ZenTreasury
ZenTreasury is a modern cloud-based platform designed to simplify IFRS 16 lease accounting and streamline treasury operations in a single, easy-to-use system. It is ideal for companies managing anything from a few to several thousand leases, offering a scalable and secure environment to automate key processes and eliminate spreadsheet risk.
The lease accounting module supports full IFRS 16 compliance, including automated lease classification, reassessments, modifications, termination handling, and journal entry creation. ZenTreasury generates accurate disclosure reports and supports multi-currency, multi-entity structures, cost center allocations, and role-based access control. Built-in audit trails ensure transparency and external audit readiness.
In addition to lease accounting, ZenTreasury includes powerful treasury tools for managing financial instruments such as internal and external loans, FX contracts, guarantees, letters of credit, and interest rate derivatives. The platform also provides features for cash forecasting, liquidity planning, and automated treasury accounting.
ZenTreasury integrates easily with core business systems, enabling seamless data flow and process automation. It is hosted on secure, enterprise-grade cloud infrastructure and supports fast onboarding, enabling teams to go live quickly without long implementation projects.
Trusted by enterprises globally, ZenTreasury empowers finance teams with visibility, compliance, and control in both lease and debt management. Whether you are replacing spreadsheets or upgrading from a legacy system, ZenTreasury delivers the automation and structure needed to modernize your financial operations.
Learn more
Proton VPN
Secure your organization from costly data breaches while meeting essential compliance requirements, such as ISO 27001, GDPR, and HIPAA. Our software-based VPN solution is easy to deploy alongside your existing systems, giving you a powerful and adaptable tool for securing your enterprise network.
Our VPN Professional plan allows your team to connect securely to your local networks and cloud-based services. And with granular segmented control over who can connect to dedicated VPN servers and Gateways (logical groupings of dedicated servers), you can ensure your staff can access the resources they need (but only what they need).
All of our business plans use robust industry-standard AES-256 or ChaCha20 encryption to ensure your data remains secure. You can further strengthen your organization's security with enforced two-factor authentication (2FA) and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning.
Our global high-performance (mainly 10 Gbps) server network is one of the largest in the world, and is part of the trusted Proton ecosystem — a suite of fully open source, end-to-end encrypted services built by the creators of Proton Mail and designed specifically to keep your business secure.
Learn more
SolarWinds IP Address Manager
Leverage the capacity reporting features of IPAM to monitor the usage of subnets and enhance your capacity planning efforts. The customizable subnet capacity template allows for rapid, adaptable, and centralized reporting that meets specific needs. The Subnet Allocation Wizard within IPAM efficiently organizes your IP address space into appropriately sized subnets tailored for your network's requirements. With IPAM’s intuitive drag-and-drop interface, you can establish groups that include any combination of groups, supernets, subnets, and individual IP addresses, while also having the flexibility to add custom fields as needed. Additionally, vRealize Orchestrator (vRO) can be integrated with vRealize Automation (vRA) and vCenter to streamline the management of IP address tasks. You can easily acquire and reserve unique IP addresses, automatically releasing them during the relevant stages of the machine lifecycle. Furthermore, IPAM enables you to identify unused addresses from both static and DHCP configurations—simply utilize its continuously updated logs to pinpoint abandoned addresses for reclamation. This capability not only enhances efficiency but also ensures optimal utilization of your IP address resources.
Learn more
Tufin
Tufin empowers companies to streamline their security policy management, risk oversight, provisioning, and compliance within diverse, hybrid environments featuring multiple vendors. By using Tufin, organizations achieve enhanced visibility and control over their networks, ensuring they meet security standards continuously while integrating security protocols into their workflows and development processes. This approach eliminates security-related delays, thereby enhancing overall business agility. Traditional methods for managing network modifications often span weeks and may lead to mistakes that pose security threats. Businesses globally depend on Tufin’s automation based on policies to facilitate visibility and provisioning, ultimately boosting both agility and security. In the face of increasingly intricate and disjointed networks, maintaining compliance with industry regulations and internal policies can be challenging. Tufin assists enterprises in ensuring they remain in continuous compliance and ready for audits, providing peace of mind in a complex regulatory landscape. Furthermore, this level of automation allows organizations to adapt quickly to changing security demands, reinforcing their resilience in a dynamic threat environment.
Learn more