2 programs for "k-meleon" with 2 filters applied:

  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • 1
    illness index

    illness index

    illness_index A Computer Program of a Medical Textbook.

    A computer scientist has attempted to program a textbook of British general practice (primary care) medicine, that is, Hodgkin K (1978) "Towards Earlier Diagnosis....", 4th Edition, Churchill Livingstone. If a patient types presenting findings (such as headache, cough), the program prompts the user for expansion/denial of appropriate findings, in order to construct a list of patient findings. The program also calculates a list of likely diseases, which the user can use the web to find out...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    De Key Data Monitor

    De Key Data Monitor

    This is a solution to help an enterprise to monitor their key data

    This is a solution to help an enterprise to monitor their key/sensitive data. It is composed of seven major components: k-data modeling, k-data capture, k-data store, k-data watcher, k-data metrics, k-data view and k-data action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next