View
Sorting
Products found: 6
Hexnode
Hexnode is a software company headquartered in San Francisco specializing in providing Unified Endpoint Management solution worldwide. A Gartner recognized UEM solution, Hexnode, is one of those vendors which provide device management solutions to SMBs as well. Hexnode's Unified Endpoint Management software offers cloud-based services and supports Android, iOS, Windows PCs, macOS, tvOS and fireOS. With a deluge of functionalities, Hexnode assures to deliver a 100% reliable and secure solution for productive business continuity. Hexnode offers a 30-day free trial version for its customers to get a brief understanding of what it offers.
OneLogin Trusted Experience Platform
Take a leap forward in your digital transformation
The OneLogin Trusted Experience Platform™ is the foundation to build simple and secure experiences between people and technology. Manage and secure digital identities for your workforce and your customers so you can get back to business. CONNECT As organizations grow, the technology puzzle pieces multiply: more apps, users, and devices. OneLogin simplifies identity and access management. ANALYZE In the past year, there has been nearly a twelve-fold increase in the number of cyberattacks using artificial intelligence and machine learning (AI/ML) capabilities. Fight fire with fire. Vigilance AI™ uses AI/ML to gather data across the OneLogin Trusted Experience Platform™ and identify potential threats. ACT Not all login attempts are created equal. SmartFactor Authentication™ offers flexible authentication requirements based on contextual insights, including modular login flows as well as step-up and step-down multi-factor authentication (MFA) requirements. Security when you need it, simplicity when risk is low.Key OneLogin Trusted Experience Platform™ services
Cloud directory The center of the platform is the OneLogin cloud directory: a single source of truth from which you manage access. No need to rip and replace your current directories. OneLogin’s pre-built integrations work seamlessly with your existing on-prem and cloud directories, like Microsoft Active Directory, LDAP, Workday, and more. Single Sign-On OneLogin’s Single Sign-on (SSO) platform gives users one-click access to all their apps, in the cloud or behind the firewall, anywhere and anytime. With an extensive app catalog and a secure portal, users can always see and access their apps. OneLogin Desktop extends SSO to MacOS or Windows machines. OneLogin Access extends identity management to legacy apps on-prem and hosted remotely. Authentication It’s all about secure authentication. OneLogin adds multi-factor authentication (MFA). Implement personal security questions, biometrics, OTP, pins, and more. You define the rules, OneLogin enforces them. OneLogin’s SmartFactor Authentication uses machine learning for state-of-the-art MFA. It takes context into account, like location, IP addresses, and time of day, to identify and challenge abnormal login attempts. Identity and lifecycle management With OneLogin’s identity management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Reporting and intelligence Stay compliant with sophisticated reporting and a centralized audit trail. The information you need to meet compliance requirements or assess cyber threats is at your fingertips. No more coordinating with multiple systems and people for reports. OneLogin’s dashboard is supplemented by a state-of-the-art reporting engine for drilling down to users, apps, and events. Developer tools An identity solution that isn’t extensible isn’t a scalable solution. Built to be developer-first, OneLogin’s API is based on RESTful principles, secured by OAuth 2.0, and provides JSON messages, search, pagination, sorting, and filtering. With OneLogin, you can integrate your custom apps and third-party apps, and extend the system to fit your workflows.Privoro Platform
- ExoComputer. SafeCase trusted hardware is the bedrock foundation for all other features and capabilities. It has been rigorously designed, developed and manufactured to a nation-state threat model across the entire system.
- Mobile hardening. Integrated within the SafeCase are verifiable protections against remote surveillance via the mobile device’s cameras and microphones.
- Policy management. Administrators can monitor SafeCase activity and set and enforce policies (including geofences) for the SafeCase; optional Mobile Device Management (MDM) integrations enable policy enforcement via paired mobile devices.
Quadible authentication
Why Quadible's authentication?
- AI-powered. Innovative AI-powered technology uniquely combines biometrics and behavioural traits
- Continuous authentication. At any point you know who is accessing your system
- Device independent. Your users can setup their profile on one device and keep using it on different devices
- Multi-biometric and behavioural. More than 10 biometrics and behavioural traits work together to authenticate the end-user
- Easy integration. The integration process is a piece of cake with only one line of code and you are ready to go
- User-friendly. Setup with only one selfie or passport; then your end-users do not need to actively do anything.
This is how we can help you
- User authentication. Know at any point that the person interacting with your system is exactly the person that they say they are
- Account sharing. Detect and prevent in real-time when users share their account among each other, reducing risks and data breaches
- Account takeover. Spot immediately when malicious users have taken over the account of your legitimate users, preventing fraud
Relution Mobile Device Management
Shevirah Dagah Software
- Given only a phone number, Shevirah can phish mobile users via SMS, QR Codes, NFC or send client-side attacks to simulate how hackers would exploit users
- Given the installation of a simulated malicious application, Shevirah measures the potential impact of malicious applications on users’ devices and corporate management settings
- Simulated phishing attacks can gather basic information, user credentials, or attempt to side-load a simulated malicious application
- Works against Android and iOS smartphones and devices
- Available now in Community and Professional versions. Enterprise version coming soon.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.