Search results for
Murf
(1697)
Star Rating
Categories
Categories(1)
Sellers(123)
Solutions(0)
Discussions(3)
Articles(4)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

Bikky is the #1 CDP for multi-location restaurants. We break down guest data silos across operating and marketing systems to activate your guest data in one place. Bikky surfaces the insights you need and empowers marketers and c-suite leaders to see customers and to act faster to grow the business.

Product Description

Workday Strategic Sourcing delivers rapid ROI by making the source-to-contract process more impactful. Most customers launch their first sourcing event within 30 days and can achieve 99% ROI in the first year. The solution achieves this by focusing on three areas: Streamlined Sourcing & Collaboration: A simple intake process improves stakeholder collaboration, and an intuitive interface helps teams run sourcing events and negotiate better deals. Data-Driven Supplier Management: A centralized

Product Description

InsecureWeb is a Digital Attack Surface Analysis (DASA) platform available as a SaaS that keeps an eye on the bad guys operating in shady places like black market sites, P2P networks, hidden chat rooms, botnets, and private websites. It delivers Dark Web Monitoring for businesses, live Dark Web Scans, Typo Squatting, and email security. InsecureWeb watches for relevant information, vulnerabilities, and indicators of ongoing or future attacks to keep you one step ahead. More than 14 Billion

Product Description

Bookinglayer is a web-based software for surf schools and camps that allows you to have people on your website make a reservation, with back office capabilities, to help manage errors and efficiencies from one system.

Product Description

form·Z's ability to combine solid and surface modeling has made it a favorite in multiple design fields that engage in the articulation of 3D forms and spaces. Available for the Mac and Windows, it adds interoperability between the two platforms as it allows users to open their files on either one.

Product Description

Palo Alto Networks' GlobalProtect is a comprehensive network security solution designed to extend the protection of the Next-Generation Security Platform to mobile users, regardless of their location. By establishing a secure connection between remote devices and the corporate network, GlobalProtect ensures consistent enforcement of security policies, safeguarding sensitive data and applications from potential threats. Key Features and Functionality: - Identity-Based Access Control: GlobalProt

Product Description

Autodesk Mudbox is a digital 3D sculpting and painting tool designed for artists to create highly detailed characters and environments with stunning textures. Its intuitive interface and robust toolset allow users to sculpt virtual 3D surfaces much like working with real clay, facilitating the creation of intricate models and realistic textures. Key Features and Functionality: - Intuitive Sculpting Tools: Mudbox offers artist-friendly sculpting tools that enable the creation of complex, high-r

Product Description

Say hello to urfuture, the emerging talent platform designed for Gen Z, turning career dreams into reality. Just like Tinder ❤️ changed dating and Uber transformed transport 🚕, urfuture is on a mission to create a fresh approach for young people to engage with careers. We match you with the brightest future stars ✨ and help you build a diverse, engaging workforce. Increase retention and success by finding the perfect fit based on personality. 🙌 Connect with our awesome community and discover

Product Description

DryRun Security is an LLM-native code risk analysis platform that reviews source code to cut false positives and surface real security issues—helping developers fix problems faster, without the noise of traditional security tools.

Product Description

Collective[i] generates intelligence that helps businesses thrive and expand economic opportunity assisted by advanced AI. Collective[i]’s model leverages artificial intelligence to predict economic outcomes and surface insights to forecast, manage, and grow enterprise revenue. The technology was developed by an exceptional team of engineers, entrepreneurs, and data scientists supported by an A-list set of advisors that include the former Vice Chair of the Federal Reserve, senior executives from

Product Description

Darwin Attack® is a real-time penetration testing platform developed by Evolve Security, designed to enhance the efficiency and collaboration of security information within organizations. By integrating data management, communication, and reporting functionalities, Darwin Attack® enables proactive security measures, thereby improving compliance and reducing risk. The platform allows for continuous monitoring and immediate identification of vulnerabilities, facilitating prompt remediation actions

Product Description

ScenePD is a crash and crime scene diagramming tool that employs a library of intelligent objects to diagram crime scenes from domestic abuse and murder to floor mapping.

Product Description

RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms. RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.

Product Description

Parrot Security OS is a free and open-source GNU/Linux distribution based on Debian, tailored for security experts, developers, and privacy-conscious users. It offers a comprehensive suite of tools for penetration testing, digital forensics, reverse engineering, and software development, all within a lightweight and flexible environment. Key Features and Functionality: - Extensive Toolset: Parrot Security OS includes over 600 tools for various cybersecurity operations, such as penetration test

Product Description

Intruder is a proactive security monitoring platform for internet-facing systems.

Product Description

WhyLabs is an AI observability platform that prevents model performance degradation by allowing you to monitor your machine learning models in production. If you deploy an ML model but don’t have visibility into its performance, you risk doing damage to your business because the model stops working. Machine learning engineers and data scientists rely on the platform to monitor ML applications and data pipelines by surfacing and resolving data quality issues, data bias, and concept drift. The

Product Description

Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.

Product Description

More than just a PRM, Euler is a complete partner operations platform that handles your entire partner workflow end-to-end. It meets partners where they already work - email, Slack, CRM, and browser - creating an exceptional Partner Experience without friction. Powered by AI capabilities including PAM, our industry-first AI Partner Account Manager, Euler eliminates manual busywork and surfaces actionable insights in real-time. This gives partner teams the ability to move faster, prove ROI, an

Product Description

Toby surfaces key resources from every tool onto every new tab page.

Product Description

Zscaler's Secure Access Service Edge is a cloud-native platform that seamlessly integrates advanced security services with wide area networking capabilities. Designed to meet the demands of modern, dynamic workforces, it ensures secure, efficient, and reliable access to applications and data, regardless of user location. By adopting a zero trust architecture, Zscaler's SASE solution minimizes business risks, simplifies IT operations, and enhances overall cybersecurity posture. Key Features and