• Access and Authentication

    The process of determining whether someone or some process may have access to a resource (Access) and to confirm the identity of that person or process (Authentication).

    See products and services in this category
  • Biometrics

    The measurement of physiological characteristics like – but not limited to – fingerprint, iris patterns, or facial features that can be used to identify an individual.

    See products and services in this category
  • Cloud security

    A collection of procedures and technology designed to address external and internal threats to devices, servers, repositories, applications amd systems connected via a network.

    See products and services in this category
  • Compliance Management Solutions

    An online or digitally-based portal where professionals from all relevant departments in an entity can join in to create a holistic compliance program.

    See products and services in this category
  • Contract Management Solutions

    The process of managing contract creation, execution, and analysis to maximize operational and financial performance at an organization, all while reducing financial risk.

    See products and services in this category
  • Critical infrastructure security

    concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of an entity.

    See products and services in this category
  • Data Mapping

    The process of identifying networks and devices on those networks for a complete map of an entity’s network infrastructure. It includes integrating data, building data warehouses, transforming data, or Migrating data from one place to another.

    See products and services in this category
  • Governance, Risk and Compliance (GRC)

    A strategy for handling the interdependencies between corporate governance policies, enterprise risk management programs and regulatory compliance.

    See products and services in this category
  • Internet of Things (IoT) Security

    Protections for cloud-connected devices such as home automation, smart devices, security cameras, and any other technology connected to the cloud over the Internet.

    See products and services in this category
  • Intrusion Prevention System

    A network security tool (which can be a hardware device or software) that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur.

    See products and services in this category
  • Machine Learning / Artifical Intelligence

    Computational science that focuses on analyzing and interpreting patterns and structures in data to enable learning, reasoning, and decision making outside of human interaction.

    See products and services in this category
  • Security Incident and Event Management (SIEM)

    Security Incident Event Management (SIEM) solution collects logs from your applications for analysis of incidents and research of useful patterns.

    See products and services in this category
  • vulnerability management

    Vulnerability management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.

    See products and services in this category