Suggested Categories:

One-on-One (1:1) Meeting Software
One-on-one meeting software tools for managers are specialized software designed to facilitate private and productive conversations with team members. These tools typically include features like video conferencing, agenda setting, note-taking, and task management, which help managers conduct structured and focused meetings. They often provide scheduling functionalities to coordinate meeting times and integrate with calendar systems for ease of planning.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
All-in-One Marketing Software
All-in-one marketing platforms are comprehensive software solutions designed to streamline and automate various marketing tasks and processes across multiple channels. These platforms provide a suite of integrated tools that support email marketing, social media management, lead generation, analytics, customer segmentation, and campaign automation. By centralizing marketing efforts, they help organizations improve efficiency, deliver consistent messaging, and track performance in real-time.
On-Demand Staffing Platforms
On-demand staffing platforms and services are online platforms that provide a marketplace for employers to hire hourly and shift workers for temporary positions. On-demand staffing service providers can enable employers to hire temporary workers directly, or through a staffing agency.
Virtual Try-On Software
Virtual try-on software is a type of interactive technology that allows users to virtually experiment with different styles or looks. It utilizes computer vision, machine learning and augmented reality to provide an accurate representation of how clothes would look on the user. This technology has become increasingly popular as online shopping becomes more common.
On-Demand Catering Software
On-demand catering software is software designed to streamline the process of managing and organizing catering services. With this software, users can easily create menus and manage orders in real-time. The platform also allows for efficient communication between clients, vendors, and event venues. Additionally, the software offers customizable features to fit the specific needs of each individual business. Overall, on-demand catering software provides a convenient and modern approach to catering management.
Advocacy Software
Advocacy software is a platform designed to support organizations in mobilizing supporters, engaging stakeholders, and driving action on important issues. It provides tools for creating petitions, organizing campaigns, and facilitating communication with policymakers, helping users advocate effectively for change. With features like targeted messaging, contact management, and social media integration, advocacy software empowers organizations to reach the right audience and amplify their message. Many platforms also offer analytics to track campaign performance and measure supporter engagement, allowing for data-driven decision-making. By streamlining outreach efforts, advocacy software enhances the impact and efficiency of advocacy campaigns.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Community Software
Community software provides organizations with the tools to build, manage, and engage online communities, enabling users to interact, collaborate, and share content. These platforms typically include features like discussion forums, messaging, content sharing, event management, and member directories. Community software is used by businesses, educational institutions, nonprofits, and other organizations to foster engagement, create support networks, and promote collaboration among members. It can be customized to suit different types of communities, such as customer communities, social groups, or professional networks, and can include tools for moderation, analytics, and member management.
Travel Software
Travel software encompasses a wide range of applications designed to simplify and automate various processes in the travel industry. These platforms provide tools for managing bookings, reservations, itineraries, customer interactions, and travel-related transactions. Travel software includes solutions for both travel agencies and travelers, offering features like trip planning, real-time updates, pricing comparisons, and travel experience management. By integrating with airlines, hotels, car rentals, and tour operators, travel software enables seamless travel arrangements and efficient operations across multiple channels. This software helps businesses in the travel industry streamline their operations, enhance customer service, and improve overall travel management.
Law Enforcement Software
Law enforcement software is used by public safety organizations to manage and keep track of cases, reports, legal documentation, and investigations.
Team Communication Software
Team communication software facilitates effective interaction and collaboration within organizations by providing tools for messaging, voice and video calls, file sharing, and project coordination. It often includes features like group channels, threaded conversations, presence indicators, and integrations with other business applications to streamline workflows and keep everyone aligned. The software supports real-time and asynchronous communication, helping teams stay connected regardless of location or time zone. By improving transparency and reducing communication silos, team communication software boosts productivity and decision-making. It is widely used across industries to support remote work, cross-functional collaboration, and internal communications.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Print On Demand Software
Print on demand software enables businesses to sell customized printed products without holding inventory or managing production in advance. It connects online storefronts with printing and fulfillment providers to automatically process orders as they are placed. The software supports product customization, order routing, and real-time status tracking. Many platforms integrate with eCommerce systems, marketplaces, and payment processors to streamline sales and fulfillment. By eliminating upfront inventory costs, print on demand software allows businesses to scale efficiently and offer a wide range of personalized products.
Call Accounting Software
Call accounting software tracks, records, and analyzes telephone usage within an organization to help manage costs and improve communication efficiency. It captures details such as call duration, destination, extensions used, and associated costs across VoIP, PBX, or unified communications systems. The software provides reports that help businesses identify misuse, allocate expenses to departments, and optimize telecom spending. Many platforms also include security features like fraud detection and alerts for unusual calling patterns. Overall, call accounting software gives organizations greater visibility into their phone systems while reducing unnecessary costs.
Sandbox Software
Sandbox software enables IT professionals and developers to create a sandbox on their machine, or a virtual sandbox in the cloud, in order to isolate potentially dangerous programs and applications for testing and development.
Business Management Software
Business management software is a suite of tools designed to help organizations streamline and automate various operational processes, including project management, financial tracking, resource allocation, and workflow optimization. These platforms offer features for managing tasks, employees, budgets, and client relationships, enabling businesses to improve efficiency, reduce costs, and enhance decision-making. Business management software often includes modules for accounting, inventory management, human resources, and customer relationship management (CRM), allowing for centralized control over critical business functions. By automating routine tasks and providing real-time data insights, these solutions support strategic planning and operational growth.
Data Lake Solutions
Data lake solutions are platforms designed to store and manage large volumes of structured, semi-structured, and unstructured data in its raw form. Unlike traditional databases, data lakes allow businesses to store data in its native format without the need for preprocessing or schema definition upfront. These solutions provide scalability, flexibility, and high-performance capabilities for handling vast amounts of diverse data, including logs, multimedia, social media posts, sensor data, and more. Data lake solutions typically offer tools for data ingestion, storage, management, analytics, and governance, making them essential for big data analytics, machine learning, and real-time data processing. By consolidating data from various sources, data lakes help organizations gain deeper insights and drive data-driven decision-making.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.
  • 1
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona...
    View Software
    Visit Website
  • 2
    Feroot

    Feroot

    Feroot Security

    Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis,...
    View Software
    Visit Website
  • 3
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. ...
  • 4
    DobiProtect

    DobiProtect

    Datadobi

    ...Set up quickly and manage easily with an intuitive interface. Protect as little or as much as needed on a flexible software-only license model. Every file on your source system is protected through an identical copy on your target system. DobiProtect will validate this copy to make sure that the content is exactly the same. When a file changes on the source, it is re-protected to the target.
  • 5
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. ...
    Starting Price: $35 one-time payment
  • 6
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. ...
  • 7
    Google VPC Service Controls
    ...Configure private communication between cloud resources from VPC networks spanning cloud and on-premises hybrid deployments. Take advantage of fully managed tools like Cloud Storage, Bigtable, and BigQuery.
  • 8
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    ...If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 9
    Trellix Data Encryption
    ...Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
  • 10
    Flow Security

    Flow Security

    Flow Security

    Flow is not just your cloud security tool with a data scanning utility. It is the only platform that analyzes both data at rest and data in motion. By also following and analyzing all data flows in runtime, the platform enables security teams to regain control over all their data, including shadow data stores and applications across all cloud, on-prem, and SaaS environments. Flow’s deep analysis of the organization’s data journey from origin to destination allows security teams to automatically catalog all their sensitive data (e.g. ...
  • 11
    Keyavi

    Keyavi

    Keyavi

    Our revolutionary, award-winning technology infuses every piece of data with so much intelligence that it automatically thinks and protects itself throughout its entire life cycle. Stop criminals in their tracks with Keyavi’s hijack-proof data security solution. We gave data a mind of its own to protect itself from cybercriminals, forever. How? By infusing multilayered security into actual data so that no single layer can be compromised without triggering protection mechanisms in the...
  • 12
    Protopia AI

    Protopia AI

    Protopia AI

    ...It enables enterprises to maximize the value of their data by breaking down silos while retaining full ownership and security. SGT supports deployment across diverse environments, including on-premises, hybrid, and multi-tenant clouds, optimizing GPU use for performance. It runs up to 14,000 times faster than traditional cryptographic methods, ensuring AI inference adds only minimal latency. The platform is designed to meet the needs of industries with strict data privacy requirements, such as finance, defense, and healthcare. ...
  • 13
    Dtex Systems

    Dtex Systems

    Dtex Systems

    ...Our approach is based on learning from employee behavior, not spying on them. We capture and synthesize hundreds of unique behaviors and automatically zero in on the ones that expose your organization to the greatest risk and inhibit operational excellence. Only DTEX delivers what other solutions promise. DTEX InTERCEPT is a first-of-its-kind Workforce Cyber Security solution that replaces first-generation Insider Threat Management, User Behavior Activity Monitoring, Digital Forensics, Endpoint DLP and Employee Monitoring tools with a lightweight, cloud-native platform that scales to thousands of endpoints and servers in hours with zero impact on user productivity and endpoint performance.
  • 14
    ALTR

    ALTR

    ALTR

    ...Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 15
    Cribl Stream
    Cribl Stream allows you to implement an observability pipeline which helps you parse, restructure, and enrich data in flight - before you pay to analyze it. Get the right data, where you want, in the formats you need. Route data to the best tool for the job - or all the tools for the job - by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders. As much as 50%...
    Starting Price: Free (1TB / Day)
  • 16
    Ping Identity

    Ping Identity

    Ping Identity

    ...Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 17
    AnySecura

    AnySecura

    AnySecura

    ...By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. ...
    Starting Price: $216/month
  • 18
    Acronis Cyber Protect
    Managing cyber protection in a constantly evolving threat landscape is a challenge. Safeguard your data from any threat with Acronis Cyber Protect (includes all features of Acronis Cyber Backup) – the only cyber protection solution that natively integrates data protection and cybersecurity. - Eliminate gaps in your defenses with integrated backup and anti-ransomware technologies. - Safeguard every bit of data against new and evolving cyberthreats with advanced MI-based protection...
    Starting Price: $85
  • 19
    DataGuard

    DataGuard

    DataGuard

    Achieve your security and compliance goals with DataGuard’s all-in-one platform, designed to simplify compliance with frameworks like ISO 27001, TISAX®, NIS2, SOC 2, GDPR, and the EU Whistleblowing Directive. DataGuard’s iterative risk management enables you to capture all relevant risks, assets and controls to reduce risk exposure from day one. Automated evidence collection and control monitoring ensure ongoing governance to safeguard your organization as it scales.
  • 20
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. ...
  • 21
    Rubrik

    Rubrik

    Rubrik

    A logical air gap prevents attackers from discovering your backups while our append-only file system ensures backup data can't be encrypted. You can keep unauthorized users out with globally-enforced multi-factor authentication. From backup frequency and retention to replication and archival, replace hundreds or thousands of backup jobs with just a few policies. Apply the same policies to all your workloads across on-premises and cloud.
  • 22
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB