IT and Security, Cloud Services
Thanks for visiting this demo page for IT and security, cloud services, which are provided over the internet via private cloud or third-party suppliers. These services range from software and infrastructure (i.e., servers) to hosting and platforms (i.e., operating systems). For a sponsored, demo of how they can benefit you, simply click on a vendor card below.
Reduce Risk and Manage Salesforce Security with Clicks, Not Code
FairWarning user activity monitoring interprets Salesforce log files, providing greater visibility into user behavior to support a robust security posture. Save time, simplify compliance, and reduce risk with one-click investigating and reporting, automated alerts, and business-friendly insights that don’t require a data scientist to leverage.
Security Awareness Training for Employees
This information security training includes the main principles of data and information security. In this 60 minute e-learning your employees slip into the role of a hacker and are trained in an entertaining and interactive way. During this online training they recognize the most important cyber attack methods and learn how to react accordingly.
Next Gen Security Services: Global Protection and Cost-Effective
You can’t have privacy without security. Kuma brings qualified experts to address your security needs at rates that work for you. Our services: Virtual CISO Services · Risk Assessments (NIST, HITRUST, PCI, ISO, SOC) · Continuous Monitoring Program · Training and Awareness Programs
Encryption for OneDrive, Dropbox, Google Drive, and more
With Boxcryptor's end-to-end encryption you can protect your sensitive data on more than 30 cloud providers, as well as NAS systems and local data. It allows secure collaboration on files while being compliant with privacy regulations. Thanks to zero knowledge encryption, all company data is securely protected from third-party access.
Automated NIST Cybersecurity Framework Reporting Tool
MatureMetrics: Leverages the NIST CSF for simplicity. Focuses on risk posture and maturity. Leverages ‘boot strapped’ deployment approaches to minimize cost. No additional licenses required. Uses APIs to ingest data and make metrics truly unbiased. Employs KPIs that measure effectiveness in cybersecurity posture across people, process, technology.
Get your company featured in the Demo Center by contacting email@example.com.