Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Canyon Solutions has created a robust, web-based Public Defender system in collaboration with the County of San Diego Public Defender’s Advisory Committee. This solution encompasses modules for Criminal, Juvenile Delinquency, and Mental Health that have been operational since 2001 and are utilized in numerous locations. Additionally, Canyon Solutions partnered with the State of Georgia’s Prosecuting Attorney Council to develop a comprehensive web-based Prosecutor solution, which has been in use since 2006. Furthermore, the company has also introduced a web-based Child Dependency/Child Advocacy solution that focuses on case management at the family level, addressing each petition on an individual basis. This product automates the management of cases for dependent children and offers features such as calendar management, workflow, statistical data, and financial oversight, among other desirable functionalities, and has been actively in production since 1999. With the integration of these various systems, Canyon Solutions demonstrates a commitment to enhancing the efficiency and effectiveness of public legal services.
Description
Stay ahead of complex threats like ransomware and attacks from nation-states. Empower defenders to effectively manage risks and enhance their security strategies. Move past isolated endpoint solutions and build a more mature security framework grounded in XDR and Zero Trust principles. Microsoft Defender for Endpoint provides top-tier security for various platforms, including Windows, macOS, Linux, Android, iOS, and network devices, enabling swift attack mitigation, resource scaling, and defense evolution. Leveraging cloud scalability and integrated AI, it utilizes the most extensive threat intelligence in the industry. This all-encompassing solution facilitates the identification of every endpoint and network device, such as routers, within your operational landscape. It encompasses vulnerability management, endpoint protection, endpoint detection and response (EDR), mobile threat defense, and managed hunting, all seamlessly integrated into a single platform, thus ensuring comprehensive security coverage. With this unified approach, organizations can establish a more robust defense mechanism while maintaining visibility across all their assets.
API Access
Has API
API Access
Has API
Integrations
Axonius
Blackpoint Cyber
Blink
ContraForce
Cyber Triage
Daylight
Dune Security
Google Digital Risk Protection
HivePro Uni5
Intezer AI SOC
Integrations
Axonius
Blackpoint Cyber
Blink
ContraForce
Cyber Triage
Daylight
Dune Security
Google Digital Risk Protection
HivePro Uni5
Intezer AI SOC
Pricing Details
$1000 per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Canyon Solutions
Website
www.canyonsolutions.com
Vendor Details
Company Name
Microsoft
Founded
1975
Country
United States
Website
www.microsoft.com/en-us/security/business/threat-protection/endpoint-defender
Product Features
Court Management
Administrative Hearings
Appeal Boards
Calendar Management
Case History
Collections Management
Court Cost Records
Defendant Records
Docket Management
Document Imaging
Fines Management
Jury Management
Subpoena Tracking
Warrant Tracking
Legal Case Management
Billing Management
Calendar Management
Case Notes
Client Management
Communication Tracking
Conflict Management
Corporations
Court Management
Discovery Management
Docket Management
Document Management
Expense Tracking
Government
Law Firms
Records Management
Task Management
Time Tracking
Trust Accounting
Product Features
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting