About
CIMCON Software minimizes operational risks inherent in end-user computing (EUC) files. Risks include regulatory reporting errors, non-compliance, cyber risk, and fraud. EUCs include documents such as spreadsheets, models, Access databases, scripted applications using VBScript, R, Python and self-service analytics tools such as Tableau and QlikView. Banks rely heavily on end-user computing applications (EUCs) such as Excel spreadsheets and scripts for day to day operations because they allow users to react quickly to changing market conditions or regulations. Whether they are used for creating financial models, finance, accounting or complying with regulatory requirements, they need to be managed effectively. CIMCON Software offers solutions that create an inventory of all EUCs in your organization, identify the most critical files, detect errors; provide a visual map of data dependencies, and provide on-going monitoring and control of your most important EUCs.
|
About
With ClusterSeven Shadow IT Manager, gain control over the hidden spreadsheets and other data assets that put your enterprise at risk. Discover and manage the hidden, sensitive spreadsheets, applications, and data assets that lie outside of IT’s control – and create risk. Now you can easily and efficiently capture and maintain an inventory of the files your organization relies upon and monitor who’s making changes, helping you meet audit and compliance requirements and prevent problems before they impact your enterprise. Classify the risks associated with your newly discovered EUC files and organize them in a centralized database. Once you’ve established the spreadsheets your organization is using, you can carry out a deeper risk analysis on critical files using rules that matter to your business, such as the complexity of a formula or macro, use of sensitive terms in the file like “confidential,” inclusion of unprotected client or personal data, or the presence of hidden worksheets.
|
About
EGERIE benefits from a community of over 450 expert consultants trained and certified in our solutions. We share our knowledge with them and construct risk analyses jointly to ensure they meet users’ needs in terms of their markets and their specific situations. Agility and security must always be an integral part of cyber project management to create the conditions for effective risk detection and prevention. This is the whole purpose of risk analysis, which must be managed using an adaptive, dynamic model. To detect malicious behavior quickly and be as responsive and effective as possible when incidents occur, companies must strive to obtain maximum visibility over their infrastructure and their systems. This involves performing diagnostics and knowing which threats they may be exposed to and what they are covered against.
|
About
Wing Python IDE was designed from the ground up for Python, to bring you a more productive development experience. Type less and let Wing worry about the details. Get immediate feedback by writing your Python code interactively in the live runtime. Easily navigate code and documentation. Avoid common errors and find problems early with assistance from Wing's deep Python code analysis. Keep code clean with smart refactoring and code quality inspection. Debug any Python code. Inspect debug data and try out bug fixes interactively without restarting your app. Work locally or on a remote host, VM, or container. Wingware's 21 years of Python IDE experience bring you a more Pythonic development environment. Wing was designed from the ground up for Python, written in Python, and is extensible with Python. So you can be more productive.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Companies in need of a complete Cyber Risk Management solution to reduce end user computing and model risk across entire life cycle
|
Audience
Financial institutions searching for a solution to manage their operations
|
Audience
Organizations searching for a Cyber Risk Management solution that helps measure the results of risk mitigation efforts
|
Audience
Python developers seeking a tool to build applications
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationCIMCON Software
Founded: 1988
United States
www.cimcon.com
|
Company InformationMitratech
Founded: 1987
United States
mitratech.com/products/clusterseven/
|
Company InformationEGERIE
Founded: 2016
France
egerie.eu/en/egerie-software-platform-cybersecurity/
|
Company InformationWingware
Founded: 1999
United States
wingware.com
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
||||
|
|
|
|
|
|||
|
|
|
|||||
|
|
|
|
|
|||
Categories |
Categories |
Categories |
Categories |
|||
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
|
Application Development Features
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
|
|||||
Integrations
Amazon Web Services (AWS)
Apache Subversion
C
C++
Django
Docker
Emacs
Flask
Git
Google App Engine
|
Integrations
Amazon Web Services (AWS)
Apache Subversion
C
C++
Django
Docker
Emacs
Flask
Git
Google App Engine
|
Integrations
Amazon Web Services (AWS)
Apache Subversion
C
C++
Django
Docker
Emacs
Flask
Git
Google App Engine
|
Integrations
Amazon Web Services (AWS)
Apache Subversion
C
C++
Django
Docker
Emacs
Flask
Git
Google App Engine
|
|||
|
|
|
|
|