Search results for
miden
(10165)
Star Rating
Categories
Categories(13)
Sellers(140)
Solutions(0)
Discussions(0)
Articles(12)
Advanced FiltersClear Filter
Star Rating
Categories
The next elements are filters and will change the displayed results once they are selected.
Product Description

Drive content operations from an award-winning digital asset management and brand management platform.

Product Description

IDenfy is an online identity verification company, helping to reduce frauds and makes business smoother and more profitable

Product Description

Crop.photo is an advanced cloud-based image retouching platform developed by Evolphin, a leading Silicon Valley-based company that specializes in AI-driven image and video processing. This innovative platform is designed to simplify the process of image retouching by automating low to mid-end retouching tasks, saving individuals and businesses valuable time and effort. With its powerful AI algorithms, Crop.photo ensures that images are retouched with precision, correcting common issues like inco

Product Description

Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.

Product Description

Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'

Product Description

Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.

Product Description

AWS Identity and Access Management (IAM) is a web service that enables you to securely control access to AWS services and resources. It allows you to manage permissions, ensuring that only authenticated and authorized users can access specific resources. IAM provides the infrastructure necessary to control authentication and authorization for your AWS accounts. Key Features and Functionality: - Centralized Access Control: Manage all users and their permissions from a single place, allowing for

Product Description

Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.

Product Description

WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce IAM requirements.

Product Description

Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments

Product Description

Pro Insight is a manual review solution that helps risk management teams around the world verify identities. In one comprehensive view, Pro Insight allows users to assess both digital and traditional identity attributes and their relation to one another. The tool also features a Confidence Score and the top signals that influence it, proprietary Network Insights, an interactive distance calculation map, robust admin tools and analytics, and direct workflow integrations.

Product Description

Oracle Identity Management is a comprehensive suite of identity and access management (IAM) solutions designed to help organizations manage the entire lifecycle of user identities and access privileges across enterprise resources, both on-premises and in the cloud. By automating user provisioning, enforcing security policies, and ensuring compliance with regulatory requirements, Oracle Identity Management enhances operational efficiency and strengthens security postures. Key Features and Functi

Product Description

medent is a software development and services company focused on automating medical practices. We offer an All-In-One EMR/EHR, Patient Portal & Practice Management system providing a high-level of interoperability and automation.

Product Description

Identity verification and management solutions with market-leading accuracy (99.5%) and recall (99.3%) values for enterprises across the globe

Product Description

What is your time worth? We want you to spend time living a meaningful life, not waiting hours on the phone with the IRS or your bank. We can’t remove all the worry from your life, but we can help reduce the stress if your identity is stolen. We remove the uncertainty and give you the advantage of being able to act quickly if something suspicious is happening with your identity. We actively monitor your identity with enhanced protection so you can focus on the things in life that matter most to

Product Description

Cove Identity is an android and iOS App that helps secure, organize and share data using end to end encryption. Keep your digital identity secure using Cove's ultra-secure networks. Upload all your important documents and access them any time, anywhere. Each bit of your data is protected using AES 256 Bit End-to-End Encryption. With its AI-based Smart Tagging Technology, the documents get automatically sorted and organized. Get higher access to security using Cove's 2FA (two factor authentic

Product Description

Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.

Product Description

Google Cloud Identity & Access Management (IAM) is a software that lets administrators authorize who can take action on specific resources, giving a full control and visibility to manage cloud resources centrally, it established enterprises with complex organizational structures, hundreds of workgroups and potentially many more projects to provides a unified view into security policy across entire organization, with built-in auditing to ease compliance processes.

Product Description

A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.

Product Description

Identity Matrix de-anonymize your web traffic down to the exact person viewing your site, track which pages they're on, and reach out with fully enriched contact information.