|
|
Related Products
-
Google Cloud Platform
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits.
Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
-
ManageEngine Endpoint Central
ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
-
Astra Pentest
Astra’s Pentest is a comprehensive penetration testing solution with an intelligent automated vulnerability scanner coupled with in-depth manual pentesting.
On top of 10000+ tests including security checks for all CVEs mentioned in the OWASP top 10, and SANS 25, the automated scanner also conducts all tests required to comply with ISO 27001, HIPAA, SOC2, and GDPR.
Astra offers an interactive pentest dashboard that the user can use to visualize vulnerability analyses, assign vulnerabilities to team members, and collaborate with security experts. And if the users don’t want to get back to the dashboard every time they want to use the scanner or assign a vulnerability to a team member, they can simply use the integrations with CI/CD platforms, Slack, and Jira.
-
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
-
Golioth
Connect and secure devices, send sensor data to the web, update firmware over the air, and scale your fleet with our instant IoT cloud.
Select hardware and connectivity that meets your needs from your preferred vendor.
Use the open source Golioth Device SDK to integrate with your firmware securely. Once connected you can instantly monitor, manage, and update your devices from the Golioth console.
We’re a group of industry-leading hardware, firmware, and cloud engineers. We understand the struggle to connect “sand” to the internet, so we built a better way to do just that. We’re built for the embedded developer workflow. Use the tools you’re already familiar with to build robust and reliable devices, faster.
Choose from hundreds of hardware options and a variety of connectivity types, protocols, and multiple embedded RTOS providers.
Golioth provides a single control plane for all your devices, whether you’re exploring an idea, or improving an existing project.
-
Parasoft
Parasoft helps organizations continuously deliver high-quality software with its AI-powered software testing platform and automated test solutions. Supporting embedded and enterprise markets, Parasoft’s proven technologies reduce the time, effort, and cost of delivering secure, reliable, and compliant software by integrating everything from deep code analysis and unit testing to UI and API testing, plus service virtualization and complete code coverage, into the delivery pipeline.
A powerful unified C and C++ test automation solution for static analysis, unit testing and structural code coverage, Parasoft C/C++test helps satisfy compliance with industry functional safety and security requirements for embedded software systems.
-
Pikmykid
Pikmykid is the leading safety and dismissal platform that empowers schools to simplify dismissal, engage parents, and keep students safe without the need to purchase, install, or support additional hardware. Designed by former educators and parents, Pikmykid has helped more than 2,000 schools in all 50 states eliminate the busy work and vulnerabilities of dismissal so that teachers have more time to teach, admins aren’t bogged down in carpool calls, and principals can account for every student at the end of the day. And with extensive SIS integrations, Pikmykid easily fits into your schools’ existing ecosystems to make the tools you already have that much more powerful.
-
ShareMyToolbox
ShareMyToolbox - Your Ultimate Tool Tracking Solution.
Effortlessly monitor small tools and equipment. Seamlessly accessible on Apple and Android devices, mobile users can explore their company's tool inventory. Requesting tools and accepting assignments is a breeze, utilizing barcode scanning. Unveil the power of GPS coordinates captured during scanning, precisely showing all scans on an interactive map. Tailored for contractors, our system boasts unparalleled user-friendliness. Embark on your tool tracking journey in just three steps:
Streamlined Organization: Curate an inventory of tools and equipment, creating your personalized cloud catalog of valuable assets.
Amplified Visibility: Empower field personnel with swift access to view the company's array of assets through our intuitive mobile app.
Foster Accountability: Grant field workers the ability to check tools in and out, and transfer tools from person to person through the convenience of barcodes and QR codes.
-
Polonious
Polonious is an ISO27001 certified secure, extremely flexible and highly configurable investigation workflow solution.
The system includes features such as process centrism, workload management, reporting, dynamic dashboards, case reports, integrations and more. With our process and compliance focus, you can ensure your investigations are fully compliant with applicable regulations, with minimal extra effort or stress.
With Polonious, you can run detailed reports on case outcomes, timeframes, and finances, and break that down across case types, investigators, and even down to investigation status. So you can prove your value up the chain, but you can also identify any problem areas and improve your efficiency.
-
Securden Password Vault
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
• Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files.
• Enforce password security best practices like periodic password resets.
• Generate and assign unique & strong passwords to IT assets.
• Share resources with IT teams and collaborate seamlessly
• Eliminate hard-coded credentials with API-based application password management.
• Control ‘Who’ has access to ‘What’ with granular controls.
• One-click remote access to IT assets through native apps & web-based sessions.
• Track all privileged activities with comprehensive Audit trails.
• Demonstrate compliance with industry standards using customized reports on privileged access.
• Check for breached passwords through dark web monitoring.
• Auto-fill credentials on websites.
|
|