View

Sorting

Products found: 6

logo
Offer a reference bonus
0.00

Hexnode

Hexnode is a comprehensive Unified Endpoint Management solution from Mitsogo Inc. that aims to simplify how people work. The management platform streamlines the complete device lifecycle model to provide support at every stage, from device onboarding to the end of its life. Additionally, it provides a hands-free experience with automatic enrollment utilizing Knox Mobile Enrollment, Zero-touch enrollment, Apple Business Manager, and endpoint management with the aid of dynamic group allocation in the event of policies. Furthermore, Hexnode supports all major device platforms and assists in the security, monitoring, and management of both BYOD and corporate-owned devices. These capabilities make Hexnode popular for SMBs and Fortune 500 enterprises worldwide. Take a look at the ROI you can generate with the help of Hexnode.
https://www.hexnode.com/roi-calculator/
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

OneLogin Trusted Experience Platform

Take a leap forward in your digital transformation

The OneLogin Trusted Experience Platform™ is the foundation to build simple and secure experiences between people and technology. Manage and secure digital identities for your workforce and your customers so you can get back to business. CONNECT As organizations grow, the technology puzzle pieces multiply: more apps, users, and devices. OneLogin simplifies identity and access management. ANALYZE In the past year, there has been nearly a twelve-fold increase in the number of cyberattacks using artificial intelligence and machine learning (AI/ML) capabilities. Fight fire with fire. Vigilance AI™ uses AI/ML to gather data across the OneLogin Trusted Experience Platform™ and identify potential threats. ACT Not all login attempts are created equal. SmartFactor Authentication™ offers flexible authentication requirements based on contextual insights, including modular login flows as well as step-up and step-down multi-factor authentication (MFA) requirements. Security when you need it, simplicity when risk is low.

Key OneLogin Trusted Experience Platform™ services

Cloud directory The center of the platform is the OneLogin cloud directory: a single source of truth from which you manage access. No need to rip and replace your current directories. OneLogin’s pre-built integrations work seamlessly with your existing on-prem and cloud directories, like Microsoft Active Directory, LDAP, Workday, and more. Single Sign-On OneLogin’s Single Sign-on (SSO) platform gives users one-click access to all their apps, in the cloud or behind the firewall, anywhere and anytime. With an extensive app catalog and a secure portal, users can always see and access their apps. OneLogin Desktop extends SSO to MacOS or Windows machines. OneLogin Access extends identity management to legacy apps on-prem and hosted remotely. Authentication It’s all about secure authentication. OneLogin adds multi-factor authentication (MFA). Implement personal security questions, biometrics, OTP, pins, and more. You define the rules, OneLogin enforces them. OneLogin’s SmartFactor Authentication uses machine learning for state-of-the-art MFA. It takes context into account, like location, IP addresses, and time of day, to identify and challenge abnormal login attempts. Identity and lifecycle management With OneLogin’s identity management, provision users easily and automate onboarding/offboarding. Connectors integrate OneLogin with your on-prem and cloud directories with real-time synchronization. Streamline entitlements through powerful rules to enforce intelligent access policies based on user location, role, privilege level, and more. Reporting and intelligence Stay compliant with sophisticated reporting and a centralized audit trail. The information you need to meet compliance requirements or assess cyber threats is at your fingertips. No more coordinating with multiple systems and people for reports. OneLogin’s dashboard is supplemented by a state-of-the-art reporting engine for drilling down to users, apps, and events. Developer tools An identity solution that isn’t extensible isn’t a scalable solution. Built to be developer-first, OneLogin’s API is based on RESTful principles, secured by OAuth 2.0, and provides JSON messages, search, pagination, sorting, and filtering. With OneLogin, you can integrate your custom apps and third-party apps, and extend the system to fit your workflows.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
4
5
logo
Offer a reference bonus
0.00

Privoro Platform

Safecase The SafeCase is a first-of-its-kind ExoComputer – a secondary computing device providing trusted services independently of the paired mobile device. Cloud Featuring a robust policy engine and device logging capabilities, the cloud – interfaced via the Privoro Portal – offers administrators the ability to manage each SafeCase. IOS App The Privoro app on the user’s mobile device enables communications with the Privoro Cloud as well as user validation of SafeCase protections. Secure Data Channel Every communication between the SafeCase and cloud utilizes an inner encryption tunnel through the mobile device's data channel to provide high-security, end-to-end, trusted communication Features and capabilities
  • ExoComputer. SafeCase trusted hardware is the bedrock foundation for all other features and capabilities. It has been rigorously designed, developed and manufactured to a nation-state threat model across the entire system.
  • Mobile hardening. Integrated within the SafeCase are verifiable protections against remote surveillance via the mobile device’s cameras and microphones.
  • Policy management. Administrators can monitor SafeCase activity and set and enforce policies (including geofences) for the SafeCase; optional Mobile Device Management (MDM) integrations enable policy enforcement via paired mobile devices.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Quadible authentication

Secure your organisation Quadible introduces the future of authentication. An AI-platform that continuously authenticates your end-users, without the need of any input by learning their behavioural patterns such as the way they move, the way they use their devices, their biometrics and transactional patterns.

Why Quadible's authentication?

  • AI-powered. Innovative AI-powered technology uniquely combines biometrics and behavioural traits
  • Continuous authentication. At any point you know who is accessing your system
  • Device independent. Your users can setup their profile on one device and keep using it on different devices
  • Multi-biometric and behavioural. More than 10 biometrics and behavioural traits work together to authenticate the end-user
  • Easy integration. The integration process is a piece of cake with only one line of code and you are ready to go
  • User-friendly. Setup with only one selfie or passport; then your end-users do not need to actively do anything.

This is how we can help you

  • User authentication. Know at any point that the person interacting with your system is exactly the person that they say they are
  • Account sharing. Detect and prevent in real-time when users share their account among each other, reducing risks and data breaches
  • Account takeover. Spot immediately when malicious users have taken over the account of your legitimate users, preventing fraud
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Relution Mobile Device Management

Inventory Relution’s streamlined device management view lets you effortlessly create an inventory of your equipment. Send complete guidelines or individual actions to devices and device groups over the air with just a few clicks. Enrollment The intuitive device enrollment process in Relution’s MDM solution supports SMS, QR code or link notifications with automatic platform recognition. Even inexperienced users can easily enroll their devices. Moreover, there is a bulk enrollment mode for enrolling multiple devices at the same time as well as full support for Apple’s Device Enrollment Program (DEP) or Samsung Knox Mobile Enrollmen (KME). Policies Simplify mobile device setup by distributing standardized configurations over the air (OTA) such as wireless internet, email, VPN and more. With Relution’s MDM solution, you can secure mobiles devices by creating security policies, i.e. Monitoring Each device’s compliance status as well as detailed information about all of the mobile devices is available to the administrator in the Relution Mobile Device Management portal. See which devices are non-compliant with your policies, such as App Blacklists and Whitelists, Exchange Accounts, VPN connections, etc. Security As a central Mobility Gateway, Relution’s MDM platform provides comprehensive access control to the corporate IT infrastructure from all mobile devices. Ensure controlled access by applying WiFi, VPN, Exchange or other configurations. In case of loss or theft, you can block or wipe enabled devices.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0
logo
Offer a reference bonus
0.00

Shevirah Dagah Software

With Dagah, security analysts can design a campaign of penetration test attacks against targets, launch them, and review the results. Attacks simulate phishing, harvesting, iOS profile, and malicious application exploitations. Each attack can be delivered over Short Message Service (SMS), Quick Response (QR) Codes, Near-Field Communications (NFC), or messaging applications.
  • Given only a phone number, Shevirah can phish mobile users via SMS, QR Codes, NFC or send client-side attacks to simulate how hackers would exploit users
  • Given the installation of a simulated malicious application, Shevirah measures the potential impact of malicious applications on users’ devices and corporate management settings
  • Simulated phishing attacks can gather basic information, user credentials, or attempt to side-load a simulated malicious application
  • Works against Android and iOS smartphones and devices
  • Available now in Community and Professional versions. Enterprise version coming soon.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.