We make it cheaper and easier to manage your waitlist, order backlog, and just about any other waiting scenario.
Streamline your customer flow with our SMS-powered waitlist, reservations, and queue management app for restaurants, health care providers, and many other businesses.
Free Trial
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
A generic SQL driven data audit tool for detecting differences between any JDBC accessible database tables and other data sources. Platform independent. It's a unix like diff for databases. Produces key values with the differing column name and data
Provides tools, supporting quality management or quality assurance for software: Assessment execution (ISO 15504 (SPiCE), AutomotiveSPiCE, CMMi), diff tool calculating sizes (SLoC) of diffs, identification of conditional compilation, and more.