|
|
Related Products
-
Source Defense
Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience.
The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
-
Netwrix Auditor
Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
-
Shrimpy
Simplify the way you manage your portfolio by automating your trading strategy. Connect Shrimpy to all your crypto exchange accounts to automate trading strategies that can improve performance and reduce risk in the long-term. Automatically copy the top crypto traders on the only social trading platform that was built for simple portfolio management. No matter your experience with cryptocurrency, Shrimpy can help you build a portfolio strategy, track performance, and monitor the market. Shrimpy was built with your security in mind from the beginning. Every API key is securely encrypted and stored using FIPS 140-2 validated hardware security modules (HSMs) to protect the confidentiality and integrity of your exchange API keys. Shrimpy only requires the ability to read data and make trades, so your funds can't be removed from the exchange. We also encourage all users to utilize our Two-Factor Authentication (“2FA”) service which secures access to your account.
-
Blumira
Blumira’s mission is to help SMBs and mid-market companies detect and respond to cybersecurity threats faster to stop breaches and ransomware. Blumira’s all-in-one SIEM+XDR platform combines logging with automated detection and response for better security outcomes and consolidated security spend.
- Flexibility of an open XDR: Open platform integrates with multiple vendors for hybrid coverage of cloud, endpoint, identity, servers and more
- Automation accelerates security: Deploy in minutes; stop threats immediately with automated response to isolate devices and block malicious traffic
- Satisfy more compliance controls: Get more in one – SIEM w/1 year of data retention, endpoint, automated response & 24/7 SecOps support*
- Managed platform saves time: Blumira’s team manages the platform to do threat hunting, data parsing and analysis, correlation and detection at scale
-
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com.
-
Terranova Security
Terranova Security makes it easy to build cybersecurity awareness programs that feature the industry’s highest-quality training content and real-world phishing simulations. As a result, any employee can better understand phishing, social engineering, data privacy, compliance, and other critical best practices.
-
Modius OpenData
Modius provides the solutions for managing the availability, capacity, and efficiency of critical facilities. Our flagship product, OpenData, provides all the tools including DCIM needed to manage the performance of mission-critical infrastructure, which includes seamless integration of disparate devices. OpenData has built-in integrated features for analytics, dashboards, graphical views, and more, all in a “single pane of glass”. Modius has worked with the ESTCP to showcase a Middleware solution for more effective use of utility and facility data to improve facilities management, operation, and maintenance. Pre-configured bundles and out-of-the-box protocol integrations means you deploy efficiently. OpenData actively monitors your equipment to alert you to faults before they happen. Deploy a modern edge-based architecture to lower bandwidth costs and analyze equipment at the source in real-time.
-
ActiveBatch Workload Automation
ActiveBatch by Redwood makes setting up and launching automation easy with no custom scripting required. With a low-code Super REST API adapter, over 100 pre-built job steps and a user-friendly drag-and-drop workflow designer, you can integrate across any system, application and data source, on-prem, in the cloud or in hybrid environments.
Maintain complete control and visibility and meet SLAs with monitoring of all automation from a single pane of glass and get custom alerts via emails or SMS. Managed Smart Queues dynamically scale resources for high-volume workloads, reducing process times while the self-service portal enables business users to run and monitor workflows independently.
ActiveBatch meets security and compliance standards, with ISO 27001 and SOC 2, Type II certifications, encrypted connections and regular third-party tests, always keeping security at the forefront. Along with ongoing product advancements, get the added benefit of 24x7 support and on-site training.
-
Sumsub
Sumsub is a full-cycle verification platform that secures every step of the user journey. With Sumsub’s customizable KYC, KYB, AML, Transaction Monitoring and Fraud Prevention solutions, you can orchestrate your verification process, welcome more customers worldwide, meet compliance requirements, reduce costs and protect your business.
Sumsub achieves the highest conversion rates in the industry—91.64% in the US, 95.86% in the UK, and 97.89% in Hong Kong—while verifying users in less than 50 seconds on average.
Sumsub’s methodology follows FATF recommendations, the international standard for AML/CTF rules and local regulatory requirements (FINMA, FCA, CySEC, MAS, BaFin).
Sumsub has over 2,000 clients across the fintech, crypto, transportation, trading, e-commerce and gaming industries including Bitpanda, Wirex, Avis, Bybit, Huobi, Kaizen Gaming, and TransferGo.
-
Google Compute Engine
Compute Engine is Google's infrastructure as a service (IaaS) platform for organizations to create and run cloud-based virtual machines.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications. Integrate Compute with other Google Cloud services such as AI/ML and data analytics. Make reservations to help ensure your applications have the capacity they need as they scale. Save money just for running Compute with sustained-use discounts, and achieve greater savings when you use committed-use discounts.
|
|