Other Useful Business Software
dilisense provides AML, CTF and KYC screenings for companies that focus on product simplicity and data coverage while keeping costs under control. The rich dataset contains sanctions, watch lists and PEPs and can be accessed in a Pay-As-You-Go pricing model.
Streamline and integrate your complex learning, compliance, content monetization, and external training capabilities while keeping your people safe and delivering profits with Seertech’s LMS solution.
Aurigo builds software that helps build the world. Aurigo provides modern, cloud-based solutions for capital infrastructure and private owners to help them plan with confidence, build with quality, and maintain their assets efficiently. With more than $300b of capital programs under management, Aurigo’s solutions are trusted by over 300 customers in transportation, water and utilities, healthcare, higher education, and government on over 40,000 projects across North America. Founded in 2003, Aurigo is a privately held U.S. corporation headquartered in Austin, Texas, with global offices in Canada and India.Our award-winning Aurigo Masterworks Cloud platform offers owners full lifecycle capital program management capabilities from planning, through construction, to business operations. Aurigo helps capital program executives make better decisions based on proprietary artificial intelligence and machine learning technology.
Satori created the first DataSecOps platform which streamlines data access by automating access controls, security and regulatory compliance for the modern data infrastructure. The Secure Data Access Service is a universal visibility and control plane which allows you to oversee your data and its usage in real-time while automating access controls. Secure access to the sensitive PII, health and financial data in minutes with Satori. Satori integrates into your environment in minutes, maps all of the organization’s sensitive data, and monitors data flows in real-time across all data stores. Satori enables your organization to replace cumbersome permissions and acts as a policy engine for data access by enforcing access policies, data masking, and initiating off-band access workflows.