knowledge management and training platform for businesses. Zoho Learn can be used to a build knowledge base to organize employee and customer information, create … programs, and measure results. Zoho Learn comes with built-in features like collaborative content editor, article templates, vers…
Search Results
Listings (5,001-5,025 of 10,000)
providing knowledge of data proliferation and equipping users to act on Subject Rights Requests in an automated and comprehensive manner. … Securely respond to the Right to Access and Right to Erasure requests through iRetire. Define rules for secure tokenization or deletion of requested sens…
(EHR), practice management (PM), and revenue cycle management (RCM) solutions and services for medical practices. They partner with large and small medical … practices, medical management organizations, and medical billing companies to improve patient and provider experience, optimize operati…
conduct compliance and security access reviews at a fraction of the time and cost. It delivers instant cloud-based access certification and attestation campaigns … identity governance. Also includes user reports identity policy violation and include built-in tracking tools help streamline the…
analyze, and mitigate cybersecurity risks with full transparency and control. The solution boasts out-of-the-box yet configurable workflows and controls … from CENTRL, is a cyber security risk assessment software solution that is designed to streamline cybersecurity assessments and transform…
Cellusys IoT presents a Security, Roaming, and Analytics Solutions for MVNOs and Enterprises. Its module Roaming Control is a Steering of Roaming solution … combining a rules engine with reporting and analytics, users can control the cost of outbound IoT devices and steer devices to the optim…
acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice … diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. … customers to acquire ne…
that combines a global private backbone, a network security stack, and support for cloud resources and mobile devices. Now from Aryaka (acquired May, 2021) … firewall-as-a-service solutions, secure web gateway, SD-Wan and traffic optimization, and SASE intrusion protection.
tracking system for cleaning and security contractors in North America, users get tools to generate more applicants, screen for fit and manage compliant onboarding … processes, the applicant tracking system helps users to find, hire and onboard the right cleaners and guards. The solution can …
who in the organization can access HSMs and the scope and assignment of their roles, with full administrative and cryptographic control. Microsoft has no … Azure Dedicated HSM are hardware security modules that used in the cloud enabling users to maintain full administrative and cryptographic…
that applies artificial intelligence and learning models to identify known and unknown threats at the device, network and application levels. … provider in New York that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or pr…
Software is offered to ensure accurate measurement, data security and support to attract new partners and build profitable relationships. CAKE's solution is … program through real-time insights into partner and campaign performance, customizable alerts, granular data and unique commission str…
ports, and boast reliable connectivity over long distances to eliminate bottlenecks. The switches bost a quiet, fanless design, in-built security, and smart-managed … smart-managed layer 2+ Ethernet switch series ready to deploy in 8-, 24- and 48-port for non-PoE and Class 4 PoE (i.e. PoE+) …
boasting users among more than 5000 companies, including small and medium-sized businesses and large groups. The solution adapts to the user's needs to manage … Wherever the user is, tasks can be shared and assigned in real time. The user can also organize time off and other absences. It is d…
recruiters can capture resumes and evaluate prospects instantly, quickly track their data on a dashboard, and manage recruiting events all in one place. The Rakuna … the mobile app for campus recruiting events, and Rakuna Recruit Dashboard, the candidate relationship management dashboard for …
provide hardware, software, and technological services to create automatic parking lots. generated. And when a vehicle enters and exists a lot, data is generated … This data is stored (without time and volume limits) in an advanced Big Data database, organized, displayed properly, and can pr…
virtual event platform is to simplify event organization tasks while optimizing attendee engagement and overall satisfaction levels. Vendor Management Tools … BoothCentral's vendor management tools enhance convenience and efficiency in event organization by streamlining processes, mitigating…
investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their … Browse metadata and payload across Kafka streams and Elastic indices by offset, timestamp or SQL. Protected by data role-based security a…
cloud to store, sync and share files easily from anywhere, anytime. The vendor says Tresorit is powered by end-to-end encryption and enhanced with a flexible … permission system, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored accord…
QR Maintenance uses QR codes and mobile forms to optimize asset management, tracking and maintenance. Whether users need to manage equipment, property … Maintenance is a complete asset management solution, from maintenance to asset tracking to management of inventory, parts and consumables. U…
ISO 27001. The platform helps companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for … driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, and create Trust with Pr…
enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and many other fields, and, according … enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and…
to detect and block known and suspicious threats before they ever reach enterprise devices. Natively integrated across the Fortinet Security Fabric, the … the FortiGuard IPS Service aims to deliver IPS performance and efficiency while creating a coordinated network response across the organiz…
disparate needs of security and access of the digital worker into a single cloud delivered scale-out platform, that can be deployed in minutes, and managed via … trust broker to mediate connections between a specific private application and an authorized user.
malicious script detection and proactive prevention along with an integrated hunting and remediation engine. The solution hardens servers and applications reducing … reducing the attack surface, by providing actionable intelligence about web security posture based on real world best practices…