View
Sorting
Products found: 38
AccessData AD EDISCOVERY
- Mitigate Risk. Limit handoffs between vendors and technologies with a single, secure, end-to-end solution and protect against spoliation, data loss and theft.
- Lower Cost. Process all potentially relevant information, structured and unstructured, inside and outside the enterprise, with a single integrated solution, meaning less cost and wasted resources for your organization.
- Improve Efficiency. Now you can collect data faster from even more data sources, including Office 365®, with the latest release of AD eDiscovery. We’ve also automated more tasks, speeding up the time between collection and analysis.
- End-to-end e-discovery platform supporting preservation through production
- Transform your unstructured data into new discoveries. Brainspace customers can push data from and pull data to AD eDiscovery and back again for deeper insights without using load files.
- Advanced interactive data visualizations to quickly identify relationships and custodian communication patterns
- Collect emails—even upgraded/migrated Exchange/O365 emails that contain “illegal” data—directly into your AccessData environment as distinct files, ready for MD5 hashing.
- Collect data seamlessly with support for the latest Enterprise Vault® and OneDrive® environments.
- Create/export searchable PDFs from native files.
- Intuitive litigation hold wizard featuring real-time hold status updates, pre-loaded notification templates and out-of-the-box litigation hold integrations with the leading HR database solutions
- Ability to assign secure web and role-based access
- Process over 700 data types (including PSTs/NSFs) with full forensic logging
- Integrated document review with predictive coding
- Direct web API export feature enables the seamless transfer of data from AD eDiscovery to Relativity® without the use of load files.
AimBrain AimFace
- Greater user identification accuracy. Our patented technology clusters facial data to identify your users in virtually unlimited contexts, for greater accuracy and a smoother user experience.
- AI-based image processing. Intuitive quality feedback for the user, including suggestions to improve lighting or positioning, to simplify and support the customer through the step.
- Deep learning for faster onboarding. Using algorithms enhanced by millions of requests, our technology de-noises and enhances document images in real-time, for faster onboarding.
- Protects against video and photo fraud. Inbuilt liveliness detection plus checks for signals of video such as Moiré flares and chromatic anomalies, to protect against synthetic fraud.
- Integrate your apps today. Simple-to-deploy SDKs to connect your web or mobile app and benefit from stronger user identification straightaway; use it for free with AimBrain On Demand.
- Standalone or add-on authentication. Use AimFace facial authentication on its own, or integrate it with other authentication tools as part of a step-up process for additional security.
Armjisoft PDF DRM Security OwnerGuard
DRM FOR PDF Security and Rights Management Systems
PDF DRM, Security, Protection and Distribution Management technologies are used as a copyright enforcement mechanism and sometimes as an alternative mechanism to copyright law. Granting exclusive ownership rights to authors and creators through Copyrights, Security and DRM, allows for a better chance of enrichment of more and more creative and cultural products, and they can nominally compensate their efforts and costs. Intellectual efforts for producing a product or artifact must be appropriately prizes, and we must prevent people to benefit from such products free of charge. PDF Security and DRM provide a better base for protecting contents against illegal distributions, usages and sells. PDF Security and Digital Rights Management (DRM) systems are provided to ease distribution of PDF documents for end users by enforcing some usage and distribution limitations like printing, copying, save and transfer. With PDF Security OwnerGuard you can:- Protect and Lock your PDF documents to specific User, Computer or USB Drive.
- Define High Security Expiration Date or Working Duration for your drm protected pdf documents.
- Stop your valuable PDF documents from being shared and distributed across the Internet.
- Allow users to use full features of Adobe Reader to access your drm protected pdf documents.
- Define Print and/or View watermarks for your protected pdf document users.
- Minimize your users DRM hassles by letting them access your secure pdf documents offline.
- Distribute and Sell your secure PDF documents easily.
- Gain full control over your sensitive documents usage rights.
- Feel free to Store, transfer and share your protected contents using your desired method and media just like before.
- Advanced 512 bit unique encryption system for DRM protected PDF Documents.
- Support a wide range of limitations including Machine-Dependency, Working Duration, Expiration Date, Print Watermarking, Printing, Clipboard, Modification and Screen-Capture.
- Extremely easy to implement and use licensing system for DRM protected PDF Documents distribution over local networks or internet.
- Fully automated serial based licensing system for protected pdf documents.
- Protection and Licensing Application Programming Interface (API) for customization and full integration.
- Support Machine Dependent/Independent licenses to Lock your DRM Protected PDF documents to specific computers.
- Multiple projects creation and management to make groups for your protected PDF documents.
- Hierarchical reseller licensing system to ease license distribution.
- Built in support for integration with windows Active Directory and Group Policy.
BehavioSec Platform
BEHAVIOSEC’S CONTINUOUS AND TRANSPARENT AUTHENTICATION SOLUTION
BehavioSec is the first vendor to pioneer Behavioral Biometrics for the enterprise at scale that can support billions of transactions and millions of users. BehavioSec’s Behavioral Biometrics software is a new method that transparently and continuously verifies human digital identity across mobile and web apps. While traditional authentication technologies offer one-time verification, typically during the sign in phase and introduce friction to the digital experience, they typically validate things that infer the user’s identity. In contrast, BehavioSec’s software platform, as part of a multi-layered authentication approach, verifies people in real-time and continuously as the user engages with the app.BEHAVIOSEC’S UNIQUE BENEFITS TO COMBAT FRAUD AND DIGITAL RISK
BehavioSec’s platform delivers precise information on users engaging with mobile and web apps to help detect and stop digital fraud, lower outbound customer calls required to verify identity, reduce uncertainty generated by traditional, one-time authentications tools, and orchestrate appropriate course of actions to combat fraud attacks from malware and criminals. BehavioSec provides unique capabilities to help fraud and security teams effectively combat against the rise of cybercrime. Features:- Security. Continuous authentication that complements one-time verification.
- Frictionless. Transparent authentication that improves digital experience.
- Integration. Easily connect with existing web and mobile apps.
- Scalability. Authenticate billions of transactions across millions of users.
- Orchestrate. Connect to existing anti-fraud and security systems.
- Savings. Mitigate on-line fraud risk. Automate your response to attacks.
- Ensuring Uptime. Protect the transaction integrity across your digital transformation efforts
- Less Manual Intervention. Automate your real-time detection and response to online fraud.
- Lowering False Positives. Identify individual identities based on their unique behavioral traits.
- Lowering Fraud Risks. Detect real-time and continuously online account attacks.
Cloudentity CIAM.next
- Upstream Federation: Use your existing IDP (or multiple IDPs) as the source of truth for your users
- SAML Federation: Standard support for SAML Service Providers (SPs)
- OAuth and OIDC: Integrate applications with 3-Legged OAuth using OIDC JWT tokens with an optional developer portal
- MFA: Out of the box support for a range of MFA solutions
- Multi-Organization Support: Our Organization support provides centralized administration if you have different divisions, departments, or groups that require segmentation
- User Self-Service: Allow users to sign up, verify their accounts using their choice of second factor OTP, and manage their accounts in the future
Digital Resolve Platform
Single Sign-On
Digital Resolve’s cloud-based security solution eliminates time-intensive integrations by providing easy configurations so SSO can quickly be deployed across your entire enterprise’s technology and business system framework. Digital Resolve’s SSO is the only marketplace solution that automatically incorporates proprietary and proven multi-factor authentication (MFA) to provide another level of security to ensure only authorized users are logging in.- Replaces integration with easy configuration
- Strengthens security with safer, stronger credentials
- Reduces IT administration overhead costs
- Supports compliance and governance protocols
- Improves employee productivity
Multifactor Authentication
The Digital Resolve platform combines the power of behavioral profiling, device identification and calculated risk factors to automate the authentication process in a transparent yet powerful manner. Should a login attempt be deemed suspect, adaptive authentication options spring into play to provide robust protection that’s hard to bypass—no matter how seasoned the criminal.- Challenge/ Response Questions
- One-Time Passwords
- Out-of-Band Authentication
- Real-time robust risk response options
Behavioral Monitoring & Analytics
To address the full fraud lifecycle, the Digital Resolve platform monitors every user interaction and transaction to uncover any suspect behaviors while engaged with your site. All activity is traced at the user, account and site levels to provide a comprehensive view across your entire channel. By determining regular user patterns at multiple levels, suspect activity can be flagged and handled accordingly.- Application Navigation Analysis
- Online Session & Transaction Profiling
- Account/ Personal Information Monitoring
- Click Analysis
- Payment Profiling
- Device Fingerprint Analysis
Forter Payment Protection
Payment Protection
Payment Fraud Protection Forter protects all of your online transactions from fraud – regardless of payment type – by accurately determining the trustworthiness of every transaction and the user behind it. Phone Fraud Protection Forter’s adaptive authentication capabilities protect your call centers from fraud in real-time. PSD2 Solution for Merchants Forter automatically evaluates the risk of each transaction affected by the directive and routes it through the path of least possible friction. Omnichannel Fraud Protection Forter protects your various customer channels from fraud so you can provide omnichannel offerings like BOPIS (Buy Online, Pickup Instore) and more without risk. Chargeback Guarantee Forter protects you from chargebacks by assuming full chargeback liability, improving your bottom-line. Chargeback & Claims Resolution Forter enables merchants to streamline claims management and identify dispute opportunities in real-time.Fraudlogix Live IP Blocklist
Live IP Blocklist
Comprehensive IP intelligence for use in multiple environments to identify and block malicious Internet traffic generated from bots, compromised devices, data centers, and more.- Fraudlogix javascript code is embedded on 300+ million URLs and apps, monitoring 640 million unique users monthly.
- IPs that generate high volumes of fake ad traffic and installs are identified and added to a list, which updates hourly.
- The list is integrated directly into your environment for preventative blocking.
Hoxhunt Gamified phishing training platform
- Failure rates on simulated attacks drop to less than 2% even with the most sophisticated attacks
- Reporting rates of real attacks increase to over 60%
- Loved by security teams and employees alike
ID Analytics First-Party Fraud
Identifying “Mules” Before They Come Back to Bite You
Often referred to as “credit muling” or “equipment gaming,” first-party fraud occurs when consumers use their true identities and personal information to apply for multiple, high-value products with no intention of honoring their contractual agreements.2 When consumers set out to steal from a business using their real identities, running a standard credit check – or even a third-party fraud screen – won’t necessarily protect the credit issuer. These “mules” have different profiles from identity fraudsters, so they require a specialized approach using fraud assessment tools and predictive solutions. Consumer behavioral data from the ID Network incorporates insights from wireless, retail lending, banking, peer-to-peer lending, and checking and savings accounts. By using these insights to form a historical picture of how a consumer typically behaves, ID Analytics can quickly identify when an individual begins to seek credit and services in an unusual and high risk fashion.An In-Depth Analysis of First-Party Fraud
By rank-ordering the risk associated with consumer identity elements being asserted on an application, ID Analytics provides a first-party fraud risk assessment across all channels. Higher risk applications are flagged for remediation while lower-scoring applications may move on to the next step of the purchase process. Organizations choose the score threshold that best balances fraud prevention with fast, convenient adjudication processes. Businesses need first-party fraud solutions that can:- Identify and analyze the special attributes of “mules” across industries
- Minimize the manual review of legitimate, well-intentioned customers
- Help reduce first-party fraud losses with a near real-time fraud assessment purpose-built for this unique challenge
ID Experts MyIDCare Protection Platform
Identity & Privacy Protection Services
Threats to your identity and privacy are everywhere. MyIDCare’s alert-based identity & privacy protection platform scans billions of data points, notifying you of risks to your privacy and identity so you can take action!
Advanced Identity Monitoring ID Experts’ MyIDCare includes comprehensive identity monitoring including credit monitoring, deep and dark web monitoring, credit lock, instant inquiry, social security number scanning, and much much more. More than 14 billion data points are scanned for your protection. You will receive alerts if there are changes to monitored information. Privacy Protection Protect your privacy with our SocialSentry social media protection. SocialSentry actively scans social networks to detect fraudulent and takeover activity, identifies inappropriate content and reduces personal information exposure. Coupled with our Password Detective, you will be empowered to protect your privacy. Health Claims Monitoring (MIDAS) Our MIDAS technology is the first and only consumer-focused healthcare fraud solution. MIDAS alerts members every time a medical claim is made against their identity. This powerful tool enables individuals to review health transactions for potential identity fraud the same way they do for credit transactions.Financial Protection
$1 million of insurance and stolen funds protection provide a solid backstop for serious cases of identity theft.
Putting money back in your hands MyIDCare members who fall victim to identity crime can rest easy. Our $1 million reimbursement insurance replaces stolen funds—including losses due to medical, financial, and other types of identity crimes. It also covers legal and other professional service expenses related to identity theft.Concierge-Style Identity Recovery
No other identity protection company provides their members with this level of customer experience.
We delight victims with friendly, expert service For MyIDCare members whose identity is stolen, our ID Care Team of identity specialists is standing by. Using limited power of attorney (LPOA), we’ll act on a victim’s behalf to restore their identity to pre-theft status, which we’ve done with a 100% success rate.Easy Implementation
Whether a data breach, an employee benefit, or something valued to offer your members, we can get you up and running quickly and easily.
Hassle-free and quick time to value MyIDCare is simple to offer your customers, members, or employees. We provide the implementation and rollout plan, along with all the tools you need to communicate with your people. The average availability is fast—90 days from signing—so you can provide valuable identity protection right away. IdentityMind IdentityLink API
- Fraud prevention: account origination, account takeover, payment fraud prevention
- Identity reputation: leverage IdentityMind’s digital identity reputation network
- Risk score: machine learning score based off complexity of the entity graph
- FRAUD PREVENTION. Account origination, account takeover, payment fraud prevention
- IDENTITY REPUTATION. Leverage IDM digital identity reputation network
- RISK SCORE. Machine learning score based off complexity of the entity graph
- API. Real time based to retrieve risk score, graph stats, reputation, and actual graph
- REDUCE FRAUD. IdentityMind’s 50+ attribute identity building capabilities enable you to make higher confidence risk assessments.
- MACHINE LEARNING. Continual improvements and more targeted risk assessment as system learns from your data
- QUICK DEPLOYMENT. Save time and money through plug and play entity link analysis and machine learning solution
Fraud Prevention
Leverage IdentityMind’s Trusted Digital Identities reputation values to expedite trusted users and detect suspicious users before they transact. Detect when users may be related to terrorism, human trafficking, drug cartels, through their network of affiliations.Transaction Monitoring
Detect hidden connections in groups of customers and aggregate individual’s activities even when using multiple accounts.InfoArmor PrivacyArmor
Peace of mind delivered
Dark web monitoring We use bots and embedded human intelligence operatives to search the dark web for compromised credentials. We then alert members who have been compromised. Stolen fund reimbursement Funds stolen from a bank account, 401(k), or HSA? We’ll reimburse it. We even advance tax refunds that were fraudulently issued. Pre-existing conditions If your employees are victims of identity theft or fraud before joining PrivacyArmor, we’ll fully remediate past and present incidents with no extra fees. Deceased family member coverage Family members who pass away are still targets for identity theft. We’ll fully remediate cases for loved ones who have passed on. PrivacyArmor also offers:- Service and benefits that fit all industries and company sizes
- Accounts secured with two-factor authentication
- Generous family coverage that includes kids, parents, in-laws, and other dependents living at home
- No age cap on minors or “aging out” of coverage
- Full-service fraud remediation with a dedicated Privacy Advocate®
- Pre-existing identity theft coverage at no extra cost
- In-house Privacy Advocates available 24/7
- $1 million identity theft insurance policy†
- Financial protection far beyon a credit score
- Keep control of social media accounts
- Combat advanced fraud
Intelligent Wave ACEPlus
- Flexibility to build a system environment in accordance with handling volume (from tens of thousands to tens of millions of card members)
- Extensive installations in Japanese credit card industries
- Functions to detect and monitor fraudulent card use in real time, online
- Automatic suspension function
- Function to manage information on customer card use
- Scoring function based on customer behavior model
- Function to support data analysis effectively utilizing a database
- Function to search critical alert data
- Flexible changes in screen display
- Work efficiency improvements by obtaining statistical information
- Data mining utilizing accumulated data
Ipsidy Verified
Verify Identity of Employees and Customers, Anywhere
Securely manage identity both inside and outside your enterprise with Verified by Ipsidy. Reduce fraud and gain identity certainty of a mobile app logon, online chat, or any digital transaction.- Trigger an identity authentication from your platform or our Identity Portal to the Ipsidy app on a user’s mobile phone. A user swipes right to confirm the request and details specific to the event.
- The phone’s camera with liveness detection auto-prompts a user to capture their face with just a blink and a smile.
- Ipsidy converts the selfie into a biometric facial template and matches against the user’s reference photo. The transaction is confirmed, and the user’s identity is Verified.
Frictionless Biometric Multi-Factor Authentication
Key Features- A full-service web-portal, where you can view and manage data, export reports, and send all authentication requests.
- Reverse-Verify feature allows customers to request your service providers (whether on the phone or in-person) to verify their identities.
- Multi-factor authentication technology allows for multiple levels of security: PIN, password, biometrics, dynamic digital signature, etc.
- With no integration required, reduce the time it takes to verify customers, whether on the phone, chatting online, or even in-person.
- Provide customers and employees with a trusted, seamless and secure biometric identification experience, secure corporate transactions, and reduce fraud.
- Out-of-the-box solution offers flexibility and allows you to get started immediately. However, Ipsidy's APIs and SDKs allow for optional easy integration to enterprise databases.
Iraje Software ActiveChange Manager
- All users have a consistent real-time secured vision of multiple instances of all corporate database applications.
- ActiveChangeManager provides an encrypted password algorithm whereby the user is prevented from knowing the direct SQL database passwords for sensitive production databases.
- All database changes are recorded, along with the exact SQL that has been executed as well as the specific database user who executed the SQL.
- Ability to freeze the database schema at any time from a single controlling point.
- Ability to allow the users SQL access to databases with restricted SQL privileges. E.g. DROP table and DELETE CUSTOMER operations may be restricted by the ActiveChangeManager for a particular production database.
- Ability to restrict specific data access provides the database application owner the means to prevent a developer from querying sensitive production database information, while allowing this developer to modify and work with the schema design if necessary.
- ActiveChangeManager also allows the changes to work its way around a change management and approval process, thus providing a controlled environment for database design changes. This is an option that can be turned ON when the system enters implementation/production stage.
- To restrict users from uncontrolled SQL access on production databases.
- To allow full access to developers on development databases, at the same time controlling the changes via the recording feature whereby all changes and changed by information is being recorded.
- Changes on one database schema instance can be propagated effortlessly to another database instance, e.g. Changes in the DEVL environment can be propagated to the PROD database.
- Where it is required to provide access to the audit control information, but not allow direct access to database changes or schema changes.
Jumio Corporation Identity Verification
Know the True Identity of Your Customers
The Jumio Identity Verification process uses machine learning, face-based biometrics and verification experts to ensure the person behind a transaction is present and who they say are. Identity verification goes well beyond traditional authentication methods to deliver a significantly higher level of assurance and establish a trusted digital identity.- ID Proofing Check. Is the ID document authentic and valid?
- Similarity Check. Is the person holding the ID the same person shown in the ID photo?
- Liveness Check. Is the person holding the ID physically present during the transaction?
- Definitive Answer. Jumio Identity Verification delivers a definitive yes or no answer in seconds.
- Verify IDs. Ensure the ID document is authentic and valid.
- Similarity Check. Make sure the person holding the ID is the same person shown in the ID photo.
- Compliance. Comply with growing regulations & directives including GDPR, PSD2, KYC and AML.
- Certified Liveness Check. Perform liveness detection using FaceTec’s certified 3D selfie technology.
- User Experience. Dramatically reduce user friction and verification time while increasing conversion rates.
- Security. All data is transmitted and stored with strong AES 256 bit encryption. Jumio is PCI Level 1 compliant.
- Cardholder not present
- User authentication
- Fraud detection
- High risk transactions
- KBA replacement
- KYC/AML compliance
MarkMonitor Domain Security
- API and single sign-on (SSO) create a streamlined and user-friendly interface
- Granular permissions and full transaction logging for accountability and control
- Customizable security levels for each of your domains
- Count on the MarkMonitor team, trusted by 10 out of 10 most highly trafficked websites worldwide
- Two-Factor Authentication fortifies account access against account hijacking
- Portal Access Control to prevent tampering with off-premises registration
- Secure Account Management automatically notifies a secure email address when changes are made
- DNS Monitoring identifies unauthorized DNS updates by scanning each domain name under management
- Domain Masking keeps your ownership confidential until you’re ready to introduce your product or service to the market
- Mission-Critical Domain Security combines maximum domain renewal periods with domain locking
A simplified experience
Highly-secured access
Full-scale protection
Mitek Systems Mobile Verify
- INTUITIVE CAPTURE EXPERIENCE. Guided and touchless interface to ensure a successful capture
- GLOBAL ID VERIFICATION. Hundreds of AI analyzers instantly proof the authenticity of global ID documents
- SMART IDENTITY VERIFICATION. Biometric-comparison and liveness-detection algorithms ensure the ID presented is from its true owner
- Powering science
- Identity verified
- Document capture
- Documet classification
- Data extraction
- Document authentication
- Biometric facial comparison
- ID data anlysis
- Simultaneous AI-powered development & production
Next Caller VeriCall
WHY WE’RE DIFFERENT
Our team and our technology set us apart- Detect High Risk Calls. Spoof Proof™ your call center
- Our Pricing. Security costs shouldn’t be criminal
- Flexibility. Offline P.O.C. and live API integration
- Our Team. Responsive, attentive, and authentic
- 75% Authentication. Best rate in the industry
- 200ms Response Time. Immediately after answer
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.