|
|
|
|
|
|
|
|
|
Related Products
-
Guardz
Guardz provides MSPs and IT professionals with an AI-powered cybersecurity platform designed to secure and insure SMBs against cyberattacks.
Our platform offers unified detection and response, protecting users, emails, devices, cloud directories, and data. By simplifying cybersecurity management, we enable businesses to focus on growth without being bogged down by security complexities.
The Guardz scalable and cost-effective pricing model ensures comprehensive protection for all digital assets, facilitating rapid deployment and business expansion.
-
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
RISK IDENT
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sectors. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications. Our intelligent software products detect online fraud through an automated evaluation and interpretation of data points. We deliver results in real time and thus enable you to stop fraudulent attacks before the damage occurs. Multiple awards, serious data security. The challenge in fraud prevention is the networking and evaluation of all relevant data points at high processing speed. That is exactly what we deliver: Identifying anomalies in real time.
-
Udentify
Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution.
Challenges we solve:
- Identify verification
- Onboarding
- New account opening
- Age verification
- Fraud prevention
- Biometric authentication
- Passwordless authentication
- Strong customer authentication
- KBA replacement
- KYC and AML compliance
Behind the scenes, Udentify embeds cutting-edge technologies into our identity verification and biometric authentication solution via a lightweight and flexible SDK. We are constantly investing in our technologies to stay at the forefront of fraud detection, compliance, and user experiences.
-
ARGOS Identity
ARGOS Identity is an identity verification service provider (Identity as a Service). Get everything you need for Identity verification at ARGOS.
We provide services to help you identify Anyone Anywhere Anytime!
Providing simple KYC implementation for identity verification. We empower our clients to deliver a seamless digital onboarding experience. Build your identity management system around your business goals and offer your customers a smooth, hassle-free KYC experience.
FACE Identity is a section of user onboarding that utilizes facial recognition technology to search for matching faces within a collection of stored faces. This service helps alleviate the
ARGOS Textify is an AI-powered solution that automates the extraction and review of critical data from a wide range of documents, reducing the time and cost of manual verification.
-
Fraud.net
Fraud.net delivers the world’s most advanced infrastructure for fraud management – powered by a sophisticated collective intelligence network, world-class artificial intelligence, and a modern, cloud-based platform that helps you:
* Unify fraud data from any source with a single connection
* Detect fraudulent activity for 99.5%+ transactions in real-time
* Optimize fraud management by uncovering hidden insights in terabytes of data
Recognized in Gartner’s Market Guide for Online Fraud Detection, Fraud.net is a real-time, enterprise-strength fraud prevention and analytics solution organized around its business customers’ needs. Through a single point of command, it unifies and analyzes data from disparate systems and sources, tracks digital identities and behaviors, and then deploys the latest tools and technologies to stamp out fraudulent activity while allowing good transactions to sail through.
Contact us today for a free trial.
-
Blumira
Blumira’s mission is to help SMBs and mid-market companies detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira’s all-in-one SIEM+XDR platform combines logging with automated detection and response for better security outcomes and consolidated security spend.
- Flexibility of an open XDR: Open platform integrates with multiple vendors for hybrid coverage of cloud, endpoint, identity, servers and more
- Automation accelerates security: Deploy in minutes; stop threats immediately with automated response to isolate devices and block malicious traffic
- Satisfy more compliance controls: Get more in one – SIEM w/1 year of data retention, endpoint, automated response & 24/7 SecOps support*
- Managed platform saves time: Blumira’s team manages the platform to do threat hunting, data parsing and analysis, correlation and detection at scale
-
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business.
Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction.
Welcome to the new world of Risk Intelligence.
-
Securden Unified PAM
Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization.
• Enforce remote password resets on devices.
• Manage Windows domain, service, local admin accounts & their dependencies.
• Eliminate hardcoded-credentials from scripts and configuration files.
• Automate password access for non-human identities with APIs.
• Protect SSH keys, track usage & associate with UNIX devices.
• Share accounts with granular access controls.
• One-click remote access to assets without revealing passwords.
• Grant Just-In-Time access to privileged accounts.
• Shadow, Monitor & record live sessions.
• Endpoint privilege management with application controls.
• Integrate with AD, AzureAD for user provisioning.
• Integrate with solutions for MFA, SIEM, ITSM & SSO.
• Comply with regulations with audit trails & custom reports
|
|
Platforms Supported
|
Platforms Supported
|
Audience
Businesses that want to protect their customers from unauthorized account access, data leakage, and identity fraud
|
Audience
Organizations interested in a powerful browser security solution
|
Support
|
Support
|
API
|
API
|
Screenshots and Videos
|
Screenshots and Videos
|
Pricing
|
Pricing
No information available.
|
Reviews/Ratings
|
Reviews/Ratings
|
Training
|
Training
|
Company Information
Deduce
Founded: 2019
United States
www.deduce.com
|
Company Information
LayerX
Founded: 2021
Israel
layerxsecurity.com/product/
|
Alternatives
|
Alternatives
|
|
|
|
|
|
|
|
|
Categories
|
Categories
|
|
|
|
|
|
|