|
|
Related Products
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
-
Thinfinity Workspace
Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice.
With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business.
The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
-
Udentify
Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution.
Challenges we solve:
- Identify verification
- Onboarding
- New account opening
- Age verification
- Fraud prevention
- Biometric authentication
- Passwordless authentication
- Strong customer authentication
- KBA replacement
- KYC and AML compliance
Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
-
SiteKiosk
SiteKiosk Online is a Cloud-based, all-in-one kiosk & digital signage software for kiosks, interactive displays, public computers, tablets, and laptops (Windows/Android) in public access locations. You can easily set up tamper-proof, public-facing computers and displays from the SiteKiosk Cloud platform and manage and monitor them remotely from your dashboard in your Cloud account. Create your interactive user interfaces from the easy-to-use SiteKiosk Online editor and publish them to your computers and interactive displays in just a few clicks. Our software ensures your customer’s data is cleared after each session on the remote client. Don’t have the time to design your kiosk and DS interfaces? Leave it to us and contact our office! We create custom kiosk apps and provide comprehensive support during the implementation of your project. Open a 30-day free trial account.
-
Cerberus FTP Server
Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations.
- FTP/S, SCP, SFTP, HTTPS
- SAML SSO
- Active Directory & LDAP
- Secure SSL Encryption
- Two-Factor Authentication
- IP Auto-Banning and Geoblocking
- HIPAA Compliant
- FIPS 140-2 Validated
- Advanced Reporting
- Comprehensive Auditing
- Web File Transfer Client
- Email Notifications
- Event Support & Automation
- File Retention Policies
-Unlimited Connections
-Virtual Directories
-Users & Groups
-Detailed Logs
-Full IPv6 Support
-FTP with TLS/SSL
-SOAP control API
-Web Administration
-SSH2 SFTP and SCP
-Public Key Authentication
-
Auth0
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™.
Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
-
SEMAI
SEMAI, a game-changing AI-driven SEO solution designed to revolutionize digital marketing strategies. SEMAI isn't just another SEO tool; it's a comprehensive recommendation engine packed with functionalities that streamline and enhance every aspect of Search Engine Optimization.
What Does SEMAI Offer?
SEMAI boasts an array of features that make it an indispensable asset for marketers and SEO practitioners:
Header Tag Generation: Seamlessly create and optimize header tags crucial for content organization and SEO effectiveness.
Predictive Keyword Threat Analysis: Leverage predictive AI to preemptively identify potential risks to keyword rankings, enabling proactive measures to maintain search visibility.
Tailored Content Creation: Craft targeted content aligned with different stages of the marketing funnel, facilitating engagement and relevance.
Competitor Monitoring: Monitor competitors' strategies by analyzing content changes, header modifications, and keyword ranking shift
-
TrustInSoft Analyzer
TrustInSoft Analyzer is a C and C++ source code analyzer powered by formal methods, mathematical & logical reasonings that allow for exhaustive analysis of source code. This analysis can be run without false positives or false negatives, so that every real bug in the code is found. Developers receive several benefits: a user-friendly graphical interface that directs developers to the root cause of bugs, and instant utility to expand the coverage of their existing tests. Unlike traditional source code analysis tools, TrustInSoft’s solution is not only the most comprehensive approach on the market but is also progressive, instantly deployable by developers, even if they lack experience with formal methods, from exhaustive analysis up to a functional proof that the software developed meets specifications.
Companies who use TrustInSoft Analyzer reduce their verification costs by 4, efforts in bug detection by 40, and obtain an irrefutable proof that their software is safe and secure.
-
Cisco Duo
Protect your workforce with simple, powerful access security. We're Cisco Duo. Our modern access security is designed to safeguard all users, devices, and applications — so you can stay focused on what you do best. Secure access for any user and device, to any environment, from anywhere. Get the peace-of-mind only complete device visibility and trust can bring. Respond faster to threats with an easy‑to‑deploy, scalable SaaS solution that natively protects every application. Duo's access security shields any and every application from compromised credentials and devices, and its comprehensive coverage helps you meet compliance requirements with ease. Duo natively integrates with applications to provide flexible, user-friendly security that's quick to roll out and easy to manage. It's a win, win, win for users, administrators, and IT teams alike. Lay the foundation for your zero-trust journey with multi-factor authentication, dynamic device trust, adaptive authentication and secure SSO.
|
|