|
|
Related Products
-
Secure Privacy
Become compliant today with the #1 Cookie & Consent Management Platform (CMP).
Secure Privacy is protecting +10000 websites and helping companies to be compliant with CPRA, GDPR, ePRivacy, PIPEDA and other international data privacy laws.
Our CMP, as well as our privacy training platform are always updated to meet legal requirements as they evolve.
With Secure Privacy, you'll be able to:
1. Fully automate your cookie and consent management needs with our intelligent and integrated solution.
2. Stay up-to-date with GDPR, CPRA and other international data privacy regulations.
3. Safely document, store and filter consent.
4. Comply with the different legal requirements across all your web properties in an easy-to-use platform.
We'd be happy to assist you on your compliance journey. You're welcome to schedule a free demo call with us.
-
Safetica
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization.
Safetica covers the following data security solutions:
✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments.
✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement.
✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly.
✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations.
✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
-
BIGDBM
BIGDBM is a leading US data provider with 7+ years of experience building identity graphs with a focus on ROI, privacy, and quality.
Unlock significant value in your marketing campaigns, lead generation strategies, and identity verification workflows with our US consumer and B2B datasets.
Utilize the self-service BIGDBM Data Market for easy and affordable audience/list generation and custom appends.
Identify website visitor traffic using our WeVi product suite of real-time data collection via pixels and real-time identity resolution APIs.
Popular products:
- Telecom-verified phone numbers>consumers
- IP>consumer and IP>company domain linkages
- Verified consumer emails
- Consumer and B2B intent
- Consumer demographics and behavioral affinities
- Residential and commercial property owners and contact information
- MAID>consumer linkages
-
NMIS
FirstWave’s NMIS is a complete network management system that provides fault, performance, and configuration management, performance graphs, and threshold alerts. Business rules allow for highly granular notification policies with many types of notification methods. NMIS consolidates multiple tools into one system, ready for Network Engineers to use. Scalable, flexible, open, and simple to implement and maintain, NMIS is the Network Management System that underpins the operations of over one hundred thousand organizations worldwide – making it one of the most widely used open-source Network Management Systems in the world today.
FirstWave enables partners, including some of the world’s largest telcos and managed service providers (MSPs), to protect their customers from cyber-attacks, while rapidly growing cybersecurity services revenues at scale. FirstWave provides a comprehensive end-to-end solution for network discovery, management, and cybersecurity for its partners globally.
-
Monitask
Employee monitoring application for businesses of all sizes. Tracks productivity for in-office, remote, and hybrid workers. Provides analytics and data on how to improve your team. Keeps your team accountable. World-class security.
Captures websites visited, unproductive time, screenshots, fake activity, and more.
Features:
• Time Tracking: Automatic clock in/out for accurate work hour logging
• Screenshot Capture: Random or interval-based for work verification
• Activity Monitoring: Tracks web and application usage
• Real-time Dashboards: View ongoing projects and tasks
• Stealth Mode: Discreet monitoring option
Functionality:
- Provides insights into work processes and productivity
- Identifies inefficiencies and optimizes workflows
- Maintains employee privacy while offering employer oversight
Stealth Mode allows silent monitoring, capturing natural work behaviors and maintaining productivity standards.
-
KYC Portal
KYC Portal focuses on streamlining and automating the back-office of any due diligence process. It allows you to define and manage all your regulatory and policy requirements within the system and it then provides the operational capacity to automate and manage the entire process from on-boarding relationship management all throughout the automation of ongoing aspects of KYC such as risk-based approach, reporting, document requests, automated risk-based questionnaires etc. KYCP hooks up with any 3rd party provider/s that you might choose on the market, giving you a centralised, due diligence workflow solution.
-
Jobma
Jobma is a cloud-based video interviewing platform trusted by companies globally. It offers a range of virtual interviewing tools, including pre-recorded one-way video interviewing, automated interview scheduling, coding assessments for technical hiring, and more.
Its AI-powered features, such as automated scoring, proctoring, and transcriptions, are designed to prevent unconscious bias in hiring and save employers time. The platform integrates with the most popular ATS natively and 5,000+ apps using Zapier. Support is available via live chat, email, and phone.
Jobma is SOC 2 Type II certified, GDPR and CCPA compliant, ensuring the highest level of security and privacy for its users’ data. It's used by 3,000+ customers in more than 50 countries and is available in 16 languages.
-
Bob
Bob is the modern HR platform that simplifies complexity. With Bob, you can streamline your global core HR processes—such as onboarding, performance management, workforce planning, and compensation management—using automated workflows that increase efficiency and save precious time—even in a distributed workforce. Bob provides real-time quantifiable data that informs strategic decisions and impacts the bottom line. Bob helps dynamic companies bring out the best in their people. HiBob’s dedicated teams across the US, UK, Europe, Israel, and Australia are working every day to serve thousands of modern, mid-sized businesses.
-
Qloo
Qloo is the “Cultural AI”, decoding and predicting consumer taste across the globe. A privacy-first API that predicts global consumer preferences and catalogs hundreds of millions of cultural entities.
Through our API, we provide contextualized personalization and insights based on a deep understanding of consumer behavior and more than 575 million people, places, and things. Our technology empowers you to look beyond trends and uncover the connections behind people’s tastes in the world around them. Look up entities in our vast library spanning categories like brands, music, film, fashion, travel destinations, and notable people. Results are delivered within milliseconds and can be weighted by factors such as regionalization and real-time popularity.
Used by companies who want to incorporate best-in-class data in their consumer experiences. Our flagship recommendation API delivers results based on demographics, preferences, cultural entities, metadata, and geolocational factors.
-
Securden Endpoint Privilege Manager
Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control.
•Eliminate local admin rights on Windows endpoints
•Manage applications that require administrative privileges
•Define who can access what applications & automate application control through whitelisting & blacklisting
•Policy-based access, even for offline endpoints & remote employees
•On-demand privilege elevation on online & offline endpoints
•Grant temporary full administrator privileged for standard users when required
•Track application usage & privilege elevation trends
•Continuously monitor local admin accounts & detect if new local admin accounts are created
•Ensure compliance with regulations with comprehensive audit trails
•Highly scalable and enterprise ready
|
|