Find products trusted by professionals in your network
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Software used to protect databases using dedicated internal security systems and programs. - Detect and eliminate suspicious activities, unauthorized access, and policy violations - Assess overall database security health and evaluate risks with real-time monitoring - Implement safety control measures in the cloud or on premise - Manage access controls and mask or encrypt sensitive data
79 results
DynaTech's Security Tool streamlines user permissions and license management within Microsoft Dynamics 365 Finance and SCM. With its robust features and intuitive interface, our tool ensures: ? License Management: Optimize user licenses with detailed reports, recommendations, and inactive user identification. ? Segregation of Duties (SOD): Prevent conflicts by identifying potential SOD issues at role and user levels. ? Access Control: Secure access by detecting designation conflicts, cross-entity conflicts, and viewing user access details. ? Audit: Ensure compliance with logs of user activities, SOD conflicts, and role assignment approvals. ? Automation & AD Integration: Automate user management with Azure Directory-based activity and deactivation. ? Delegation: Suggest appropriate users for role and workflow delegation. Technology Stack: ? Microsoft Dynamics 365 F&SCM ? Azure Directory
We provide a wide range of CCTV solutions including single and multi-camera systems, video and audio surveillance, remote monitoring, recording and intervention functionality. Through its exclusive global partnerships with industry players Margins ID Systems has access to a wide range of superior CCTV products and solutions: Types of Cameras used in our solutions include: Bullet Cameras Dome Cameras Infrared Cameras (IR) Wireless Cameras High-Resolution Cameras
Gain a unified view of cloud security posture across Oracle Cloud Infrastructure customer tenants. Oracle Cloud Guard, including the new Threat Detector, detects misconfigured resources, insecure activity across tenants, and malicious threat activities and provides security administrators with the visibility to triage and resolve cloud security issues.
Oracle Audit Vault and Database Firewall (AVDF) monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources. It can be deployed on-premises or in the Oracle Cloud. AVDF includes an enterprise quality audit data warehouse, host-based audit data collection agents, powerful reporting and analysis tools, alert framework, audit dashboard, and a multi-stage Database Firewall.
See which products are used by connections in your network and those that share similar job titles Sign in to view full insights
Security Tool for D365 CE is a powerful security and governance solution for the Power Platform, offering centralized control over apps, data, and processes. Key benefits include: ? Centralized Security Management ? Optimized Governance ? Enhanced Innovation & Efficiency Features: ? CoE Admin Command Center: Central hub for Power Platform security management. ? DLP Impact Analysis: Identifies risks on apps due to DLP policies. ? Power Platform Admin View: Tracks app ownership and user activity. ? Business Value Toolkit: Aligns app development with business goals and impact. ? Developer Compliance Center: Ensures compliance for developers. ? Cleanup Apps: Removes outdated and orphaned resources. ? Innovation Backlog: Manages and prioritizes innovations. ? ALM Accelerator: Simplifies complex deployments. ? CoE Power BI Dashboard: Provides governance insights across environments. Tech Stack: ? Microsoft Dynamics 365 CE ? Power Platform
We provide a variety of Access Control Device options including keycard, facial detection, biometric or iris scan. Our access control systems and solutions help our clients manage guests and employees by preventing unauthorised access, generating activity reports, workforce management, time and attendance.
Oracle Key Vault is a key and secrets management system that provides extreme scalability, availability, and fault-tolerance through clustering. It can be deployed on-premises on dedicated servers, as VM guests, or in your OCI tenancy from the Oracle Cloud Marketplace, or in Microsoft Azure, or Amazon AWS. It enables you to quickly deploy encryption and other security solutions by centrally managing encryption keys, Oracle Wallets, Java Keystores, credential files, private and public keys, and certificates.
At dinCloud, Security is of paramount importance. With this vision ahead of us, we have integrated Cisco’s Adaptive Security Appliance (ASA) into our cloud infrastructure. With a Cisco ASA powered Desktop as a Service (DaaS) solution, security is fully taken care of. The Adaptive Security Appliance (ASA) by Cisco combines some of the best security protocols into a well rounded single device. You can seamlessly implement a Firewall, Antivirus, Intrusion Prevention and Virtual Private Network (VPN) thru ASA. Your ability to implement these enterprise-grade security protocols from a single device reduces architectural complexity, while also delivering top-notch cyber security at the same time. This in turn makes your Virtual Desktop environment safe from cyber threats.