Suggested Categories:

School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
Compliance Training Software
Compliance training software enables organizations to train their workforce on various topics such as anti-harassment, ethics, workplace safety, diversity and inclusion, financial fraud, and more. Compliance training programs, also known as compliance learning management systems (LMS), help companies improve their workplace and remain compliant with HR regulations.
Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Gymnastics Software
Gymnastics software is software for gymnastics clubs, coaches, and organizations to manage their operations, training, and competitions. These platforms often include features like scheduling, attendance tracking, athlete management, progress tracking, and score management for competitions. Gymnastics software can help coaches create personalized training plans, monitor skill development, and track individual athlete performance over time. Additionally, the software may offer tools for registration, payment processing, and communication with athletes and parents. It streamlines administrative tasks, improves organization, and enhances the overall experience for athletes and coaches.
Fire Department Software
Fire department software helps fire stations manage incident reporting, personnel scheduling, equipment tracking, and overall operational readiness. It streamlines workflows such as dispatch coordination, training management, hydrant inspections, and response documentation. Many platforms integrate with CAD systems and provide mobile access so firefighters can quickly retrieve critical information in the field. The software also supports compliance reporting, analytics, and performance reviews to help departments meet regulatory requirements and improve service outcomes. Overall, fire department software enhances communication, efficiency, and safety for emergency response teams.
Skills Management Software
Skills management software enables organizations to identify, monitor, track, and analyze the skills and skillsets of their workforce. These platforms typically include features for skill assessments, employee skill inventories, training and development tracking, and skills gap analysis. Skills management software allows HR teams and managers to identify skill shortages, match employees with appropriate projects, and create personalized learning and development plans. It also helps organizations align their workforce's capabilities with business objectives, ensuring they have the right skills for current and future needs.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    SparkView

    SparkView

    beyond SSL

    ...) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 2
    Diplomat Managed File Transfer
    Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more. With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. ...
    Starting Price: $1,149/year
    Partner badge
    View Software
    Visit Website
  • 3
    Control D

    Control D

    Control D

    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with client level granularity - Re-route traffic via proxies (through DNS) for improved privacy and security - Enjoy superior UX and simplicity Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 4
    PentestBox

    PentestBox

    PentestBox

    ...By default PentestBox runs like a normal user, no administrative permission is required to launch it. To make PentestBox more awesome we have also included HTTPie, HTTPie is a command line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as possible. It provides a simple http command that allows for sending arbitrary HTTP requests using a simple and natural syntax, and displays colorized output. HTTPie can be used for testing, debugging, and generally interacting with HTTP servers. PentestBox also contains a modified version of Mozilla Firefox with all the security addons pre installed in it.
  • 5
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    ...This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
  • 6
    Yandex Application Load Balancer
    Application Load Balancer runs on OSI Layer 7, and helps use HTTP request attributes to distribute traffic and form or modify HTTP responses. All requests to your apps are recorded, and you can analyze events in the load balancer’s access logs. Distribute your cloud resources to multiple geographically distributed availability zones, and maintain your applications' availability even if one of the zones becomes unavailable.
  • 7
    Zecurion SWG
    ...Enterprise-level performance and rich functionality. Operates in networks with up to 200K workstations. Prevents attacks with the built-in IDS/IPS module. Supports HTTP, HTTPS, FTP over HTTP and other protocols. Native integration with DLP. Integration with any other software through ICAP. The most accurate and up-to-date content filtering database. Sites are categorized manually by a person rather than by a robot. Daily database updates. More than 100 resource categories. Fast categorization of new and unknown web sites. ...
  • 8
    Impero Webcheck

    Impero Webcheck

    Impero Software

    ...Impero’s robust internet filtering for schools analyses content in real-time to ensure students are protected online, in the classroom and beyond. Our web filter for schools uses an AI categorization name service (CNS) to comb through all HTTP, HTTPS and FTP web traffic and block web content containing any pornography, substance abuse, extremism and many other categories of sensitive material. Impero Webcheck protects school networks from encrypted traffic – including virus-based threats and proxy avoidance – and ensures that every device on the network is secure.
  • 9
    Azure Load Balancer
    ...Create highly available and scalable apps in minutes with built-in application load balancing for cloud services and virtual machines. Load Balancer supports TCP/UDP-based protocols such as HTTP, HTTPS, and SMTP, and protocols used for real-time voice and video messaging applications. Manage traffic between virtual machines inside your private virtual networks, or use it to create multiple-tiered hybrid applications.
  • 10
    Alibaba Cloud WAF
    ...WAF secures your core business data and prevents server malfunctions caused by malicious activities and attacks. Alibaba Cloud WAF is a web application firewall that monitors, filters, and blocks HTTP traffic to and from web applications. Based on the big data capacity of Alibaba Cloud Security, Alibaba Cloud WAF helps to defend against common web attacks such as SQL injections, Cross-site scripting (XSS), web shell, Trojan, and unauthorized access, and to filter out massive HTTP flood requests. It protects web resources from being exposed and guarantees website security and availability. ...
  • 11
    MONITORAPP AIWAF
    ...Most security breaches happen on the web, to defend against web attacks, a dedicated web firewall system is required. AIWAF strongly defends various web attacks. Web security is no longer optional. It's essential. The web is vulnerable. Because the HTTP/HTTPS ports must always be open to show the Web to clients, various attacks can be introduced through them. MONITORAPP's web application firewall, AIWAF is specialized for traffic-based detection of hacking attempts using vulnerabilities in the Web and for controlling access to servers. Web attacks are evolving every day, causing malicious traffic or falsifying request information. ...
  • 12
    Oracle Cloud Infrastructure Load Balancing
    ...The portfolio comprises two services—Oracle Cloud Infrastructure Flexible Load Balancer (OCI Load Balancer) and Oracle Cloud Infrastructure Flexible Network Load Balancer (OCI Network Load Balancer). OCI Flexible Load Balancer primarily manages HTTP/HTTPS traffic and provides advanced routing features that distribute the requests based on the requests’ contents. In contrast, OCI Flexible Network Load Balancer performs at low latency, offering extreme performance. OCI Flexible Load Balancer offers a public IP address to front-end internet traffic within a single availability domain or across regions, ensuring applications are always available during peak demand.
    Starting Price: $0.0243 per hour
  • 13
    Squid

    Squid

    Squid

    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows, and is licensed under the GNU GPL. Squid is used by hundreds of Internet Providers worldwide to provide their users with the best possible web access.
  • 14
    HAProxy Enterprise

    HAProxy Enterprise

    HAProxy Technologies

    ...Maintain users' sessions based on TCP/IP information or any property of the HTTP request (cookies, headers, URI, and more). The world’s fastest, and most widely used software load balancer.
  • 15
    Voxility DDoS Protection
    Voxility DDoS protection is used to protect online games, DNS, TCP services, HTTPS and HTTP websites. This service is compatible with almost any application and protects networks and their downstream customers against volumetric or application specific DDoS attacks of up to 1 Tbps. The Anti-DDoS Tunnel is an automated solution that filters the traffic only when an attack is detected. It is compatible with all edge routers supporting GRE or L2TP and gives the network total control of which subnets are advertised through this tunnel via BGP advertisements. ...
    Starting Price: $468 per month
  • 16
    Seeker

    Seeker

    Black Duck

    ...Unlike other IAST solutions, Seeker not only identifies security vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of confirmed issues to address. By employing patented methods, Seeker processes extensive HTTP(S) requests swiftly, reducing false positives to near zero and enhancing productivity while minimizing business risk.
  • 17
    Oracle Web Application Firewall
    ...Protect applications deployed in Oracle Cloud Infrastructure, on-premises, and in multicloud environments with access controls based on geolocation data, whitelisted and blacklisted IP addresses, HTTP URL, and HTTP header. Identify and block malicious bot traffic with an advanced set of verification methods, including JavaScript, CAPTCHA, device fingerprinting, and human interaction algorithms.
  • 18
    Imperva DDoS Protection
    ...Our DDoS protection for websites complements the Imperva cloud web application firewall (WAF), which blocks hacking attempts and attacks by malicious bots. A change to your DNS records ensures that all HTTP/S traffic to your domain(s) is routed through the Imperva network. Acting as a secure proxy, Imperva DDoS protection for websites masks your origin server IP.
  • 19
    DNSSense

    DNSSense

    DNSSense

    DNSEye detects malicious traffic on your network and reports whether this traffic can be blocked by your other security devices. DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about your entire network, regardless of its network protocol. With DNS tunnelling, data exfiltration attacks cannot be detected by DLP products. It requires DNS log analysis for an effective solution. 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. ...
    Starting Price: $1000
  • 20
    KeePass

    KeePass

    KeePass

    KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can store all your passwords in one database, which is locked with a master key. So you only have to remember one single master key to unlock the whole database. Database files are encrypted using the best and most secure encryption algorithms currently known (AES-256, ChaCha20 and Twofish). KeePass can be downloaded for free from SourceForge.
    Starting Price: Free
  • 21
    N-Stalker

    N-Stalker

    N-Stalker

    N-Stalker Web Application Security Scanner X is a sophisticated Web Security Assessment solution for your web applications. By incorporating the well-known “N-Stealth HTTP Security Scanner” and its 39,000 Web Attack Signature database along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is a “must have” security tool to developers, system/security administrators, IT auditors and staff. Most complete package for developers, IT security and governance professionals. ...
    Starting Price: $499 per year
  • 22
    Spendgo

    Spendgo

    Spendgo

    Spendgo is an integrated loyalty and marketing platform that allows businesses of all sizes to automate and manage campaigns, creating a unified customer experience for its 12 million users by connecting point of sale and e-commerce platforms with third-party solutions. Spendgo provides behavioral data, as well as customer profiles and purchases history, empowering businesses to more effectively engage with their customers. With Spendgo you can reach your customers in-store, online or via mobile.
    Starting Price: $10 per month
  • 23
    Nikto

    Nikto

    CIRT.net

    Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version-specific problems on over 270 servers. It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated. Nikto is not designed as a stealthy tool. It will test a web server in the quickest time possible and is obvious in log files or to an IPS/IDS. However, there is support for LibWhisker's anti-IDS methods in case you want to give it a try (or test your IDS system). ...
  • 24
    TextCaptcha

    TextCaptcha

    TextCaptcha

    The TextCaptcha service provides access to textual CAPTCHA challenges via a simple JSON or XML API over HTTP. The question is the textual challenge that should be presented to the user. The answers are the MD5 hashes of correct lower cased answers: you should be able to check responses from real users you challenge with the question against these checksums. A text CAPTCHA is more accessible to visually impaired users than their image-based alternatives like ReCAPTCHA.
    Starting Price: Free
  • 25
    Yandex Network Load Balancer
    Load Balancer uses technologies running on Layer 4 of the OSI model. This lets you process network packets with minimum delay. You set rules for TCP or HTTP checks and load balancers monitor the status of cloud resources. Resources that fail the check aren’t used. You pay for the number of load balancers and the amount of incoming traffic. Outgoing traffic is charged the same as other Yandex Cloud services. Load balancers distribute load based on the client address and port, resource availability, and network protocol. ...
  • 26
    ManageEngine Patch Manager Plus
    Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.
    Starting Price: $245 per year
  • 27
    AppWall

    AppWall

    Radware

    ...AppWall is an NSS recommended, ICSA Labs certified and PCI compliant WAF that combines positive and negative security models to provide complete protection against web application attacks, access violations, attacks disguised behind CDNs, API manipulations, advanced HTTP attacks (slowloris, dynamic floods), brute force attacks on login pages and more. At the core of Radware's web application and API protection Solution suite, AppWall is a web application firewall (WAF) that provides patent-protected technology to create and optimize security policies in real-time for widest security coverage with the lowest false positives and minimal operational effort. ...
  • 28
    Diladele Web Filter
    ...Information about request and response is stored in the database. Web Safety is an ICAP web filter that directly plugs into Squid proxy. This allows it to filter URLs and do deep content inspection of encrypted HTTPS traffic. Encrypted explicit content is blocked easily. Performs deep content inspection of web pages and blocks everything containing adult explicit language and links to questionable content. General purpose web sites (Google Search, Google Images, Bing or YouTube) are filtered as well and all inappropriate content is blocked.
  • 29
    Baidu AI Cloud Intrustion Detection System
    ...Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection compliance services. Under the user authorization, IDS analyzes the bidirectional HTTP traffic log of user EIP in a real-time manner and quickly identifies various common web attacks, such as SQL injection, XSS cross-site scripting, web shell back door uploading and unauthorized access.
  • 30
    personalDNSfilter

    personalDNSfilter

    Zenz Solutions

    personalDNSfilter is a DNS filter proxy written in Java that intercepts domain name resolutions and returns the loopback address for filtered hosts. It supports secure DNS via DNS over HTTPS (DoH) and DNS over TLS (DoT) and is available for Java-enabled devices. The application operates with minimal memory usage, allowing filtering with millions of hosts while consuming only a few megabytes of RAM. On Android devices (version 4.2 and newer), personalDNSfilter functions as an effective ad, malware, and tracking server filter without requiring root access. ...
    Starting Price: Free
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next