Vendors
Accounting & Documentation Management
Open
Augmented Reality (AR)
Open
Backup & Data Management
Open
CAD Software
Open
PTC
Information Security
Open
InfoSec. Analysis and filtering of network traffic (including NTA)
Open
InfoSec. Cyber Fraud Protection
Open
InfoSec. Cyber Intelligence platforms
Open
InfoSec. Data Leak Prevention (DLP)
Open
InfoSec. Database and file storage protection
Open
InfoSec. DDoS Attack Prevention
Open
InfoSec. Encryption tools
Open
InfoSec. Endpoint protection (EPP, EDR)
Open
InfoSec. Identity Governance and Access Rights Management (IDM, IAM, IGA)
Open
InfoSec. Mail server protection
Open
InfoSec. Means of protecting information from unauthorized access
Open
InfoSec. Protect of an Industrial Automatic Control System (IACS)
Open
InfoSec. Protecting Cloud and Virtual Environments
Open
InfoSec. Protection against targeted attacks (Sandbox)
Open
InfoSec. Protection of remote workstations and mobile devices
Open
InfoSec. Security information and event management (SIEM)
Open
InfoSec. Security Orchestration, Automation and Response (SOAR)
Open
InfoSec. Security Web Gateway (SWG)
Open
InfoSec. Training of personnel to protect against cyberthreats
Open
InfoSec. Web Application Firewall (WAF)
Open
Qualys
Internet of Things (IoT)
Open
PTC
Mac OS Software
Open
Mobile Apps
Open
Multimedia
Open
Operating Systems (OS)
Open
Remote device management
Open
Text Processors
Open
PTC
Video calling and web conferencing
Open
Virtualization
Open
Visualization and data analysis
Open