens servers and applications reducing … reducing the attack surface, by providing actionable intelligence about web security posture based on real world best practices…
analysis, and storage, to provide IT teams with in-depth network conversation details for troubleshooting, performance optimization, and security investigations … monitoring technologies. Network Instruments was acquired by JDSU in 2015, and then split off into Viavi Solutions.
STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords … log in credentials, and other password policy enforcement features. StealthINTERCEPT also includes more advanced authenticati…
spreadsheets, XML and other data sources in a single location. iDashboards' built-in security framework provides role-based user permissions and access control … software to custom build dashboards, perform what-if analytics, enable alerts and generate reports based on the displayed data in a…
responses that are often missed. Corporations and governments can use Clearspeed to build trust in their people and vetting processes in hiring, claims, applications … based on an individual’s vocal responses. It can be applied for fraud, security, or safety risk screening to clear the low-ri…
Amazon Inspector is a security assessment service for Amazon EC2 instances and the applications running on them. Pricing is based on two dimensions, the … the number of EC2 instances included in each assessment, and the type(s) of rules package selected. An Inspector assessment can have a com…
Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious user or device behavior with … built-in intelligence. Mainstream support for the product ended in January 2021, and the product is no longer available for sale. Similar fu…
enforce internet-use policies, analyze the nature and intent of content and active code entering the network, and use DLP technology to scan outbound traffic … Gateway) is presented by the vendor as high-performance on-premises web security, that can be deployed as dedicated hardware or a vir…
virtual event platform is to simplify event organization tasks while optimizing attendee engagement and overall satisfaction levels. Vendor Management Tools … BoothCentral's vendor management tools enhance convenience and efficiency in event organization by streamlining processes, mitigating…
provide hardware, software, and technological services to create automatic parking lots. generated. And when a vehicle enters and exists a lot, data is generated … This data is stored (without time and volume limits) in an advanced Big Data database, organized, displayed properly, and can pr…
acquire and retain members and achieve revenue goals. According to the vendor, this solution enables users to: Centralize all the information they … visitors, donors and members. Boost efficiency to focus on their mission. Streamline their external and internal communication efforts. …
providing knowledge of data proliferation and equipping users to act on Subject Rights Requests in an automated and comprehensive manner. … Securely respond to the Right to Access and Right to Erasure requests through iRetire. Define rules for secure tokenization or deletion of requested sens…
Additionally, Industry Weapon offers a range of digital signage hardware and displays. … the platform makes content creation, management, and scheduling easy. Everything you need to develop, deploy and automate your content can be managed in … in CommandCenterHD with the drag and drop …