requirements and can be bundled with other IT or security offerings, or used to upsell managed services—creating an opportunity for MSPs and resellers. … requirements and can be bundled with other IT or security offerings, or used to upsell managed services—creating an opportunity for MSPs an…
Search Results
Listings (4,926-4,950 of 10,000)
strategies, including audience planning, activation, and measurement, with complete data privacy, security, and governance. … InfoSum's Data Clean Room enables companies to match and analyze unlimited datasets in real-time without sharing or moving data, eliminating the risk of … activ…
workflows that trigger immediate action based on pre-defined and/or customer-defined security policies and rules. … faster fraud takes place. OneSpan Risk Analytics leverages machine learning and data modeling to analyze data in real time to produce a transaction risk score … action ba…
as simpler and safer Kubernetes application delivery, using Argo CD, from the Argo Project. With it, users can manage all applications and environments … no need for fine-tuning Argo CD components or manual sharding, and gain improved security features. … enterprise support, solution g…
The Zscaler Cloud Security Platform is a SASE service built from the ground up for performance and scalability. As a globally distributed platform, users … applications, and through peering with hundreds of partners in major internet exchanges around the world it aims to ensure optimal perfor…
KYC aims to provide a global online identity verification solution for KYC and AML screening. Argos KYC provides online identity verification solution services … convenience. Take two photos - ID card and face - to start and complete the KYC process. … With the OCR technology, informat…
encryption and vaultless tokenization to secure Personally Identifiable Information (PII), Protected Health Information (PHI), cardholder data (CHD) and ACH account … channelsSimple setup and detailed reporting through Bluefin’s web based ShieldConex ManagerMeets PCI, GDPR, CCPA, HIPPA and Na…
equips salespeople and drivers with real-time inventory and price and promotion information, helping companies achieve optimized deliveries and is an ideal solution … equips salespeople and drivers with real-time inventory and price and promotion information, helping companies achieve optimiz…
Google Calendar events to worklogs for added value and productivity. Make accurate decisions based on approved and up-to-date information with dynamic reports … reports. Plan for time and future bids based on historical estimates, and measure and report on CAPEX and OPEX with precision. &hell…
bank transfers, and non-cash payment methods. Fundraise Up supports giving websites in multiple languages, and can include security and fraud protection … donors and increase conversion by integrating with a nonprofit’s existing website. The solution includes pre-built components to add to a …
for developers used to visualize code changes and behavior in an IDE and code editor. Users can observe and map an application’s running behavior with one … the developer makes a pull request, and before production, helping users to find runtime performance, security, and stability problems w…
Internet Access is delivered as a security stack as a service from the cloud, and is designed to eliminate the cost and complexity of traditional secure … gateway approaches, and provide easily scaled protection to all offices or users, regardless of location, and minimize network and applian…
marketing platform used by over 200 DMOs to, source, organize, publish, and optimize UGC and owned visuals that resonate with today’s travelers. … Flexible rights management: Customize how you ask for rights to social media photos and create a great experience … third parties: We make…
INX +BI aims to assist the entire workforce management process by simplifying reporting and graphing through a single screen, drill-down dashboard display … Home page - Events
solution designed for the cleaning industry. MaidSuite stores information, analyzes it and helps business users to make the most profitable decisions for … vendor, this solution considers important variables the way a user would and provides their company with the best, most efficient schedul…
on analyzing event based security logs from cumbersome sensors and software installed on the endpoint. Rather than analyzing security/event logs, Infocyte … enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, …
partnership with VMware, provides security and high performance in a VPC that is designed to maintain the ultimate scalability and flexibility whilst resources … being used. Their Virtual Private Cloud is cost-effective and compatible with hybrid clouds and multi-cloud strategies.
filtering, processing, and classifying large volumes of real-time data. Bringing a new level of security to the data center, cloud, and edge, Morpheus uses … uses AI to identify, capture, and act on threats and anomalies that were previously impossible to identify. … filtering, process…
Quantum IoT Protect from Check Point offers security solutions for both IoT networks and IoT and OT devices. These solutions are tailored for different … environments including Enterprise Smart Office, Smart Building, Industrial, and Healthcare. Quantum IoT Protect prevents IoT cyber attacks,…
designed surveys with wide-ranging customization and branding options, which are optimized for smartphone, tablet and desktop, to increase completion rates. NIPO's … NIPO's solutions are certified to international data security ISO 27001:2013 standards, and compliant with local data legislati…
from Trustwave and rebranded from SysNet, VikingCloud is a managed security service that monitors the state + performance of network and applications, a … anomalies and react to issues as they arise. Services can include the Asgard Platform, a predictive platform providing continuous cybersec…
to build, deploy, and scale web apps and APIs, a fully managed service with built-in infrastructure maintenance, security patching, and scaling. Includes … popular frameworks including .NET, .NET Core, Java, Node.js, Python, PHP, and Ruby.
knowledge and preferred way to learn. The course library includes content on software development, DevOps, machine learning, security infrastructure, and cloud … well as certification practice exams, hands on learning experiences and cloud labs, and skills assessments.
public and private content, events, and discussions.Personalized Onboarding - Create an engaging experience for members and get them activated and focused … accessing resources and uncovering new opportunities.Member Directory - Manage members in one place and segment for targeted content, ev…
Cisco's Meraki Virtual MX (vMX) is a virtual instance of a Meraki security & SD-WAN appliance, dedicated specifically to providing the simple configuration … simplicity, performance, and security of Auto VPN connectivity from the MX security and SD-WAN appliance to secure users and infrastru…