Search results for
Invideo
(6463)
Star Rating
Categories
Categories(26)
Sellers(84)
Solutions(0)
Discussions(8)
Articles(324)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

PhishByte is an Australian-focused phishing simulation and cyber awareness training platform designed to help organisations reduce human risk through real-world scenarios and measurable behavioural change. While firewalls and software protect systems, attackers increasingly target people. PhishByte helps organisations strengthen their human layer of defence — equipping employees to recognise, question and stop phishing and social engineering attacks before damage is done. Our platform delivers r

Product Description

DataRecoverySoftware.com offers a comprehensive suite of data recovery solutions designed to retrieve lost, deleted, or inaccessible files from various storage devices. Established in 1999, the company provides both freeware and commercial tools compatible with Windows and Mac operating systems. Users can download free versions to evaluate the software's capabilities before upgrading to professional editions. Key Features and Functionality: - Versatile Recovery Options: The software supports

Product Description

Microsoft Purview Privileged Access Management (PAM is a security feature within Microsoft 365 designed to provide granular control over privileged administrative tasks. By implementing just-in-time (JIT access, PAM ensures that users receive only the necessary permissions for specific tasks, reducing the risk associated with standing administrative privileges. This approach enhances organizational security by minimizing potential exposure to sensitive data and critical configuration settings.

Product Description

rediCASE is an Australian-developed, web-based case management software tailored for health and community service providers. Launched in 2012, it offers a comprehensive solution for managing client records, treatment plans, and reporting requirements across various sectors, including counseling, addictions, indigenous services, and mental health. Designed for flexibility and scalability, rediCASE supports organizations ranging from single practices to large consortiums with multiple locations an

Product Description

Fatigue360 is a comprehensive fatigue risk management and job planning tool designed to help organizations proactively monitor and mitigate workforce fatigue. By integrating scheduling, rostering, and real-time shift planning, Fatigue360 enables businesses to manage working hours, travel, and rest periods effectively, ensuring compliance with industry regulations such as Network Rail's NR/L2/OHS/003 standard. Key Features and Functionality: - Scheduling and Rostering Shifts: Plan and assign s

Product Description

NorthGRC is a comprehensive Governance, Risk, and Compliance (GRC platform designed to streamline and integrate compliance efforts across various standards, including ISO 27001/2, NIS2, GDPR, and DORA. Established in 2002, NorthGRC offers organizations a centralized solution to manage information security and data protection compliance, enhancing operational efficiency and ensuring regulatory adherence. Key Features and Functionality: - Integrated Compliance Management: Facilitates simultaneou

Product Description

Mindset is an award-winning, international PR agency for tech companies and VC funds. In 2023, the firm was named the gold winner of the Agency of the Year nomination by the Golden Bridge Awards by Globee Awards, as well as shortlisted for the European Agency Awards as PR Agency of the Year and for the PR Daily’s Media Relations Awards in the Media Relations category. Working globally from our base in Spain, we have implemented over 600 successful projects in the United States, Europe, Latin Ame

Product Description

StealthMole is an AI-powered dark web intelligence platform that specializes in digital investigation, risk assessment, and threat monitoring. By aggregating and analyzing data from the deep and dark web, StealthMole equips governments, law enforcement agencies, and enterprises with the tools necessary to identify and mitigate digital risks and criminal activities. The platform's advanced AI capabilities enable users to uncover hidden threats, trace data relationships, and visualize investigatio

Product Description

Automated protection against all client-side threats, Source Defense Protect is a turnkey, automated web security and data privacy compliance solution designed to protect data at the point of input. It extends web security beyond the server to the client-side (the browser) where a majority of data theft activity now occurs. It provides a simple and effective solution for data security and data privacy compliance – with options for securing your own code, as well as addressing a ubiquitous gap in

Product Description

Defiance Digital is a comprehensive digital transformation consultancy specializing in cloud engineering, DevOps, security, monitoring, and compliance services. By partnering with industry leaders like AWS, Vanta, Clumio, Datadog, and Lacework, Defiance Digital delivers optimized cloud infrastructures tailored for peak performance. Key Features and Functionality: - Managed Cloud Services: Offers end-to-end migration and management of cloud environments, ensuring a well-architected foundation

Product Description

Mohawk Cloud is a specialized IT consulting firm founded in 2018, focusing on cybersecurity, infrastructure, and cloud services. The company assists businesses in their digital transformations by offering comprehensive solutions tailored to optimize IT infrastructures. Emphasizing a transdisciplinary approach, Mohawk Cloud ensures clients receive holistic strategies that align with their organizational and technological needs. Key Features and Functionality: - Infrastructure and Cloud Service

Product Description

Datadog is a comprehensive monitoring and analytics platform designed for applications and infrastructure. It provides IT and DevOps teams with real-time, unified observability across an organization’s entire technology stack. With Datadog, businesses can monitor everything from servers, databases, and applications to network devices and cloud services—all in one centralized platform. Key Features and Functionality: - Infrastructure Monitoring: Keep an eye on your hardware—both on-premise and

Product Description

OneMind Services is a technology solutions provider offering a wide range of services designed to optimize business operations, enhance security, and drive innovation. Our offerings address modern business challenges through tailored solutions and expert delivery. OneMind Services specializes in solving critical issues such as secure network design, application scalability, and technology adoption by offering: - Cloud Solutions: Deploy, migrate, and manage applications on cloud platfor

Product Description

RawWorks is a leading IT service provider specializing in modern workplace solutions, security, cloud services, and artificial intelligence . As a Microsoft Partner, RawWorks offers expertise in infrastructure-as-code, software development, data management, and workspace optimization. The company is dedicated to enhancing productivity and efficiency for organizations across sectors such as government, healthcare, and financial services. With a team of over 100 professionals, RawWorks employs its

Product Description

Boch Systems Company Limited is a premier systems integration firm specializing in delivering high-quality information and communication technology services across West Africa. Established in 2006, BOCH has built a reputation for providing reliable, timely, and cost-effective solutions to a diverse clientele, including sectors such as industry, commerce, and government. The company's mission is to offer seamless, proactive technological advancements to the connected world, aiming to become the l

Product Description

CyberArk Software EMEA offers a comprehensive Identity Security Platform designed to secure all identities—human and machine—across various environments, including on-premises, cloud, and hybrid infrastructures. By implementing intelligent privilege controls, CyberArk ensures that organizations can protect their most critical assets from unauthorized access and potential cyber threats. Key Features and Functionality: - Privileged Access Management : CyberArk's flagship offering provides a secu

Product Description

Xigent Solutions specializes in delivering comprehensive IT services and solutions tailored for mid-sized organizations. By adopting a holistic partnership approach, Xigent engages with clients on both strategic and tactical levels to enhance IT and business outcomes. Their methodology, termed "Result Driven IT," focuses on optimizing IT resources, including personnel, processes, and technology, to achieve business efficiency while minimizing costs and inefficiencies. Key Features and Function

Product Description

Thehosting.io offers virtual servers with dedicated resources and high bandwidth. You have full access to your VDS resources at any time. We offer two types of plans: Servers with traffic limits – you get maximum network speed with a predefined traffic quota (a generous one — starting from 20 TB). Servers with guaranteed bandwidth – ideal for high-traffic projects. Constant speed with no data volume limits. What makes thehosting.io special? Own hardware and data centers — we don’t rent equi

Product Description

Redpeaks is a comprehensive, agentless SAP monitoring solution designed to provide real-time observability and security across hybrid and cloud environments. By integrating seamlessly with various SAP technologies, Redpeaks enables organizations to monitor system health, availability, and performance efficiently, ensuring optimal operation of SAP landscapes. Key Features and Functionality: - Agentless Deployment: Redpeaks connects remotely to SAP systems without the need for installing agents

Product Description

Twistlock is a comprehensive cloud-native security platform designed to protect applications across their entire lifecycle, from development to deployment. It offers robust security solutions for containers, serverless functions, and virtual machines, ensuring that organizations can confidently adopt and manage modern cloud technologies. Key Features and Functionality: - Vulnerability Management: Twistlock scans container images and serverless functions for vulnerabilities, integrating seamles