Name | Title | Contact Details |
---|
IObit is a San Francisco, CA-based company in the Software and Internet sector.
iBX Group Inc is a Deerfield Beach, FL-based company in the Software & Internet sector.
BrainEngine is a Houston, TX-based company in the Software and Internet sector.
Prove is the modern way for businesses to enable their customers to prove their identities. Prove offers phone-centric solutions that enable its customers to acquire new consumers and engage with their existing consumers by removing friction while bolstering security and enhancing consumer privacy & consumer choice. Prove`s solutions are used by more than 1,000 businesses across diversified industries, including banks, financial services, healthcare, insurance, and e-commerce. With 1 billion+ consumer and small business identity tokens under continuous management, Prove`s Phone-Centric Identity™ platform helps companies mitigate fraud while accelerating revenue and reducing operating costs across all channels. Prove`s omnichannel solutions are available in 195 countries.
Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.