Business Software for Auth0

  • 1
    Scanner Reviews

    Scanner

    Scanner

    $30,000 per year
    Scanner.dev is a cloud-based security data lake and a streamlined security information and event management (SIEM) platform that allows users to index logs directly into their Amazon S3 storage, thereby enabling the retention of unlimited logs and facilitating full-text searches across vast amounts of data in mere seconds, all without the need for additional ETL processes or schema setups. With its lightweight indexing system, any log format can be made immediately searchable, and it offers rapid search capabilities, ongoing threat detection through customizable detection rules that can be managed as code via GitHub, and seamless alerting with APIs for automation and existing security workflow integration. The platform's streaming detection engine constantly assesses rule queries in nearly real time and is equipped to backtest detection logic using historical data. Furthermore, its API and Model Context Protocol (MCP) not only provide programmatic access but also allow for AI-assisted evaluation of security data, enhancing the overall security analysis process. This robust architecture ensures that organizations can effectively manage and respond to security threats with agility and precision.
  • 2
    Sailthru Reviews
    We are already the premier choice for your competitors. Sailthru by Marigold stands out as the most cutting-edge platform for email, web, and mobile solutions. It fulfills all your email requirements seamlessly. You can handle all aspects of your email—ranging from campaigns to triggered and transactional messages—within a single, reliable system. Our Audience Builder makes it simple to segment your audience, while the Email Composer allows you to create stunning emails effortlessly, without needing any HTML or CSS skills. Sailthru is recognized as one of the largest and quickest email dispatchers globally. Challenge us; we're ready for it. What sets Sailthru’s personalization apart is its unique approach. Instead of merely disguising segmentation tactics as 'personalized,' our exclusive algorithms enable genuine personalization at the individual level across your emails, website, and mobile applications. This capability is driven by our industry-leading customer profiles. In practical terms, this means you can deliver 5 million distinct emails to 5 million different customers, showcasing the beauty of automation and tailored communication. With Sailthru, the possibilities are limitless, ensuring that every customer feels uniquely valued.
  • 3
    PrivacyPerfect Reviews
    Introducing a comprehensive solution for effortless GDPR adherence, designed to streamline the regulatory compliance experience and support privacy professionals globally. This innovative tool equips your privacy program with a user-friendly and secure interface, enhanced by integrated automation that facilitates the execution of all compliance-related tasks. Improve transparency by effectively showcasing your compliance efforts to essential stakeholders. Effortlessly share your outcomes within the privacy team and with upper management through automated, pre-designed reports. Maintain a clear overview of your entire privacy administration while ensuring you retain full control over the processes. Leverage smart automation to optimize and standardize your workflows, allowing for a more efficient approach to compliance. Simplify your data protection initiatives while meeting all GDPR requirements, ensuring your organization remains aligned with regulatory standards. This solution not only enhances your compliance capabilities but also fosters a culture of accountability within your organization.
  • 4
    MissingX Reviews
    Our CLOUD software solution has been developed over many years in collaboration with some of Europe's busiest air terminals. The intuitive interface and familiar workflows make it easy to get started for smaller operations. The MissingX solution has everything you need, from registering a lost item to returning it via collection or shipping. Contact us today to see if our solution is right for you. We use this expertise to develop solutions that are tailored to the needs of our clients. We keep an eye on trends and invent to meet tomorrow's needs for lost property management.
  • 5
    PeakCommerce Reviews

    PeakCommerce

    PeakCommerce Inc.

    PeakCommerce is a subscription-based ecommerce platform that allows B2C and business to create unique shopping experiences for every device. PeakCommerce seamlessly integrates e-commerce with account, case, subscription management and e-commerce to provide seamless experiences in the subscription market. PeakCommerce supports multiple brands and billing systems from one cloud-based platform. It also supports different currencies, languages, countries, and currencies. PeakCommerce is natively integrated to the most popular subscription billing engines like Zuora, CRM's and support systems. This allows PeakCommerce to provide a beautiful subscription experience in real time.
  • 6
    Arctic Wolf Reviews

    Arctic Wolf

    Arctic Wolf Networks

    An organization’s data should be its most powerful asset, not its biggest risk. But as accidental loss renders them vulnerable and cyber attackers remain at large, many technology and security leaders are left feeling exposed even though their investments in security technology continue to grow. With Arctic Wolf Security Operations, organizations immediately benefit from the support of a Pack that always has your back. To accomplish unprecedented capacity and scale for cyber defense, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than three trillion security events a week, enabling customers of virtually all sizes and in all industries to feel confident in their security posture, readiness, and long-term resilience. Arctic Wolf empowers organizations to establish world-class security operations with the push of a button and defend their greatest assets at the speed of data.
  • 7
    Alterian Reviews
    Customers create their own experiences. Alterian's software adeptly identifies and maps the 'natural' pathways selected by customers, highlighting essential 'break points' throughout their journey and 'moments of truth' as they approach significant objectives, thus enhancing the value of every interaction for both the customer and the brand. This allows brands to assess and measure the impact of each strategic journey, demonstrating its influence on ongoing engagements and understanding its ramifications for their business objectives. The platform is designed to continuously learn and implement the most effective improvements, consistently evolving and refining each customer experience. Additionally, Alterian offers a comprehensive perspective of the customer's journey across various digital, offline, direct, and channel interactions. This ongoing communication with customers facilitates the visualization of complete customer journeys, enabling the monitoring of important shifts in customer interest at every engagement point, ultimately fostering deeper connections and insights.
  • 8
    Pipedream Reviews
    The fastest way to integrate APIs, and run code. Pipedream is a serverless computing platform and integration platform that makes it easy for developers to create event-driven workflows and connect apps. Any API can be turned into an event stream by creating event sources. You can create event sources to listen for tweets, Github events or Airtable records. You can inspect events in a human-friendly manner, trigger Node.js workflows for every event, and consume events in your app via API. Node.js code steps are used to create workflows that run on every event. You can write your own Node.js and use any npm packages. Or you can reuse actions that scaffold popular APIs. You can trigger via sources, a custom URL, email address or SDK code, or a schedule. Connect to Auth apps once and they will continue to work in your workflow. Pipedream supports OAuth, key-based auth and handles token refresh and OAuth flow for you. Simply link accounts to steps, and include the appropriate auth information in code.
  • 9
    Google Cloud Endpoints Reviews
    Cloud Endpoints allows you to create, launch, safeguard, and oversee your APIs effectively. With a robust NGINX-based proxy and a distributed framework, it ensures exceptional performance and scalability. By utilizing either an OpenAPI Specification or one of the provided API frameworks, Cloud Endpoints equips you with essential tools for every stage of API development while offering valuable insights via Cloud Logging, Cloud Monitoring, and Cloud Trace. You can manage access to your API and authenticate each request using JSON Web Tokens and Google API keys. Additionally, seamless integration with Auth0 and Firebase Authentication enables user identification for your web or mobile applications. The Extensible Service Proxy guarantees security and analytics in under 1 millisecond per request. You can effortlessly deploy your API using App Engine and Google Kubernetes Engine or incorporate our proxy container into your Kubernetes setup. Furthermore, you can track essential operational metrics through the Google Cloud Console and obtain deeper insights into user behavior and usage patterns utilizing Cloud Trace, Cloud Logging, and BigQuery. This comprehensive approach ensures that your APIs are not only secure but also optimized for performance and usability.
  • 10
    Gurucul Reviews
    Our security controls, driven by data science, facilitate the automation of advanced threat detection, remediation, and response. Gurucul’s Unified Security and Risk Analytics platform addresses the crucial question: Is anomalous behavior truly a risk? This unique capability sets us apart in the industry. We prioritize your time by avoiding alerts related to non-risky anomalous activities. By leveraging context, we can accurately assess whether certain behaviors pose a risk, as understanding the context is essential. Merely reporting what is occurring lacks value; instead, we emphasize notifying you when a genuine threat arises, which exemplifies the Gurucul advantage. This actionable information empowers your decision-making. Our platform effectively harnesses your data, positioning us as the only security analytics provider capable of seamlessly integrating all your data from the outset. Our enterprise risk engine can absorb data from various sources, including SIEMs, CRMs, electronic medical records, identity and access management systems, and endpoints, ensuring comprehensive threat analysis. We’re committed to maximizing the potential of your data to enhance security.
  • 11
    XcooBee Reviews
    The necessity for contactless and secure fundraising has become increasingly apparent in today's landscape. Most donors weigh three critical factors when deciding to contribute: their personal safety, the protection of their online data with privacy measures, and the experience of a contactless transaction. Unfortunately, many fundraising platforms fail to adequately address all these elements, which can lead to missed opportunities among the largest group of potential donors. XcooBee stands out as a comprehensive fundraising solution that effectively tackles these concerns while offering offline, online, web, email, social, and multilingual fundraising options, all without any additional fees. You can launch your fundraising efforts in less than an hour, and our ready-to-use platform guarantees efficient and secure conversion of donors through paper, web, or social media channels. Each interaction with XcooBee is conducted in a completely safe and contactless manner on devices owned by the users, eliminating the need for shared equipment or contact with kiosks. It’s essential to recognize that every additional step added to a donor's journey can lead to a significant decrease in the likelihood of completing their donation, with a drop of over 40%. Therefore, adopting a seamless process is crucial for maximizing contributions.
  • 12
    Pepper Flow Reviews
    Pepper Flow is designed with distinctive features that enable life science companies to enhance collaboration among marketing, medical, legal, and regulatory teams. As a marketer, utilizing effective tools is essential for swiftly navigating the complexities of advertising and promotional reviews. By leveraging Pepper Flow, you can efficiently launch critical campaigns and content that align with your organization’s strategic goals. The platform promotes real-time collaboration, allowing team members to address feedback and make necessary revisions without delay. This means you can dedicate more time to high-impact tasks rather than managing the review process. As a cloud-based, enterprise-grade software solution, Pepper Flow empowers life science companies to bolster their competitive edge, streamline product marketing, and ensure strict compliance with industry standards. With the need for speed in reaching your target audiences, Pepper Flow’s user-friendly interface facilitates quick and effective task completion, ensuring that your marketing efforts are both timely and impactful. In a fast-paced environment, having such a tool can make all the difference in achieving success.
  • 13
    Query Federated Search Reviews
    Quickly access data from all sources with a single search, including non-security data sources and unstructured data in cloud storage. Control where and how to store data, reducing storage costs and eliminating expensive data churn projects. Supercharge your security investigations with a single view of normalized and enriched search results from across your data sources.
  • 14
    Blotout Reviews
    Enhance customer experiences with full transparency through infrastructure-as-code solutions. Blotout's SDK equips businesses with familiar analytics and remarketing capabilities while prioritizing top-notch privacy for users. Designed to comply with GDPR, CCPA, and COPPA right from the start, Blotout’s SDK leverages on-device, distributed edge computing to conduct analytics, messaging, and remarketing without compromising personal data, device identifiers, or IP addresses. Achieve comprehensive customer insights by measuring, attributing, optimizing, and activating customer data with total coverage. It is the only platform that seamlessly integrates the entire customer lifecycle by consolidating event data along with both online and offline sources. Cultivating a trustworthy data relationship with customers fosters loyalty and ensures adherence to GDPR and other international privacy regulations, thereby enhancing your brand's reputation.
  • 15
    Ireckonu Reviews
    Ireckonu facilitates connections with your guests, ensuring that every interaction is smooth and impactful, extending from the moments leading up to check-in all the way through to after they check out. This is the reason our interconnected ecosystem is meticulously crafted to oversee your operations and systems while empowering your staff, enabling you to tailor experiences that cater to the specific preferences of each guest in every room. With features ranging from guest profiling and analytics to on-the-spot assistance for hotel staff, our ecosystem revolves around the CORE, delivering genuinely unique experiences for your guests. The CORE middleware integrates your systems seamlessly as you adopt new technologies, creating an environment that collaborates effectively to not only meet but exceed guests' expectations. You will gain deep insights into what drives your guests, ensuring they return for more stays in the future. Additionally, our robust integration with Auth0 has allowed us to decouple identity management from a guest’s profile, which empowers hoteliers to implement single sign-on (SSO) and multi-factor authentication, enhancing security while simplifying access for guests. As a result, both the guest experience and operational efficiency are significantly enhanced.
  • 16
    Meltano Reviews
    Meltano offers unparalleled flexibility in how you can deploy your data solutions. Take complete ownership of your data infrastructure from start to finish. With an extensive library of over 300 connectors that have been successfully operating in production for several years, you have a wealth of options at your fingertips. You can execute workflows in separate environments, perform comprehensive end-to-end tests, and maintain version control over all your components. The open-source nature of Meltano empowers you to create the ideal data setup tailored to your needs. By defining your entire project as code, you can work collaboratively with your team with confidence. The Meltano CLI streamlines the project creation process, enabling quick setup for data replication. Specifically optimized for managing transformations, Meltano is the ideal platform for running dbt. Your entire data stack is encapsulated within your project, simplifying the production deployment process. Furthermore, you can validate any changes made in the development phase before progressing to continuous integration, and subsequently to staging, prior to final deployment in production. This structured approach ensures a smooth transition through each stage of your data pipeline.
  • 17
    Cisco Identity Intelligence Reviews
    Cisco Identity Intelligence is an AI-driven solution that effectively connects authentication with access management, delivering unparalleled security insights without causing disruptions. By integrating authentication and access controls, the Cisco Identity Intelligence solution fortifies your attack surface, preemptively defending against potential intrusions. Gain comprehensive visibility into identity activities, allowing you to address vulnerable accounts, eradicate risky permissions, and prevent high-risk access attempts. With its effortless deployment, the Cisco Identity Intelligence solution enhances other Cisco security frameworks, offering enriched capabilities that guide appropriate responses to various threats. Given the escalating sophistication of attackers' strategies, the Cisco Identity Intelligence solution is meticulously designed to safeguard your organization from identity-related threats, regardless of their complexity. This proactive approach ensures that your security measures are not only reactive but also anticipatory, adapting to emerging risks as they arise.
  • 18
    Deed Reviews
    Discover the workplace giving platform that your team will adore. A single platform offers limitless opportunities for good deeds. This comprehensive tool enhances employee engagement while promoting social impact. Instantly transform your workplace with a giving program that features a selection from over 2 million nonprofits across the globe. Through Deed’s employee volunteering platform, you can share your time and skills with meaningful causes worldwide, utilizing an extensive library of ready-to-use opportunities. Attract new talent, retain your current workforce, motivate employee resource groups, and weave social responsibility into your corporate culture through Deed communities. Foster a culture of generosity by encouraging your employees to engage in collective actions and gamification with Deed actions. This all-encompassing platform allows for volunteering, donating, and taking action both at work and in the community. Build a sense of belonging by connecting with employees where they are. With our app, teams can volunteer and contribute together, share impactful stories, and celebrate their collective achievements—all seamlessly integrated with Slack. In doing so, you can create a vibrant community that champions social good.
  • 19
    QueryPie Reviews
    QueryPie serves as a unified platform that consolidates diverse data sources and security protocols into a single interface. Accelerate your company's journey toward achievement without altering your current data infrastructure. In an era driven by data, effective data governance has become essential. Make certain that you adhere to data governance regulations while simultaneously granting multiple users access to an increasing volume of essential data. Formulate data access policies by incorporating crucial factors such as IP addresses and time of access. You can create various privilege types based on SQL commands categorized into DML, DCL, and DDL, allowing for secure data analysis and modifications. Effortlessly monitor SQL event details and analyze user behavior along with potential security threats by examining logs filtered by permissions. Furthermore, all historical data can be exported for comprehensive reporting, ensuring that you have a clear view of your data usage and security practices. This holistic approach not only enhances oversight but also supports informed decision-making for future strategies.
  • 20
    Sana Reviews
    Experience a centralized hub for all your educational and informational needs. Sana is an innovative learning platform powered by AI that equips teams with the ability to discover, disseminate, and leverage the knowledge necessary for fulfilling their objectives. Enhance the learning journey for everyone by merging live collaborative interactions with tailored self-paced courses, all available in a single location. Simplify the sharing of knowledge through the capabilities of Sana Assistant, which can create questions, explanations, images, and even entire courses autonomously. Encourage active participation and excitement through a variety of interactive elements such as quizzes, Q&A sessions, polls, sticky notes, reflection cards, recordings, and much more. Seamlessly integrate Sana with your team's favorite applications, ensuring that your organization's collective knowledge remains accessible and searchable in less than 100 milliseconds. From Github to Google Workspace, Notion, Slack, and Salesforce, whatever you need, Sana is ready to provide insights from it. All of this comes together to foster a vibrant learning culture within your organization.
  • 21
    Tromzo Reviews
    Tromzo creates a comprehensive understanding of environmental and organizational factors spanning from code to cloud, enabling you to swiftly address significant risks within the software supply chain. By focusing on the remediation of risks at each layer, from code to cloud, Tromzo constructs a prioritized risk assessment that encompasses the entire supply chain, providing essential context. This contextual information aids users in identifying which specific assets are vital for the business, safeguarding those critical components from potential risks, and streamlining the remediation process for the most pressing issues. With a detailed inventory of software assets, including code repositories, software dependencies, SBOMs, containers, and microservices, you gain insight into what you possess, who manages it, and which elements are crucial for your business's success. Additionally, by assessing the security posture of each team through metrics such as SLA compliance and MTTR, you can effectively promote risk remediation efforts and establish accountability throughout the organization. Ultimately, Tromzo empowers teams to prioritize their security measures, ensuring that the most important risks are addressed promptly and effectively.
  • 22
    Pantomath Reviews
    Organizations are increasingly focused on becoming more data-driven, implementing dashboards, analytics, and data pipelines throughout the contemporary data landscape. However, many organizations face significant challenges with data reliability, which can lead to misguided business decisions and a general mistrust in data that negatively affects their financial performance. Addressing intricate data challenges is often a labor-intensive process that requires collaboration among various teams, all of whom depend on informal knowledge to painstakingly reverse engineer complex data pipelines spanning multiple platforms in order to pinpoint root causes and assess their implications. Pantomath offers a solution as a data pipeline observability and traceability platform designed to streamline data operations. By continuously monitoring datasets and jobs within the enterprise data ecosystem, it provides essential context for complex data pipelines by generating automated cross-platform technical pipeline lineage. This automation not only enhances efficiency but also fosters greater confidence in data-driven decision-making across the organization.
  • 23
    Blink Reviews
    Blink serves as a powerful ROI enhancer for security teams and business executives aiming to efficiently secure an extensive range of scenarios. It provides comprehensive visibility and coverage of alerts throughout your organization and security infrastructure. By leveraging automated processes, it minimizes noise and decreases the incidence of false alarms in alerts. Additionally, it scans for attacks while proactively detecting insider threats and vulnerabilities. Users can establish automated workflows that incorporate pertinent context, simplify communication, and shorten mean time to resolution (MTTR). Alerts can be acted upon to bolster your cloud security posture through no-code automation and generative AI. The platform also facilitates shift-left access requests, streamlines approval processes, and allows developers to work without hindrance, all while ensuring application security. Furthermore, it enables ongoing monitoring of applications for compliance with SOC2, ISO, GDPR, and other standards, helping to enforce necessary controls. This comprehensive approach not only improves security but also enhances operational efficiency across the board.
  • 24
    MATTR VII Reviews
    Establish robust digital trust within your organization using MATTR VII, our extensive suite of APIs designed to provide developers with convenience while still allowing for flexibility and choice. Address compliance and regulatory requirements effortlessly with adaptable public or private cloud solutions that can be implemented globally. Our platform, known for its high availability, is relied upon by both governments and enterprises, capable of handling hundreds of transactions every second. We prioritize the security and upkeep of the platform, fostering trust in every transaction while also reducing the overall cost of ownership. By choosing MATTR VII, you not only enhance your digital infrastructure but also empower your team to innovate without constraints.
  • 25
    HuLoop Reviews
    Receive insights grounded in data regarding your workforce, operational methods, and technological tools. Establish automation for intricate business workflows that span various systems and data sources. Streamline repetitive tasks to facilitate testing that proves challenging to accomplish manually. The HuLoop platform is designed to create, deploy, and oversee intelligent agents, functioning as a digital workforce that takes over mundane tasks your employees shouldn’t have to handle. By utilizing HuLoop's digital agents, you can achieve reduced costs, enhanced productivity, and greater job satisfaction among your team members. This platform provides a comprehensive view of your operational capabilities, enabling you to grasp and modify the interactions among your people, processes, and technologies. Moreover, it orchestrates and automates complex business processes across disparate systems and data, effectively reducing the reliance on human intervention. These agents not only execute and control tests but also verify expected results, ensuring quality and efficiency. Ultimately, automating these repetitive tasks allows your organization to focus on strategic initiatives rather than manual processes.