tracking system for cleaning and security contractors in North America, users get tools to generate more applicants, screen for fit and manage compliant onboarding … processes, the applicant tracking system helps users to find, hire and onboard the right cleaners and guards. The solution can …
Search Results
Listings (5,001-5,025 of 10,000)
who in the organization can access HSMs and the scope and assignment of their roles, with full administrative and cryptographic control. Microsoft has no … Azure Dedicated HSM are hardware security modules that used in the cloud enabling users to maintain full administrative and cryptographic…
that applies artificial intelligence and learning models to identify known and unknown threats at the device, network and application levels. … provider in New York that uses predictive AI technology to identify and stop mobile security threats without compromising end-user productivity or pr…
ports, and boast reliable connectivity over long distances to eliminate bottlenecks. The switches bost a quiet, fanless design, in-built security, and smart-managed … smart-managed layer 2+ Ethernet switch series ready to deploy in 8-, 24- and 48-port for non-PoE and Class 4 PoE (i.e. PoE+) …
Software is offered to ensure accurate measurement, data security and support to attract new partners and build profitable relationships. CAKE's solution is … program through real-time insights into partner and campaign performance, customizable alerts, granular data and unique commission str…
Threat Sharing is an open source software and set of standards to share, create and validate threatintel and intelligence. As an open source project MSP … MSP Threat Sharing is free to participate in, and use. … to navigate between events and their correlations. An event graph function…
of governments, public and private companies, private lenders, accountants and developments agencies that service between 10 and 30,000 loans. This solution … Construction, Litigation and Lines of Credit. Users can create customized fields along with drop down menus, custom payment types, a…
investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their … Browse metadata and payload across Kafka streams and Elastic indices by offset, timestamp or SQL. Protected by data role-based security a…
cloud to store, sync and share files easily from anywhere, anytime. The vendor says Tresorit is powered by end-to-end encryption and enhanced with a flexible … permission system, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored accord…
Digital Science company ReadCube now offers Papers, a reference management application. … to make the world of research more accessible and connected - serving researchers, publishers, academic and commercial organizations. Papers offers a cross-platform … cross-platform suite of refe…
recruiters can capture resumes and evaluate prospects instantly, quickly track their data on a dashboard, and manage recruiting events all in one place. The Rakuna … the mobile app for campus recruiting events, and Rakuna Recruit Dashboard, the candidate relationship management dashboard for …
provide hardware, software, and technological services to create automatic parking lots. generated. And when a vehicle enters and exists a lot, data is generated … This data is stored (without time and volume limits) in an advanced Big Data database, organized, displayed properly, and can pr…
ISO 27001. The platform helps companies to rapidly deploy a risk-driven Security & Compliance program as Strike Graph automatically collects evidence for … driven integration to common business systems & infrastructure. Strike Graph helps companies pass Audits faster, and create Trust with Pr…
enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and many other fields, and, according … enhancements and security fixes. Alibaba boasts abundant Java application scenarios, covering e-commerce, finance, logistics and…
to detect and block known and suspicious threats before they ever reach enterprise devices. Natively integrated across the Fortinet Security Fabric, the … the FortiGuard IPS Service aims to deliver IPS performance and efficiency while creating a coordinated network response across the organiz…
disparate needs of security and access of the digital worker into a single cloud delivered scale-out platform, that can be deployed in minutes, and managed via … trust broker to mediate connections between a specific private application and an authorized user.
malicious script detection and proactive prevention along with an integrated hunting and remediation engine. The solution hardens servers and applications reducing … reducing the attack surface, by providing actionable intelligence about web security posture based on real world best practices…
analysis, and storage, to provide IT teams with in-depth network conversation details for troubleshooting, performance optimization, and security investigations … monitoring technologies. Network Instruments was acquired by JDSU in 2015, and then split off into Viavi Solutions.
STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords … log in credentials, and other password policy enforcement features. StealthINTERCEPT also includes more advanced authenticati…
spreadsheets, XML and other data sources in a single location. iDashboards' built-in security framework provides role-based user permissions and access control … software to custom build dashboards, perform what-if analytics, enable alerts and generate reports based on the displayed data in a…
responses that are often missed. Corporations and governments can use Clearspeed to build trust in their people and vetting processes in hiring, claims, applications … based on an individual’s vocal responses. It can be applied for fraud, security, or safety risk screening to clear the low-ri…
Amazon Inspector is a security assessment service for Amazon EC2 instances and the applications running on them. Pricing is based on two dimensions, the … the number of EC2 instances included in each assessment, and the type(s) of rules package selected. An Inspector assessment can have a com…
Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious user or device behavior with … built-in intelligence. Mainstream support for the product ended in January 2021, and the product is no longer available for sale. Similar fu…
enforce internet-use policies, analyze the nature and intent of content and active code entering the network, and use DLP technology to scan outbound traffic … Gateway) is presented by the vendor as high-performance on-premises web security, that can be deployed as dedicated hardware or a vir…
Backup protects users from data loss by continuously monitoring files and folders, and backing them up to the cloud, a network share, or local drive when … this design is more desirable than whole-disk backups for some situations. And if the worst should happen, users can restore a backup wi…