Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
We offer a comprehensive solution that includes POS systems, waitstaff management, kitchen integration, kiosks, and online food ordering. Additionally, we provide hardware that has been rigorously tested to ensure optimal performance with our software, all without any hidden fees and based on a pay-as-you-go model! Our commitment to transparency and exceptional customer service sets us apart. At the core of our offerings is the ACE POS iPad system, which we have designed to be an intuitive and user-friendly solution that is robust and highly customizable to meet the specific needs of your business. The ACE POS System works seamlessly with Dojo Go, a state-of-the-art card machine that is lightweight, features mobile connectivity, and boasts a remarkable 10-hour battery life. This device allows for rapid payment processing, ensuring that transactions are swift and secure, whether at the point of sale, at the table, or on the move. Embrace the future of payment with Dojo Go for efficient and reliable service, enhancing your customer experience while optimizing your operations.
Description
Experience DefectDojo firsthand by checking out its demo and logging in using sample credentials provided. Available on GitHub, DefectDojo comes with a convenient setup script to facilitate installation, and there's also a Docker container featuring a pre-built version of the tool. You'll be able to pinpoint exactly when new vulnerabilities arise in a build or are addressed. Using DefectDojo's API, tracking the timing of security assessments on products is straightforward, allowing you to monitor security tests conducted on each build seamlessly. This powerful platform enables the tracking of crucial details such as build-id, commit hash, branch or tag, orchestration server, source code repository, and build server associated with every security test performed on demand. Additionally, it offers a variety of reports covering tests, engagements, and products. By organizing products into categories of critical importance, you can focus on those that matter most to your organization. Furthermore, DefectDojo provides the capability to consolidate similar findings into a single entry, helping developers manage issues more effectively and reducing clutter in their reports. This streamlined approach enhances the overall security management process and aids in prioritizing remediation efforts efficiently.
API Access
Has API
API Access
Has API
Integrations
Crashtest Security
CycloneDX
Deepinfo
Probely
Semgrep
Trivy
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
ACE POS
Country
United Kingdom
Website
acepos.co.uk
Vendor Details
Company Name
10Security
Country
United States
Website
www.defectdojo.org
Product Features
Bar POS
Cash Drawer Management
Employee Management
Gift Card Management
Inventory Control
Loyalty Program
Separate Checks
Split Checks
Tips Management
Online Ordering
Integrated Gift Cards
Menu / Product View
Mobile Ordering
Push Notifications
Reporting / Analytics
Rewards / Loyalty Program
Secure Payment Processing
Store Locator
White-Label
Restaurant POS
Delivery Management
Gift Card Management
Inventory Management
Loyalty Program
Mobile Access
Online Ordering
Order Management
Reporting/Analytics
Separate Checks
Split Checks
Table Management
Tips Management
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection