Software > Search

Search result

  • Windows based
  • macOS
  • Unix based
  • Mainframe based
  • Mobile
show price
  • with demo version
  • multi-client compatible
  • with customizing
  • On-premises (local installation)
  • SaaS, web based, cloud
Authentication
or
show 1 to 18 (of 18 software programs)
Asset.Desk
Inventory, asset and lifecycle management, licence and contract management and much more.
Inventory, asset and lifecycle management, licence and contract management and much more. Management and documentation of all hardware and software assets over their entire life cycle. Linked to contracts, costs, allocation to locations, departments and cost centres, it is the basis for IT operations, planning, controlling and purchasing. Enables the inventory of virtual environments such as vCenter and Hyper-V and allows the hardware and software of the data centre to be managed. Since 2019, Asset.Desk also provides an overview of cloud usage and costs. One of the few SAM tools certified by KPMG since 2015. Allows mobile support of the processes of acquisition, goods receipt, inventory, IT operations and disposal. Interfaces based on REST services allow integration into any corporate environment, e.g. with ERP and helpdesk or similar systems. Asset.Desk makes inventory possible with barcode or RFID.
otris privacy
otris privacy supports the data protection officer in his daily work
otris privacy supports the data protection officer in his daily work The data protection solution offers you targeted analysis and control of operational data protection and IT security standards. With the software, you can optimize security gaps and comprehensively document all data protection measures taken. otris privacy supports company and external data protection officers in their daily work. The software can be used across all industries and maps any company structure. With its comprehensive range of services, otris privacy sets the course for a successful long-term ...
HelloID
Secure Cloud Identity & Access Management
Secure Cloud Identity & Access Management Identity Management as a Service IAM for your on-premise, hybrid or cloud environment. Your strategy is set, step by step you migrate to the cloud. This doesn't happen overnight. For the coming years, this means: a hybrid environment with e.g. Office365, Teams and CRM in the cloud but your AD, file and ERP system still local for the time being. Your identity management will also move to the cloud. At the same time, you should not lose sight of your local network. HelloID as an innovative "Identity as a Service" (IDaaS) platform, is your ticket to the future of your identity management. Both in the cloud and for your hybrid or on-premise environment. Learn now how HelloID can support your Cloud Identity Management!...
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
Session
Meeting management software for municipalities, authorities, utilities, banks
Meeting management software for municipalities, authorities, utilities, banks Session is the leading software solution for meeting management. It is a tailor-made collection of tools consisting of software and an all-round service on site: from A for automated template creation to Z for time-dependent calculation of compensation. The program includes options for template creation and recording, meeting planning, resolution management and monitoring as well as for the agenda. You can use it to create invitations and calculate the attendance fee or compensation ...
CrypToken
USB token for security solution providers
USB token for security solution providers The CrypToken® USB for security solution providers and system administrators is ideal for secure authentication in eBusiness applications and as a smart card alternative. It offers strong authentication, PKI support via CAPI / PKCS#11, email encryption, options for a digital signature and regulatory compliance. Users in the LAN/WAN can be identified. It also contains functions for an SSO login for Windows and Linux as well as customer-specific special solutions ...
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
PANSITE - Content Management System (CMS)
Powerful content management system - for complex websites and intranet presences
Powerful content management system - for complex websites and intranet presences With the browser-based, powerful content management system PANSITE, you can realize both complex websites and ambitious intranet projects and control the targeted, personalized provision of information on any end device. Maintain your content decentrally and across locations and design your pages exactly according to your ideas with the help of prefabricated special elements and numerous add-ons - even in large teams of editors.
myPARM - Multi-project management software
Multi-project management and PPM software
Multi-project management and PPM software myPARM PM is a strategic, process-oriented multi-project management software with Gantt and WBS, time recording, budgeting, resource planning, invoicing, risk and opportunity management. myPARM RFS is a risk-based management/leadership system with balanced scorecard, portfolio management, programme management and controlling options for operational, tactical and strategic management levels.
BIC GRC Solutions
Quickly deployable standard solutions and flexible custom solutions
Quickly deployable standard solutions and flexible custom solutions The success of innovative organizations can be sustainably increased through the digitalization of GRC processes. We make this possible with the GBTEC GRC Software Suite BIC GRC, which offers our customers flexible and adaptable custom solutions or standard solutions that can be implemented with minimal effort: BIC Enterprise Risk BIC Business Continuity BIC Data Protection BIC Information Security BIC BSI Basic Protection BIC Internal Control...
Cryptshare
Sending large files - exchanging e-mails securely
Sending large files - exchanging e-mails securely Exchange information and large files securely, easily and traceably by email. Cryptshare enhances your existing e-mail system with security, administrative control, traceability and the ability to exchange files of unlimited size. In order to live up to our slogan "Making e-mail better", we place particular emphasis on user-friendliness, because software only makes financial and security sense if it is well accepted and popular with users. Therefore, there is no need for software installations, user accounts, procurement of certificates or exchange of public keys on the part of the end user ...
MOXIS
The eSignature Business Platform
The eSignature Business Platform MOXIS is the secure e-signature platform for your business. MOXIS perfectly adapts to your enterprise signature workflows and accelerates your business with mobile remote signatures with the highest legal binding. Sign your documents with MOXIS via qualified electronic signature (QES), 100% eIDAS compliant and with the legal effect of a handwritten signature.
Logipad
A customizable, flexible and comprehensive information management solution.
A customizable, flexible and comprehensive information management solution. The solution for digital document & workflow management Nowadays, information is one of the important foundations that a company needs in order to successfully pursue and achieve its goals. However, the relevant information does not always end up exactly where it is needed. Sometimes it simply gets lost or is not reproduced correctly. Because the flood of information is almost inexhaustible. Logipad is a software developed by DextraData GmbH that can be customized. At the same time, all document-driven processes in a company are optimized so ...
FieldShield
Powerful and cost-effective software for data recognition and masking .
Powerful and cost-effective software for data recognition and masking . IRI FieldShield® is powerful and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield utilities in Eclipse are used to profile and de-identify data at rest (static data masking) and the FieldShield SDK is used to secure data in motion (dynamic data masking).
CellShield
Reporting & masking of PII in Microsoft Excel® spreadsheets
Reporting & masking of PII in Microsoft Excel® spreadsheets IRI CellShield to find and protect sensitive data (PII) in multiple Excel® spreadsheets: CellShield is the only full-featured, professional data discovery, masking and auditing package for Excel 2010, 2013, 2016 and 2019 (plus Office 365) workbooks on your LAN. CellShield exceeds the security and scope of a single password by combining and automating additional features.
DarkShield
Recognize, deploy and delete PII in Dark Data
Recognize, deploy and delete PII in Dark Data With IRI DarkShield, you can classify, find and delete or otherwise mask sensitive information in various structured, semi-structured and unstructured sources, including: text, PDF and MS Office documents, Parquet and image files, relational and NoSQL collections, and even faces. Whether the PII is on your desktop or anywhere on your network, DarkShield protects it!...
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
With governance, risk and compliance management in one system, Compliance Aspekte is a modular tool that enables you to manage regulatory or company-specific standards, policies and best practices. Compliance Aspekte includes numerous, extremely useful features. The tool is intuitive to use, has a modern user interface and allows for convenient management of policies. Quarterly feature updates and multilingual support are available.
Secldent – Empower digital identity
Brand protection, track & trace and customer loyalty through secure serialization
Brand protection, track & trace and customer loyalty through secure serialization SecIdent is a SaaS software that can be used to generate, manage and check counterfeit-proof serial numbers. The ability to check the codes forms the basis for new marketing activities or evaluations of market trends, potential gray market activities and track and trace. All processes are logged to ensure a high level of compliance and process reliability.
show 1 to 18 (of 18 software programs)
1