|
|
Related Products
-
Source Defense
Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience.
The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
-
Netwrix Auditor
Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
-
Blumira
Blumira’s mission is to help SMBs and mid-market companies detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira’s all-in-one SIEM+XDR platform combines logging with automated detection and response for better security outcomes and consolidated security spend.
- Flexibility of an open XDR: Open platform integrates with multiple vendors for hybrid coverage of cloud, endpoint, identity, servers and more
- Automation accelerates security: Deploy in minutes; stop threats immediately with automated response to isolate devices and block malicious traffic
- Satisfy more compliance controls: Get more in one – SIEM w/1 year of data retention, endpoint, automated response & 24/7 SecOps support*
- Managed platform saves time: Blumira’s team manages the platform to do threat hunting, data parsing and analysis, correlation and detection at scale
-
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments.
✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement.
✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly.
✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations.
✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
-
gtechna
gtechna is the smart parking solution trusted by some of the world’s leading cities, offering unmatched efficiency and convenience. gtechna cloud-based parking enforcement and management solutions empower municipalities, transportation agencies, and universities with state-of-the-art applications that maximize revenue, reduce operational costs, and enhance the driving experience.
When you choose gtechna, you’re investing in a partnership with a proven parking enforcement and management industry leader, continually innovating to stay ahead of the curve. Our solutions are already transforming cities like Washington, D.C., Boston, Pittsburgh, Toronto, and Vancouver, and now you can join them in embracing the future of parking.
Upgrade to the smart and scalable technology that delivers results today and builds the parking infrastructure your community needs tomorrow.
-
Camms GRC
Enabling your GRC success through Camms powerful, agile and scalable software.
Effective Governance, Risk and Compliance (GRC) management demands software capabilities to facilitate the sharing of data and insights across your wider risk landscape to drive agility and decision making – That’s where we come in!
We understand that every business will have different pain points, be at varying stages of maturity and have different objectives. We deliver solutions for those struggling with spreadsheets or at an Enterprise level, and all in between.
Our experience, coupled with our comprehensive, flexible cloud-based offering, allows you to focus on your immediate needs, deliver, and scale as you grow.
-
Securden Password Vault
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
• Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files.
• Enforce password security best practices like periodic password resets.
• Generate and assign unique & strong passwords to IT assets.
• Share resources with IT teams and collaborate seamlessly
• Eliminate hard-coded credentials with API-based application password management.
• Control ‘Who’ has access to ‘What’ with granular controls.
• One-click remote access to IT assets through native apps & web-based sessions.
• Track all privileged activities with comprehensive Audit trails.
• Demonstrate compliance with industry standards using customized reports on privileged access.
• Check for breached passwords through dark web monitoring.
• Auto-fill credentials on websites.
-
Datasite Diligence Virtual Data Room
Datasite Diligence is the premier sell-side virtual data room. Where maximum security meets seamless collaboration. Leverage our experience, knowledge, and best practices for your benefit.
Dive into due diligence with complete confidence. Save weeks of effort with our suite of tools built for real-life M&A challenges. Everything flows intuitively, while end-to-end support ensures that nothing slows you down.
Use AI document management, embedded trackers, and granular permissions to enjoy seamless, secure collaboration. Work from anywhere with our mobile app. Keep the deal on track with real-time analytics and a Q&A hub. Close each deal faster and move on to the next.
-
AI Docs
Our AI Docs contract automation software empowers small and midsized businesses to efficiently create, execute, and manage their contracts and sales documents with simple rules. These organizations rely on AI Docs to help them save labor, improve quality, and increase revenue.
One of the features that sets AI Docs apart from other contract management solutions is its ability to capture your unique document and business rules through traditional logic and artificial intelligence. This enables your less contract-savvy users such as salespeople to generate customer agreements fast and error-free. AI Docs also provides a frictionless native electronic signature process and easy access to your contract data in a secure cloud environment hosted at Amazon Web Services (AWS).
AI Docs, Inc. is a veteran-owned company based in the Chicago area which makes every effort to be the most accommodating vendor in the contract lifecycle management (CLM), proposal, and ROI software space.
-
Securden Unified PAM
Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization.
• Enforce remote password resets on devices.
• Manage Windows domain, service, local admin accounts & their dependencies.
• Eliminate hardcoded-credentials from scripts and configuration files.
• Automate password access for non-human identities with APIs.
• Protect SSH keys, track usage & associate with UNIX devices.
• Share accounts with granular access controls.
• One-click remote access to assets without revealing passwords.
• Grant Just-In-Time access to privileged accounts.
• Shadow, Monitor & record live sessions.
• Endpoint privilege management with application controls.
• Integrate with AD, AzureAD for user provisioning.
• Integrate with solutions for MFA, SIEM, ITSM & SSO.
• Comply with regulations with audit trails & custom reports
|
|