Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The PeopleScope Suite aims to enhance the HR function at every level, ensuring that not only does the HR Team experience greater ease in their roles, but also that their productivity and efficiency are markedly improved, resulting in faster, higher-quality work with fewer mistakes and increased overall satisfaction—ultimately leading to better outcomes and more smiles all around. Salarium, the payroll software provided by PeopleScope, is crafted in accordance with established payroll processing norms in India while possessing the adaptability to accommodate future changes. Built with cutting-edge technology, Salarium is accessible to users from various locations, providing significant convenience. Additionally, Personata serves as a centralized interface for the HR function, streamlining processes for all employees within the organization, thereby greatly reducing the burdensome administrative and clerical tasks that typically fall upon the HR Team. This seamless integration among tools not only fosters a more efficient workflow but also empowers employees by simplifying their interactions with HR.
Description
The premier platform for enterprise application security is powered by the finest ethical hackers globally. Depending on the scale and intricacy of the projects your organization intends to undertake, you can be classified as either a beginner or an enterprise-level client. Our platform simplifies the management of your security initiatives while we take care of validating and overseeing all reports generated by your teams. With the expertise of top ethical hackers, your security efforts will receive a significant boost. Assemble a dedicated team of exceptional ethical hackers tasked with uncovering hidden vulnerabilities within your applications. We provide support in selecting the appropriate services, establishing programs, defining project scopes, and connecting you with rigorously vetted ethical hackers who align with your requirements. Together, we will outline the parameters of the Researcher Program, you’ll set the budget, and we’ll collaboratively decide on the commencement date and duration of the initiative, ensuring that you have the most suitable team of ethical hackers in place. Additionally, our goal is to enhance your overall security posture through a tailored, collaborative approach to vulnerability discovery.
API Access
Has API
API Access
Has API
Integrations
No details available.
Integrations
No details available.
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
€1.000 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Maven Tech Services
Founded
2010
Country
India
Website
www.peoplescope.co.in/
Vendor Details
Company Name
Zerocopter
Founded
2015
Country
Netherlands
Website
www.zerocopter.com
Product Features
Human Resources
360 Degree Feedback
Applicant Tracking
Attendance Management
Benefits Management
Career Development Planning
Compensation Management
Compliance Management
Employee Database
Employee Lifecycle Management
Onboarding
Payroll Management
Performance Management
Recruiting Management
Self Service Portal
Succession Planning
Time & Attendance Management
Time Off Management
Timesheets
Training Management
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection