Drive content operations from an award-winning digital asset management and brand management platform.
Crop.photo is an advanced cloud-based image retouching platform developed by Evolphin, a leading Silicon Valley-based company that specializes in AI-driven image and video processing. This innovative platform is designed to simplify the process of image retouching by automating low to mid-end retouching tasks, saving individuals and businesses valuable time and effort. With its powerful AI algorithms, Crop.photo ensures that images are retouched with precision, correcting common issues like inco
Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
Today’s new reality requires a new kind of access platform. Built on Zero Trust, CyberArk Identity is creating a new era -secure access everywhere- that uniquely combines leading capabilities to seamlessly integrate SSO, MFA, EMM and UBA. Using our proven technologies, we’re ushering in a new generation of access technology that not only protects companies, but also leads to happier customers, better products and more valuable organizations.
AWS Identity and Access Management (IAM) is a web service that enables you to securely control access to AWS services and resources. It allows you to manage permissions, ensuring that only authenticated and authorized users can access specific resources. IAM provides the infrastructure necessary to control authentication and authorization for your AWS accounts. Key Features and Functionality: - Centralized Access Control: Manage all users and their permissions from a single place, allowing for
Microsoft Defender for Identity enables you to integrate Microsoft Defender for Identity with Defender for Endpoint, for an even more complete threat protection solution. While Defender for Identity monitors the traffic on your domain controllers, Defender for Endpoint monitors your endpoints, together providing a single interface from which you can protect your environment.
WSO2 Identity Server, part of WSO2’s CIAM suite, is the market’s leading open-source CIAM solution. It provides modern identity and access management capabilities that can be easily built into your organization’s customer experience (CX) mobile apps or websites, or even deployed to fulfill workforce IAM requirements.
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
Pro Insight is a manual review solution that helps risk management teams around the world verify identities. In one comprehensive view, Pro Insight allows users to assess both digital and traditional identity attributes and their relation to one another. The tool also features a Confidence Score and the top signals that influence it, proprietary Network Insights, an interactive distance calculation map, robust admin tools and analytics, and direct workflow integrations.
Oracle Identity Management is a comprehensive suite of identity and access management (IAM) solutions designed to help organizations manage the entire lifecycle of user identities and access privileges across enterprise resources, both on-premises and in the cloud. By automating user provisioning, enforcing security policies, and ensuring compliance with regulatory requirements, Oracle Identity Management enhances operational efficiency and strengthens security postures. Key Features and Functi
Identity verification and management solutions with market-leading accuracy (99.5%) and recall (99.3%) values for enterprises across the globe
What is your time worth? We want you to spend time living a meaningful life, not waiting hours on the phone with the IRS or your bank. We can’t remove all the worry from your life, but we can help reduce the stress if your identity is stolen. We remove the uncertainty and give you the advantage of being able to act quickly if something suspicious is happening with your identity. We actively monitor your identity with enhanced protection so you can focus on the things in life that matter most to
Cove Identity is an android and iOS App that helps secure, organize and share data using end to end encryption. Keep your digital identity secure using Cove's ultra-secure networks. Upload all your important documents and access them any time, anywhere. Each bit of your data is protected using AES 256 Bit End-to-End Encryption. With its AI-based Smart Tagging Technology, the documents get automatically sorted and organized. Get higher access to security using Cove's 2FA (two factor authentic
Identity Protection is a tool that allows organizations to accomplish three key tasks: Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to your SIEM.
Google Cloud Identity & Access Management (IAM) is a software that lets administrators authorize who can take action on specific resources, giving a full control and visibility to manage cloud resources centrally, it established enterprises with complex organizational structures, hundreds of workgroups and potentially many more projects to provides a unified view into security policy across entire organization, with built-in auditing to ease compliance processes.
A unified identity, access, app, and device management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace.
Identity Matrix de-anonymize your web traffic down to the exact person viewing your site, track which pages they're on, and reach out with fully enriched contact information.