disparate needs of security and access of the digital worker into a single cloud delivered scale-out platform, that can be deployed in minutes, and managed via … trust broker to mediate connections between a specific private application and an authorized user.
Search Results
Listings (5,001-5,025 of 10,000)
malicious script detection and proactive prevention along with an integrated hunting and remediation engine. The solution hardens servers and applications reducing … reducing the attack surface, by providing actionable intelligence about web security posture based on real world best practices…
analysis, and storage, to provide IT teams with in-depth network conversation details for troubleshooting, performance optimization, and security investigations … monitoring technologies. Network Instruments was acquired by JDSU in 2015, and then split off into Viavi Solutions.
responses that are often missed. Corporations and governments can use Clearspeed to build trust in their people and vetting processes in hiring, claims, applications … based on an individual’s vocal responses. It can be applied for fraud, security, or safety risk screening to clear the low-ri…
spreadsheets, XML and other data sources in a single location. iDashboards' built-in security framework provides role-based user permissions and access control … software to custom build dashboards, perform what-if analytics, enable alerts and generate reports based on the displayed data in a…
STEALTHBITS Enterprise Password Enforcer supporting high security password creation, the ability to detect and prevent the creation of previously exploited passwords … log in credentials, and other password policy enforcement features. StealthINTERCEPT also includes more advanced authenticati…
Amazon Inspector is a security assessment service for Amazon EC2 instances and the applications running on them. Pricing is based on two dimensions, the … the number of EC2 instances included in each assessment, and the type(s) of rules package selected. An Inspector assessment can have a com…
Threat Analytics (ATA) was an advanced security analytics tool used to learn, analyze, and identify normal and suspicious user or device behavior with … built-in intelligence. Mainstream support for the product ended in January 2021, and the product is no longer available for sale. Similar fu…
enforce internet-use policies, analyze the nature and intent of content and active code entering the network, and use DLP technology to scan outbound traffic … Gateway) is presented by the vendor as high-performance on-premises web security, that can be deployed as dedicated hardware or a vir…
provide hardware, software, and technological services to create automatic parking lots. generated. And when a vehicle enters and exists a lot, data is generated … This data is stored (without time and volume limits) in an advanced Big Data database, organized, displayed properly, and can pr…
Digital Science company ReadCube now offers Papers, a reference management application. … to make the world of research more accessible and connected - serving researchers, publishers, academic and commercial organizations. Papers offers a cross-platform … cross-platform suite of refe…
investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their … Browse metadata and payload across Kafka streams and Elastic indices by offset, timestamp or SQL. Protected by data role-based security a…
cloud to store, sync and share files easily from anywhere, anytime. The vendor says Tresorit is powered by end-to-end encryption and enhanced with a flexible … permission system, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored accord…
Backup protects users from data loss by continuously monitoring files and folders, and backing them up to the cloud, a network share, or local drive when … this design is more desirable than whole-disk backups for some situations. And if the worst should happen, users can restore a backup wi…
with RFID, web analytics, business intelligence, CRM, and finance solutions streamlining information gathering. Ticketure contains a feature called ‘Checkout … evaluates the contents of the basket and then determines the appropriate actions to take based on the items in the basket and the con…
Squish is a project management solution with capabilities such as bug tracking, issue tracking, and customizable metrics through a browser-based deployment
to outsource SIEM and SOC services to Secon Cyber’s Managed Detection and Response enables organisations to take advantage of SIEM and an experienced SOC … organisation with the knowledge and skills to reduce risk and effectively combat cyber threats. Through a combination of technology and h…
The B2W Employee App lets construction works report labor and equipment hours and job progress in minutes using any Android or iOS mobile device. … B2W Employee App is fast and easy to set up and use on any Android or iOS mobile device – online or offline – and requires little to no end-user …
accounting solution that helps users to comply with FASB & IASB standards, and make it simple and secure to account for small lease portfolios under ASC … solution that helps users to comply with FASB & IASB standards, and make it simple and secure to account for small lease portfolios un…
Microsoft, L’Oreal, Roche, SAP, and many small and midsize companies, and they count the world's leading virtual event providers and award-winning IT companies … MEETYOO's digital events and conferences are customizable and provide a point-and-click interface with managed service for digital …
The Telefónica Tech and Cyber Security division offers managed cloud services for public and private enterprise clouds, featuring end-to-end cloud management … boasts 10 years of operation, and users can include the Telefonica PaaS which makes available Oracle, SAP, Openshift, and BMC service…
monitors activity across endpoints—on and off the network—providing deep visibility into their security state, and it prioritizes alerts when there is an … dwell time by rapidly detecting new and non-malware attacks that other EDR solutions miss, and it cuts the cost, time and scope of incide…
Performance Features, and Detailed Logs and Comprehensive Reports. Security Gateway helps analyze, manage, and report on the inbound and outbound email traffic … Security Gateway for Email Servers, from MDaemon offers Protection from External Email Threats, Protection from Internal Email Thre…
independent validation and verification teams use the latest technologies and robust testing tools to enhance product quality, and reduce time to market … Services include functional testing, performance testing, security testing, automation, and middleware testing. … in application de…
Suite, available for Microsoft Exchange and IBM Domino, is designed to stop highly targeted email attacks and spear phishing by using document exploit … reputation, and sandboxing as part of a custom APT defense—protection you. In addition, ScanMail blocks traditional malware with email, file…