Xtralis References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (2186)
    Premium94+ References
  • 4.7 / 5.0 (3038)
    Premium96+ References
  • 4.7 / 5.0 (3608)
    Verified81+ References

Xtralis Testimonials

  • currently locked
  • currently locked
  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References94 total
    About

    Kisi develops cloud technology to build secure access control systems that use a combination of sensors and mobile devices to grant facility access to authorized personnel. Designed for commercial and enterprise applications, the Kisi system provides an added layer of intelligence and enhanced experience at all access points of the facility. The system software streamlines access management for operations teams while generating sophisticated data visualizations and personnel tracking for advanced IT departments. For the end user, Kisi works in the background to detect their presence and timely unlock doors for them as they approach.

  • Reference Rating
    4.7 / 5.0
    Customer References96 total
    About

    Mend, formerly known as WhiteSource, is the application security provider of choice for six out of 10 of the world’s most demanding software developers. With Mend, organizations can resolve the application security challenges that pain developers and security teams alike, so they can deliver secure software, faster. Mend secures all aspects of software, providing automated remediation from problem to solution versus only detection and suggested fixes. With more than 1,000 customers, Mend helps enterprises like Microsoft, IBM, and Comcast to improve their application security outcomes. For more information, visit www.mend.io.

  • Reference Rating
    4.7 / 5.0
    Customer References81 total
    About

    RSA provides more than 30,000 customers around the world with the essential security capabilities to protect their most valuable assets from cyber threats. With RSA’s award-winning products, organizations effectively detect, investigate, and respond to advanced attacks; confirm and manage identities; and ultimately, reduce IP theft, fraud, and cybercrime.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked