IntrinsicDecoy Technologies
|
||||||
About
Craft your own policies beyond standard abuse categories and enforce them in just minutes.
Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly.
Automate moderation of text, images, videos and reports with a system that gets better with every moderation action.
Manage review queues and escalations easily with fine-grained RBAC permissions.
Make data-driven decisions based on policy performance reports and platform-wide health monitoring.
Access advanced security, AI-powered analytics, and comprehensive information governance.
|
About
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business.
Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction.
Welcome to the new world of Risk Intelligence.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Trust and safety teams interested in a powerful AI content moderation and workflow solution
|
Audience
Organizations interested in a powerful risk intelligence platform
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$10,000/year
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationDecoy Technologies
United States
withintrinsic.com
|
Company InformationResolver
Founded: 2000
Canada
www.resolver.com
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
Categories |
CategoriesWithout visibility and action across complex, multi-page, multi-language social media pages and campaigns, negative and abusive user activity will continue to disrupt your online communities, alienate your consumers, and cut your bottom line. Safeguard your audiences across owned channels and paid activity so you can increase brand engagement and return on ad spend with an inviting and safe brand community. Our reliable moderation accuracy keeps your online presence welcoming, effective, and secure. We proactively protect your campaigns, offering visibility into owned accounts and paid activities while distinguishing the differences between organic and paid audience interactions. Through advanced detection and comprehensive insights, we safeguard your paid ROI and strengthen customer connections. |
|||||
Audit Features
Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
GRC Features
Auditing
Disaster Recovery
Environmental Compliance
Incident Management
Internal Controls Management
IT Risk Management
Operational Risk Management
Policy Management
Incident Management Features
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
Incident Reporting
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis
Safety Management
Task Management
Ticket Management
Incident Response Features
Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
Security Orchestration
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management
Integrated Risk Management Features
Audit Management
Compliance Management
Dashboard
Disaster Recovery
Incident Management
IT Risk Management
Operational Risk Management
Risk Assessment
Safety Management
Vendor Management
Investigation Management Features
Contact Management
Data Management
Incident Management
Reporting & Statistics
Subject Profiles
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
Physical Security Features
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Risk Management Features
Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
Internal Controls Management
IT Risk Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment
Vendor Management Features
Audit Management
Contact Management
Customer Database
Self Service Portal
Supplier Master Data
Transaction History
Vendor Maintained Profiles
Vendor Managed Inventory
Vendor Performance Rating
Vendor Qualification Tracking
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
Asana
Everbridge Mass Notification
Filigran
Microsoft Teams
Okta
ServiceNow
Slack
Zendesk
|
Integrations
Asana
Everbridge Mass Notification
Filigran
Microsoft Teams
Okta
ServiceNow
Slack
Zendesk
|
|||||
|