38 Integrations with Juniper Identity Management Service
View a list of Juniper Identity Management Service integrations and software that integrates with Juniper Identity Management Service below. Compare the best Juniper Identity Management Service integrations as well as features, ratings, user reviews, and pricing of software that integrates with Juniper Identity Management Service. Here are the current Juniper Identity Management Service integrations in 2025:
-
1
Pliant
Pliant.io
Pliant’s solution for IT Process Automation simplifies, streamlines, and secures how teams build and deploy automation. Reduce human error, ensure compliance, and elevate your efficiency, with Pliant. Ingest existing automation and write new automation with single-pane orchestration. Ensure compliance using consistent, practical built-in governance. Pliant has abstracted thousands of vendor APIs to create intelligent action blocks allowing users to drag-and-drop blocks, rather than writing and rewriting lines of code. From a single platform, citizen developers are able to build consistent and meaningful automation across platforms, services, and applications in minutes — maximizing value across the entire technology stack in one place. With our ability to add new APIs in 15 business days, anything that is not already out of the box will be in an industry leading timeframe. -
2
Microsoft Exchange
Microsoft
Work smarter with business-class email and calendaring. Exchange helps you collaborate on your critical documents and gives you a focused inbox that prioritizes important messages and adapts to your work style, so you can get more done–faster. Get access to a more personalized inbox with helpful features and a smarter, more organized way to view and interact with email. Search enhancements give you faster and more complete results. With Add-ins, get powerful customization and extensibility, which connect you to modern services and internal line-of-business applications. Organize your time with a calendaring system that goes beyond basic scheduling of appointments and commitments. Automatically capture events from email such as flights and hotel reservations, and get suggestions about where to meet based on your location. Microsoft Exchange Online offers a hosted email service for business. Exchange Online helps protect your information with advanced capabilities. -
3
IPFire
IPFire
IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario, and extensibility make it usable for everyone. Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Its powerful firewall engine and intrusion prevention system protect your network against attacks from the Internet and denial-of-service attacks. IPFire is free software developed by an open community and trusted by hundreds of thousands of users from all around the world. The primary objective of IPFire is security. It's easy to configure a firewall engine and an intrusion prevention system stops any attackers from breaking into your network. In the default configuration, the network is split into various zones with different security policies such as a LAN and DMZ to manage risks inside the network and have a custom configuration for specific needs.Starting Price: Free -
4
LoginTC
Cyphercor
Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more with it's innovative 2fa software. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.Starting Price: $3/month/user -
5
inspace
inspace
From desks to meeting rooms and so much more, our software takes the guesswork out of the hybrid setup, streamlining the employee experience and enhancing productivity. Providing data-driven insights, in space equips leaders with the tools to optimize space utilization and create a seamless, loved work experience for all. Companies and startups use it to improve the hybrid work experience and gain actionable data about how the office is used. Enhance the employee experience by seamlessly connecting people, technology, and the workplace, no matter where they are. Choose from our diverse range of ready-to-use integrations or leverage our custom API to tailor the perfect solution for your unique needs. Transform your workplace with Inspace's versatile integration options. Explore productivity, collaboration, and workflow-enhancing integrations across various categories to make your workplace work better.Starting Price: $2.99 per month -
6
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
7
6connect
6connect
Revolutionary network automation & provisioning for ISP's and enterprises around the world. Easy to deploy and integrate with, whether you use the 6connect cloud or deploy ProVision behind the firewall. Regain your sanity. Avoid the costly pitfalls of ad hoc solutions and manual network resource management. Global resource management, complete IPAM automation, easy management of DNS, DNSSEC, and DHCP. Flexible data model that seamlessly supports multi-tenant permissions, works with RADIUS, LDAP, 2FA, SAML2. Integrates, synchronizes and automates workflows over a dozen DNS platforms. Also makes migrations a snap! Easy DHCP configuration and scope management that integrates with other systems. From allocation to assignment, from CGN to IPv6, ProVision knows how to handle IPs. Carrier-grade API for easy integration across global system, fast, well documented and tested. Easy to use Peering workflows built-in – from email to BGP config pushes to reporting, it’s all there. -
8
PowerTerm InterConnect
Ericom
The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal emulation via various communication modes. PowerTerm InterConnect offers a flexible and extensive feature set to maximize users' time while providing a wide range of options. Using Power Script Language, users can automate tasks and increase efficiency. PowerTerm InterConnect's small footprint makes it a simple, fast and effective means of running legacy applications and it is easily installable on any PC. -
9
PowerTerm Pro
Ericom
The PowerTerm Pro Series is Ericom Software's premier terminal emulation solution for Windows that simplifies and extends legacy access functionality. Supporting a diverse range of hosts and emulation types, PowerTerm Pro enables corporations to standardize on a single host access solution. Featuring a customizable GUI, SSL, SSH and secure file transfer (SFTP), PowerTerm Pro and PowerTerm Pro Enterprise offer a number of options, so corporations can choose the PowerTerm Pro product that meets their host, security, server and productivity needs. Easy-to-use intuitive GUI (graphic user interface) enables users to do their work quickly and efficiently, with drag-and-drop tools for quick data accessibility and AS/400 DFT for easy file transfer between PC and AS/400 host. PowerTerm Pro terminal emulation software is installed on a central server and accessed via a Windows desktop with per-user licensing. -
10
TCS MasterCraft DevPlus
Tata Consultancy Services
To drive competitive advantage using digital technologies, enterprises need high performance IT teams that deliver high quality products and services faster. TCS MasterCraft™ DevPlus is a scalable, Agile and DevOps product, that helps your teams tailor their workflow to track and manage Scrum, Kanban or any other Agile framework, perform continuous testing, and automate release management. Build the right product by ensuring transparency and alignment across all levels of the enterprise. Accelerate your demand to deploy journey through automation, enabling businesses to realize value rapidly. Ship a minimum viable product and enhance it iteratively by receiving continuous feedback from end users. Maintaining end-to-end traceability of application delivery by ensuring transparency and alignment of all enterprise teams that work on various platforms, applications, teams etc. Enterprise level governance and reporting during your demand to deploy journey. -
11
TCS MasterCraft DataPlus
Tata Consultancy Services
The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management. -
12
TCS MasterCraft TransformPlus
Tata Consultancy Services
TCS MasterCraft™ TransformPlus is a cognitive transformation platform that provides clear visibility into core business applications, with an intelligent blueprint, and centralized knowledge repository, which is technology agnostic and implicit knowledge driven. Its automated conversion platform for modernization and faster roll outs, helps enterprises in their digital journey without business disruption. Cognitive code analysis based application knowledge repository with business rule externalization. A platform for designing and executing data transformation and migration for enterprises, especially during legacy application modernization. A solution for development of new digital applications using automatic code generation platform, based on model-based development. An automated migration platform for DB and language conversion, which accelerates application transformation. -
13
TCS OmniStore
Tata Consultancy Services
Customers walking into stores are trading transactions for ‘aha’ moments and experiences, the convenience of picking up or returning an online order at the store or a micro moment such as an irresistible discount offered by the store associate on a ‘wishlisted’ item. However, retailers are struggling with a point of sale (POS) solution that is unable to step up to offer the new customer centric capabilities of today. TCS OmniStoreTM is a unified commerce platform that completely revolutionizes the way customers shop and will be at the heart of everything you do. It serves as an antidote to retailers who had to contend with a patchwork of haphazard systems that fall short of meeting evolving customer expectations. Orchestrate integrated multichannel customer journeys. Build new services and apps quickly without worrying about channel constraints Enable customers to checkout anywhere in the store. Ensure their stores are ‘always on’ to drive unique, interconnected micro-experiences. -
14
TCS Optumera
Tata Consultancy Services
As retailers strategize for the post-COVID world marked with rising costs, changing shopping behavior, stifling competition and implementing safety norms, an imperative need is to be able to respond swiftly. This requires a tectonic shift in the way retailers operate. The way forward is providing the required resilience to unlock exponential value and make decisions with confidence backed with big data, predictive analytics, intelligent real-time, personalized and localized insights. TCS Optumera™ AI-powered retail optimization suite, helps to optimize merchandising and supply chain decisions in an integrated manner. Retailers have seen 3-5% increase in sales, ~50% reduction in time spent, 5x more strategies and 20-30% reduction in costs. Complete customers basket across channels considering demand transferability, customer choice sets, predictive analytics and competitive assortment. -
15
TCS TAP
Tata Consultancy Services
Technology breakthroughs are enabling organizations to reimagine their sourcing and procurement functions into a virtual organization in order to drive agile and integrated processes, while aligning buying decisions with sourcing strategies. The new age of agile sourcing and smart procurement brings a different set of opportunities for the leaders, along with stakeholder expectations. Sourcing and procurement leaders are aiming to overcome functional silos, unifying end-to-end source to pay processes while exploring ways to leverage supplier relationships that can drive innovation as they try to improve performance and mitigate risks. Procurement 4.0 is characterized by boundary less source to pay functions, capability to act on “here and now” spend insights, zero-touch smart buying, and ability to leverage ecosystems. TAP can be deployed as an integrated source to pay suite as well as an independent module including TAP Sourcing, TAP Quick Bid, TAP Procure to Pay. -
16
TCS HOBS
Tata Consultancy Services
In an era of digital business, we are helping organizations in their strategic pivot towards subscription business models, data monetization and device management. We drive mass personalization, leverage ecosystems, and deliver as-a-service models at scale. We help monetize ‘smart, connected devices’, unlock new revenue streams and improve profits, revenues and cash flows. The next-generation digital business platform for subscription, device and data, delivering 'growth and transformation' for your business. Improve margins and net promoter scores with world class revenue assurance. Big Data based, robust, and non-intrusive diagnostic methodology to improve customer experience. Acquires, converts, and collates data obtained from different applications of service providers. Leverages a workflow based case manager that enables creation of user defined workflows. Employs a business process engine for rule-based data processing. -
17
Zentry
Zentry Security
Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies. -
18
ParkView Hardware Monitoring
Parkplace Technologies
ParkView Hardware Monitoring™ is a hosted service that boosts Uptime by proactively monitoring data center storage, server and networking hardware 24/7. ParkView™ develops baselines, specific to your environment, that help filter out noise, resulting in alerts being sent only for actionable events. ParkView™ can even predict some events before they occur. When remediation is needed, ParkView™ automatically opens incident tickets and triages the issue. Then, Park Place engineers are dispatched immediately to your data center, making the service experience as efficient as possible. ParkView Hardware Monitoring™ proactively identifies faults 24/7 without the need for customer action of any kind. ParkView Hardware Monitoring™ supports all storage, server and networking equipment and all OEM vendors currently supported by Park Place Technologies. We set up security features based on each customer’s individual security requirements. -
19
SolidPass
SolidPass
SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience. -
20
AuthControl Sentry
Swivel Secure
Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators. -
21
Acceptto Zero Trust Identity (CIAM)
Acceptto
You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology. -
22
Prodea
Prodea
Launch secure, scalable and globally compliant connected products with services within six months. Prodea provides the only IoT platform-as-a-service (PaaS) that was specifically designed for manufacturers of mass-market consumer home products. It is comprised of three main services. IoT Service X-Change Platform, for quickly launching connected products with services across global markets requiring minimal development. Insight™ Data Services, to gain key insights from user and product usage data. And EcoAdaptor™ Service, to enhance product value through cloud-to-cloud integration and interoperability with other products and services. Prodea has helped its global brand customers launch 100+ connected products, in less than six months on average, across six continents. This was made possible by using the Prodea X5 Program which was designed to work with our three main cloud services to help brands evolve their systems. -
23
TCS CHROMA
Tata Consultancy Services
With shift in mindset from talent hunting to harnessing, connecting employees has become the need of the hour for talent development in an organization. Also, the need for engaging workplaces and agile teams is on the rise. HR practitioners are actively looking for an agile HR function, which brings a different set of opportunities for the leaders along with the stakeholder expectations. Organizations can capitalize on this new paradigm by orchestrating a highly cohesive HR function to drive greater level of employee engagement while leveraging potential across the enterprise. CHROMA™ is TCS’ Talent 4.0 solution helping enterprises to rapidly adopt HR best practices, foster collaboration, and effectively nurture talent with intelligent hiring, seamless on-boarding, comprehensive benefits covering diverse needs, simplified and mobile native features such as leave, attendance, and claims management, agile and cohesive social collaboration, flexible compensation, etc. -
24
TCS Intelligent Urban Exchange
Tata Consultancy Services
As urbanization continues at an unprecedented rate, planners and administrators are find it increasingly difficult to provide intelligent, safe, and sustainable cities and work environments to the occupants. The challenge before them is to achieve more viable and modernized urban living conditions and workplaces with limited resources. For this, city leaders need to leverage data from multiple Smart City 1.0 sources to provide services that promote sustainable living and economic development. Designed to accelerate the implementation of smart IoT initiatives in a cost-effective manner, the TCS Intelligent Urban Exchange™ (IUX) IoT Analytics for Smart Cities and Businesses is a modular, insight-centric platform that provides smart software solutions to address the challenges of a modern-day city. This cloud platform leverages data from multiple domains, systems, and IoT devices and runs advanced analytics that support real-time decision-making. -
25
TCS ADD
Tata Consultancy Services
TCS ADD platform accelerates speed-to-market for pharmaceutical industry across the entire clinical R&D value chain and helps make clinical trials more agile and safe. TCS ADD enables digital ecosystems, simplifies data complexity and provides faster access to new and effective drugs for the patients. The platform is powered by cognitive artificial intelligence engine called TCS Decision FabricTM, smart analytics and IoT that provides superior business value to pharmaceutical industry. A next-generation and end-to-end metadata-driven solution to manage industry & sponsor clinical standards. A data science-driven platform that leverages AI & ML technologies to enable quicker decisions, faster study start-up and targeted interventions. A solution that digitizes the entire clinical trial supply management process while putting the patient in the center, increasing patient’s safety and overall efficacy. -
26
ArcGIS Indoors
esri
ArcGIS Indoors is a complete indoor mapping system for smart building management. It organizes computer-aided design (CAD), building information modeling (BIM), site scans, and operational datasets into floor-aware indoor maps to support facilities, workplace operations, maintenance applications, and various use cases. Executives, supervisors, mobile staff, and employees can better understand, maintain, and operate workplace environments with ArcGIS Indoors. Support facilities, workplace operations, and maintenance workflows across your organization with indoor maps and apps. ArcGIS Indoors gives organizations the ability to properly define, allocate, and assign space to better support workplace operations, communication, and productivity. Organizations need the ability to coordinate the use of common spaces such as meeting rooms, collaboration spaces, or shared work spaces like office hotels. -
27
Optiv Managed XDR
Optiv
Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach. -
28
Pica8 AmpCon
Pica8
Enterprise campus, distributed sites, and data center networks are replacing thousands of Cisco Catalyst switches with PicOS Software Switches on hardware provided by Dell and Edgecore. Through a single GUI, Pica8’s AmpCon™ Network Controller centrally manages and automates switch deployments as an alternative to Cisco DNA Center. Customers secure an increase in freedom and reduction in expense that every C-level executive will appreciate. Pica8’s AmpCon is a network controller that manages the lifecycle of any number of open network switches in enterprise campus and branch/retail office access networks. AmpCon comprises a set of server-based tools that enable enterprises to remotely install, configure and provision hundreds, or thousands, of PicOS Software, Switches deployed on white box switch hardware. It is the first network controller that leverages both advanced proprietary and open technology allowing network operators to run their networking software with full visibility. -
29
Cybraics
Cybraics
Stop chasing alerts and prevent incidents before they happen with the world's leading XDR platform that revolutionizes threat detection, log management, and response. Close the gaps and free your team with our silo-breaking, enterprise-class industry-leading XDR platform that covers compliance and simplifies security operations. Cybraics nLighten™ isn't just another security tool. Born out of AI and machine learning research with the U.S. Department of Defense, it's the catalyst to unlock actionable intelligence from the scattered and siloed data, logs, and alerts across multiple security tools in your network. And with Cybraics, powerful threat detection doesn't need to come at a premium. Powered by Adaptive Analytic Detection (AAD) and Persistent Behavior Tracing (PBT). Maximize security team efficacy with 96% automated actionable case creation and a 95% reduction in false positives. Reduce detection and response time from months to minutes. -
30
Inpixon
Inpixon
The power of a dynamic mobile app platform, mapping, location, and actionable intelligence for smart campuses, omnichannel events, and asset tracking. Inpixon’s comprehensive Indoor intelligence platform provides organizations with the tools to ingest, interpret, and integrate data with indoor maps. With a range of dynamic, scalable solutions encompassing indoor mapping, analytics, security, and indoor positioning, our technology empowers you to create impactful tailored solutions across your organization. Start harnessing the power of your indoor data today with Inpixon. Transform your workplace into a smart, innovative, and connected space with a comprehensive mobile app platform. Focused on creating exceptional customer and employee experiences, this SaaS platform provides management, streamlined engagement touchpoints, and pre-built integrations for companies' events, meetings, digital communications, and campus experiences. -
31
LogMan.io
TeskaLabs
TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. LogMan.io ensures regulatory compliance with legislation covering cyber security and GDPR. Logman.io can grow with your needs. It can be easily upgraded to TeskaLabs SIEM. You can promptly get a central essential overview of the entire IT infrastructure, a full-scale tool for threat modeling, risk management, and vulnerability scanning. -
32
TeskaLabs SIEM
TeskaLabs
A state-of-the-art tool for security information and event management. A security surveillance tool that allows you to automatically monitor, correlate, and evaluate security events and create reports in real-time. TeskaLabs SIEM will bring a central overview of the entire company infrastructure and early detection helps eliminate risks and their possible effects on the operation of your company. TeskaLabs SIEM will always be one step ahead of potential threats and you will gain absolute supervision. TeskaLabs is a cybersecurity expert and therefore all our products meet the security standards of your company. TeskaLabs SIEM ensures regulatory compliance with legislation covering Cyber Security, GDPR, and ISO 27001:2013. Automated real-time detection and reporting of known incidents and anomalies will allow you to quickly react and prioritize the solution to individual incidents. Time savings allow you to proactively search for potential threats. -
33
VirtualArmour
VirtualArmour
We’re here to help you navigate your cybersecurity journey. Since 2001, we’ve ensured a strong cybersecurity posture for every client through threat resolution and security recommendations in the pursuit of zero cyber risk. When people, processes, and technology work together, we can better protect our digital way of life. Resolve and remediate cybersecurity threats through full-cycle management. Actionable intelligence provides valuable insight for improving your cybersecurity posture. A single platform to unify your entire security stack. Detection, investigation, and resolution of your security alerts. Team of cybersecurity experts that bolster your existing security team or supplement light IT staff. Support and monitoring of your firewall and overall security. Prevention and visibility to protect you from a breach. Evaluation of your infrastructure for vulnerabilities and security gaps. -
34
SecHard
SecHard
SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities. -
35
Ednetics
Ednetics
Education and government are the cornerstones of community services. Through them, we believe technology has the largest potential to help the most people. Public institutions don’t always have the resources to use technology to its full extent. We are here to address this and help our communities succeed. We can assist at any step in your technology lifecycle. Our service portfolio, like our solutions, has evolved over time to better fit the needs of our customers. We offer end-to-end services from consulting to configuration to fully managed services. Whatever your need, the Ednetics team has you covered. We understand the challenges that you face when it comes to technology procurement that’s why we offer state purchasing contracts that have been thoroughly vetted by state purchasing agencies and consortia. We have partnered with leading manufacturers to bring industry innovations to your organization. -
36
Microsoft R Open
Microsoft
Microsoft continues its commitment and development in R, not only in the latest Machine Learning Server release, but also in the newest Microsoft R Client and Microsoft R Open releases. You can also find R and Python support in SQL Server Machine Learning Services on Windows and Linux, and R support in Azure SQL Database. R components are backwards compatible. You should be able to run existing R script on newer versions, with the exception of dependencies on packages or platforms that are no longer supported, or known issues that require a workaround or code change. Microsoft R Open is the enhanced distribution of R from Microsoft Corporation. The current release, Microsoft R Open 4.0.2, is based the statistical language R-4.0.2 and includes additional capabilities for improved performance, reproducibility and platform support. Compatibility with all packages, scripts and applications that work with R-4.0.2. -
37
Censornet MFA
Censornet
Secure access to a wide range of systems, services and applications using an adaptive, cloud-based multi-factor authentication solution. Protect user accounts with more than just a password and reduce the impact of password reuse when the next large scale data breach happens. 100% cloud-based back end, simplifies implementation and accelerates time to value for organisations of all sizes. Adaptive multi-factor authentication delivers a friction-less user experience, intelligently challenging users only when risk is high. Out-of-the-box support for a wide range of systems, services and applications including all major VPN vendors and cloud applications. Passwords are not enough. Multi-Factor Authentication adds an additional layer of protection to user and privileged accounts, eliminating account compromise and identity related threats. Some OTPs sent by legacy solutions are susceptible to interception and vulnerable to phishing and MITM attacks. -
38
Coeo
COEO Solutions
PBX, or private branch exchange, is the private telephone network used by companies and organizations to keep internal and external phone communication working. It includes features like transfers, voicemail, interactive voice menus and more. With Cloud PBX services, you continue to get all the features you need and want but so much more. Increased mobility, better security, scalability that works for you now and in the future. We learn about your business needs and then create solutions to meet them. We pride ourselves on being the most transparent, service-driven connectivity provider in the industry. New technologies facilitate voice communications over the Internet, all at reduced costs and with enhanced reliability and scalability. We’ll assist you in moving forward with the newest technology or from legacy or outdated systems. Bridging business connectivity and customer service, Coeo ensures seamless, high-quality connectivity with industry-leading security levels.
- Previous
- You're on page 1
- Next