Vendors
Accounting & Documentation Management
Open
Augmented Reality (AR)
Open
Backup & Data Management
Open
CAD Software
Open
Corporate Communications
Open
DBMS
Open
File Management & Drive Management
Open
Information Security
Open
InfoSec. Analysis and filtering of network traffic (including NTA)
Open
InfoSec. Cyber Fraud Protection
Open
InfoSec. Cyber Intelligence platforms
Open
InfoSec. Data Leak Prevention (DLP)
Open
InfoSec. Database and file storage protection
Open
InfoSec. DDoS Attack Prevention
Open
InfoSec. DevSecOps
Open
InfoSec. Encryption tools
Open
InfoSec. Endpoint protection (EPP, EDR)
Open
InfoSec. Identity Governance and Access Rights Management (IDM, IAM, IGA)
Open
InfoSec. Intellectual Property Protection
Open
InfoSec. Mail server protection
Open
InfoSec. Means of protecting information from unauthorized access
Open
InfoSec. Protect of an Industrial Automatic Control System (IACS)
Open
InfoSec. Protecting Cloud and Virtual Environments
Open
InfoSec. Protection against targeted attacks (Sandbox)
Open
InfoSec. Protection of remote workstations and mobile devices
Open
InfoSec. Security information and event management (SIEM)
Open
InfoSec. Security Orchestration, Automation and Response (SOAR)
Open
InfoSec. Security Web Gateway (SWG)
Open
InfoSec. Training of personnel to protect against cyberthreats
Open
InfoSec. Vulnerability Scanner
Open
InfoSec. Web Application Firewall (WAF)
Open
Internet of Things (IoT)
Open
Mac OS Software
Open
Mobile Apps
Open
Multimedia
Open
Operating Systems (OS)
Open
Remote device management
Open
Science & Education
Open
Software Development
Open
Speech technology, computer vision
Open
Text Processors
Open
Video calling and web conferencing
Open
Virtualization
Open
Visualization and data analysis
Open