Suggested Categories:

Email Template Design Software
Email template design software enables email professionals to build email templates. Email template builders offer easy to use tools like drag and drop template creation, as well as tools that let more advanced users create email templates coded from scratch.
Document Template Management Software
Document template management software is software used to help create, store and manage documents according to specified templates.
Account Planning Software
Account planning software helps businesses and marketing teams develop strategies and manage relationships with clients or key accounts. These tools allow users to organize and track detailed information about their clients, including their needs, goals, and performance metrics. Account planning software often includes features such as customer segmentation, sales forecasting, and campaign management to ensure that client objectives are met. By offering insights and data-driven recommendations, it helps create personalized and effective account strategies. This software is especially useful for sales teams, account managers, and marketing departments to strengthen client relationships and drive business growth.
Scholarship Management Software
Scholarship management software provides educational institutions with the tools to manage and process scholarship and financial assistance applications.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Business Plan Software
Business plan software is a tool designed to help entrepreneurs, startups, and businesses create, organize, and manage comprehensive business plans. These platforms typically provide templates, financial forecasting tools, and guidance to assist users in outlining their business objectives, market research, financial projections, and operational strategies. Business plan software often includes features for budgeting, cash flow management, and performance tracking to help users develop realistic and achievable goals. Many platforms also offer collaboration tools, allowing teams to work together on the business plan in real-time. By providing structure and insights, business plan software helps businesses present a clear roadmap for growth and attract investors or secure funding.
Document Generation Software
Document generation software automates the creation of documents, typically by merging data from various sources into predefined templates. It is commonly used to generate reports, contracts, invoices, or proposals with minimal manual effort. The software enables users to define document structures, integrate dynamic fields, and ensure consistent formatting across multiple documents. With features like batch processing and integration with databases or CRM systems, document generation tools can handle large volumes of documents efficiently. This automation reduces errors, speeds up workflows, and ensures that generated documents meet organizational standards.
Regulatory Reporting Software
Regulatory reporting software gathers data from an organization's systems and produces regulatory reports required by industry regulations. Regulatory reporting systems help manage and automate the regulatory reporting and compliance processes of organizations like financial institutions, banks, financial services, healthcare organizations, insurance companies, manufacturing, oil & gas, and more.
Offboarding Software
Offboarding software helps organizations manage the process of transitioning employees out of the company, ensuring that all tasks related to an employee's departure are handled efficiently and in compliance with company policies. These platforms typically include features for managing tasks such as collecting company property, revoking access to systems and accounts, conducting exit interviews, and ensuring the proper transfer of responsibilities.
Logbook Software
Logbook software is software to record and track operational activities, such as vehicle usage, maintenance, and employee tasks. It enables users to maintain accurate logs for compliance, efficiency, and record-keeping purposes. The software typically supports features like automated entries, customizable templates, and real-time data entry, making it easier to manage day-to-day operations. It is commonly used in industries like transportation, fleet management, and equipment maintenance. Logbook software helps organizations streamline processes, reduce errors, and improve overall operational oversight.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
HR Case Management Software
HR case management software enables businesses and HR departments with a single platform for handling human resource cases, investigations, requests, and issues. HR case management software, also known as HR investigation software or employee relations software, streamline that entire process around human resource case management and investigation. HR case management software handles cases like co-worker complaints, disciplinary issues, long-term sick leave, harassment, and more. Effective HR case management software includes everything an HR manager needs to manage every type of HR case, for every step in the process.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (13) for "spring template"

97 Products for "spring template" with 1 filter applied:

  • 1
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing...
  • 2
    HexaVault

    HexaVault

    HexaVault

    ...A template is a predefined collection of fields for the type of information you want to add. You can create your own templates as well. The templates are grouped in various categories for easy selection.
    Starting Price: Free
  • 3
    MetaPhish

    MetaPhish

    MetaCompliance

    ...Ultimately, this will keep staff safe from phishing scams through automated training that increases their vigilance and identifies the need for additional cyber awareness training. Choose from an extensive range of regularly updated phishing templates. Templates are based on current phishing threats which imitate reputable websites and brands. The templates can be matched with relevant domain names that improve the ease of use within your organization’s network. The templates are all fully customizable and can be adapted to suit specific business sectors. Phishing emails can be created from the ground up using our in-house design team and the extensive range of templates are available in 12 different languages.
  • 4
    ProjectDiscovery

    ProjectDiscovery

    ProjectDiscovery

    ...Security should be simple, accessible, and community-driven. Not all vulnerabilities and assets are worth triaging. Focus on the ones that matter to your workflows with context-enriched data. Our AI templating integration reads vulnerability reports and tailors templates to your needs, saving you time and effort on automation. Automate with support from APIs and webhooks. Trigger scans and receive real-time updates on vulnerabilities, assets, and templates. Collaborate across teams by sharing templates, assets, and vulnerabilities. Our enterprise platform has an amazing foundation.
  • 5
    Google Chrome Enterprise
    Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome's cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium. Chrome offers a dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. ...
    Starting Price: Free
  • 6
    Hypervault

    Hypervault

    Hypervault

    ...Organize your data in separate folders and subfolders. Combine this with the speed & flexibility of tags. For the lack of anything better, stop messing around with plain secure notes. Our handy templates for many data types and formats allow you to securely store and manage any type of sensitive data in the most structured way. No more need to store everything that is not a password in a meaningless secure note. For every type of sensitive data we have pre-formatted templates to keep everything clean and organized.
    Starting Price: €3.8 / month / user
  • 7
    Resourcely

    Resourcely

    Resourcely

    Stop the self-inflicted damage. Get your resources set up right the first time. Resourcely lets you provision resource templates that are secure and compliant by design. So your dev team can spend less time figuring out the cloud, and more time creating. Did you know that over 99% of cloud breaches can be traced to preventable misconfigurations or mistakes by customers? Your team wants to work on the cloud, not decipher it. Let's get you ruling your own resources.
  • 8
    InstantCard

    InstantCard

    InstantCard

    Get the ID cards you need when you need them, hassle-free. We won’t try to sell your business a printer, we won’t try to sell your company any card stock. Our professional designers will create a custom template based on your specifications. We do not use generic templates, ensuring you get exactly what you need from your employee ID cards. We provide unlimited templates, so you get the identification features you need, where you need them. Get your employee ID badges when you need them with same-day shipping. Since the InstantCard system was designed with single-card orders in mind, this applies to small orders, too. ...
    Starting Price: $5.80 per card
  • 9
    Zecurion DLP
    ...Investigate any incidents easily with Zecurion DLP. А DLP system intuitively understandable without documentation. Use an early threat detection with user behavior analytics (UBA) module. Ready-made templates for compliance with legal requirements. Convenient dashboard and preset visual reports. Calculates more than 10 different characteristics for each user.
  • 10
    CloudABIS

    CloudABIS

    M2SYS Technology

    ...There are many viable fingerprint readers on the market. Most fingerprint SDKs allow you to generate a standard ISO template since this is a universal format.
  • 11
    discrimiNAT Firewall

    discrimiNAT Firewall

    Chaser Systems

    ...From complete multi-zone network configurations that work with a single click and have sane defaults, to DIY instance deployments so you can configure the networking around it, we have all templates ready to go in our CloudFormation library for AWS and as a Deployment Manager template for Google Cloud.
  • 12
    Gophish

    Gophish

    Gophish

    Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing. Gophish makes it easy to create or import pixel-perfect phishing templates. Our web UI includes a full HTML editor, making it easy to customize your templates right in your browser. Launch the campaign and phishing emails are sent in the background. You can also schedule campaigns to launch whenever you'd like. Detailed results are delivered in near real-time. Results can be exported for use in reports. ...
  • 13
    Powertech Identity Manager for IBM i
    ...When you have new employees or existing employees changing roles in your organization, you can create new user profiles with the exact settings they’ll need based on that employee’s department and title—no need to start from scratch. Ensure employees in the same roles receive identical authorities, system permissions, and partition access required to do their job. Templates provide consistency in user profile settings across the board. Change profile settings and update profile templates on multiple systems without actually having to sign on to each system. Powertech Identity Manager for IBM i’s central administration menu allows you to create or change user profiles across systems.
  • 14
    Microsoft Purview Insider Risk Management
    ...Quickly create a policy with customizable machine learning templates that require no scripting or endpoint agents to deploy. Identify patient data misuse risks with built-in indicators and detectors that use data from electronic medical record systems. Easily understand the context of an alert to help focus your investigation on the riskiest activities.
  • 15
    authentik

    authentik

    authentik

    ...Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose. No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet. Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.
    Starting Price: $0.02 per month
  • 16
    Infosec IQ

    Infosec IQ

    Infosec

    ...Choose from gamified education to traditional computer-based training to fit your organization’s existing culture or build a culture of security from the ground up. Programs include training modules, posters, infographics, email templates, presentations and more to help you layer your communication and deliver consistent training for the entire year. Build simulated phishing campaigns from our library of over 1,000 templates to teach employees how to avoid the most dangerous phishing threats they face.
  • 17
    Joe Sandbox

    Joe Sandbox

    Joe Security

    ...Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. ...
  • 18
    6clicks

    6clicks

    6clicks

    ...Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 19
    Reconmap

    Reconmap

    Netfoe

    ...Reconmap is a powerful, browser-based collaboration platform for penetration testing that helps infosec teams through the use of automation and reporting. Generate complete pentest reports with Reconmap's templates; save time and effort. Command automators allow you to execute multiple commands with any or little manual intervention. Automatically generate a report with the command findings. Analyze data on pentests, vulnerabilities, and projects to make informed decisions on their management. Find out how much time is spent on different tasks with our dashboard.
    Starting Price: £39
  • 20
    Gataca

    Gataca

    Gataca

    Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 21
    Samsung Pass
    ...No need to input an ID & Password to log in to websites anymore. Samsung Pass provides an enhanced user experience by integrating advanced biometrics. Your biometric template will be encrypted and secured by Samsung Knox. Samsung Pass adopts FIDO (Fast Identity Online) technology to ensure valid authentications and provide simple and secure biometric authentication services.
  • 22
    RapidPhish

    RapidPhish

    RapidPhish

    RapidPhish is a fast, flexible, and contract-free phishing simulation platform designed for businesses and MSPs supporting organisations with up to 1,000 users. Built to make security awareness testing simple and effective, RapidPhish lets you launch realistic phishing tests in minutes using modern templates, custom landing pages, and clear reporting. With pay-as-you-go pricing, no per-user licensing, and full white-labelling for MSPs, it offers an easier, more affordable way to strengthen your human firewall and improve cybersecurity resilience.
    Starting Price: $59
  • 23
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. ...
  • 24
    Assuria ALM-FIM
    Monitor selected critical files, folders, and registry keys (especially those that should rarely change in normal operations) for any changes that could represent risk. Discover all of your installed packages and automatically monitor, report and alert on changes. Package monitoring is driven by policy templates allowing selective reporting and alerting of key changes. ALM FIM can store the old and new contents of changed text files and registry keys to identify and assess the exact changes that have occurred and reverse them if required. ALM-FIM collects and stores metadata about files, folders, and registry keys to provide monitoring services. ...
  • 25
    SQL Secure

    SQL Secure

    IDERA, an Idera, Inc. company

    SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.
    Starting Price: $1,036 per instance
  • 26
    VeriEye Extended SDK

    VeriEye Extended SDK

    Neurotechnology

    ...It also includes sample applications and clear tutorials to speed up development and integration. A ready-to-use matching server is provided, giving teams an out-of-the-box backend for enrollment, template management and high-speed matching in both verification and identification scenarios. This version offers a robust foundation for creating secure iris recognition solutions that work reliably across networked infrastructures.
    Starting Price: €859
  • 27
    Cuckoo Tech Biometric Attendance
    ...This motivates the employees to adhere to company Attendance and Leave policies. It is a plug and play device and saves a good amount of money on installation and manpower costs. It provides finger template management on cloud. So, the floating workforce doesn’t need to register their fingerprints multiple times, in multiple locations. Once it is done, it’s done.
  • 28
    SentryPoint Security Suite
    ...Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features and architectures that accommodate the full range of market needs. This one-way conversion of biometric data into a proprietary template format prevents recreation, reverse-engineering or use for unintended purposes, thereby protecting the user from identity theft. All biometric data is encrypted and digitally signed using strong 256-bit Advanced Encryption Standard and Transport Layer Security technologies to prevent eavesdropping, tampering or fraud.
  • 29
    Draftit Privacy

    Draftit Privacy

    Draftit Privacy

    ...Privacy and GDPR compliance is only one out of five legal branches at Draftit. Understand the rules without being an expert. Privacy Expert is a digital guide that explains GDPR more straightforwardly. There are also aids such as document templates, explanations of essential concepts, and a bank of questions with answers to lots of data protection questions. Make risk analysis and impact assessment easy. Privacy DPIA is a valuable tool for identifying, analyzing, following up, and managing risks.
  • 30
    Concealer

    Concealer

    BeLight Software

    This reliable encryption Mac software stores information in the form of cards and uses industry-standard methods of data encryption (AES-256) to protect your credit card numbers, website passwords, software license codes, confidential files and photos, and much more. This password manager comes with card templates that make it quick and easy to store credit card details, passwords and login information, software serial numbers. Just choose a category and copy your data into the fields. Without your master password, no one will ever be able to find this encrypted data. Our encryption software not only hides your files, but also protects them by putting them in a sparse bundle with AES-256 encryption. ...
    Starting Price: $19.99 one-time payment
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB