|
|
Related Products
-
GlitchSecure
Continuous Security Testing for SaaS Companies - Built by Hackers
Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you.
We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year.
Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year.
Let us help you sleep better at night.
-
Astra Pentest
Astra’s Pentest is a comprehensive penetration testing solution with an intelligent automated vulnerability scanner coupled with in-depth manual pentesting.
On top of 10000+ tests including security checks for all CVEs mentioned in the OWASP top 10, and SANS 25, the automated scanner also conducts all tests required to comply with ISO 27001, HIPAA, SOC2, and GDPR.
Astra offers an interactive pentest dashboard that the user can use to visualize vulnerability analyses, assign vulnerabilities to team members, and collaborate with security experts. And if the users don’t want to get back to the dashboard every time they want to use the scanner or assign a vulnerability to a team member, they can simply use the integrations with CI/CD platforms, Slack, and Jira.
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
ManageEngine ADAudit Plus
ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
-
Red Points
Red Points is the most widely used solution to combat online fraud.
Over 1,200 companies rely on our AI-led technology to fight online counterfeits, piracy, and impersonation. They leverage Red Points to recover their digital revenue, maintain control, and improve their brand's value. The solution gives brands full visibility onto their online presence.
With offices in New York, Barcelona, Beijing and Salt Lake City, Red Points has disrupted an industry traditionally led by service providers with a scalable, cost-effective solution. We serve leading global brands across a variety of sectors, from sports, cosmetics, fashion, entertainment and many more.
The key to our success is our investment in technology and product to make our solution incredibly intuitive, effective and easy to use.
-
Acuity PPM
Acuity PPM provides Senior Leaders and Project Management Teams (PMO's) with easy-to-use portfolio management software to manage the project portfolio. Acuity PPM provides a Work Intake module to support demand management and helps you create and evaluate new project requests through prioritization, financial planning and resource management (capacity planning).
Once a request is approved, project teams can track project progress with centralized status reports, track key milestones, risks, issues, financial plans, decisions, lessons learned, project and portfolio roadmaps, and resource plans in Acuity PPM. This helps leadership teams select the right projects for the organization.
Connect to common Project Management tools such as Jira, Smartsheet, Asana, Wrike, Monday.com, and others.
Our implementations are measured in days, not weeks or months like many vendors. Get started quickly and give leadership the single source of truth they need to accomplish strategic goals.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
NINJIO
NINJIO lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery to provide a personalized experience that changes individual behavior.
With NINJIO you get:
- NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks.
- NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization.
- NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
-
Simply Voting
Simply Voting Inc. is a full-service provider of secure, hosted online elections. Founded in 2003 and based in Montreal, the company has built a reputation for delivering excellent service and solid technology.
Over 5000 organizations from municipalities to universities to unions rely on Simply Voting for safely executing their elections. Our secure protocols, ease-of-use and flexible solutions transform elections across industries.
Whether you are running one election a year or several elections, the streamlined and easy-to-use interface will help you get your elections live quickly. If you encounter any questions along the way, support is offered via email and over-the-phone at no extra charge, to ensure you can always speak with a real expert. Simply Voting is also one of the only vendors to truly offer emergency support -- our staff are standing by 24/7 in case of urgent support requests as well.
Self-service and hands-off managed solutions available.
-
Copy5
Turn chaos into productivity with one app. Copy5 is the platform that pulls all your team tools into one, easy-to-use workspace. Built for diverse team collaboration. Copy5 is the first platform built to emulate how people actually work, bringing all the benefits of physically working in the same room into the digital space. Customize your daily workspace to prioritize activities, update tasks or collaborate with others. Streamline your connected tools and apps under one roof. Make it your own! Customize your daily workspace to prioritize activities, update tasks, execute processes, collaborate with teammates, and manage files. Chat, meet, call, and collaborate in a video immersive platform integrated into business activities. Securely store, access, share, and collaborate on files organized by key business activity. Define room hierarchy, visibility, security, ownership, usage, and capabilities based on room objectives.
|
|