Suggested Categories:

3D Modeling Software
3D modeling software is designed to create, edit, and manipulate 3D models used in a wide range of industries such as gaming, film production, architecture, and product design. These tools allow users to create 3D representations of objects, environments, and characters by manipulating shapes, textures, and materials in a digital space. Features typically include modeling tools for mesh creation, sculpting, texturing, and rigging, as well as rendering capabilities to visualize the final design. 3D modeling software is essential for prototyping, visualizing concepts, and preparing models for applications such as 3D printing, virtual reality (VR), and augmented reality (AR).
3D Printing Software
3D printing software is software that prepares and optimizes 3D models for printing on 3D printers. These tools typically include features such as file conversion (e.g., STL, OBJ), model slicing (dividing the model into layers), material selection, and print job management. The software ensures that the digital model is ready for physical production by adjusting settings like print speed, temperature, and support structures. It also helps users preview the final print, simulate printing paths, and monitor print progress. 3D printing software is essential for industries like manufacturing, product design, healthcare, and prototyping, enabling users to bring digital concepts to life through additive manufacturing.
3D Architecture Software
3D architecture software is software that helps architects and designers create detailed 3D models of buildings and structures. These tools provide functionalities for designing floor plans, visualizing architectural designs in 3D, and simulating how a structure will look in the real world. Features typically include tools for building information modeling (BIM), material selection, lighting simulation, and rendering. This software allows users to experiment with different design concepts, making it easier to visualize spaces, optimize layouts, and create realistic presentations for clients. It is widely used in architectural design, urban planning, interior design, and construction industries.
3D Scanning Software
3D scanning software are apps that allow users to capture, process, and analyze three-dimensional data from real-world objects or environments. These platforms enable the conversion of physical objects into accurate 3D digital models, often using technologies such as laser scanning, photogrammetry, or structured light scanning. With 3D scanning software, users can manipulate and edit these models for purposes like design, prototyping, or reverse engineering. The software typically includes features for mesh generation, texture mapping, and data visualization, ensuring that the digital replica accurately represents the physical object. Industries like manufacturing, engineering, and entertainment use 3D scanning software to streamline production processes, enhance precision, and improve product development.
3D Painting Software
3D painting software enables users to apply textures, colors, and materials directly onto 3D models, simulating real-world painting techniques in a virtual environment. These tools allow for detailed surface painting, including shading, UV mapping, and material editing, enabling artists to create realistic or stylized textures for characters, objects, and environments. 3D painting software is commonly used in industries like video game development, animation, visual effects (VFX), and product design to add visual detail and realism to 3D models. Some advanced features include dynamic brush tools, layer management, and real-time rendering to see how the paint interacts with lighting and surfaces.
3D Rendering Software
3D rendering software is used to generate realistic or stylized images from 3D models by simulating lighting, textures, and materials. These tools help designers, architects, animators, and game developers create high-quality visual representations of their designs, scenes, or products. 3D rendering software typically includes features like ray tracing, shading, texture mapping, and motion blur to enhance the realism of the images. It is used in various industries such as architecture, entertainment, product design, and virtual reality to visualize and present concepts before physical production.
3D Character Creators
3D character creator software allows users to design, customize, and animate lifelike or stylized three-dimensional characters for games, films, virtual reality, and other digital media. It offers tools for modeling, texturing, rigging, and posing characters with options to modify facial features, body types, clothing, and accessories. Many platforms include libraries of pre-made assets and support integration with animation and game engines for seamless workflow. By simplifying complex 3D design processes, these tools empower artists and developers to bring unique characters to life efficiently. Ultimately, 3D character creator software enhances creative expression and accelerates content production in digital entertainment.
3D Viewers
3D viewers software is used to view and interact with 3D file types and 3D objects on a computer. It provides an intuitive user interface, allowing users to rotate and zoom in on 3D models. Many of these viewers come with collaboration tools, enabling users to work together on the same model. Additionally, they offer advanced features such as simulation, version control, and scripting for more complex usage.
3D Photo Apps
3D photo apps allow users to create immersive, three-dimensional images and videos. These apps typically come with a range of features such as the ability to rotate images, edit color, and add effects and objects. They are available on both mobile and desktop platforms and offer an alternative way of capturing and sharing memorable moments. With 3D photo apps, users can explore a world beyond two dimensions.
3D Configurator Software
3D configurator software enables users to customize products in real time using interactive three-dimensional models. It allows customers to modify features such as size, color, materials, and components while instantly visualizing the results. These tools are commonly used in industries like eCommerce, manufacturing, automotive, furniture, and real estate to improve buyer engagement. 3D configurator software integrates with pricing, inventory, and ordering systems to support accurate quotes and purchases. By delivering immersive and personalized experiences, it helps businesses increase conversions and reduce sales friction.
3D Collaboration Software
3D collaboration tools are software applications that enable users to collaboratively create 3D designs, models, and interactive 3D scenes. These tools enable users to share these creations or projects in real-time with others, regardless of location. They allow for a much more immersive experience than traditional document sharing. With the ability to manipulate objects in real-time from anywhere in the world, 3D collaboration tools offer an innovative way for teams to work together. Moreover, they provide the benefit of reviewing and enhancing 3D models without needing physical access to them.
3D Parts Catalog Software
3D parts catalog software enables organizations to manage their industrial 3D parts. 3D parts catalogs, sometimes referred to as electronic parts catalogs, are useful for manufacturers who want to build a catalog of their 3D parts for use in distribution and production, as well as sales teams and ecommerce distributors that want to showcase 3D part models to potential clients.
3D Product Visualization Software
3D product visualization software is software that allows users to create detailed and realistic 3D models of physical products. This software utilizes advanced rendering techniques to accurately depict textures, colors, and lighting effects of the product. Users can manipulate the model by rotating, zooming, and adding animation to showcase various angles and movements of the product. These programs also offer customizable features such as changing backgrounds, adding labels or logos, and adjusting camera angles for a more personalized presentation. 3D product visualization software is commonly used in industries such as architecture, manufacturing, marketing, and e-commerce to create visually appealing representations of products.
Medical 3D Visualization Software
Medical 3D visualization software enables healthcare professionals to create, analyze, and interact with detailed three-dimensional models of anatomical structures, medical scans, and surgical plans. It integrates data from imaging technologies like MRI, CT, and ultrasound to provide enhanced spatial understanding for diagnosis, treatment planning, and medical education. Surgeons use it to simulate procedures, improving precision and reducing risks, while researchers leverage it for studying complex biological systems. The software often includes tools for segmentation, volumetric rendering, and real-time manipulation of medical images. By offering an immersive and intuitive way to explore patient-specific data, medical 3D visualization enhances decision-making and improves patient outcomes.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
AI 3D Model Generators
AI 3D model generators are software tools that use artificial intelligence to create virtual three-dimensional objects. These objects can be used in a variety of applications, ranging from animation to architecture and engineering. AI 3D model generators typically offer more realistic results than traditional methods, due to their ability to simulate physical characteristics such as textures and lighting. They are also capable of creating models with greater detail than manual methods, allowing for high-quality visuals in a shorter time frame.
3D Point Cloud Annotation Software
3D point cloud annotation tools are designed to help users label and categorize 3D data points captured by technologies such as LiDAR or photogrammetry. These tools allow for the precise marking of points or regions within the cloud, facilitating tasks such as object detection, feature extraction, and spatial analysis. Users can apply various annotations, including labels, tags, and classifications, to enrich the dataset for further analysis or machine learning applications. The tools often include features like interactive visualization, zooming, and measurement capabilities to ensure accurate annotation in complex 3D environments.
3PL Software
3PL (Third-Party Logistics) software is designed to help businesses manage and streamline their outsourced logistics operations, including warehousing, transportation, and distribution.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
  • 1
    Jscrambler

    Jscrambler

    Jscrambler

    ...Jscrambler’s Code Integrity product safeguards first-party JavaScript through state-of-the-art obfuscation and exclusive runtime protection. Jscrambler’s Webpage Integrity product mitigates threats and risks posed by third-party tags, while ensuring compliance with PCI DSS v4 requirements 6.4.3 and 11.6.1. Jscrambler serves a range of customers, including top Fortune 500 companies, online retailers, airlines, media outlets, and financial services firms.
    Partner badge
    View Software
    Visit Website
  • 2
    FaceTec

    FaceTec

    FaceTec

    The FaceTec interface makes 3D Liveness Detection and 3D Face Matching fast, easy, and incredibly secure for everyone, regardless of their device. During onboarding, FaceTec’s two-second video-selfie verifies 3D liveness, matches the user’s 3D Face to their Photo ID, OCRs the text on their ID, and sets up their new account. Every time they return, FaceTec’s ongoing user authentication again proves 3D Liveness and compares their new 3D FaceMap to the one stored from onboarding. ...
  • 3
    Modirum 3-D Secure
    Modirum is a global leader in 3-D Secure authentication and payment security solutions, helping issuers, acquirers, and merchants prevent online payment fraud. Its suite of products—including Modirum DS, ACS, MPI, SDK, and VPOS Payment Gateway—supports EMV® 3-D Secure standards for seamless and secure card-not-present transactions. The company’s technology enables risk-based and biometric authentication, ensuring a frictionless checkout experience while maintaining robust compliance with EMVCo and payment network requirements. ...
  • 4
    D3 Smart SOAR

    D3 Smart SOAR

    D3 Security

    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency.
  • 5
    i3D.net

    i3D.net

    i3D.net

    "i3Dꓸnet is a leading provider of scalable hosting solutions for game studios and enterprises. Our unique infrastructure spans from Seattle to Sydney, Tokyo to Santiago, and everything in between. This high-performance network combined with our gaming expertise helps us to deliver low latency experiences across the globe. Since 2019, i3Dꓸnet is a proud member of the Ubisoft family, which allows us to help even more customers to deploy, manage and scale their games and applications across the globe.
  • 6
    RECOGNITO

    RECOGNITO

    RECOGNITO

    ...Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID, Passport Document OCR and MRZ, Barcode Analysis - Features • On-premise, Fully offline and On-device SDK • Compact Library-type SDK for easy on-premise installation. • Simple and comprehensive API.
    Leader badge
    Starting Price: Free
  • 7
    NetGuardians

    NetGuardians

    NetGuardians

    ...Traditional anti-fraud practices find it all but impossible to efficiently prevent payment fraud. Most rely on hundreds of static, reactive rules that fail to detect new fraud patterns and trigger too many poor hits. Leveraging award-winning 3D artificial intelligence (3D AI) technology, NetGuardians’ platform NG|Screener monitors all of the bank’s payment transactions in real-time catching more fraud with fewer false positives. It identifies suspicious payments coming from social engineering techniques or scams (such as invoice redirection, love scams, CEO-fraud) and ties this in with digital banking fraud indicators (such as eBanking/mBanking sessions redirected by malware, hijacked by hackers or account takeover fraud resulting from identity theft).
  • 8
    Wibmo

    Wibmo

    Wibmo

    We enable banks and fintechs to leverage the full power of technology. Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. ...
  • 9
    Alcatraz AI

    Alcatraz AI

    Alcatraz AI

    ...Our robust access control unit combines superior intelligence with a modern design. Powered by machine learning at the door, the Rock ensures real-time authentication, analytics, and access control. With 2D and 3D sensors onboard capturing data, the Rock’s analytical prowess outclasses other security options. Get ready for incredible accuracy and effortless user interaction. With 3D facial mapping and deep neural networks, the Rock can authenticate users in real time for the smoothest experience possible. Pair the access control system with any third-party badge reader for a 2F or 3F security solution in more restricted areas. ...
  • 10
    NINJIO

    NINJIO

    NINJIO

    ...With NINJIO you get: - NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks. - NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization. - NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
  • 11
    Casbin

    Casbin

    Casbin

    ...It offers flexible policy storage options, supporting various databases like MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3. The library also features a role manager to handle RBAC role hierarchies and supports filtered policy management for efficient enforcement.
    Starting Price: Free
  • 12
    Domdog

    Domdog

    Domdog

    Domdog is the most flexible and no-nonsense solution for compliance with 6.4.3 and 11.6.1 requirements of PCI DSS 4.0.1. Every organization has different preferences and constraints regarding what new systems they can integrate into their payment pages. With this in mind, Domdog has been designed to support Remote Scanning, JavaScript Agent, and Content Security Policy. This ensures that no matter what an organization's preferences are, Domdog can help them meet the 6.4.3 and 11.6.1 requirements with the least amount of effort and friction. ...
  • 13
    Oz Liveness

    Oz Liveness

    Oz Forensics

    Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. ...
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 14
    Nxt

    Nxt

    Jelurida Swiss

    ...With its many easy to use modular built-in features, Nxt covers most of the dApp use cases and at the same time is perfectly suitable for private blockchain implementations. Nxt was the first to implement a pure proof-of-stake consensus protocol.
  • 15
    PicKey

    PicKey

    PicKey

    PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. Instead of memorizing password strings, users simply authenticate with their chosen Vision Secret photo plus a 3D Keymoji selection, and PicKey’s AI recognizes the image even under variations in lighting or angle, mirroring human photographic memory and making login intuitive and memorable while enhancing resistance to brute-force, phishing, and keylogging attacks.
    Starting Price: $4 per month
  • 16
    Facia

    Facia

    Facia.ai

    ...Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses.
  • 17
    Hacken

    Hacken

    Hacken

    Hacken is a trusted blockchain security auditor on a mission to make Web3 a safer place. With a team of 60+ certified engineers, Hacken provides solutions covering all aspects of blockchain security, such as Smart Contract Audit, Blockchain Protocol Audit, dApp Audit, Penetration Testing, CCSS Audit, Proof of Reserves, DORA Compliance, Tokenomics Audit and design. From security audits and bug bounties to DORA Compliance, AML Monitoring, and Threat-Led Penetration Testing, Hacken delivers solutions that bridge innovation and compliance. ...
  • 18
    Memberstack

    Memberstack

    Memberstack

    Beautiful user logins & payments for any website. You control where your website & content lives. 1. Install a JavaScript code snippet to your website. 2. Set membership plans, pricing and permissions for your website. 3. Manage members through a simple dashboard. Say goodbye to authentication and payment problems — gate website pages and content to create web applications. Start accepting payments quickly with our one-click Stripe integration. 100% free, unlimited trial — upgrade only when you're ready to launch. ...
    Starting Price: $25 per month
  • 19
    Hitex SafeTpal
    SafeTpal from Hitex GmbH is a modular Safety & Security Suite for the AURIX TC3xx microcontroller family designed to simplify embedded safety and security development. It supports applications up to ISO 26262 ASIL-D and IEC 61508 SIL-3, as well as security standards such as ISO 21434, CERT-C, and MISRA-C. It combines qualified software components (drivers, HAL, bootloader/OTA packages) with reference designs, training, documentation, and flexible service packages to cover every stage of the V-model: concept & architecture, development, test & validation, and production. ...
  • 20
    ScrapingBypass

    ScrapingBypass

    ScrapingBypass

    ScrapingBypass Web Scraping API can bypass all anti-bot detection, Bypass Cloudflare, CAPTCHA verification, WAF, and CC protection. Provides HTTP API and Proxy with a built-in global exclusive high hidden static residential proxy IP. Includes interface address, request parameters, return processing. Also allows setting of Referrer, browser UA, headless status, and other browser fingerprint device features. Support: Python, Curl, Java, NodeJS Bypass CAPTCHA Verification Code Available...
    Starting Price: $5.9/3 days
  • 21
    Cisco Catalyst Center
    ...Proactively scale your network using deep insights into capacity and performance. Improve time to resolution with AI diagnostics and remediation. Optimize Wi-Fi coverage and deliver services where they're needed with 3D visualization. Gain visibility into the user experience and improve hybrid work experience with application insights.
  • 22
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. ...
  • 23
    GPayments

    GPayments

    a neurocom company

    GPayment provides a complete range of Fraud Prevention products based on the 3D Secure protocol, Verified by Visa, Mastercard SecureCode, JCB J/Secure, American Express SafeKey and Diners Club International ProtectBuy. Reduce credit card fraud and eliminate chargebacks through liability shift. Reduce the potential for online fraud and stay in control of authenticating transactions. Collect a rich dataset for more accurate risk based authentication.
  • 24
    Arkose MatchKey

    Arkose MatchKey

    Arkose Labs

    ...In fact, Arkose MatchKey is the strongest CAPTCHA ever made. Arkose MatchKey is a state-of-the-art series of challenges with industry-leading security. An unparalleled variety of 3D imagery. Our strongest challenges may produce more than 1,250 variations of a problem to solve. All are incredibly easy for legitimate users, but the variety makes it incredibly difficult to solve with automation. We use a key image to solve the largest problem with challenge design: Conveying instructions that are universally understandable across all languages and cultures. ...
  • 25
    HiTRUST

    HiTRUST

    HiTRUST

    HiTRUST is a leading provider of identity authentication solutions, specializing in secure and seamless digital transactions. As a market leader in 3-D secure technology, HiTRUST offers innovative services that prioritize security, reliability, convenience, and mobile-friendliness. Their solutions include passwordless authentication through VeriFIDO, which leverages public key cryptography to eliminate the need for passwords, and comprehensive fraud detection systems that ensure safe and frictionless checkout processes. ...
  • 26
    Fork

    Fork

    VerSprite Cybersecurity

    ...Fork provides a unified security insights dashboard that correlates threats with your application’s attack surface and integrates trusted frameworks and taxonomies such as MITRE, OWASP, CWE, CVE (with EPSS), CAPEC, ATT&CK, D3FEND, and ASVS to drive targeted mitigations and actionable outcomes.
  • 27
    Entersekt

    Entersekt

    Entersekt

    ...Engage your customers with highly relevant and intuitive experiences no matter their chosen touchpoint. Checking out: Digital banking, mandates, and the user experience factor. Revisiting authentication in the age of SRC and EMV 3-D Secure. Introducing the Entersekt Secure Platform. Establish trust, identify your user and provide them with new and innovative experiences that drive brand. Offer a smooth, highly secure remote registration and card provisioning process to boost adoption and revenue. Entersekt Customer Authentication Solution. Eliminate account takeover fraud with a compliant solution spanning all your digital channels. ...
  • 28
    ThreatWarrior

    ThreatWarrior

    ThreatWarrior

    ...The platform simplifies and unifies multiple clouds and environments to deliver complete protection from one consolidated location. Our SaaS platform identifies, classifies and protects every network-connected ‘thing’ and provides a rich 3D Universe that shows real-time traffic, communication, and connections between those assets.
  • 29
    TrulySecure
    ...Sensory’s novel approach utilizing passive face liveness, active voice liveness, or a combination of the two leverages a deep learning model that nearly eliminates spoofs from fraudsters using 3D masks, photos, video recordings, and more.
  • 30
    PAAY

    PAAY

    PAAY

    ...All it takes is a click or a tap, and in that millisecond of a purchase, lives PAAY. It’s hard enough to make sales online, let alone lose them to fraudulent chargebacks or false declines. As a certified provider of EMV 3-D Secure, we authenticate buyers to protect purchases for merchants. PAAY provides issuers with additional data, so they are better informed and accept more payments. PAAY provides you with authentication data to improve internal fraud algorithms and risk-based workflows. PAAY decreases time and resources spent on disputes, manual reviews, and fraud prevention.
  • Previous
  • You're on page 1
  • 2
  • Next