Other Useful Business Software
Discover the power of eDiscovery for law firms.
DWR eDiscovery allows legal professionals to process, analyze, review, and produce documents that are relevant to litigation and other legal disclosure obligations. Our tools allow easy ingestion and analysis of client and opposing party documents using a comprehensive set of document review features including AI search, keyword search, keyword highlighting, metadata filtering, marking documents, privilege log management, redactions, and a range of analysis tools to help users best understand their document corpus.
PeerGFS PEER Software - File Sharing and Collaboration
PeerGFS is a software-only solution developed to solve file management/file replication challenges in multi-site, multi-platform, and hybrid multi-cloud environments.
Cycloid: Hybrid Cloud DevOps collaboration platform
Enable your developers to do their best work and increase time-to-market speed with a leading DevOps and Hybrid Cloud platform.
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
Attack Surface Management | Criminal IP ASM
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
