Page 69 - Top Business Apps - Luxembourg
Submit New App
3D Issue
3dissue.com
Create mobile-centric, digital publications with 3D Issue's content experience platforms. Whether you: * Choose tried-and-trusted Flipbooks * Supercharge your content strategy with all-new Experios * Or outsource to its Design Studio Services There's a solution for everyone. Whether it’s a book or a brochure, a technical manual or an annual report, our software helps you get the job done. 3D Issue was founded in 2006 with the aim of developing software to assist marketers in distributing their content online. 3D Issue’s flagship product, its digital publishing software suite, was released in 2007 as a cross platform desktop software tool that allowed print publishers to convert press ready PDFs into interactive page turning e-Replication editions. The types of publications produced using the core software include online magazines, eBooks, digital brochures, retail catalogues, reports, whitepapers, marketing flipbooks etc. 3D Issue also provide a native app solution (3D Issue® Native App Solution) that allows you to publish and market your own branded apps for iPhone, iPad, Android smartphone and Android tablet devices. In 2010, as the necessity of tablet and mobile content marketing strategies grew, 3D Issue released a content aggregator called ‘3D Issue Hubs’ (originally called PressJack). 3D Issue Hubs is an online SaaS platform that allows publishers to centralize their online marketing collateral (from multiple online web pages, feeds, CMS systems and social platforms such as Twitter, Facebook, LinkedIn and SlideShare) into one easy to manage & share location – a content hub that can be viewed on any device.
PageTurnPro
pageturnpro.com
PageTurnPro is an online, automated digital publishing platform that transforms static PDF files into dynamic and user-friendly presentations that engage a reader. Unlike traditional printed publications and other collateral marketing materials, a user can create a PageTurnPro digital publication online in just a few minutes and add deeper, more meaningful dimensions to it. The process is simple: upload a PDF, configure the desired features for the digital publication, and then convert! Anything used to communicate with an audience can be converted with PageTurnPro, such as newsletters, catalogs, magazines, advertising flyers, brochures, and annual reports, just to name a few. A digital publication is a hosted solution, which means there is nothing a user needs to do to their existing website to integrate a PageTurnPro digital publication. There is no software to buy and install. All that is needed is to simply paste a link on a website, email, or newsletter campaign, and they're ready to go. Best of all, there's no need to worry about readers needing to download any third-party software or plug-ins to view the digital publications. A PageTurnPro digital publication is much lighter and more flexible than downloading a heavy, clunky, static PDF file. This makes the publication materials and the brand more interesting to use and read. The individual at PageTurnPro is always striving to improve upon the foundational elements and introduce new, useful features that a customer can use to improve their bottom line. It's the customer who drives the evolution of PageTurnPro.
Enhanc
enhanc.com
Enhanc is a Digital Publishing Platform just for you. Designed to make your content and you look good to your audience. Ideal for marketers, publishers and designers to create, edit and publish content online. Make the transition from print and PDF-based formats to responsive, mobile-friendly reading experiences that you can easily share with your audience. Its quick. Its easy. Its efficient and modern. Capture leads. Monetize your content by including ads. Add content security and links. Monitor and measure the performance of your content. Embed your content in your website. The possibilities are endless. Content owners, publishers and business owners from across the world are using Enhanc to create online magazines, newsletters, catalogs, brochures, annual reports, and more. It’s the easiest way to enhance your online presence, and it only takes a few minutes!
Brightside AI
brside.com
We’re Brightside AI - A Swiss cybersecurity company that helps businesses protect themselves from personalized AI attacks and make employees aware of real-life threats that are applicable to them personally.
Guardey
guardey.com
Guardey offers security awareness training based on gamification. In a team where 95% of all data leaks are caused by human error, you need a platform that turns your employees into a human firewall. Here’s what separates Guardey from the pack: - Weekly challenges that take 3 minutes to complete and are actually engaging. - A leaderboard that shows users how they are performing compared to their colleagues. - A learning management system that enables admins to set up their own challenges. Customers with businesses of all sizes can use Guardey to improve the security awareness among their employees.
Jericho Security
jerichosecurity.com
Jericho Security uses AI to fight AI in the new frontier of cybersecurity. By simulating hyper-personalized attacks, Jericho trains employees to recognize and respond to new AI threats, resulting in increased testing efficiency, reduced costs, and fewer security incidents. Jericho trains employees to recognize and respond to new AI threats by simulating hyper-personalized attacks, resulting in increased testing efficiency, reduced costs, and fewer security incidents. Our approach to training involves: >Test: Replicate real-life phishing simulations with our AI-powered email generator > Monitor: Report on how your organization is performing in granular detail > Train: Leverage AI-powered training that drives behavioral change Jericho learns from its attack simulation and adapts to test your organization and continuously detect generative attacks. At Jericho Security, we believe that effective cybersecurity training must go beyond simply imparting knowledge—it must foster a culture of security awareness and preparedness. To achieve this, we've developed a unique approach that sets us apart from traditional training vendors: >Generative AI-Powered Content: Our advanced AI technology enables us to create customized, up-to-date training modules and phishing simulations that address the latest threats and industry trends. This ensures employees are always prepared for the most current cyber risks. >Customized Training Solutions: We recognize that every organization has unique needs and vulnerabilities. That's why we tailor our training content to address your organization's specific risks and requirements, ensuring maximum relevance and effectiveness. >Engaging Microlearning Format: Our training modules are designed in a short, digestible format that minimizes workflow disruptions and enhances retention of key concepts. >Dual reporting features: Generate reports in our Web-based app or your Learning Management System (LMS) to provide valuable data on employee participation, quiz scores, and more, enabling you to monitor the effectiveness of your training program. >Seamless Import Integration: Jericho's solutions integrate with your existing tools, including SCIM-enabled directories (Microsoft and Okta) and OAUTH-enabled API integration (Google Workspace). Integrations can also be customized to work with any directory. >Expert-created training: Certified Cybersecurity and Instructional Design experts develop engaging, up-to-date content that addresses emerging threats and best practices. >One-Click Phishing Reporting: Empower employees to report phishing attempts with just one click, allowing for rapid response and mitigation of potential threats. >Regulatory Compliance: Our training programs meet and exceed industry standards and guidelines, helping your organization maintain compliance and demonstrate due diligence in safeguarding sensitive data.
Moxso
moxso.com
Moxso is an advanced phishing simulation and training platform. In collaboration with leading security experts, we have developed the next generation security awareness tool. We help organizations reduce the increasing cyber threat by making employees their strongest defence.
Hadrian
hadrian.io
Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive data sources, active scanning techniques, and machine learning models, Hadrian identifies digital assets and complex attack paths that security teams are unaware of. It incorporates how misconfigurations, exposed secrets, permissions, and vulnerabilities impact an organization’s security posture. Context-aware testing uses only relevant modules and secrets in attack paths. This combination of context and risk discovery allows Hadrian to prioritize the same targets attackers will exploit. All of this is presented in an online dashboard to help security teams focus on what matters and make their attack surface more secure.
Hackuity
hackuity.io
Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enriches them so security practitioners can, at last, create risk-driven remediation plans and align their priorities with their current and future exposure to threats. Fully customizable, the platform fits the client technical context and security requirements either in a full-Saas mode, On-premise or Hybrid installation mode. Hackuity proposes the right offer regarding the company's experience in vulnerability management and field of activity : - Risk-based vulnerability management - Continuous Monitoring - Augmented pentest - Hackuity for MSSP The company was founded in 2018 and is based in Lyon, France.
PlexTrac
plextrac.com
We designed the PlexTrac solution to address the workflow pain points security practitioners face. PlexTrac helps them track signal through the noise and break down communication silos. Combining “plexus” and “track,” our name really says it all. PlexTrac exists to network and coordinate all people and parts of a security program and to better track progress toward maturity.
Bitahoy
bitahoy.com
Augment your daily IT risk management processes with an AI-powered IT risk analyst that helps you prioritize, investigate and report risk-scenarios.
Derive
deriverisk.com
For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigate risk, Derive is a a SaaS subscription-based platform that quantifies the potential financial impact of cyber threats using proprietary data on cyber loss magnitudes, frequencies, control costs, and control effectiveness delivering a high resolution characterization of what risks they face and how they could address them. Unlike competitors Derive translates abstract cybersecurity concerns into concrete, actionable insights with financial clarity.
Shield
shieldcyber.io
Shield is a continuous exposure management platform built by penetration testers and developed for security service providers. In a simple, 3-step deployment, Shield instantly shows you how an attacker could breach and take over your specific network. And tells you exactly what you need to do to remove those exposures. Shield is different from existing vulnerability management solutions in that it correlates your external attack surface, internal networks, and identity services to deliver hyper-efficient remediation guidance based on the severity and impact to a specific network. This enables security service providers to stop wasting time on fixes that don't matter, and remove the highest impact risks first. In other words, Shield distinguishes the critical few risks from the trivial many. What more could you accomplish if you could direct 2% of your efforts to reduce 98% of risk?
Tenacy
tenacy.io
Tenacy is the SaaS platform that simplifies cybersecurity management for all IT security teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. As a result, you can continuously measure your level of security, effectively monitor your operations, and unite all stakeholders around your cyber vision.
ZeroFox
zerofox.com
ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented visibility and control across social media and the surface, deep and dark webs. We combine market-leading solutions - external attack surface management, digital risk protection, cyber threat intelligence, adversary disruption and incident and breach response - into a single platform experience backed by an elite global managed services team. ZeroFox customers benefit from complete protection over hundreds of vulnerable external assets including domains, social platforms, executives, forums, job posting sites, mobile apps, BINs, marketplaces, intellectual property, physical locations, code repositories, third-parties and more. In addition, our team of SOC analysts, embedded dark web personas and threat intelligence experts regularly provide curated findings and a steady stream of relevant threat reports packed with important context, analysis and recommendations. ZeroFox also disrupts and takes down threats at scale by removing offending content, dismantling of attacker infrastructure, managing takedowns of malicious domains and social profiles in house, and executing UDRP filings. ZeroFox is trusted by 4 of the Fortune 10 and hundreds of the Global 2000 across all industries and geographic locations. We are regularly ranked as leaders in brand protection and threat intelligence by prominent analyst firms including Gartner, Forrester, Frost & Sullivan and Quadrant Knowledge Solutions.
Panorays
panorays.com
Panorays is a leading provider of third-party cyber risk management solutions, helping businesses optimize their defenses for each unique third-party relationship. Trusted by the most complex supply chains in the world, Panorays provides businesses the tools to stay ahead of any emerging third-party threats and provides actionable remediations.
Riskify
riskify.net
Access detailed non-financial risk reports to identify, monitor, and understand capital markets, operational, reputational, cybersecurity, employees, compliance, and ESG risks. in any company. Empower your decision-making with Riskify reliable data.
Apomatix
apomatix.com
Charity professionals arguably face more challenges than ever before. Risk management is now of critical importance and failings in a charity’s risk management regime can have severe consequences. But the increase in workload has not necessarily led to a change in methodology. The old-fashioned way of conducting risk assessments - using spreadsheet templates – is still the norm. Apomatix’s Risk Management Software is designed to modernize risk management. Built by risk management experts with over 90 years of experience, our aim is to make risk management simpler and less disruptive. Our cloud-hosted risk management platform has features to help you easily plan and conduct your risk assessments. We also have tools to automate the reporting process, saving you from having to manually build these in your spreadsheet. Together, these features help save time, reduce the burden of managing your risk register and improve the quality of your risk assessments.
Workscope
workscope.com
Workscope believe that knowledge encoded on the desktop carries value and risk which organisations must understand the significance of. Workscope provides an automated platform that enables organisations to map, monitor and improve the spreadsheet and end-user computing environment. Powered by edge-computing, Workscope provides a real-time contextual view of the entire spreadsheet environment, which enables you to understand how these assets are supporting critical business processes and key decision making. Whether you need to demonstrate operational resilience to the regulators, or you need to understand the time, cost & materiality associated with manual spreadsheet processes - Workscope can answer these questions without any manual intervention or change to existing business processes.
HyperComply
hypercomply.com
HyperComply is the fastest and most accurate way to send and respond to security questionnaires. Procurement teams can send and track questionnaires for free and sales teams can respond to questionnaires in 1 day, guaranteed.
Bizhows
bizhows.com
BizHows is an easy and convenient online printing service - design and create hundreds of business items for free. It offers a wealth of resources, tools, and information that cover various aspects of business development, including marketing strategies, financial planning, and operational management.
Vendict
vendict.com
Vendict combines cutting-edge AI technologies with industry-leading expertise to provide a simple yet powerful automated security compliance solution that ensures high response rates and unmatched accuracy. With our custom-built Generative AI solution, Vendict empowers security teams to reduce risk, accelerate the sales cycle, and gain a competitive advantage by efficiently and accurately managing security questionnaires and third-party risk management at scale in a matter of hours, instead of weeks. Vendict has established a reputation as a leader in providing security questionnaire solutions to organizations worldwide. By partnering with Vendict, organizations can experience firsthand how our custom-built Generative AI solution can help them reduce compliance friction, enhance efficiency, and turn the speed of solving security questionnaires into a competitive advantage in their respective markets.
WorkAsPro Talent
workaspro.com
Join the top Web3 job board! Access 20,000+ blockchain jobs at 3,000+ startups, connecting talent with opportunities in Bitcoin, Ethereum, and more.
CyberVadis
cybervadis.com
Mitigate third-party cyber risks. With confidence. CyberVadis is a trusted solution for mitigating third-party cyber risks. We combine the speed of automation with the reliability of a team of information security experts, providing evidence-based assessments. Our comprehensive, scalable and managed solution enables you to effectively reduce risks across your entire supply chain. - Manage all third parties on a single platform - Collect and monitor automated risk insights - Have all critical suppliers assessed by analysts based on evidence - Drive improvements & share recommendations.
Ubiscore
ubiscore.com
Ubiscore is a leading provider of privacy ratings and privacy analytics for businesses. The company's mission is to help organizations of all sizes achieve their full potential by providing them with the tools and insights they need to understand and improve their privacy practices.
Web3 AdNetwork
web3adnetwork.com
Web3 AdNetwork offers a range of performance-based advertising models, including CPA (Cost Per Action), CPI (Cost Per Install), CPC (Cost Per Click), and more. The platform also supports SMS and email marketing campaigns, providing flexible and effective solutions to help brands engage their target audience and optimize ad spend. Whether you're driving app installs, generating leads, or boosting conversions, Web3 AdNetwork ensures measurable results across multiple channels. * CPA campaigns can provide instant visibility for your brand, products, or services * With CPC, you only pay when someone clicks on your ad, and with CPM, you pay for impressions. * Allow you to precisely target your audience based on demographics, interests, behavior, location, and more.
Trustle
trustle.com
Trustle helps front-line teams get their permissioning under control, so they can get back to the jobs they’re hired to do. Trustle makes it easy for developers and ops teams to go in and and out of access to cloud systems like AWS, which cuts out hassles, time, and headaches, while making the whole cloud environment safer and more secure.
BlackFog
blackfog.com
Founded in 2015, BlackFog is a global cybersecurity company that has pioneered on-device anti data exfiltration (ADX) technology to protect companies from global security threats such as ransomware, spyware, malware, phishing, unauthorized data collection and profiling. Our ADX technology blocks threats across mobile and desktop endpoints, protecting organizations’ data and privacy, and strengthening regulatory compliance. BlackFog’s preventative approach to security recognizes the limitations of existing perimeter defense techniques and neutralizes attacks before they happen at multiple points in their lifecycle. Trusted by corporations all over the world BlackFog is redefining modern cyber security practices. There are both enterprise and personal protection versions of our software. BlackFog’s Anti Data Exfiltration (ADX) technology filters network traffic in real time and operates on layer 3 of the OSI stack. Using advanced AI based algorithms it can stop cyberattacks and prevent the exfiltration of data from a device, protecting trade secrets, personally identifiable information (PII), data theft and extortion. ADX technology automatically stops data leaving the device, without the need for human intervention. It also stops: - Communications with C2 servers - Lateral movement - Insider threats - Exfiltration to restricted countries - Data breaches - Over 99% of all ransomware BlackFog provides multiple layers of protection across all of your devices and all platforms. The platform provides complete management of all devices in the Cloud with a single agent install on each device. BlackFog is fully orchestrated by design, with no management overhead, no complex setup and operates 24/7 and requires less than 1% CPU overhead. In the interactive Enterprise console organizations can view all blocked events and activity across all devices in real time. With BlackFog’s “set it and forget it” approach, organizations do not need dedicated members of staff to monitor and respond to incoming cyberthreats. Our Virtual CISO (vCISO) offering provides all of the expertise without the hassle and expense of recruiting a full time CISO. We provide: • Access to our threat intelligence experts when you need them* • Protection from cyberattacks including ransomware thanks to our Anti Data Exfiltration (ADX) technology • A custom branded Enterprise console managed by our team of experts. • Detailed custom reporting for compliance and auditing.
Descope
descope.com
Reduce user friction, prevent account takeover, and get a 360° view of your customer identities with the Descope CIAM platform. Use visual workflows, SDKs, and APIs to create and customize the entire user journey for your external applications.
Corebook
corebook.io
An online brand guidelines platform for branding in-house teams and their partners. Corebook is an online brand guidelines platform designed to help branding teams maintain and develop their brand identity effectively. It provides a flexible and user-friendly environment for creating, sharing, and managing digital brand guidelines.
Cerby
cerby.com
Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on and lifecycle management capabilities. With Cerby, identity teams can extend access, minimize risk, and lower costs.
Mocky AI
mocky.ai
Revolutionizing E-commerce with AI Fashion Models and Products Mocky quickly and easily creates high-quality product photos with AI technology. Users can get professional quality photos by changing the background of the product photos they upload.
Ory
ory.sh
Ory Network is a global, high availability and low latency user identity & access management network that protects identities and other first party data. It offers cloud-native, end-to-end services dedicated to securing and managing user authentication, authorisation and API protection for humans, robots, devices, and software across various internet services. State-of-the-art solutions for access security include passkeys, passwordless login, social login, second factor authentication, multi factor authentication and hardware tokens. Ory Network helps its customers use zero-trust security across their stack including data protection, compliance and risk management. It delivers information security using advanced AI analytics for any data created by system access including authentication, authorisation and API traffic. Ory is an open source organization welcoming collaboration and contributions to its leading products from an active global community. With more than 30,000 community members and over 250 GitHub repositories, Ory maintains the world’s leading open-source identity management, authentication and authorization ecosystem and community. Ory Network builds on this knowledge and experience.
SSOJet
ssojet.com
SSOJet is an all-in-one solution for user management for your B2B SaaS that reduces onboarding time, makes it easy for new team members to get up and running. Simple integration, less code, and no headaches.
OTPLESS
otpless.com
OTPLESS stands at the forefront of identity and access management innovation, transforming digital authentication with a user-centric approach. Designed for businesses that prioritize both user engagement and ironclad security, OTPLESS offers a frictionless sign-in experience for any application or website, setting new standards in ease of use and protection. With advanced security protocols at its core, OTPLESS streamlines identity verification, requiring minimal user input to ensure swift, secure access. By moving beyond traditional methods such as passwords and OTPs, we not only expedite the login process but also significantly boost user satisfaction. Our platform supports an extensive range of modern authentication channels—over 20, including WhatsApp, Line, Viber, Facebook, and Google—coupled with robust features like multifactor authentication, session and user management, adaptive authentication, and step-up authentication. OTPLESS's versatility is unmatched, offering effortless integration through an extensive SDK that caters to all major platforms. This universal compatibility makes OTPLESS the go-to solution for a wide array of businesses, from bustling eCommerce sites to comprehensive enterprise systems, looking to streamline authentication, reduce abandonment, and fortify against security risks without burdening users. Moreover, OTPLESS enhances operational control with advanced session and user management capabilities, providing businesses with detailed oversight of user interactions and security policies. Opting for OTPLESS means elevating the login experience to unparalleled heights, fostering customer loyalty and trust with simplicity and security at the forefront.
Smile ID
usesmileid.com
Smile ID provides the best Africa-focused solutions for real-time Digital KYC, Identity Verification, User Onboarding, Document Verification, Liveness Checks, Face Verification, Anti-fraud, Know your Business (KYB), and Identity Data Deduplication across Africa. We are building the tools and software that make it easier for millions of Africans to prove and verify their identity online. Our platform includes SDKs and APIs for User Onboarding, Digital KYC, Identity Verification, Document Verification, Face Verification, Anti-fraud, and ID validation in mobile applications and on the web. Our identity verification and artificial intelligence tools have been specially designed for African faces and identities. Our mission is to make the benefits of a modern digital lifestyle universally accessible by expanding trust in underserved markets. We are backed by Costanoa Ventures, Future Africa, PTB Ventures, Khosla Impact, 500 Startups, CRE Venture Capital etc Subscribe to Identity Illustrated - A newsletter by Smile ID enabling African business leaders to understand the continent's complex ID, regulatory and fraud landscape one illustration at a time - https://identityillustrated.com/
WhatsAuth
whatsauth.com
WhatAuth is an innovative OTP (One-Time Password) solution designed to offer businesses a more secure and cost-effective alternative to traditional SMS OTP systems. Leveraging the power of WhatsApp, WhatAuth provides a comprehensive solution for various authentication use cases, such as second-factor authentication, login/onboarding, password recovery, phone verification, and transaction authorization. Enhanced Security: By utilizing the end-to-end encryption and secure data transmission capabilities of WhatsApp, WhatAuth significantly reduces the risk of interception and unauthorized access to sensitive information. This ensures that users can perform transactions and access their accounts with increased confidence and peace of mind. The flow of the authentication is also a new paradigm, originating from the user and traveling one-way from the user to the auth service, meaning that it reduces the phishing and fraudulent means to intercept the code Cost-effectiveness: WhatAuth stands out by providing a cost-effective solution for businesses. By leveraging the existing infrastructure of WhatsApp, organizations can seamlessly integrate WhatAuth without the need for additional infrastructure investments. This approach eliminates the high costs often associated with SMS-based OTP solutions, making it an attractive option for businesses of all sizes. Seamless User Experience: WhatAuth prioritizes user experience, offering a frictionless authentication process. Leveraging the familiar interface of WhatsApp, users can effortlessly receive OTPs and complete the authentication process without the need for complex code entry or additional downloads. This streamlined experience improves conversion rates and ensures a positive user journey. Versatility and Reliability: WhatAuth caters to a wide range of OTP use cases, making it a versatile solution for businesses across industries. Whether it's securing transactions, verifying user identities, or facilitating password recovery, WhatAuth handles these scenarios effectively. This consolidation of multiple OTP use cases simplifies authentication processes and ensures reliability for businesses and their users. Conclusion: WhatAuth presents itself as a secure and cost-effective OTP solution that surpasses the limitations of SMS OTP. By leveraging the power of WhatsApp, businesses can enhance security, reduce costs, and provide users with a seamless authentication experience. Whether for second-factor authentication, login/onboarding, password recovery, phone verification, or transaction authorization, WhatAuth is a versatile solution that prioritizes user satisfaction and data protection.
Synaps
synaps.io
Effortlessly onboard your users while staying compliant with regulations. Synaps supports you throughout your entire project according to your identification needs. Our KYC (Know Your Customer) solution is the ultimate tool for businesses seeking to streamline customer onboarding while ensuring compliance with regulatory requirements. With advanced ID verification and authentication technologies, our solution makes it easy to verify the identities of customers and prevent identity fraud. Plus, our highly customizable solution integrates seamlessly with existing systems, providing a frictionless customer experience while safeguarding sensitive customer data. Trust us to help you onboard customers quickly, securely, and with ease.
Backbone
backboneiq.com
Backbone is the world's first supply mesh software providing supply chain solutions for an interconnected world.
Behold
behold.so
Add user and hashtag galleries to your website using a flexible embedded widget or hassle-free JSON API. Behold is a user-friendly platform designed to help individuals and businesses seamlessly integrate Instagram feeds into their websites. With a focus on elegance and ease of use, Behold provides a flexible embedded widget and a hassle-free JSON API for showcasing user and hashtag galleries.
DigiCert
digicert.com
DigiCert is the leading TLS/SSL Certificate Authority specializing in digital trust for the real world through PKI, IoT, DNS, Document & Software security solutions.
Руцентр
nic.ru
Rucenter is the largest domain registrar for business in Russia: security and protection of online assets, data storage in the Russian Federation and ensuring the reliability of projects taking into account the individual needs of corporate clients.
Futuramo
futuramo.com
Futuramo is the revolutionary cloud-based work environment. Designed with teams in mind, provides powerful tools to work creatively and productively. Lets you get the most of your working hours and displace distractors. Futuramo offers a suite of work management tools for teams working on digital projects. Foster collaboration between teams, clients and businesses. Great for teams of all sizes, the platform offers business apps such as Visual Tickets, Time Tracker, and Tasks. Together, the apps work as a complete suite of project management tools that help teams collaborate more effectively.
ConductorOne
conductorone.com
ConductorOne helps organizations secure their workforce identities through modern access controls and governance. Security and IT teams use ConductorOne to automate user access reviews, identify and remove unused access, and save time with self-service access requests. Forward-thinking companies like DigitalOcean, Ramp Financial, Loom, and Baron Funds trust us to achieve least privilege and ensure compliance.
Curity
curity.io
Curity is a leading provider of IAM and API security technology that enables user authentication and authorization for a wide range of digital services. The Curity Identity Server is highly scalable, handles the complexities of the leading identity standards, making them easier to use, customize and deploy. Today, the Curity Identity Server is the most complete OAuth and OpenID Connect server, and we enjoy the trust of large organizations in most industries, including financial services, telecom, retail, gaming, energy, and government services across many countries.
Ezto Auth
eztoauth.com
Ezto auth is a cloud-based Workforce identity and access management (IAM) platform that provides secure access to various applications and services for employees, contractors, partners, and customers. The platform offers a range of features to manage user identities, including authentication, authorization, and user administration, across a wide variety of devices and applications. ezto auth enables organizations to secure access to their resources with a single sign-on (SSO) experience. Users can log in to the ezto auth portal once, and then access all of their authorized applications and services without having to enter their credentials again. ezto auth supports SSO for thousands of cloud-based and on-premises applications, including Salesforce, Office 365, and Google Workspace. ezto auth also provides multi-factor authentication (MFA) capabilities to further enhance the security of user identities. This feature requires users to provide additional authentication factors, such as a biometric identifier, a mobile app, or a hardware token, in addition to their password. In addition to identity management and authentication, ezto auth also offers features for user provisioning, group management, and access control. This enables organizations to centrally manage user access to applications and services and enforce security policies. Overall, ezto auth is a comprehensive IAM solution that helps organizations to secure their digital environments and streamline access management for their workforce, partners, and customers.
P0 Security
p0.dev
P0 Security helps security engineers secure cloud access and entitlements for their developers. Security practitioners can use P0 to identify which cloud identities (human or machine) have privileged access. P0 automates granular, just-in-time and short-lived privileged access grants in the most developer-friendly UX possible. No more tickets or configuring static groups. Enter right-sized, just-in-time, ephemeral access.
Synk.To
synk.to
Synk.to is a cloud-first identity management platform designed to seamlessly integrate with your favorite SaaS solutions, including Google Workspace, Jira, Slack, Microsoft Entra ID, Zoom, Confluence, and more. With Synk.to, you can effortlessly synchronize users and groups across all your applications. Our platform enables you to onboard and offboard employees in minutes, conduct instant access rights reviews, and monitor SaaS license usage—all from a single interface. Synk.to simplifies identity management, making your SaaS management more efficient and secure.
Контур
kontur.ru
Kontur is a leading developer of online services for accounting and business. SAAS products from Kontur are chosen by thousands of enterprises throughout Russia for filing reports, exchanging electronic documents and maintaining accounting.
PageDNA
pagedna.com
"Web to Print That Works" Automated eCommerce solutions for web and print. PageDNA makes it easy to manage and distribute printed marketing content. Customizable storefronts give your customers an intuitive and comprehensive e-commerce experience from quote to order fulfillment. PageDNA automates, simplifies, and streamlines everything from order submission to job output. Digital Screens are taking over the world. Your customers already use digital screens to order everything else in their life - now its your turn to bring this convenience to branded, personalized products. Both you and your users will enjoy the benefits of automation.
Opal Security
opal.dev
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
Zilla Security
zillasecurity.com
Zilla Security is the leading provider of modern identity governance and administration (IGA), providing a SaaS platform that automates the processes of identity compliance, provisioning, and security. Zilla stands out for its speed to value, offering the most complete set of application integrations capabilities for both commonly used and custom applications. Zilla AI Profiles™ eliminates the tedious, nearly impossible process of creating and maintaining rules that define roles or groups. Through its automations, Zilla clients are able to deploy 5X faster, complete access reviews with 80% less effort, and enable faster provisioning with 60% fewer ITSM tickets.
StackBob
stackbob.ai
StackBob is a modern Employee Access and License Management Platform that integrates with over 300,000 apps, even without SSO. Organizations that use StackBob are securing access to all their tools, boost team productivity and also cut software and license costs. StackBob is the only IAM platform that can connect with any web app your team is using (including even your internal tools) and doesn't require upgrades to expensive enterprise plans in all your apps, nor going through a complex SAML SSO setup.
Braingineers
brainsight.app
Brainsight is an AI based predictive eye tracking product to help companies across the thresholds of consumers attention scarcity. Predictive heatmaps can be used to optimize website designs, marketing ads or videos without the need for extensive and expensive user research or panel feedback.
brand.ai
brand.ai
Brand.ai is an innovative brand management platform designed specifically for brand builders, agencies, and large organizations. It serves as a comprehensive operating system (OS) that helps bring your brand to life by streamlining collaboration and ensuring consistency across all brand touchpoints.
Authgear
authgear.com
Business success now also depends on external users such as customers, contractors, agents, and non-desk workers. Deliver frictionless digital experience to your customers and better engage with external team members with Authgear to grow your business. Authgear is an External Identity and Access Management solution that provides all authentication and user management features for businesses of any sizes to use. By integrating Authgear with your apps or websites, you can rapidly and reliably implement Passkey, 2FA, Social Login, and more Passwordless options to provide more secure and smoother user experience. Moreover, our Single Sign-on helps businesses unify the authentication experience across multiple platforms, internal and third-party applications, with simple integration. Developers and IT Support can manage user access, user sessions, analyze event logs using the Admin Portal. You can also modernize your legacy software with Authgear as it offers a plug-and-play auth solution that can connect your LDAP and Active Directory system with modern web/mobile apps. The Enterprise solution also offers Compliance supports and Private Cloud deployment options.
Drafta
drafta.app
Discover all Drafta's features: tasks, chat, spreadsheet, kanban, calendar, gantt, subtasks, descriptions, integrations, and more. Drafta is an online platform designed for collaborative design and prototyping, enabling teams to streamline their workflow and enhance productivity. It provides tools for creating, sharing, and refining design concepts in a user-friendly environment.
Veriam
getveriam.com
Veriam brings access management and subscription services together in one solution. No more switching between platforms or struggling with disconnected tools. Whether you're managing B2B access, handling subscriptions, or navigating compliance, Veriam makes everything work smoothly behind the scenes—without adding extra hassle to your day. With Veriam, you can integrate access control and subscription management with just a few lines of code. That means less time on admin and more time focusing on what really matters—growing your business. Our platform is easy to use, and your users only ever need a single login for all their products, subscriptions, and data, accessed through Veriam. Making the exchange of data secure and simple. We integrate Access and Subscription Management into a single straightforward solution that equips businesses with the tools needed to sell products and share data online. Moreover, our users require just one login to access any product, subscription, or data from organizations utilizing Veriam. Everything you need, one platform. Let your customers easily manage their profiles and subscriptions in one safe place. Our self-service features mean fewer support calls and more satisfied users who enjoy having control over their services. Plus, it’s not just another login—they can use the same credentials across multiple organizations for all products, subscriptions, and data accessed through Veriam. Veriam makes everything easier by merging access and subscriptions into a unified secure platform, optimizing operations and aiding companies in growth. With Veriam, businesses can effortlessly sell products and share data online, while users benefit from a singular login for all products and services from any Veriam-connected organization. Reliable, secure, and compliant. At Veriam, we’re dedicated to providing top-quality products with unbeatable security and compliance. We follow ISO standards to ensure everything runs smoothly and meets the highest quality marks. Your payment data is protected with PCI-DSS compliance, and we strictly follow GDPR privacy regulations, for you and your customers. With Veriam, you can trust that our solutions always meet the world’s toughest standards.
FancyAI
getfancy.ai
Ditch Your SEO Agency! AI-Powered Automated SEO That Works. Fancy AI is a complete SEO system and automation for business owners and marketing teams who want something powerful, affordable, and effective. FancyAI transforms how eCommerce businesses approach SEO by automating and optimizing their online presence. Its AI seamlessly connects with popular platforms like Shopify and WordPress, allowing you to effortlessly update existing content and generate new content directly on your website. This automation ensures that your site is always optimized for the latest search engine algorithms. In addition to on-site optimization, FancyAI helps you get found by both customers and search engines through strategic outreach to reporters and media partners. It helps by building quality backlinks and securing media coverage the right way. FancyAI enhances your site's authority and visibility, driving more organic traffic and boosting your search engine rankings.