Name | Title | Contact Details |
---|
saaspoint USA is a San Francisco, CA-based company in the Software and Internet sector.
Realtime Technology Group Inc is a Mississauga, ON-based company in the Software & Internet sector.
A unique feature of this platform is that when you upload images that you have the rights to, you get paid for it when people download those images. Why get hundreds or thousands of likes on social media without getting paid for it? As an image owner, you gain fame, attract followers and earn money by being part of someone else’s fantasy. The DaF Mask application is a new frontier and we are thrilled to broaden our scope to attract new customers and customers who wouldn’t normally use VR/AR goggles. Couples can use the DaF Mask for private role-play and upload cherished images of the user`s spouse or licensed images of the user`s celebrity crush. The DaF Mask provides a truly augmented experience. Contact us today to be one of the first to try out this new application for Android and iOS mobile platforms.
Mantis Bug Tracker is a Plano, TX-based company in the Software & Internet sector.
Meet the Industry`s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization. - API Risk Posture Management: Tackle API Sprawl, head on. Instantly know where you are exposed. Enjoy automatic and continuous API discovery that gives you comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes. - Stop Data Exfiltration: Detect and block all known and unknown API attacks, including internal and external API attacks, the OWASP web and API top 10, business logic abuse attacks, API abuse, API fraud, and sensitive data exfiltration. - Threat Hunting: Ensure you are ahead of attackers by searching through the transaction data lake for potential threats. Immediately discover the signs of reconnaissance and take action before the full attack.