Results for: information system

Suggested Categories:

Student Information System Software
A Student Information System (SIS) is a centralized software platform used by educational institutions to collect, manage, and track student‐related data throughout their academic lifecycle. It typically handles everything from admissions and enrollment, to class scheduling, attendance, grading, transcripts, and reporting. Many SIS platforms also provide portals for students, parents/guardians, and teachers to access relevant information, communicate, and collaborate. The system often integrates with other tools such as Learning Management Systems (LMS), finance/payroll modules, and analytics dashboards to support administration and academic decision‐making. By automating key administrative workflows and consolidating student data, an SIS helps institutions improve efficiency, transparency, student engagement, and compliance with educational regulations.
Radiology Information Systems
Radiology Information Systems (RIS) are computerized systems used to manage and store medical imaging data. This includes information such as patient demographics, medical history, test results and any related documentation. RIS enable medical professionals to access this data quickly and accurately in order to optimize the delivery of health care services. Additionally, these systems help streamline administrative processes like billing, scheduling, and reporting.
Laboratory Information Systems (LIS)
Laboratory Information Systems (LIS) are software solutions designed to manage, track, and organize data and workflows in medical and research laboratories. They streamline the handling of patient information, sample tracking, and test results, ensuring accuracy and efficiency throughout the testing process. LIS integrates with other healthcare systems, such as electronic health records (EHR), to facilitate seamless data exchange and improve clinical decision-making. The system also supports regulatory compliance by maintaining detailed records, ensuring data security, and managing quality control. Ultimately, LIS enhances lab productivity, reduces errors, and improves the overall management of laboratory operations.
Information Security Management System (ISMS) Software
Information Security Management System (ISMS) software helps organizations implement and manage frameworks that protect sensitive data and mitigate security risks. It automates the processes of establishing, monitoring, and enforcing information security policies, often following standards like ISO/IEC 27001. This software provides tools for risk assessment, incident tracking, compliance audits, and ongoing monitoring to ensure the organization's data remains secure. By streamlining these tasks, ISMS software enhances efficiency, reduces the risk of breaches, and ensures regulatory compliance. Overall, it supports a proactive approach to information security, safeguarding critical assets while improving operational resilience.
Utility Customer Information Systems (CIS)
Utility Customer Information Systems (CIS) are specialized software solutions designed to help utility companies manage customer-related data and services. These systems centralize and automate processes like customer billing, payment tracking, service requests, account management, and customer communication. CIS platforms provide utilities with tools to track energy consumption, manage tariffs, calculate bills, and handle disputes or inquiries efficiently. They often integrate with other utility management systems (such as asset management or outage management) to provide a seamless workflow and better customer service. By streamlining these processes, CIS solutions enhance operational efficiency, improve customer satisfaction, and ensure compliance with regulatory standards, all while reducing manual effort and errors.
Regulatory Information Management (RIM) Systems
Regulatory information management (RIM) systems are software systems designed to streamline and manage regulatory and compliance processes relating to pharmaceutical products, medical devices, and other medical products. Regulatory information management systems help manage regulatory information, product submissions, and more.
Operating Systems
Operating systems are foundational software that manage computer hardware, software resources, and provide services for applications and users. They handle critical functions such as process scheduling, memory management, device control, file systems, and security. Operating systems provide a user interface—either graphical (GUI) or command-line—that allows individuals to interact with the machine. They also offer APIs and system calls that enable developers to build and run applications consistently across devices. From personal computers to servers, mobile devices, and embedded systems, operating systems are essential for ensuring stability, efficiency, and usability in modern computing environments.
System Monitoring Software
System monitoring software is designed to track the performance, health, and availability of IT systems, including servers, networks, applications, and hardware. It continuously collects data such as CPU usage, memory consumption, disk activity, and network throughput to detect anomalies or potential failures. Many tools feature dashboards, alerts, and automated reports to help administrators respond quickly to issues before they impact end users. By providing real-time visibility, system monitoring software helps organizations maintain uptime, optimize resource usage, and improve troubleshooting efficiency. It is widely used in IT operations, DevOps, and enterprise environments to ensure system reliability and performance.
System Utilities
System utilities are specialized software tools designed to maintain, manage, and optimize computer systems. They assist with essential tasks such as file management, disk cleanup, backup, performance monitoring, and troubleshooting. Unlike applications built for end-user productivity, system utilities work behind the scenes to improve efficiency, stability, and security of the operating system. They can be built into the OS or installed as third-party tools to extend functionality. By automating maintenance and diagnostic tasks, system utilities help prolong system lifespan and ensure smooth day-to-day operations.
Comment Systems Software
Comment systems software allows websites to implement commenting features for their visitors through the use of text comment boxes.
Systems Engineering & MBSE Software
Systems engineering and MBSE software enables engineers and systems designers to create and simulate system designs using a GUI. Systems engineering software streamlines and simplifies the process of designing a system such as factory machines, industrial equipment systems, IoT systems, and more. Model-based systems engineering (MBSE) software enables systems designers to model systems based on specific requirements.
Business Phone Systems
Business phone systems are advanced communication networks designed to manage and streamline voice calls and other communication channels within organizations. They range from traditional landline systems to modern VoIP (Voice over Internet Protocol) solutions, offering features like call forwarding, voicemail, auto-attendants, and conferencing. These systems can be tailored to fit businesses of all sizes, from small startups to large enterprises, ensuring seamless internal and external communication. Many modern phone systems integrate with other business tools like CRM software to enhance productivity and customer service. Reliable and scalable, business phone systems play a crucial role in maintaining efficient operations and fostering collaboration.
Kitchen Display Systems
Kitchen display systems (KDS) are digital solutions used in commercial kitchens to streamline order management and improve communication between the front-of-house and kitchen staff. These systems replace traditional paper ticketing by displaying orders on screens, allowing kitchen staff to track and prepare dishes in real-time. KDS often integrates with point-of-sale (POS) systems, ensuring that orders are accurately transmitted directly to the kitchen as they are placed. Features such as color coding, timers, and order prioritization help improve efficiency, reduce errors, and enhance workflow. By using a kitchen display system, restaurants can speed up service, improve order accuracy, and create a more organized kitchen environment.
Alternative Trading Systems
Alternative trading systems (ATS), also known as multilateral trading facilities in some parts of the world, are electronic trading systems that enable buyers and sellers to match and execute orders with one another. Alternative trading systems can facilitate the sale of securities and other assets, including digital assets. Electronic communication networks (ECN) are an example of an alternative trading system.
Airline Reservation System Software
Airline reservation systems are software platforms that help airlines manage flight bookings, ticket sales, and passenger information in an organized and efficient way. They provide real-time details on flight schedules, seat availability, pricing, and inventory, making it easy for customers and travel agents to make or modify reservations. The system automates key tasks such as check-ins, cancellations, and payment processing while maintaining compliance with international airline standards. By connecting to global distribution networks, these platforms help airlines reach more customers and improve seat utilization. Ultimately, airline reservation systems enhance the travel experience and streamline operations across booking, service, and flight management.
Retail POS Systems
Retail point of sale systems are the tools that modern retailers use to process customer transactions. They integrate a variety of technologies including barcode scanners, cash drawers, and payment processing terminals. Retailers can customize their point of sale systems according to their unique needs, allowing them to track inventory, manage staff performance, and optimize customer experience. As with all technology investments, businesses should carefully evaluate their specific requirements when selecting a retail point of sale system.
Learning Management Systems (LMS)
A Learning Management System, or LMS, is a software platform used to create, deliver and manage online training programs. They provide instructors with the ability to design course content, track learner progress, assess performance and generate reports. Learners also benefit from self-paced learning options that are available through most systems. Additionally, an LMS can be tailored to meet specific organizational needs such as providing specialized learning paths for different job roles.
Safety Instrumented Systems
Safety Instrumented Systems (SIS) are a type of industrial automation system used to monitor and measure process variables such as pressure, temperature, flow, or level. The goal of SIS is to ensure safe operation of a process by responding to unsafe conditions with predetermined control actions. Safety systems use sensors to detect abnormal conditions in a system and respond appropriately. They can also provide monitoring and protection against failure of other sub-systems within the process. SIS allow for efficient operation while maintaining safety requirements set forth by regulatory agencies.
Building Management Systems
Building management systems (BMS) are software control systems used to manage and monitor various aspects of a building. They typically include hardware, software, and sensors to collect and analyze data related to energy usage, temperature control, lighting, security, and other building functions. Building management systems can be customized to fit the specific needs of a building and can be accessed remotely for easy monitoring and adjustments. These systems aim to improve efficiency, reduce costs, and enhance occupant comfort in commercial and residential buildings. Overall, building management systems play an important role in ensuring the smooth operation of buildings by providing centralized control and monitoring capabilities.
Security System Installer Software
Security system installer software allows security service providers to improve the efficiency of their services by optimizing the management of clients, costs, schedules, and inventory.
View more categories (20) for "information system"

360 Products for "information system" with 1 filter applied:

  • 1
    ELC Information Security

    ELC Information Security

    ELC Information Security

    ...More than 24 topics, monthly and annual training on phishing, ransomware, social engineering, and more. Your best defense is a good offense. Security awareness customizations include script edits, branding, and company-specific policy and contact information. Our security awareness training is compatible with smartphones, tablets, laptops, and desktops. Save time and increase productivity with custom security awareness training specific to your company. As the cybersecurity landscape rapidly transforms, we are committed to helping your workforce adapt and meet the challenges of maintaining secure information systems. ...
  • 2
    Carbide

    Carbide

    Carbide

    Carbide is a tech-enabled service that strengthens your company’s information security and privacy management capabilities. Our platform and expert services are tailored for companies aiming for a sophisticated security posture, particularly valuable for organizations that must meet rigorous compliance requirements of security frameworks like SOC 2, ISO 27001, HIPAA, GDPR, and more. With Carbide, you can benefit from continuous cloud monitoring and the educational resources of Carbide...
    Starting Price: $7,500 annually
    Partner badge
    View Software
    Visit Website
  • 3
    Getac Device Monitoring System (GDMS)
    Increase IT asset reliability with device monitoring, improving utility worker productivity, whilst helping to reduce operational costs. Increase operational efficiency for field service engineers with device monitoring for improved asset reliability. Boost productivity for remote workers with device monitoring to improve asset reliability and manufacturing efficiency. Device monitoring to enhance police operational effectiveness, minimizing downtime to meet the demands of frontline...
  • 4
    Systweak Advanced System Protector
    ...Keep your system protected against malicious threats and PUPs that cause slowdowns to enhance system performance and make it more stable.
    Starting Price: $39 one-time payment
  • 5
    Securden Unified PAM
    Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of...
    Starting Price: Per User Pricing
  • 6
    XGRC Product Range

    XGRC Product Range

    XGRC Product Range

    An Information Security Management System (ISMS) is a set of policies and procedures implemented by organizations to manage information risks such as cyber attacks or data theft. ISO 27001 is the auditable international standard that requires a company to establish, implement and maintain best-practice information processes via its ISMS. As with any other compliance standards, ISO 27001 follows the plan-do-check-act (PDCA) cycle.
  • 7
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader...
  • 8
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized...
  • 9
    Base27

    Base27

    Base27

    With Base27, you have all the tools at your disposal to inform employees, make processes secure, perform risk assessments quickly and easily, and continuously monitor and improve your information security. Keep control of potential risks with detailed analyses regarding scope, processes, information systems, and/or suppliers. All clearly mapped by threat models such as MAPGOOD, among others.
    Starting Price: €22.50 per month
  • 10
    ComplyWave

    ComplyWave

    ScanWave CTS

    ComplyWave is helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. ComplyWave provides comprehensive implementation services for ISO Services ComplyWave is a proven leader in providing Information Security services to the government and commercial organizations. Our security professionals have developed a proven system to support the implementation and audit/ guidance on all sections of ISO Information Security Management System (ISMS) and supporting risk management frameworks. ISMS Compliancy Services Our security team provide you with the level of support you need. ...
  • 11
    Key Control Dashboard

    Key Control Dashboard

    Yellowtail Control Solutions

    Demonstrable In-Control on process, performance, frameworks of standards, risks and audits. Municipalities & Provinces Curious about how you can effectively issue an In Control Statement, further professionalise the internal control and risk management function and comply with legislation such as the GDPR or BIO Information Security standards framework? Ministries, ZBOs & implementing organizations Discover how you can demonstrably be in control of your standards frameworks, information...
  • 12
    SearchInform SIEM

    SearchInform SIEM

    SearchInform

    SearchInform SIEM is a system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The system accumulates information from various sources, analyzes it, records incidents and alerts the designated staff. How the system works: •Collects events from various software and hardware sources: network equipment, third-party software, security tools, OS.
  • 13
    Protector

    Protector

    Equinox Information Systems

    Globally, telecom fraud costs companies nearly $40 billion every year. Just one incident of fraudulent international calls can inflict a $50,000 hit on your bottom line. Manual processes are labor-intensive and lack automated interventions to detect and stop fraud quickly. Protector, the most installed fraud management system in the U.S., is a powerful solution built upon years of experience and enhancements. A comprehensive, scalable solution now in its 11th generation, Protector leverages...
  • 14
    Hyena

    Hyena

    SystemTools Software

    ...Whether your organization is using Windows 2003, Windows 2019 or anything and everything in between, you can manage everything with one tool. Hyena, our comprehensive and award-winning Active Directory and Windows system management software, now includes multiple ways to mass-update Active Directory information : Use the new Active Task feature for mass updating and importing of Active Directory information, or use the Active Editor, an interactive Active Directory editor that lets you freely move around and modify directory information.
    Starting Price: $329
  • 15
    MaxPatrol

    MaxPatrol

    Positive Technologies

    MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks.
  • 16
    CertCrowd

    CertCrowd

    CertCrowd

    Software for governance, risk, and compliance doesn't need to be difficult nor expensive. Introducing CertCrowd - your SaaS solution for risk, compliance, and ISO. You've got bigger things to worry about than staying on top of compliance. Let CertCrowd handle the heavy lifting. Whether you're a seasoned pro, or just starting out, our intuitive GRC platform is designed to simplify your life. No more juggling multiple tools or drowning in paperwork.
    Starting Price: Free
  • 17
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages.
  • 18
    CBT Nuggets

    CBT Nuggets

    CBT Nuggets

    Learning IT doesn’t have to mean boring lectures, the frantic pace of bootcamps, or lots of time away from your job or family. With CBT Nuggets, you can train anytime, anywhere, at your own pace — all from the comfort of your office chair or living room couch. Our training team is made up of industry experts who truly enjoy teaching people IT. Their training is informative, relevant, and engaging — and because most videos are 10 minutes or less, it’s easier to retain information. Choose...
    Starting Price: $59 per user per month
  • 19
    Advanced PC Cleanup

    Advanced PC Cleanup

    Advanced PC Cleanup

    ...The scan will show how much storage space can be recovered from deleting all the unused files & old downloads. Clear up the personal information saved on the web browser. Fix all issues such as PC cleanup and boost performance in one click. Remove malware, and adware to save the system from any potential threats to data.
    Starting Price: $30 one-time payment
  • 20
    Cetbix GRC & ISMS
    In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. ...
  • 21
    OpenText Business Network
    Securely integrate people, systems and things across extended business ecosystems. Connecting expert people, proven processes and leading technologies for streamlined connectivity, secure collaboration and real-time business intelligence across an expanding network of internal systems, cloud applications, trading partner communities and connected devices. Connect people, systems and things on a single platform to ease digital business information exchange. ...
  • 22
    Cyberwatch

    Cyberwatch

    Cyberwatch

    ...Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 23
    GAT

    GAT

    GAT InfoSec

    Information security solutions to manage threats in technologies, people and processes. Manage your Security Program and reduce the risk of attacks, ransomware, data leaks and third-party risks. Integrated solutions to help create and maintain an SGSI (Information Security Management System) with prioritization and focus on the business context.
  • 24
    PersonID

    PersonID

    360 Biometrics

    ...Here's how it works. Individuals are enrolled into the system by capturing their fingerprints along with personally identifiable information and a photograph, if desired. When an individual needs to be identified, the system instantly matches the captured fingerprint against the enrolled fingerprints and displays the results with a match score, personal information, a photograph.
  • 25
    ins2outs

    ins2outs

    ins2outs

    ...Users can operate integrated systems that address multiple regulatory and standard requirements, manage electronic documentation collaboratively with traceability and export options.
    Starting Price: $25 per month
  • 26
    Hicomply

    Hicomply

    Hicomply

    Say goodbye to long email chains, hundreds of spreadsheets, and complicated internal processes. Stand out from the crowd. Increase your competitive advantage with key information security certifications, achieved quickly and easily with Hicomply. Build, house, and manage your organization's information security management system in the Hicomply platform. No more wading through piles of documents for the latest updates on your ISMS. View risk assessments, monitor project processes, check for outstanding tasks, and more, all in one place. ...
  • 27
    API Critique

    API Critique

    Entersoft Information Systems

    API critique is penetration testing solution. A major leap in REST API Security has been achieved with our first in the world pentesting tool. With the growing number of attacks targeted towards APIs, we have an extensive checks covered from OWASP and from our experiences in penetration testing services to provide comprehensive test coverage. Our scanner generates the issue severity based on CVSS standard which is widely used among many reputed organizations. Your development and...
    Starting Price: $199 per month
  • 28
    signer.digital

    signer.digital

    Chartered Information Systems

    signer.digital is the range of solutions which offer its users innovative ways to sign the documents and files and eInvoices, through it rage of procuts like, Bridge Application, REST APIs, Web Server and Web Libraries, DLLs and Free signer.digital Browser Extension. The signer.digital Bridge application can be setup in minutes for Digitally Signing with any of the existing ERP or application without writing a line of code, while the web server and libraries can be configured with any...
    Starting Price: $1
  • 29
    OpenText IAM
    Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. ...
  • 30
    CyberManager
    Time and cost-saving. Easy set-up & management, intuitive and user-friendly. Subscriptions suit your objectives and organization. Integrated management systems for cyber security, information security, privacy & business continuity. The CyberManager management system gives you full insight and control of an ISMS according to the ISO 27001, NEN 7510, or e.g. BIO norms, and is in line with the certification requirements. Tasks with clear deadlines can be assigned in a focused and often recurring manner, saving you time and money. ...
    Starting Price: €1,850 per year
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB