Affecto References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (1770)
    Verified27+ References
  • 4.8 / 5.0 (2154)
    13+ References
  • 4.8 / 5.0 (1718)
    6+ References

Affecto Testimonials

  • "Our requirement was that the solution has to show actual financial improvement immediately."

  • “People at Affecto knew our systems and from where to start. They informed us about the system capabilities, how things should be presented and done. On the other hand, we have had in-house discussions on what should be included in the tool. The process has worked well.”

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References27 total
    About

    GateKeeper is focused on bringing wearable technology to the enterprise security solutions marketplace. Untethered Labs has created hardware and software tools for automatically locking computer systems in an enterprise environment to prevent unauthorized access. Untethered Labs’ flagship product, GateKeeper, makes protecting computer data an afterthought using proximity-based authentication.

  • Reference Rating
    4.7 / 5.0
    Customer References13 total
    About

    Prolitus Technologies is a leading and trusted provider of open source solutions for your enterprise. Their knowledge coupled with years of experience makes us a one-stop solution for all your open source needs. Their beliefs and practical approach in providing IT solutions have landed us amongst the leading provider of open source solutions in the country.

  • Reference Rating
    4.7 / 5.0
    Customer References6 total
    About

    Securonix is re-defining the next generation of cyber-threat detection using the power of entity context, machine learning, and big data. Their purpose-built, security analytics platform mines, enriches, analyzes, scores and visualizes data into actionable intelligence on the highest risk threats. Using machine learning techniques that track user, account and system behavior, Securonix detects the most advanced insider threats, cyber threats and fraud attacks in real-time.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked