Suggested Categories:

3D Modeling Software
3D modeling software is designed to create, edit, and manipulate 3D models used in a wide range of industries such as gaming, film production, architecture, and product design. These tools allow users to create 3D representations of objects, environments, and characters by manipulating shapes, textures, and materials in a digital space. Features typically include modeling tools for mesh creation, sculpting, texturing, and rigging, as well as rendering capabilities to visualize the final design. 3D modeling software is essential for prototyping, visualizing concepts, and preparing models for applications such as 3D printing, virtual reality (VR), and augmented reality (AR).
3D Printing Software
3D printing software is software that prepares and optimizes 3D models for printing on 3D printers. These tools typically include features such as file conversion (e.g., STL, OBJ), model slicing (dividing the model into layers), material selection, and print job management. The software ensures that the digital model is ready for physical production by adjusting settings like print speed, temperature, and support structures. It also helps users preview the final print, simulate printing paths, and monitor print progress. 3D printing software is essential for industries like manufacturing, product design, healthcare, and prototyping, enabling users to bring digital concepts to life through additive manufacturing.
3D Architecture Software
3D architecture software is software that helps architects and designers create detailed 3D models of buildings and structures. These tools provide functionalities for designing floor plans, visualizing architectural designs in 3D, and simulating how a structure will look in the real world. Features typically include tools for building information modeling (BIM), material selection, lighting simulation, and rendering. This software allows users to experiment with different design concepts, making it easier to visualize spaces, optimize layouts, and create realistic presentations for clients. It is widely used in architectural design, urban planning, interior design, and construction industries.
3D Scanning Software
3D scanning software are apps that allow users to capture, process, and analyze three-dimensional data from real-world objects or environments. These platforms enable the conversion of physical objects into accurate 3D digital models, often using technologies such as laser scanning, photogrammetry, or structured light scanning. With 3D scanning software, users can manipulate and edit these models for purposes like design, prototyping, or reverse engineering. The software typically includes features for mesh generation, texture mapping, and data visualization, ensuring that the digital replica accurately represents the physical object. Industries like manufacturing, engineering, and entertainment use 3D scanning software to streamline production processes, enhance precision, and improve product development.
3D Painting Software
3D painting software enables users to apply textures, colors, and materials directly onto 3D models, simulating real-world painting techniques in a virtual environment. These tools allow for detailed surface painting, including shading, UV mapping, and material editing, enabling artists to create realistic or stylized textures for characters, objects, and environments. 3D painting software is commonly used in industries like video game development, animation, visual effects (VFX), and product design to add visual detail and realism to 3D models. Some advanced features include dynamic brush tools, layer management, and real-time rendering to see how the paint interacts with lighting and surfaces.
3D Rendering Software
3D rendering software is used to generate realistic or stylized images from 3D models by simulating lighting, textures, and materials. These tools help designers, architects, animators, and game developers create high-quality visual representations of their designs, scenes, or products. 3D rendering software typically includes features like ray tracing, shading, texture mapping, and motion blur to enhance the realism of the images. It is used in various industries such as architecture, entertainment, product design, and virtual reality to visualize and present concepts before physical production.
3D Character Creators
3D character creator software allows users to design, customize, and animate lifelike or stylized three-dimensional characters for games, films, virtual reality, and other digital media. It offers tools for modeling, texturing, rigging, and posing characters with options to modify facial features, body types, clothing, and accessories. Many platforms include libraries of pre-made assets and support integration with animation and game engines for seamless workflow. By simplifying complex 3D design processes, these tools empower artists and developers to bring unique characters to life efficiently. Ultimately, 3D character creator software enhances creative expression and accelerates content production in digital entertainment.
3D Viewers
3D viewers software is used to view and interact with 3D file types and 3D objects on a computer. It provides an intuitive user interface, allowing users to rotate and zoom in on 3D models. Many of these viewers come with collaboration tools, enabling users to work together on the same model. Additionally, they offer advanced features such as simulation, version control, and scripting for more complex usage.
3D Photo Apps
3D photo apps allow users to create immersive, three-dimensional images and videos. These apps typically come with a range of features such as the ability to rotate images, edit color, and add effects and objects. They are available on both mobile and desktop platforms and offer an alternative way of capturing and sharing memorable moments. With 3D photo apps, users can explore a world beyond two dimensions.
3D Configurator Software
3D configurator software enables users to customize products in real time using interactive three-dimensional models. It allows customers to modify features such as size, color, materials, and components while instantly visualizing the results. These tools are commonly used in industries like eCommerce, manufacturing, automotive, furniture, and real estate to improve buyer engagement. 3D configurator software integrates with pricing, inventory, and ordering systems to support accurate quotes and purchases. By delivering immersive and personalized experiences, it helps businesses increase conversions and reduce sales friction.
3D Collaboration Software
3D collaboration tools are software applications that enable users to collaboratively create 3D designs, models, and interactive 3D scenes. These tools enable users to share these creations or projects in real-time with others, regardless of location. They allow for a much more immersive experience than traditional document sharing. With the ability to manipulate objects in real-time from anywhere in the world, 3D collaboration tools offer an innovative way for teams to work together. Moreover, they provide the benefit of reviewing and enhancing 3D models without needing physical access to them.
3D Parts Catalog Software
3D parts catalog software enables organizations to manage their industrial 3D parts. 3D parts catalogs, sometimes referred to as electronic parts catalogs, are useful for manufacturers who want to build a catalog of their 3D parts for use in distribution and production, as well as sales teams and ecommerce distributors that want to showcase 3D part models to potential clients.
3D Product Visualization Software
3D product visualization software is software that allows users to create detailed and realistic 3D models of physical products. This software utilizes advanced rendering techniques to accurately depict textures, colors, and lighting effects of the product. Users can manipulate the model by rotating, zooming, and adding animation to showcase various angles and movements of the product. These programs also offer customizable features such as changing backgrounds, adding labels or logos, and adjusting camera angles for a more personalized presentation. 3D product visualization software is commonly used in industries such as architecture, manufacturing, marketing, and e-commerce to create visually appealing representations of products.
Medical 3D Visualization Software
Medical 3D visualization software enables healthcare professionals to create, analyze, and interact with detailed three-dimensional models of anatomical structures, medical scans, and surgical plans. It integrates data from imaging technologies like MRI, CT, and ultrasound to provide enhanced spatial understanding for diagnosis, treatment planning, and medical education. Surgeons use it to simulate procedures, improving precision and reducing risks, while researchers leverage it for studying complex biological systems. The software often includes tools for segmentation, volumetric rendering, and real-time manipulation of medical images. By offering an immersive and intuitive way to explore patient-specific data, medical 3D visualization enhances decision-making and improves patient outcomes.
AI 3D Model Generators
AI 3D model generators are software tools that use artificial intelligence to create virtual three-dimensional objects. These objects can be used in a variety of applications, ranging from animation to architecture and engineering. AI 3D model generators typically offer more realistic results than traditional methods, due to their ability to simulate physical characteristics such as textures and lighting. They are also capable of creating models with greater detail than manual methods, allowing for high-quality visuals in a shorter time frame.
3D Point Cloud Annotation Software
3D point cloud annotation tools are designed to help users label and categorize 3D data points captured by technologies such as LiDAR or photogrammetry. These tools allow for the precise marking of points or regions within the cloud, facilitating tasks such as object detection, feature extraction, and spatial analysis. Users can apply various annotations, including labels, tags, and classifications, to enrich the dataset for further analysis or machine learning applications. The tools often include features like interactive visualization, zooming, and measurement capabilities to ensure accurate annotation in complex 3D environments.
3PL Software
3PL (Third-Party Logistics) software is designed to help businesses manage and streamline their outsourced logistics operations, including warehousing, transportation, and distribution.
Web3 Platforms
Web3 platforms are a type of decentralized computing platform built on the blockchain that allows users to access applications, trade digital assets, and store data without relying on a centralized server. It is based on distributed ledger technology such as Ethereum and operates as an open source software system with no central control. Web3 platforms provide users with greater ownership and control over their data, as well as enhanced security through cryptographic protocols. Additionally, Web3 applications typically run faster than traditional applications due to the use of an automated consensus mechanism for verifying transactions, which eliminates the need for manual confirmation from third parties. Furthermore, Web3 offers powerful tools for developers to create new interactive experiences by combining multiple blockchain services into unified environments.
Web3 Wallets Software
Web3 wallets are cryptocurrency wallets that enable users to connect to Web3 applications and platforms.
Additive Manufacturing Software
Additive manufacturing software is designed to facilitate the design, simulation, and production of 3D printed objects. These tools help users create digital models, prepare them for 3D printing, and manage the printing process. Additive manufacturing software typically includes features such as CAD model import, slicing for layer-by-layer printing, material selection, print job monitoring, and performance optimization.

37 Products for "d3.js" with 1 filter applied:

  • 1
    RansomLeak

    RansomLeak

    RansomLeak

    RansomLeak is a security awareness training platform that uses interactive 3D simulations instead of videos and slides. Employees face realistic phishing emails, social engineering phone calls, data handling decisions, physical security, and other scenarios modeled on documented attack patterns. Each simulation branches based on the employee's choices and shows them what would have happened in a real attack.
    Starting Price: $8/year/user
  • 2
    FaceTec

    FaceTec

    FaceTec

    The FaceTec interface makes 3D Liveness Detection and 3D Face Matching fast, easy, and incredibly secure for everyone, regardless of their device. During onboarding, FaceTec’s two-second video-selfie verifies 3D liveness, matches the user’s 3D Face to their Photo ID, OCRs the text on their ID, and sets up their new account. Every time they return, FaceTec’s ongoing user authentication again proves 3D Liveness and compares their new 3D FaceMap to the one stored from onboarding. ...
  • 3
    Modirum 3-D Secure
    Modirum is a global leader in 3-D Secure authentication and payment security solutions, helping issuers, acquirers, and merchants prevent online payment fraud. Its suite of products—including Modirum DS, ACS, MPI, SDK, and VPOS Payment Gateway—supports EMV® 3-D Secure standards for seamless and secure card-not-present transactions. The company’s technology enables risk-based and biometric authentication, ensuring a frictionless checkout experience while maintaining robust compliance with EMVCo and payment network requirements. ...
  • 4
    D3 Smart SOAR

    D3 Smart SOAR

    D3 Security

    D3 Security leads in Security Orchestration, Automation, and Response (SOAR), aiding major global firms in enhancing security operations through automation. As cyber threats grow, security teams struggle with alert overload and disjointed tools. D3's Smart SOAR offers a solution with streamlined automation, codeless playbooks, and unlimited, vendor-maintained integrations, maximizing security efficiency.
  • 5
    i3D.net

    i3D.net

    i3D.net

    "i3Dꓸnet is a leading provider of scalable hosting solutions for game studios and enterprises. Our unique infrastructure spans from Seattle to Sydney, Tokyo to Santiago, and everything in between. This high-performance network combined with our gaming expertise helps us to deliver low latency experiences across the globe. Since 2019, i3Dꓸnet is a proud member of the Ubisoft family, which allows us to help even more customers to deploy, manage and scale their games and applications across the globe.
  • 6
    3D Secure

    3D Secure

    3D Secure

    Apart from meeting the Strong Customer Authentication (SCA) compliance under PSD2, there are numerous benefits to the new 3DS 2.0 protocol, especially from a mobile payments standpoint. The improved design dramatically increases the user experience on mobile devices by being fully compatible with mobile wallet applications and in-app transactions. Dramatically increases the user experience on mobile devices, including non-browser based platforms and mobile integration. The merchant’s...
  • 7
    Errsole

    Errsole

    Errsole

    1) Minimal Setup: Just include the Errsole package in your code—no need for dedicated servers, software installations, or complicated configurations. 2) Logger++: Errsole automatically collects all logs from the Node.js console. Additionally, it provides advanced logging functions that support multiple log levels and the ability to attach metadata to logs. 3) Log Viewer: View, filter, and search through your logs using the built-in Web Dashboard. Secure authentication and team management features ensure that only you and your team can access the logs. 4) Critical Error Notifications: Get immediate notifications when your app crashes or encounters critical errors. ...
    Starting Price: 0
  • 8
    RECOGNITO

    RECOGNITO

    RECOGNITO

    ...Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID, Passport Document OCR and MRZ, Barcode Analysis - Features • On-premise, Fully offline and On-device SDK • Compact Library-type SDK for easy on-premise installation. • Simple and comprehensive API.
    Leader badge
    Starting Price: Free
  • 9
    NetGuardians

    NetGuardians

    NetGuardians

    ...Traditional anti-fraud practices find it all but impossible to efficiently prevent payment fraud. Most rely on hundreds of static, reactive rules that fail to detect new fraud patterns and trigger too many poor hits. Leveraging award-winning 3D artificial intelligence (3D AI) technology, NetGuardians’ platform NG|Screener monitors all of the bank’s payment transactions in real-time catching more fraud with fewer false positives. It identifies suspicious payments coming from social engineering techniques or scams (such as invoice redirection, love scams, CEO-fraud) and ties this in with digital banking fraud indicators (such as eBanking/mBanking sessions redirected by malware, hijacked by hackers or account takeover fraud resulting from identity theft).
  • 10
    Wibmo

    Wibmo

    Wibmo

    We enable banks and fintechs to leverage the full power of technology. Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. ...
  • 11
    Alcatraz AI

    Alcatraz AI

    Alcatraz AI

    ...Our robust access control unit combines superior intelligence with a modern design. Powered by machine learning at the door, the Rock ensures real-time authentication, analytics, and access control. With 2D and 3D sensors onboard capturing data, the Rock’s analytical prowess outclasses other security options. Get ready for incredible accuracy and effortless user interaction. With 3D facial mapping and deep neural networks, the Rock can authenticate users in real time for the smoothest experience possible. Pair the access control system with any third-party badge reader for a 2F or 3F security solution in more restricted areas. ...
  • 12
    NINJIO

    NINJIO

    NINJIO

    ...With NINJIO you get: - NINJIO AWARE attack vector-based training that engages viewers with Hollywood style, micro learning episodes based on real hacks. - NINJIO PHISH3D simulated phishing identifies the specific social engineering tricks most likely to fool users in your organization. - NINJIO SENSE is our new behavioral science-based training course that shows employees what it “feels like” when hackers are trying to manipulate them.
  • 13
    ID R&D

    ID R&D

    ID R&D

    ...ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3.
  • 14
    PicKey

    PicKey

    PicKey

    PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. Instead of memorizing password strings, users simply authenticate with their chosen Vision Secret photo plus a 3D Keymoji selection, and PicKey’s AI recognizes the image even under variations in lighting or angle, mirroring human photographic memory and making login intuitive and memorable while enhancing resistance to brute-force, phishing, and keylogging attacks.
    Starting Price: $4 per month
  • 15
    Casbin

    Casbin

    Casbin

    ...It offers flexible policy storage options, supporting various databases like MySQL, PostgreSQL, Oracle, MongoDB, Redis, and AWS S3. The library also features a role manager to handle RBAC role hierarchies and supports filtered policy management for efficient enforcement.
    Starting Price: Free
  • 16
    Facia

    Facia

    Facia.ai

    ...Our system provides real-time 3D face verification, ensuring speed and precision without compromising security. We protect against print and mask-based spoofing. Facia is dedicated to advancing biometric authentication, providing secure identity verification solutions for businesses.
  • 17
    Hacken

    Hacken

    Hacken

    Hacken is a trusted blockchain security auditor on a mission to make Web3 a safer place. With a team of 60+ certified engineers, Hacken provides solutions covering all aspects of blockchain security, such as Smart Contract Audit, Blockchain Protocol Audit, dApp Audit, Penetration Testing, CCSS Audit, Proof of Reserves, DORA Compliance, Tokenomics Audit and design. From security audits and bug bounties to DORA Compliance, AML Monitoring, and Threat-Led Penetration Testing, Hacken delivers solutions that bridge innovation and compliance. ...
  • 18
    Becrypt

    Becrypt

    Becrypt

    ...Proven cloud and mobile architectures delivered through managed service to simplify secure 3rd party collaboration.
  • 19
    ScrapingBypass

    ScrapingBypass

    ScrapingBypass

    ScrapingBypass Web Scraping API can bypass all anti-bot detection, Bypass Cloudflare, CAPTCHA verification, WAF, and CC protection. Provides HTTP API and Proxy with a built-in global exclusive high hidden static residential proxy IP. Includes interface address, request parameters, return processing. Also allows setting of Referrer, browser UA, headless status, and other browser fingerprint device features. Support: Python, Curl, Java, NodeJS Bypass CAPTCHA Verification Code Available...
    Starting Price: $5.9/3 days
  • 20
    Hitex SafeTpal
    SafeTpal from Hitex GmbH is a modular Safety & Security Suite for the AURIX TC3xx microcontroller family designed to simplify embedded safety and security development. It supports applications up to ISO 26262 ASIL-D and IEC 61508 SIL-3, as well as security standards such as ISO 21434, CERT-C, and MISRA-C. It combines qualified software components (drivers, HAL, bootloader/OTA packages) with reference designs, training, documentation, and flexible service packages to cover every stage of the V-model: concept & architecture, development, test & validation, and production. ...
  • 21
    Oz Liveness

    Oz Liveness

    Oz Forensics

    Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. ...
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 22
    Cisco Catalyst Center
    ...Proactively scale your network using deep insights into capacity and performance. Improve time to resolution with AI diagnostics and remediation. Optimize Wi-Fi coverage and deliver services where they're needed with 3D visualization. Gain visibility into the user experience and improve hybrid work experience with application insights.
  • 23
    Junos Traffic Vision

    Junos Traffic Vision

    Juniper Networks

    Junos Traffic Vision is a licensed traffic sampling application for MX Series 3D Universal Edge Routers. It provides details on network traffic flows that is useful for a wide variety of operations and planning activities. Junos Traffic Vision monitors packets as they are processed by the router, and captures details such as source and destination addresses, packet and byte count information. These details are aggregated and exported in a standards-based format for analysis and presentation by Juniper and third-party-based tools that support usage-based accounting, traffic profiling, traffic engineering, attack and intrusion detection, and SLA monitoring. ...
  • 24
    GPayments

    GPayments

    a neurocom company

    GPayment provides a complete range of Fraud Prevention products based on the 3D Secure protocol, Verified by Visa, Mastercard SecureCode, JCB J/Secure, American Express SafeKey and Diners Club International ProtectBuy. Reduce credit card fraud and eliminate chargebacks through liability shift. Reduce the potential for online fraud and stay in control of authenticating transactions. Collect a rich dataset for more accurate risk based authentication.
  • 25
    Arkose MatchKey

    Arkose MatchKey

    Arkose Labs

    ...In fact, Arkose MatchKey is the strongest CAPTCHA ever made. Arkose MatchKey is a state-of-the-art series of challenges with industry-leading security. An unparalleled variety of 3D imagery. Our strongest challenges may produce more than 1,250 variations of a problem to solve. All are incredibly easy for legitimate users, but the variety makes it incredibly difficult to solve with automation. We use a key image to solve the largest problem with challenge design: Conveying instructions that are universally understandable across all languages and cultures. ...
  • 26
    HiTRUST

    HiTRUST

    HiTRUST

    HiTRUST is a leading provider of identity authentication solutions, specializing in secure and seamless digital transactions. As a market leader in 3-D secure technology, HiTRUST offers innovative services that prioritize security, reliability, convenience, and mobile-friendliness. Their solutions include passwordless authentication through VeriFIDO, which leverages public key cryptography to eliminate the need for passwords, and comprehensive fraud detection systems that ensure safe and frictionless checkout processes. ...
  • 27
    Fork

    Fork

    VerSprite Cybersecurity

    ...Fork provides a unified security insights dashboard that correlates threats with your application’s attack surface and integrates trusted frameworks and taxonomies such as MITRE, OWASP, CWE, CVE (with EPSS), CAPEC, ATT&CK, D3FEND, and ASVS to drive targeted mitigations and actionable outcomes.
  • 28
    Entersekt

    Entersekt

    Entersekt

    ...Engage your customers with highly relevant and intuitive experiences no matter their chosen touchpoint. Checking out: Digital banking, mandates, and the user experience factor. Revisiting authentication in the age of SRC and EMV 3-D Secure. Introducing the Entersekt Secure Platform. Establish trust, identify your user and provide them with new and innovative experiences that drive brand. Offer a smooth, highly secure remote registration and card provisioning process to boost adoption and revenue. Entersekt Customer Authentication Solution. Eliminate account takeover fraud with a compliant solution spanning all your digital channels. ...
  • 29
    ThreatWarrior

    ThreatWarrior

    ThreatWarrior

    ...The platform simplifies and unifies multiple clouds and environments to deliver complete protection from one consolidated location. Our SaaS platform identifies, classifies and protects every network-connected ‘thing’ and provides a rich 3D Universe that shows real-time traffic, communication, and connections between those assets.
  • 30
    TrulySecure
    ...Sensory’s novel approach utilizing passive face liveness, active voice liveness, or a combination of the two leverages a deep learning model that nearly eliminates spoofs from fraudsters using 3D masks, photos, video recordings, and more.
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB