|
|
Related Products
-
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business.
Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction.
Welcome to the new world of Risk Intelligence.
-
Kognition
Kognition delivers AI-powered security technology that ensures an always-on, always-aware force multiplier at a fraction of the cost of traditional security programs. Working within existing systems, we enable organizations to proactively monitor for threats (such as weapon presentation and crowd forming) and alert your security team to the presence of both restricted individuals and VIPs. Kognition reduces IT costs and the need for additional security staff while improving incident response times and driving comprehensive security reporting and visibility for K-12+, commercial real estate, regulated industries, and more.
-
ManageEngine EventLog Analyzer
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options.
With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports.
EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
-
Source Defense
Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience.
The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
-
Hoxhunt
Hoxhunt is a Human Risk Management platform that goes beyond security awareness to drive behavior change and (measurably) lower risk. Hoxhunt combines AI and behavioral science to create individualized micro-training experiences users love, so employees learn to detect and report advanced phishing attacks. Automated incident remediation helps operations teams respond fast with limited resources. Security leaders gain outcome-driven metrics to document reduced cybersecurity risk.
Hoxhunt works with leading global companies such as Airbus, IGT, DocuSign, Nokia, AES, Avanade, and Kärcher, and partners with leading global cybersecurity companies such as Microsoft and Deloitte.
-
Kroll Cyber Risk
We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today.
Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat.
Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
-
Checker Software
Checker offers an integrated market research platform, allowing to conduct Mystery Shopping, CX/VoC, and VoE surveys efficiently.
Founded in 2005, the platform has grown exponentially with more advanced features that combine Mystery Shopping with Customer experience management through multichannel data collection, complete operational workflow, and unified reporting tools.
Checker is not only a Mystery Shopping solution but also a full-fledged survey platform, that can help conduct client feedback surveys and customer satisfaction campaigns:
Mystery shopping software;
CATI surveys;
CAPI surveys;
CAWI surveys (Internet surveys, Email surveys, SMS surveys);
Retail audit.
The ability of Checker to provide end-to-end enterprise-level solutions and excellent customer service has won its global recognition worldwide, reaching new partners and clients across 4 continents.
-
BackBox
BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance.
BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation.
-
Vivantio
Vivantio is a leading provider of service management software for both internal- and external-facing teams. Centralize your service operations across B2B Customer Support, IT, HR, Facilities, Finance, and Legal.
By combining enterprise-level functionality with the flexibility of a modern cloud-based solution, Vivantio provides an intuitive, scalable, and fully configurable platform that empowers businesses to achieve service excellence.
The platform scales to meet the complex business needs of large, multi-site organizations, especially during periods of high growth.
Vivantio is a trusted partner offering cost-effective solutions through flexible licensing.
-
Modius OpenData
Modius provides the solutions for managing the availability, capacity, and efficiency of critical facilities. Our flagship product, OpenData, provides all the tools including DCIM needed to manage the performance of mission-critical infrastructure, which includes seamless integration of disparate devices. OpenData has built-in integrated features for analytics, dashboards, graphical views, and more, all in a “single pane of glass”. Modius has worked with the ESTCP to showcase a Middleware solution for more effective use of utility and facility data to improve facilities management, operation, and maintenance. Pre-configured bundles and out-of-the-box protocol integrations means you deploy efficiently. OpenData actively monitors your equipment to alert you to faults before they happen. Deploy a modern edge-based architecture to lower bandwidth costs and analyze equipment at the source in real-time.
|
|