|
|
Related Products
-
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments.
✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement.
✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly.
✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations.
✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
-
Netwrix Auditor
Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
-
ConnectWise Cybersecurity Management
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
-
ShareCRF
Create, in a few hours, an eCRF that is as easy to use as a paper one, and avoid the biggest headaches in data collection in Pre-authorisation and Post-authorisation studies of your medical device. Incorporate an EDC that is highly flexible when creating the eCRF, this will allow you to meet the needs of any kind of study. Save tons of time in the management and monitoring of the study with the management and monitoring tools included in the EDC. Use a validated system with all the security guarantees that give trust to the sponsor and allow the collection of quality data. Don’t wait until the analysis phase to discover mistakes in the data or you will end up chasing down investigators to correct them. Prevent the process of creation of an eCRF from being long and complex.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
Extellio
Extellio is the combined power of web analytics, surveys, heatmaps and session recordings to help understand user behaviour on websites, web apps and mobile apps. Privacy compliant around the globe, Extellio can monitor and investigate user journeys and experience online to provide you with more meaningful insights. With different data sources, you can create segments and funnels to give you a better understanding of survey data and analytics data. With this powerful tool, you can follow and understand user journeys relevant to your business.
Better insights mean more accurate steps you can take to improve your website and refine visitor experience.
-
RISK IDENT
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sectors. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications. Our intelligent software products detect online fraud through an automated evaluation and interpretation of data points. We deliver results in real time and thus enable you to stop fraudulent attacks before the damage occurs. Multiple awards, serious data security. The challenge in fraud prevention is the networking and evaluation of all relevant data points at high processing speed. That is exactly what we deliver: Identifying anomalies in real time.
-
BIGDBM
BIGDBM is a leading US data provider with 7+ years of experience building identity graphs with a focus on ROI, privacy, and quality.
Unlock significant value in your marketing campaigns, lead generation strategies, and identity verification workflows with our US consumer and B2B datasets.
Utilize the self-service BIGDBM Data Market for easy and affordable audience/list generation and custom appends.
Identify website visitor traffic using our WeVi product suite of real-time data collection via pixels and real-time identity resolution APIs.
Popular products:
- Telecom-verified phone numbers>consumers
- IP>consumer and IP>company domain linkages
- Verified consumer emails
- Consumer and B2B intent
- Consumer demographics and behavioral affinities
- Residential and commercial property owners and contact information
- MAID>consumer linkages
-
PathSolutions TotalView
PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.
-
GitGuardian
GitGuardian is a code security platform that provides solutions for DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers.
GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development and define and enforce policies consistently and globally across all systems.
GitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations, and alert to allow investigation and quick remediation.
Additionally, GitGuardian's Honeytoken module exposes decoy resources like AWS credentials, increasing the odds of catching intrusion in the software delivery pipeline.
GitGuardian is trusted by leading companies, including 66 degrees, Snowflake, Orange, Iress, Maven Wave, DataDog, and PayFit. Used by more than 300K developers, it ranks #1 in the security category on GitHub Marketplace.
|
|