Ratings and Reviews 0 Ratings
Ratings and Reviews 12 Ratings
Alternatives to Consider
-
Kroll Cyber RiskWe hold the title of the leading incident response service globally, dedicated to safeguarding against cyber threats through a synthesis of comprehensive response capabilities and real-time threat insights derived from over 3000 incidents annually, complemented by our extensive expertise. Reach out to us right away through our round-the-clock cyber incident hotlines for immediate assistance. Kroll's Cyber Risk experts are equipped to address the challenges posed by current and future threats. Our protective solutions, detection, and response strategies are bolstered by frontline intelligence gathered from more than 3000 incident reports each year. Taking preemptive action to secure your organization is crucial, as the landscape of potential attacks is continually evolving and becoming more complex. Enter Kroll's Threat Lifecycle Management, which offers holistic solutions for managing cyber risk that help identify vulnerabilities, assess the strength of your defenses, enhance controls, optimize detection methods, and effectively respond to any emerging threats. The need for robust cybersecurity measures has never been more critical in today’s digital environment.
-
VUE Labor ManagementSince the mid-1990s, Velarium has been working alongside unions, launching its platform over 24 years ago with the objective of improving the management of labor union workforces through innovative technology. Our goal has been to create a comprehensive system that streamlines essential union activities such as membership management, dues collection, dispatch, grievance handling, apprenticeship tracking, and retiree administration—all integrated into a user-friendly software solution. In an age where technology plays a crucial role in union functions, VUE Labor Management provides a centralized digital platform that enables real-time access to membership information and vital data from any device, backed by secure military-grade encryption for safety. We are eager to present our cloud-based VUE Labor Management software, highlighting its capability to meet the needs of over a million labor union members today while enhancing overall operational efficiency. This innovative approach not only simplifies processes but also empowers unions to focus on their core mission of supporting their members effectively.
-
Hotspot ShieldProtect your personal data with advanced military-grade encryption while enjoying seamless access to websites and streaming platforms worldwide. Hotspot Shield guarantees that your connection is secured through its strict no-logs policy, shielding your identity and confidential information from hackers and cyber threats. With an extensive network of servers spanning over 80 countries and more than 35 cities, our innovative Hydra protocol elevates your VPN experience, offering fast and secure connections perfect for gaming, streaming, downloading, P2P sharing, and more. Relish in the reassurance that your online activities remain protected and private, enabling you to browse freely without fear. Seize control of your online presence and enhance your security today!
-
DriveLockDriveLock’s HYPERSECURE Platform aims to strengthen IT infrastructures against cyber threats effectively. Just as one would naturally secure their home, it is equally vital to ensure that business-critical data and endpoints are protected effortlessly. By leveraging cutting-edge technology alongside extensive industry knowledge, DriveLock’s security solutions provide comprehensive data protection throughout its entire lifecycle. In contrast to conventional security approaches that depend on fixing vulnerabilities after the fact, the DriveLock Zero Trust Platform takes a proactive stance by blocking unauthorized access. Through centralized policy enforcement, it guarantees that only verified users and endpoints can access crucial data and applications, consistently following the principle of never trusting and always verifying while ensuring a robust layer of security. This not only enhances the overall security posture but also fosters a culture of vigilance within organizations.
-
TesteumAre you frustrated by bugs and subpar user experiences that continue to emerge despite thorough internal testing? Enhance the quality of your application with Testeum, a crowdtesting SaaS platform tailored for high-tech enterprises. Whether you're working on a mobile or web application, Testeum links you to a selective group of testers, chosen specifically based on your distinct requirements. Here’s how Testeum ensures you remain at the forefront: - Execute testing at any phase, from early prototypes to fully-developed applications. - Choose between our self-managed option or allow our skilled team to take charge of test strategy and execution. - Precisely identify your testing audience using various criteria, devices, and settings. - Initiate functional or UX testing campaigns in mere minutes with a straightforward setup. - Gain immediate feedback as soon as your campaign launches. - Acquire actionable insights within hours instead of waiting days. - Effortlessly connect testing results with your preferred bug-tracking or automation platforms. - Obtain comprehensive reports that reflect your users' actual expectations. Testeum is designed to be agile-friendly and remarkably user-friendly. Stop making assumptions about what your users desire—gain clear insights and certainty about their needs. By leveraging Testeum, you can transform your app development process and ensure a superior user experience.
-
Criminal IPCriminal IP functions as a cyber threat intelligence search engine designed to identify real-time vulnerabilities in both personal and corporate digital assets, enabling users to engage in proactive measures. The concept behind this platform is that by acquiring insights into potentially harmful IP addresses beforehand, individuals and organizations can significantly enhance their cybersecurity posture. With a vast database exceeding 4.2 billion IP addresses, Criminal IP offers crucial information related to malicious entities, including harmful IP addresses, phishing sites, malicious links, certificates, industrial control systems, IoT devices, servers, and CCTVs. Through its four primary features—Asset Search, Domain Search, Exploit Search, and Image Search—users can effectively assess risk scores and vulnerabilities linked to specific IP addresses and domains, analyze weaknesses for various services, and identify assets vulnerable to cyber threats in visual formats. By utilizing these tools, organizations can better understand their exposure to cyber risks and take necessary actions to safeguard their information.
-
gtechnagtechna's advanced parking management and enforcement solution is relied upon by prominent cities around the globe. Our cloud-based platform equips municipalities, transportation authorities, and educational institutions with state-of-the-art applications designed to boost parking revenue, reduce operational expenses, and enhance the overall experience for drivers. By selecting gtechna for your parking management and enforcement requirements, you are aligning yourself with a pioneering company celebrated for its relentless innovation. Major cities such as Washington, D.C., Boston, Pittsburgh, Toronto, and Vancouver have already revolutionized their parking systems with gtechna—now it’s time for you to embrace the future of parking as well. Experience the benefits of a more efficient and effective parking management solution that adapts to your unique needs and challenges.
-
SAP S/4HANA Cloud Public EditionSAP S/4HANA Public Cloud serves as an advanced ERP solution that facilitates rapid digital transformation through AI-driven insights, adherence to industry standards, and an intuitive user experience. By enhancing operational efficiency, empowering decision-making, and revealing new avenues for growth, it stands out as a comprehensive tool for modern businesses. Key features include compliance with SOX and GAAP, robust financial controls, detailed forecasting and reporting, and effective treasury and tax management. Additionally, it offers automation through AI, machine learning, and robotic process automation, alongside efficient supply chain and inventory management solutions. With templated integrations and strong manufacturing capabilities, it supports scalability for businesses of all sizes. Embracing industry innovation is essential to propel growth in revenue, efficiency, and profitability. Continuous improvement is the cornerstone of optimizing business operations and processes, ensuring that organizations stay competitive in their respective markets. Therefore, selecting a dedicated partner who is committed to your success is crucial in navigating this journey.
-
Sage IntacctSage Intacct stands out as a leading cloud-based financial management solution tailored for businesses on the rise. This software encompasses a wide array of functionalities, such as essential financial operations, accounts payable and receivable, cash flow management, and the ability to consolidate multiple entities. By automating vital financial tasks, it significantly boosts both efficiency and accuracy. Users can access real-time financial data through user-friendly and customizable dashboards, which aids in making informed, data-driven decisions. Moreover, Sage Intacct integrates effortlessly with a variety of business applications, providing a cohesive overview of operations and promoting data consistency and teamwork across different departments. Its advanced reporting and analytics features empower users to create comprehensive financial reports, monitor essential performance metrics, and derive valuable insights into their financial health. Scalable and dependable, Sage Intacct is trusted by numerous organizations globally. It adeptly manages complex organizational frameworks with its multi-entity management capabilities, ensuring smooth consolidations and inter-entity transactions. The cloud-based architecture guarantees ongoing updates and innovations, keeping financial management tools relevant. Additionally, with its award-winning customer service, Sage Intacct equips businesses to enhance their operational efficiency and financial clarity, ultimately driving growth and success.
-
PoloniousPolonious serves as an investigation management workflow solution that adheres to ISO27001 standards, built upon three foundational principles: 1 - Security 2 - Process orientation 3 - Adaptability and customization This framework empowers users to design workflows that not only safeguard data and evidence in a secure, ISO27001 certified manner but also streamline compliance with regulatory obligations with minimal hassle, thanks to workflows that are inherently compliant. Furthermore, the platform eliminates the need for costly and time-intensive coding alterations, allowing users to make modifications independently through an intuitive graphical user interface (GUI). Additionally, Polonious offers the capability to generate comprehensive reports on case outcomes, timelines, and financial metrics, which can be analyzed by case types, investigators, and investigation statuses. This functionality not only demonstrates value to higher management but also aids in pinpointing inefficiencies, paving the way for enhanced operational productivity. By leveraging these insights, organizations can continually refine their investigation processes to achieve better results.
Integrations Supported
AOL Mail
Apple Mail
Courier
Dovecot
Dovecot Pro
Gmail
Google Takeout
Google Vault
Google Workspace
Microsoft 365
Integrations Supported
AOL Mail
Apple Mail
Courier
Dovecot
Dovecot Pro
Gmail
Google Takeout
Google Vault
Google Workspace
Microsoft 365
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$59.95
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Basis Technology
Date Founded
1995
Company Location
United States
Company Website
www.autopsy.com
Company Facts
Organization Name
Fookes Software Ltd
Date Founded
1996
Company Location
Switzerland
Company Website
www.aid4mail.com
Categories and Features
Categories and Features
Archiving
Access Control
Data Deduplication
Document Management
Email Archiving
Multimedia Archiving
Retention Management
Storage Management
Version Control
Web Archiving
eDiscovery
eDiscovery
Case Analytics
Compliance Management
Discussion Threads
Document Indexing
Document Tracking
Full Text Extraction
Keyword Search
Metadata Extraction
Topic Clustering
Email Archiving
Access Control
Backup Management
Compliance Management
Data Deduplication
Data Export
Encryption
Retention Management
Storage Management
Threat Protection
eDiscovery
Email Converter
Apple Mail to PST
EML to MSG
EML to PDF
EML to PST
EMLX to PST
Gmail to MBOX
Gmail to PST
IMAP to PST
MBOX to Gmail
MBOX to PST
MSG to EML
MSG to PST
Maildir to PST
Merge PST Files
OLM to CSV
OLM to PST
OST Recovery
OST to PST
PST to Gmail
PST to MBOX
PST to MSG
PST to PDF
Recover Deleted Email
Split PST File
Thunderbird to Outlook
Email Management
Data Recovery
Email Archiving
Email Monitoring
Queue Manager
Response Management
Routing
Shared Inboxes
Signature Management
Spam Blocker
Whitelisting / Blacklisting
File Converters
Archive Converter
Audio Converter
Batch Conversions
Document Converter
Email Converter
Image Converter
Other File Type Conversions
PDF Converter
Video Converter
OST to PST Converter
Convert MBOX to PST
Convert OST to PST
Convert PST to OST
EML to PST
Exchange OST File Recovery
Extract Data from OST Files
Folder Structure Preservation
Metadata Preservation
OST Error Detection
PST File Recovery
Recovery of Accidentally Deleted Items
Save to Outlook
Split PST Files