47 Integrations with Entrust Certificate Hub
View a list of Entrust Certificate Hub integrations and software that integrates with Entrust Certificate Hub below. Compare the best Entrust Certificate Hub integrations as well as features, ratings, user reviews, and pricing of software that integrates with Entrust Certificate Hub. Here are the current Entrust Certificate Hub integrations in 2024:
-
1
Microsoft 365
Microsoft
Introducing Microsoft 365 (formerly Microsoft Office 365). Be more creative and achieve what matters with Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, Microsoft Teams, Yammer, and more. With a Microsoft 365 subscription, you get the latest Office apps—both the desktop and the online versions—and updates when they happen. On your desktop, on your tablet, and on your phone.* Microsoft 365 + your device + the Internet = productivity wherever you are. OneDrive makes the work you do available to you from anywhere—and to others when you collaborate or share. Help at every turn. Email, chat, or call and talk to a real live person. Get Office today—choose the option that's right for youStarting Price: $5 per user per month -
2
IBM Cloud
IBM
IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge. -
3
BULL Forms
BULL Forms
The easiest way to generate all of your Colorado Real Estate Commission DORA Forms online with no hassle. Get Started now to see why everyone is talking about BULL Forms. Generate all of your Colorado Real Estate DORA Forms from one simplified location without struggling with pdf programs or manually filling them out. Setup your account and start generating your Real Estate contracts in minutes. Try the demo below now and see how easy it is. Regardless where you are, you will have access to all your forms and the ability to send them to a client from the road. Use your iPad, laptop or public computer as everything is stored online. Send your forms directly from the program or save them to your local computer for printing or filing. Its fast and simple. If Colorado upgrades their DORA forms, its included. New features and functionality all included. Stop having to upgrade every year when new features are released. Its all included at one affordable subscription price.Starting Price: $14.99 per month -
4
Cloud Foundry
Cloud Foundry
Cloud Foundry makes it faster and easier to build, test, deploy and scale applications, providing a choice of clouds, developer frameworks, and application services. It is an open source project and is available through a variety of private cloud distributions and public cloud instances. Cloud Foundry has a container-based architecture that runs apps in any programming language. Deploy apps to CF using your existing tools and with zero modification to the code. Instantiate, deploy, and manage high-availability Kubernetes clusters with CF BOSH on any cloud. By decoupling applications from infrastructure, you can make individual decisions about where to host workloads – on premise, in public clouds, or in managed infrastructures – and move those workloads as necessary in minutes, with no changes to the app. -
5
Ivanti Neurons for MDM
Ivanti
Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business. -
6
Jamf Now
Jamf
Jamf Now, formerly Bushel, is an on-demand mobile device management software solution specifically created for the iPhones, iPads, and Macs in the workplace. Fast, accessible, and affordable, this device management platform enables Apple users to set up, manage, and protect their workplace with ease. With Jamf Now, you can easily configure company email account and protect crucial information by keeping personal and company data separate, and automatically install work apps to devices.Starting Price: $2.00/month/user -
7
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
8
VaultCore
Fornetix
Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of useStarting Price: $1,118 per year -
9
SigningHub
Ascertia
Significant cost savings can be made when paper-based processes are moved on-line. For some documents it is vital to ensure traceability, accountability and audit with clear legal weight, data integrity and individual signed approval together with easy to access workflow process evidence. SigningHub enables quick, efficient on-line approval of any business document, agreement, report, request or package. SigningHub supports basic e-Signatures, Advanced e-Signatures and EU Qualified Signatures. The best way to prove a document is unchanged from the time of signing is to use cryptographic digital signatures. Organisations need to show that their internal controls are effective and compliant with local legislation and regulations. Ascertia has offered world-class PKI products for years. SigningHub brings together all of this capability and knowledge to provide the most secure way to sign documents.Starting Price: $12.10/month/user -
10
Autodesk Alias
Autodesk
Seamlessly collaborate across different workflows and personas. Increase productivity and eliminate the need to toggle between siloed systems. Use a single source for design from sketch through production surfacing. Create and reuse templates across design and surfacing teams—sharing surfacing language. Curve and Surface replace workflows with the History Visualizer tool, enabling automatic rebuild of geometry. Collaborate across teams and manage projects with a single suite of tools for faster decision-making. Allow Alias and non-Alias modelers to collaborate with Alias Assemblies and Master Alias Assembly Concept. Review design projects with Shotgun to keep creative teams focused.Starting Price: $585 per month -
11
4identity
Bit4id
4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America. -
12
A10 Thunder ADC
A10 Networks
High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Integrate with the Harmony™ Controller to gain deep per-application visibility and comprehensive controls for secure application delivery across on-premises datacenters, public, private and hybrid clouds. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks. High performance SSL Offload with up-to-date SSL/TLS ciphers enabling optimized and secure application service. Global Server Load Balancing (GSLB) extends load balancing on a global basis. -
13
PaloPro
PaloServices
PaloPro , is a tool to observe, analyze and analyze all reports made on the Internet and Social Media, which provides valuable analysis and information to improve the marketing and communication strategy of companies. Using state-of-the-art technology for immediate and accurate results, PaloPro analyzes all online reports that shape the public opinion and reputation of companies, products, individuals, organizations, and their competition. Using quantitative and qualitative methods of research and analysis we identify and present the important topics of discussion about your company, products, people and organizations of interest. We come up with useful suggestions for the strategic improvement of your image and/or brand. We give you the possibility of Web & Social Listening , in a friendly and easy-to-use environment, to create dashboards with a wide range of available components, collecting the information you are interested in through your own queries. -
14
HID SAFE
HID Global
Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations. -
15
Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required. Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.
-
16
AVX ONE
AppViewX
AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments. -
17
IBM Security Verify Access, formerly IBM Security Access Manager or ISAM, helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity-as-a-service (IDaaS) at a comfortable pace. Enable convenient and secure access to resources on mobile with the Verify mobile companion app for MFA. Migrate to IDaaS at a comfortable pace with a hybrid approach to access management.
-
18
Akana API Platform
Akana by Perforce
Manage the full API lifecycle, deploy across multiple clouds, support digital transformation and ensure compliance, all from one API platform. As businesses look to further connect with their partners and customers, strength in API management is increasingly part of the digital transformation. Akana provides an end-to-end, full lifecycle API management tool for designing, implementing, securing, managing, monitoring, and publishing APIs. Well-suited for large diverse enterprises and federated API partner ecosystems, Akana can be deployed natively across clouds and on-premises, enables customers to deploy securely via an integrated no-code portal, and provides detailed business analytics. Generate deep business insights from your API traffic through configurable analytic reports. Socialize and manage your communities through targeted developer portals. -
19
BeyondTrust Password Safe
BeyondTrust
Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review. -
20
Gigamon
Gigamon
Fuel Your Digital Transformation Journey. Manage complex digital apps on your network with unparalleled depth and breadth of intelligence. Managing your network daily to ensure constant availability is daunting. Networks are getting faster, data volumes are growing and users and apps are everywhere, which makes monitoring and managing difficult. How are you supposed to drive Digital Transformation? What if you could ensure network uptime while gaining visibility into your data-in-motion across physical, virtual and cloud environments? Gain visibility across all networks, tiers and applications — while getting intelligence across your complex structures of applications. Gigamon solutions can radically improve the effectiveness of your entire network ecosystem. Ready to learn how? -
21
Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
-
22
BlackBerry Access
BlackBerry
Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS. -
23
Entrust Identity Enterprise
Entrust
The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card. -
24
CertSecure Manager
Encryption Consulting LLC
An all-in-one solution for certificate management that helps to automate and seamlessly manage all certificates across different Cloud Environments, On-Premises, Hybrid IT Environments and Kubernetes Clusters. It manages certificates during entire lifecycle including certificate issuance, monitoring, renewal and revocation. -
25
Citrix ADC
Citrix Systems
Citrix ADC is the most comprehensive application delivery and load balancing solution for monolithic and microservices-based applications. Which means you can deliver a better user experience, on any device—anywhere. A single code base across the Citrix ADC portfolio gives you greater agility and speed by providing operational consistency and holistic visibility across multi-cloud with a single pane of glass. From on premises to the cloud—and everything in between. -
26
Xceedia HCMS
Xceedia
Let us put life into your next authoring and media project. Film & video production. Documentaries, animated films, short videos, feature films, film editing. Technical authoring. Courseware, textbooks, documentation, white papers, hands-on training, online help system. Multimedia content projects. Web development, podcasts, audio production, web media projects, eCommerce systems, web content management systems. -
27
ForgeRock
ForgeRock
Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs. -
28
HyTrust
HyTrust
In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads. -
29
Axway AMPLIFY
Axway
To become the hero, not the roadblock, many IT departments are investing in integration platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. Whether it’s cutting the budget, struggling to get to the cloud, or tackling a growing project backlog, IT is challenged like never before. To become the hero, not the roadblock, many IT organizations are investing in platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. AMPLIFY is the enterprise integration platform that that can hide integration complexity, enforce IT policy, and scale at will, enabling your teams to: Stop repetitive one-off integrations, and focus on reusable integrations that can be leveraged by wider internal and external teams. Gain cloud cost savings and increase scale by moving on-premises integration silos to the cloud, or by leveraging them in place with hybrid deployment, and much more. -
30
Asseco SPIN
Asseco Solutions
Asseco SPIN is a modern ERP solution with advanced features. It supports the proper operation of all processes in medium-sized and large businesses. Thanks to the web interface, the system enables you to work from any place using a web browser. Stable system for medium-sized business and large corporations. Access also via the web or mobile devices. Advanced executive Business Intelligence tools. Coverage of advanced processes also in production companies. Integrated tools for controlling and economic evaluation. Asseco SPIN takes the management of your company to a new level. It offers a number of quality management tools for processing complex data and simple, intuitive operation. The system is fully scalable in its complexity and the modules are perfectly interconnected. It is also available online using the iSPIN web application. With Asseco SPIN you get top software developed especially for the needs of the Slovak market. -
31
Trellix Data Encryption
Trellix
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized. -
32
Kona Site Defender
Akamai Technologies
Protect your apps and APIs against the largest and most sophisticated attacks with a web application firewall and DDoS protection at the edge. Kona Site Defender provides application security at the edge — closer to attackers and further from your applications. With 178 billion WAF rule triggers a day, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats. Flexible protections help secure your entire application footprint and respond to changing business requirements, including APIs and cloud migration, with dramatically lower management overhead. Kona Site Defender employs a proprietary anomaly detection engine designed to deliver the highest accuracy out of the box. You need application security that can be customized for your unique requirements and the organizations you support. -
33
Connected Safety is an Internet of Things (IoT) platform designed to connect workers, places and equipment, helping organizations to drive improvements in worker safety, compliance workflow, and safety process automation. 3M Connected PPE and software products help organizations advance the digital transformation of worker safety through innovative combinations of data science and PPE technologies. Help improve the efficiency of your safety organization by upgrading to IoT-enabled connected PPE and digitizing legacy processes using our health, safety & compliance software. Identify areas of risk and opportunities for improvement through analysis of data and insights generated through 3M Connected Safety products and software to take your compliance programs to the next level. Workers can better anticipate and recognize workplace hazards, allowing them to be confident in their safety decisions and focus on the task at hand.
-
34
Contrail Networking
Juniper Networks
Contrail Networking provides dynamic end-to-end networking policy and control for any cloud, any workload, and any deployment, from a single user interface. It translates abstract workflows into specific policies, simplifying the orchestration of virtual overlay connectivity across all environments. You can apply and control end-to-end policies across physical and virtual environments. Contrail Networking’s software-defined networking (SDN) capability, based on the open-source network virtualization project Tungsten Fabric, enables you to securely deploy your workloads in any environment. It offers continuous overlay connectivity to any workload, running on any compute technologies from traditional bare-metal servers, virtual machines, to containers. The unified operations and management tool, Contrail Command, is a simple-to-use interface. -
35
KeyScaler
Device Authority
KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication. -
36
HashiCorp Boundary
HashiCorp
Access any system from anywhere based on user identity. Traditional approaches like SSH bastion hosts or VPNs require distributing and managing credentials, configuring network controls like firewalls, and exposing the private network. Boundary provides a secure way to access hosts and critical systems without having to manage credentials or expose your network, and is entirely open source. Authenticate with any trusted identity provider you are already using. No need to distribute new credentials and manage them. Authorize access based on logical roles and services, instead of physical IP addresses. Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date. Automate credential injection to securely access services and hosts with HashiCorp Vault. Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials. -
37
OpenText Voltage SecureData
OpenText
Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption. -
38
ACI Case Manager
ACI Worldwide
Whether a genuine fraud event or a false positive, how banks manage the customer experience is critical. Give your fraud investigators a complete set of tools to resolve any issue and keep customers satisfied. Ensure that analysts can serve customers efficiently and comprehensively to confirm fraud events. Simplify case creation by utilizing account and contact details from ACI Fraud Management. Create efficient customer correspondence through configurable templates with dynamic data selection. Leverage centralized case details with multiple parameters for searching and appending data. Configure fraud analysts' workflow for simplified case management and increase the speed at which they work cases enterprise-wide. Use dynamic data enrichment, data displays and workflows to create guided workflows, built-in prompts and help-aids to assist investigator’s conduct research and decision-making. -
39
AriLinc
Infintrix Global
AriLinc is an industrial IoT gateway that converts various PLC Modbus RTU and Modbus TCP into Modbus TCP, OPC UA, MQTT, AWS, and other protocols. AriLinc adopts an embedded Linux system, supports TSL, SSL encryption, provides 1 RS232/RS485 optional serial input, 1 power output, 2 Ethernet ports and 2 USB ports, and supports SIM card and SD card. The built-in 4G network or Ethernet access to the Internet has the characteristics of fast speed and low latency. The Lora Gateway S281 series are special for data acquisition via Lora technology, supports wireless sensors and a wireless RS485 serial data converter. It is widely used in agricultural greenhouses, chemical plant, electroplating plant, hospital sites and storage warehouses for real-time temperature and humidity collection/monitoring. We offer comprehensive IT solutions, customized software development, mobile application & web development along with offshore IT consultancy services. -
40
GaraSign
Garantir
There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc. -
41
BlueCat Edge
BlueCat
BlueCat Edge leverages your existing DNS infrastructure to give you visibility, control, and detection capabilities to help protect sensitive data and critical systems. Detect, block and quickly remediate cyberattacks, right at the DNS layer. Manage DNS forwarding rules governing hybrid cloud to deliver SaaS-based services fast, while monitoring IP addresses to protect the enterprise against cyber-attacks. Provision multiple resolution paths across a hybrid cloud environment to simplify DNS operations and improve network performance. Edge provides multiple DNS query resolution paths while simplifying the segmentation of DNS data. Reduce network congestion using Edge as both a caching and forwarding server. Use a cloud-managed solution to enable Direct Internet Access (DIA) for remote branch locations. -
42
CyberArk Conjur
CyberArk
A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements. -
43
CBORD
The CBORD Group
Going forward, retail dining operations will need to be lean and adaptable. It’s crucial to have a technology solution that will help you reduce costs and meet changing requirements quickly across all locations. Create a dynamic retail dining experience with CBORD solutions. Adjust your retail operations at a moment’s notice to accommodate things like supply shortages, price changes, and physical distancing just to name a few. CBORD solutions fit any food service or convenience store environment, powering full countertop POS terminals, tablets, self-order kiosks, and online and mobile ordering. Use the latest in hardware and software to streamline and modernize your POS processes. Offer online ordering and payment options that support social distancing in all your dining and retail locations. -
44
Keyfactor Command
Keyfactor
Join the world’s leading enterprises running on the most complete and scalable managed PKI as-a-Service. Get all the advantages of PKI without the complexity. Whether it is securing your network, sensitive data, or connected devices, you turn to PKI as the proven technology to establish trust. But building and running your PKI is a complex and expensive undertaking. Getting it right is critical, but it’s not an easy feat. Finding and retaining the right people with the right skillsets, adherence to industry standards, and the expense of hardware and software required to run a robust PKI are all serious challenges — not to mention all that is at stake when something goes wrong. Easily organize and manage your inventory and set proactive alerts to notify users of expired or non-compliant certificates before they become a headache. -
45
OneSpan Authentication Servers
OneSpan
Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications. -
46
Airlock
Airlock Digital
Simple – Secure – Effective Execution Control. Stop targeted attacks with Airlock Execution and Allowlisting (formerly Application Whitelisting). Application allowlisting – Minimal Hassle. Airlock makes execution control easy. Simple to Use. Airlock has been purpose built to perform application allowlisting at scale, making allowlisting simple in complex and changing enterprise environments. Rapid. Creating, deploying and managing application allowlists with Airlock is fast, enabling organizations to become secure and compliant, sooner. Complete Coverage. Airlock provides the features you need to protect your environment. Binaries + Scripts. Airlock supports execution control of all binary files (executables / dll’s) including scripts (PowerShell, VBScript, MSI, JavaScript, Batch Files & HTML executables). File Reputation. Airlock partners with ReversingLabs to help determine which files are safe to add to the allowlist. This service will also automatically identify -
47
Sleek
Sleek
The only platform your business needs. All-in-one setup from registration to business account. Automate your accounting & compliance with ease. Transparent fees help you save time and money. Say goodbye to painstaking interactions with traditional firms that take your money and time. We're fast, efficient, and transparent. Register your company instantly, from anywhere. File digitally from the comfort of your home or office. Sleek has been there, done that, and lived to share the resources. Have peace of mind with all your back office needs managed. Our customer support team is experienced and happy to help. Every detail is tracked on Sleek's all-encompassing platform. Your business idea is fantastic, run with it! Register your company today, live that entrepreneur life tomorrow. Marking deadlines and filing paperwork should be the last of your worries, so let us take it off your plate.Starting Price: $15 per month
- Previous
- You're on page 1
- Next