Showing 1 open source project for "data structure"

View related business solutions
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • No-code automation to improve your process workflows Icon
    No-code automation to improve your process workflows

    Pipefy is a digital automation software that centralizes data and standardizes workflows for teams like Finance and HR

    Transform your financial and HR operations and improve efficiency even remotely with digital, customized workflows that your team can automate and integrate with other software without the need of IT development.
    Try For Free
  • 1
    CYBR-SUITE

    CYBR-SUITE

    Remote Scrum Communication & Collaboration Suite :: Scrum Board & co

    ...Personality assessments, ...these mandatory ways to add more context & breaking-down complexity enable a better overview and a better understanding - for man and machine... ...based on the standardized structure of the DATA WE ARE NOW CREATING AND STORING, these values can now be used directly for the inputs and targets of our artificial neuronal networks and generate our competitive advantage based on SUPERIOR MACHINE LEARNING capabilities. The CYSU is a docker-compose solution: 1. prepare your Linux system with docker & docker-compose, modify the init-script & set YOUR SSL-values, chmod +x 2. docker-compose up --build Follow the detailed step-by-step documentation. >>> PS: YOU NEED A LINUX SERVER FOR INSTALL IT ! ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB