There are no download statistics for the selected dates.

Suggested Categories:

School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
Compliance Training Software
Compliance training software enables organizations to train their workforce on various topics such as anti-harassment, ethics, workplace safety, diversity and inclusion, financial fraud, and more. Compliance training programs, also known as compliance learning management systems (LMS), help companies improve their workplace and remain compliant with HR regulations.
Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Gymnastics Software
Gymnastics software is software for gymnastics clubs, coaches, and organizations to manage their operations, training, and competitions. These platforms often include features like scheduling, attendance tracking, athlete management, progress tracking, and score management for competitions. Gymnastics software can help coaches create personalized training plans, monitor skill development, and track individual athlete performance over time. Additionally, the software may offer tools for registration, payment processing, and communication with athletes and parents. It streamlines administrative tasks, improves organization, and enhances the overall experience for athletes and coaches.
Fire Department Software
Fire department software helps fire stations manage incident reporting, personnel scheduling, equipment tracking, and overall operational readiness. It streamlines workflows such as dispatch coordination, training management, hydrant inspections, and response documentation. Many platforms integrate with CAD systems and provide mobile access so firefighters can quickly retrieve critical information in the field. The software also supports compliance reporting, analytics, and performance reviews to help departments meet regulatory requirements and improve service outcomes. Overall, fire department software enhances communication, efficiency, and safety for emergency response teams.
Skills Management Software
Skills management software enables organizations to identify, monitor, track, and analyze the skills and skillsets of their workforce. These platforms typically include features for skill assessments, employee skill inventories, training and development tracking, and skills gap analysis. Skills management software allows HR teams and managers to identify skill shortages, match employees with appropriate projects, and create personalized learning and development plans. It also helps organizations align their workforce's capabilities with business objectives, ensuring they have the right skills for current and future needs.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Cybersecurity Software
Cybersecurity software is a category of technology used to protect computers and networks from malicious attacks. It operates by monitoring activity and blocking suspicious activity, as well as providing advanced security features such as encryption and authentication. It's an important tool for businesses to help ensure the safety of their data and systems.
  • 1
    Atomic ModSecurity Rules
    ...WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - And much more * Atomicorp developed the first ModSecurity rule set and maintains the largest number of active WAF rules that support server types from Tomcat and Nginx to IIS, LightSpeed and Apache. * Atomic ModSecurity Rules are the most comprehensive WAF rule set in the industry, have the highest level of quality and are fully backed by expert support. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******
  • 2
    Voxility DDoS Protection
    Voxility DDoS protection is used to protect online games, DNS, TCP services, HTTPS and HTTP websites. This service is compatible with almost any application and protects networks and their downstream customers against volumetric or application specific DDoS attacks of up to 1 Tbps. The Anti-DDoS Tunnel is an automated solution that filters the traffic only when an attack is detected. It is compatible with all edge routers supporting GRE or L2TP and gives the network total control of which subnets are advertised through this tunnel via BGP advertisements. ...
    Starting Price: $468 per month
  • 3
    Virus Vanish

    Virus Vanish

    DigitalBulls

    Virus Vanish is an antivirus program that ensure the device security in all aspects. It helps device to detect malicious files after scanning and removes all kinds of threat involved in it. It helps to improve the speed and performance of the device.
    Starting Price: $99
  • 4
    APIVoid

    APIVoid

    APIVoid

    APIVoid is a powerful suite of cybersecurity APIs that enables seamless threat detection, analysis, prevention, and data enrichment through simple JSON‑based HTTPS POST requests. It includes specialized APIs such as IP reputation (70+ scanning engines, detection of proxy, VPN, TOR, hosting, and IP geolocation), domain reputation (30+ engines, domain age detection and risky category identification), URL reputation (70+ security checks for phishing and suspicious URLs, providing detailed insights), email verify (detection of fake, temporary and suspicious emails, flagging misconfigured domains), phone validator (number validation and normalization with international/E164 formatting, carrier and line‑type identification, and fake or abusive number detection), and site trustworthiness (assigning trust scores to websites to identify fraudulent or insecure web shops).
    Starting Price: $20 per month
  • 5
    prooV

    prooV

    prooV

    prooV is an all-in-one software proof-of-concept solution that allows enterprises and vendors to efficiently collaborate using custom-made testing environments. The prooV PoC Platform is your end-to-end solution for managing proofs-of-concept from A to Z. It offers you a radical new approach to managing your PoCs where you can evaluate, track and analyze vendor solutions all on one platform. This allows you to bring order and simplicity to an otherwise chaotic process with multiple stages...
  • 6
    LUCY Security Awareness Training
    Train. phish. assess. engage. alarm. Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses. Turn employees into a human firewall with simulated attacks and our E-Learning platform with hundreds of preconfigured videos, training, quiz ready for usage. The most powerful IT Security Awareness Solution in the market. Fixed Prices | On-Premise or SaaS | Phish-Button | Threat Analytics | Over 10.000 installations...
  • Previous
  • You're on page 1
  • Next