Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

By configuring this feature within your CFAST, you unlock a powerful and user-friendly tool at your disposal. This allows you to efficiently manage the connections between orders and incidents across various services. You can enter, track, resolve, and finalize all communications related to incidents while adhering to diverse standards. Additionally, it enables you to generate both manual and internal incidents as needed. Conduct tests to determine the most suitable services for your clients. Integrating your CFAST will help centralize your order management system effectively. The system interprets files and presents the information within a user-friendly interface. You will receive notifications from your CFAST regarding all essential details you need to be aware of. Moreover, this feature ensures that your incident management process is streamlined and organized, enhancing overall operational efficiency.

Description

Ceeyu specializes in identifying vulnerabilities within your company's IT infrastructure and supply chain (Third Party Risk Management or TPRM) by integrating automated digital footprint mapping, comprehensive attack surface scanning, and thorough cybersecurity risk assessments, complemented by online questionnaire-based evaluations. By revealing your external attack surface, Ceeyu empowers organizations to detect and manage cybersecurity risks proactively. An increasing number of security breaches originate from your company’s digital assets, which include not only traditional network devices and servers but also cloud services and organizational intelligence accessible online. Cybercriminals exploit these components of your digital footprint to infiltrate your network, rendering firewalls and antivirus solutions less effective. Moreover, it is essential to identify cybersecurity risks present in your supply chain. Many cyber-attacks and GDPR violations can be linked to third parties with whom you share sensitive data or maintain digital connections, emphasizing the need for vigilance in these relationships. By addressing these vulnerabilities, your company can enhance its overall security posture.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

No images available

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

€195/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Gestion Systèmes Télécom

Founded

2008

Country

France

Website

www.gestionsystemestelecom.fr/telecom-billing.html

Vendor Details

Company Name

Ceeyu

Founded

2020

Country

Belgium

Website

www.ceeyu.io

Product Features

Billing and Provisioning

Billing & Invoicing
Carrier Access Billing
Contract Management
Customer Accounts
Customizable Billing
Flexible Rate Tables
Internet
Order Management
Post-Paid Systems
Pre-Paid Systems
Provisioning
Rating
Self Service Portal
Service Order System
VoIP

Alternatives

ABS 100 Reviews

ABS 100

AcuraTel

Alternatives

BitSight Reviews

BitSight

Bitsight
CommVergence Reviews

CommVergence

CommSoft
Optius Digital OSS Reviews

Optius Digital OSS

SaskTel International