Access more. Register Today!
 
Sign In
 
 
 
 

Risk Compliance Management Solutions (21 companies found)

 
255 Characters Left
Identity Access Management Access Governance Solutions
ComplianceCourier - Access Compliance Management: ComplianceCourier, Courion's access certification, verification and policy compliance software, automates the access certification and compliance process. ComplianceCourier is the industry’s first access certification product that enables authorized business managers to review and...
Learn more about ComplianceCourier - Access Compliance Management ›
Phone Number  click for phone
 
  Rating: 5 - 1 review
Global Counterespionage Specialists
Cellular Forensic Services: ComSec’s TSCM cellular forensic specialists utilize the Cellebrite suite of mobile forensic solutions to perform our cellular forensic services. The Cellebrite solution provides the most technologically advanced extraction, decoding, analysis and reporting capabilities of mobile data...
Learn more about Cellular Forensic Services ›
Phone Number  click for phone
 
Oracle believes that insurers should be able to leverage technology to help transform their business. Oracle Insurance provides adaptive, rules-driven systems that let insurance companies easily change business processes as their business needs change. This positions insurers to...
With around 130,000 people in 44 countries, Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. The Group reported 2013 global revenues of EUR 10.1 billion. A deeply multicultural organization, Capgemini has developed its own way...
McKesson Specialty Health delivers innovative clinical, research, business and operational solutions, facilitated by integrated technology systems for improving the financial health of its customers and helping them provide quality care for patients.
Full-featured cryptographic toolkit for z/OS. Aside from data integrity and authentication, MegaCryption encrypts data at rest, allowing FTP of files directly from the point of origin on the mainframe while ensuring their security through to decryption. Encrypt tape data for shipment...
Risk Assessment: Our Risk Assessment is our flagship stand-alone assessment that combines a serios of several individual technical assessments into a single engagement aimed specifically at adressing the requirement for both a risk assessment as well as ongoing risk management process for all...
Companies 1-10 of 21