|
|
Related Products
-
Kognition
Kognition delivers AI-powered security technology that ensures an always-on, always-aware force multiplier at a fraction of the cost of traditional security programs. Working within existing systems, we enable organizations to proactively monitor for threats (such as weapon presentation and crowd forming) and alert your security team to the presence of both restricted individuals and VIPs. Kognition reduces IT costs and the need for additional security staff while improving incident response times and driving comprehensive security reporting and visibility for K-12+, commercial real estate, regulated industries, and more.
-
Site24x7
ManageEngine Site24x7 offers unified cloud monitoring for DevOps and IT operations within small to large organizations. The solution monitors the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure, including private and public clouds. End-user experience monitoring is done from more than 100 locations across the world and various wireless carriers.
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
RISK IDENT
RISK IDENT is a leading software development company that offers anti-fraud solutions to companies within the e-commerce, telecommunication and financial sectors. We are experts in data analytics and machine learning. Our key products are FRIDA Fraud Manager and DEVICE IDENT Device Fingerprinting. Use cases include payment fraud, account takeovers, fraud within account and loan applications. Our intelligent software products detect online fraud through an automated evaluation and interpretation of data points. We deliver results in real time and thus enable you to stop fraudulent attacks before the damage occurs. Multiple awards, serious data security. The challenge in fraud prevention is the networking and evaluation of all relevant data points at high processing speed. That is exactly what we deliver: Identifying anomalies in real time.
-
Yodeck
Next-generation technology for professional Digital Signage.
Yodeck is an unbeatably easy cloud-based digital signage platform that powers your screen with dynamic content which instantly engages your target viewers.
With Yodeck you can create, design and schedule content easily from the web, no matter how far away you are from your screens. Use attention-grabbing media like videos, images, PDF files, Office docs, data dashboards and social media to get your message across to the people that matter most to your business.
It offers enterprise-grade security & control. Yodeck also features a drag-and-drop zone editing feature that enables users to get creative in organizing content in interesting layouts.
Yodeck prides itself on providing an exceptional digital signage solution to businesses of all sizes, from local diners to global leaders who already trust us, including Delta Airlines, Autodesk, Adobe, Domino’s, Deloitte and Swissport.
-
LoanAssistant
LoanAssistant is a powerful and versatile loan amortization software developed by a dedicated team of successful accountants, software developers, and bankers. The solution is the only loan servicing add-on for QuickBooks that enables users to seamlessly manage multiple loans and credit lines. With Loan Assistant, loan data easily shows up to QuickBooks without double entry. The loan management feature of LoanAssistant covers various segments of the lending industry such as residential and commercial mortgages, education loans, motor finance, construction loans, installment sales and others. Our sophisticated Investor Participation module simplifies managing external/internal loan investments tracking/accounting, processing, and reporting.
Accrual Accounting option available. Stand-alone option available. Borrower side servicing available.
No limit/additional charges on number of loans/accounts/transactions/borrowers/lenders. No additional hardware required. Annual subscription.
-
ROLLER
At ROLLER, we're passionate about empowering leisure and entertainment businesses to reach new heights of success. With a track record of serving 1,500+ customers across 25 countries, including some of the most renowned names in the attractions industry, including SkyZone, Altitude, American Dream, Uptown Jungle, Flip Out, WhoaZone, Oxygen, Innoflate, and Jumpsquare, we understand the unique needs of playcenters, family entertainment centers, wake parks, water parks, trampoline parks, theme parks, amusement parks, indoor climbing facilities, children's museums, zoos, aquariums and more.
ROLLER serves as the ultimate all-in-one venue management solution for attraction businesses, offering a comprehensive array of features that boost revenue and drive operational efficiencies like seamless ticketing, POS, membership management, and integrated waivers.
-
PhishTitan
Powerful Inline Phishing Protection for M365. Harness the power of AI and our LLM to defeat phishing. PhishTitan is next generation inline phishing protection and remediation, powered by TitanHQ, the global leaders in email cybersecurity.
Our proprietary large learning model and AI integrates directly with Microsoft 365, both catching and remediating sophisticated phishing and BEC attacks that Microsoft misses. It provides users with in-the-moment warning banners to help them decide whether an email is malicious or safe, continually enhancing the human firewall.
Risk free deployment in 6 minutes. PhishTitan will filter your email to identify phishing threats and protect your users and business. That’s how you AVOID that one wrong click that can lead to disaster – all it takes is 6 minutes! The TitanHQ team has been a category leader in the email security field for over 20 years. Bringing the experience of working with over 12,000 customers to our new phishing solution.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
Venn
Venn is revolutionizing how businesses enable BYOD workforces, removing the burden of buying and securing laptops or dealing with virtual desktops. Our patented technology provides companies with a new approach to securing remote employees and contractors working on unmanaged computers.
Venn’s Blue Border™ is similar to an MDM solution, but for laptops. Work lives in a company-controlled Secure Enclave installed on the user’s computer, where all data is encrypted and access is managed. Work applications run locally within the Enclave – visually indicated by the Blue Border – isolating and protecting business activity from any personal use on the same computer. Company data is secured without controlling the entire device while ensuring end-user privacy for everything outside the Blue Border. As a result, IT teams can easily support BYOD workforces without the cost, complexity, and usability challenges of VDI.
|
|