|
|
Related Products
-
NINJIO
NINJIO lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior.
With NINJIO you get:
- NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks.
- NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization.
- NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
-
Boozang
Build. Test. Automate.
Empower your whole team to build and maintain automated tests, not just developers.
Meet your testing demands fast. Get full test coverage in days, not months.
Our natural-language tests are extremely stable to code changes. When tests break our AI will repair it in minutes.
Go Agile/DevOps by setting up Continuous Testing. Push features in production the same day.
Boozang supports the following test approaches:
- Codeless Record/Replay interface
- BDD / Cucumber
- API testing
- Model-based testing
- HTML Canvas testing
The following features makes your testing a breeze
- In-browser console debugging
- Screenshots to show where test fails
- Integrate to any CI server
- Test with unlimited parallel workers to speed up tests
- Root-cause analysis reports
- Trend reports to track failures and performance over time
- Test management integration (Xray / Jira)
-
Advantage
What sets Advantage apart as a superior subscription & product order management system is total flexibility. The flexibility allows you to efficiently run your business the way you want to. And with the rapid expansion of consumer preference for access to content through subscription and membership models—whether you’re a publisher, membership organization or product distributor—you need a market-responsive order-to-cash solution. Ecommerce is increasingly a critical revenue source for publishers and membership associations. But tying eCommerce into complete customer and related financial information is critical. Since Cider is built on the same system logic as Advantage, you immediately realize the power of 1,000s of features.
-
Securden Password Vault
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
• Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files.
• Enforce password security best practices like periodic password resets.
• Generate and assign unique & strong passwords to IT assets.
• Share resources with IT teams and collaborate seamlessly
• Eliminate hard-coded credentials with API-based application password management.
• Control ‘Who’ has access to ‘What’ with granular controls.
• One-click remote access to IT assets through native apps & web-based sessions.
• Track all privileged activities with comprehensive Audit trails.
• Demonstrate compliance with industry standards using customized reports on privileged access.
• Check for breached passwords through dark web monitoring.
• Auto-fill credentials on websites.
-
Monitask
Employee monitoring application for businesses of all sizes. Tracks productivity for in-office, remote, and hybrid workers. Provides analytics and data on how to improve your team. Keeps your team accountable. World-class security.
Captures websites visited, unproductive time, screenshots, fake activity, and more.
Features:
• Time Tracking: Automatic clock in/out for accurate work hour logging
• Screenshot Capture: Random or interval-based for work verification
• Activity Monitoring: Tracks web and application usage
• Real-time Dashboards: View ongoing projects and tasks
• Stealth Mode: Discreet monitoring option
Functionality:
- Provides insights into work processes and productivity
- Identifies inefficiencies and optimizes workflows
- Maintains employee privacy while offering employer oversight
Stealth Mode allows silent monitoring, capturing natural work behaviors and maintaining productivity standards.
-
PackageX Fulfillment
PackageX Fulfillment allows retailers to pick, pack and ship orders effortlessly across all fulfillment locations, from stores to micro warehouses.
-
Twilio
Design and deploy your ideal customer engagement experience. Twilio is a single fully-programmable platform with flexible APIs for any channel and over 400+ integrations, backed by a community of over 9 million developers. Build accurate and personalized experiences for your customers, easily and at scale, using SMS and WhatsApp messaging, voice, video, email, and more.
Browse documentation and SDKs in multiple coding languages, including Ruby, Python, PHP, Node.js, java, and C#, or jumpstart your first project with our open source code templates to quickly build production-ready communications apps. Sign up and start building today.
-
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
-
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
-
Looker
Looker, Google Cloud’s business intelligence platform, enables you to chat with your data. Organizations turn to Looker for self-service and governed BI, to build custom applications with trusted metrics, or to bring Looker modeling to their existing environment. The result is improved data engineering efficiency and true business transformation.
Looker is reinventing business intelligence for the modern company. Looker works the way the web does: browser-based, its unique modeling language lets any employee leverage the work of your best data analysts. Operating 100% in-database, Looker capitalizes on the newest, fastest analytic databases—to get real results, in real time.
|
|