SmartEvent event management provides full threat visibility with a single view into security risks. Take control and command the security event through real-time forensic and event investigation, compliance, and reporting. Respond to security incidents immediately and gain network true insights.
DomainTools' data and products work in harmony to enable security teams to start getting ahead of attacks, gain context and visibility into potential threats, and lower the skills barrier.
GooseChase is for smartphone users who are dissatisfied with the lack of real-world interaction and adventurousness in social games. GooseChase uses gamification to make scavenger-hunt-like activities incredibly competitive. It's social gaming for the real-world.
Nory is the operating system the hospitality industry deserves. An all-in-one solution providing Analytics, Workforce and Inventory Management, Nory is purpose-built to help hospitality venues control their costs and perform consistently each day. Smart, mobile and easy to use.
Craftable's suite is the only platform that seamlessly connects purchasing, recipes, inventory, and sales with accounting to help operators drive profit. Bevager, Foodager and House are Craftable's flagship solutions for F&B and non-F&B management that enables bars, restaurants, ghost kitchens, and hotels to track inventory and have better control over menus, recipes, and more. With Books you can automate A/P invoicing, credits & payment processing to eliminate manual entry and sync
Tightly align your philanthropy efforts with your corporate mission to achieve maximum impact, efficiently. Bonterra's single-platform Grants Management solution streamlines and simplifies the grantmaking process for corporate foundations and nonprofits with unmatched flexibility and agility to reduce administrative burden while optimizing resources.
Real-time Windows Active Directory and File-Server change audit solution
FTK Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution.
Securonix is working to radically transform all areas of data security with actionable security intelligence.
Gainsight PX provides a personalized product experience platform designed to help companies acquire, retain, and grow customers by creating real-time, personalized engagements driven by product usage data.
IBM Cloud Pak for Security is a platform that helps you uncover hidden threats, make more informed risk-based decisions and prioritize your team’s time
ActZero’s MDR platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats. No tools to buy and manage. No more alert fatigue. Just improved visibility, and continuously hardened security. That’s future-proofed MDR, powered by ActZero’s unmatched machine learning capabilities. With real-time 24/7 monitoring and a well-honed threat hunting team, we partner with you to see and stop threats before they put your operations, data, people
SpotHopper is the industry leader in restaurant marketing. We've helped 1000's of restaurants across 30 markets drive more revenue from their online marketing, while cutting cost and saving time. Our mission is to help every independent restaurant survive and thrive during COVID 19, utilizing technology and A.I. to invest in marketing that actually drives trackable revenue.
APICBASE is a recipe management platform designed to help companies in the food industry to increase their margins, comply to regulations, optimise their procurement and train teams to maintain a high quality of execution.
Instrumentl is designed to match nonprofits and researchers with relevant grants and help them manage their grants process.
Stealthwatch is the only solution that detects threats across your private network, public clouds, and even in encrypted traffic.
EnCase Endpoint Security combines two industry-leading products, EnCase Analytics and EnCase Cybersecurity, to detect, validate and prioritize unknown threats, assess the scope and impact of a compromise, and return devices to a trusted state.