Data Security
1 Review
The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud-centric. Wandera provides a unified cloud security solution to protect the modern workplace. We enableβ¦
Read more about this company1 Review
Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust security framework and automatically prevent attacks. Pradeo's next generation technology provides a reliable detection of threats, protecting against dataβ¦
Read more about this company1 Review
Lenses.io delivers a developer workspace for building & operating real-time applications on any Apache Kafka. By enabling teams to monitor, investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their weekends back.
1 Review
Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.
1 Review
Rectify leverages privacy-enabled artificial intelligenceTM to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties.
1 Review
Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd. The Prey service is theβ¦
Read more about this company1 Review
zANTITM is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
1 Review
Fyde replaces outdated and costly VPN, SWG and NAC point products with a quick to deploy, easy to manage, unified offering. Fyde helps companies mitigate security and compliance risk, increase user productivity and experience by enabling secure access to corporate applications like Jira, Confluence, Bitbucket, Gitlab, Kibana, MS RDP, SSH and cloudβ¦
Read more about this company1 Review
Promon SHIELD makes it possible to launch effective and secure apps on untrusted devices, without risking data leakage and damage to end-user trust.
1 Review
A range of mobile softphone application solutions from standalone apps to branded cloud softphones configured and managed from your own secure web portal. All softphone products come with Push Notifications for great battery life, Encryption and HD Voice and Video calling.
1 Review
GhangorCloud is a leading provider of Cyber Security solutions enabling defense against most sophisticated Cyber Attacks on Information and Data Repositories and Applications.
1 Review
GitGuardian is a cybersecurity startup solving the issue of secrets sprawling through source code, a widespread problem that leads to some credentials ending up in compromised places or even in the public space. The company solves this issue by automating secrets detection for Application Security and Data Loss Prevention purposes. GitGuardian helpsβ¦
Read more about this company1 Review
Endpoint Protector is a leading endpoint centric Data Loss Prevention (DLP) solution. An advanced cross-platform DLP solution for macOS, Windows, and Linux computers as well as Thin Clients, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Endpoint Protector byβ¦
Read more about this company1 Review
Affordable, flexible data leak monitoring focused on leaked code, configurations and credentials. Minimize the risk from these three common attack vectors. SaaS platform with no hardware or software deployment required. Most clients up and running in less than five minutes. Put ClawBack to work for you today!
1 Review
Evolution DLP features include: Automatic Encryption (Endpoint Security) Detects and automatically encrypts data moving out of the organization. Encryption protects all avenues of data loss including USB drives, external HDDs, optical media, smartphones, Internet, and email. Whitelist Protection (Cyberattack Prevention) An advanced API-level whitelistβ¦
Read more about this company1 Review
MYDLP SUITE Data Loss Prevention software keeps your data safe. MYDLP SUITE Data Loss Prevention software secures your customers' data.
1 Review
KillerID provides Custom Single-Sign-On (SSO) login for G Suite domains. It automates user license provisioning with company Human Resources integration. With KillerID, admin can restrict access via IP, session controls on mobile and desktop. KillerID is 100% based on Google Cloud Platform and passed Google's Security Scan.
1 Review
AristotleInsight was built to collect, analyze and store the enormous amounts of UDAPE data necessary to document exactly what occurs at any given moment now or in the past
1 Review
Confidentiality Manager enables firms to implement βneed-to-knowβ security and ethical walls without impacting workflow. Robust self-service, industry-leading notifications and acknowledgements, and multi-system design make it the best choice for firms concerned about meeting client security, regulatory, and ethical obligations across all systems whereβ¦
Read more about this company