Suggested Categories:

Music Streaming Services
Music streaming services allow users to listen to a vast library of music online without needing to download the files. These platforms provide on-demand access to millions of songs, curated playlists, and radio stations across various genres. Users can stream music via a subscription model (with or without ads) or for free with limitations, such as ads or limited skips. Music streaming services often offer features like personalized recommendations, offline listening, and social sharing options, enhancing the overall user experience. They have become the go-to platforms for music discovery, curation, and sharing for both casual listeners and avid music fans.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    PlayReady

    PlayReady

    Microsoft

    Microsoft is committed to working with companies across the content delivery spectrum to ensure that consumers can access premium content inside or outside the home regardless of the device or service they choose. CBC-S support in software clients! Run PlayReady Server on Linux with full Async performance boost! Plus, many more improvements. Addresses content owners' full 1080p, 4K and higher resolutions, as well as early window content protection requirements. In an effort to accelerate the adoption of PlayReady and HTML5 EME on devices such as mobile phones, set-top boxes and smart TVs, Microsoft will provide a standard set of tools for integrating PlayReady into next-generation browsers on those devices. ...
  • 2
    EZDRM

    EZDRM

    EZDRM

    EZDRM is a pioneer, leader and innovator of a managed hosted Digital Rights Management as a Service (DRMaaS) solution of Google Widevine, Microsoft PlayReady and Apple FairPlay. Our worldwide customers enjoy the benefits of a straight forward Key Management interface, while leveraging the robust full feature set of DRM technology. Dynamic business rules and API driven licensing complete the integration process, which allows our clients to expand their viewership and create new revenue streams while maintaining full control over studio content. ...
    Starting Price: $99.99 per month
  • 3
    Azure Content Protection
    Setting up and configuring a DRM license server in your system can be complicated. Azure Content Protection lets you set up major DRM license delivery (Microsoft PlayReady, Widevine, and FairPlay Streaming) in minutes. You define what type of licenses you want and we handle the infrastructure, security, and scalability. Azure Media Services gives you on-the-fly encryption for video on demand (VOD) and live streams. It’s also more cost-effective than traditional static encryption and packaging, because Media Services stores only one copy of standard multiple-bitrate MP4s and employs dynamic encryption. ...
  • 4
    Intertrust ExpresssPlay
    ...Reversing this worrisome trend requires a new, innovative approach that goes well beyond legacy security platforms optimized for traditional broadcasting and streaming services. To ensure robust content protection in this new era, Intertrust offers the ExpressPlay Media Security Suite, comprising cloud-based multi-DRM service, anti-piracy and forensic watermarking services, and more.
  • 5
    Domotz

    Domotz

    Domotz

    Domotz is an IT Infrastructure Monitoring and Management Software on a mission to provide all service providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty, and solve problems faster than ever. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with a plug-and-play setup, a friendly UX, and a comprehensive feature set accessible from any desktop browser or mobile device. Monitor any network and IT infrastructure with our powerful, affordable, user-friendly network monitoring software. All the features you need to manage and monitor your IT infrastructure proactively.
  • 6
    HAProxy ALOHA

    HAProxy ALOHA

    HAProxy Technologies

    ...The modern enterprise demands reliable performance, ease of integration, advanced security and extensible features. HAProxy ALOHA Hardware Load Balancer gives enterprises an incredibly powerful, plug and play, appliance that can be deployed in any environment. HAProxy ALOHA’s simple graphical interface coupled with an advanced templating system makes it painless to deploy and configure.
  • 7
    BuyDRM

    BuyDRM

    BuyDRM

    BuyDRM’s content protection platform secures streaming and on-demand video by providing industry-standard Digital Rights Management (DRM) and forensic watermarking technologies that help rights holders control access to proprietary content and trace piracy sources. Its KeyOS MultiKey DRM platform supports major DRM schemes such as Google Widevine, Apple FairPlay, and Microsoft PlayReady, and is designed to work across a wide range of business models, including live streaming, advertising-supported video, subscription VOD, pay-per-view, and FAST (Free Ad-Supported TV), on popular devices and operating systems, set-top boxes, and more. It can be deployed as a cloud service, on-premise server, or hybrid managed solution, delivering encryption and license key distribution at scale while integrating with packaging and playback workflows.
  • 8
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). ...
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 9
    ESET Cyber Security
    ...Protect yourself from ransomware and other types of malware with ESET's time-proven multilayered protection, trusted by over 110 million users worldwide. Play, work and browse the internet without slowdowns. Stay unplugged and online longer with battery-saving mode, and enjoy gaming without distracting pop-ups.
    Starting Price: $39.99 per year
  • 10
    Magic

    Magic

    Magic Labs

    Plug and play auth that's radically better. Get peace of mind by integrating unstoppable passwordless authentication that scales with you in a snap. Building auth on your own is higher stakes than ever. Whether you’re a seasoned dev or building your first app, there’s a lot to unpack when starting from scratch. Worrying about vendor lock-in, friction for users, scalability, reliability, security, privacy, compliance, and constant cyber threats is a massive responsibility.
    Starting Price: $35 per month
  • 11
    StixMDM
    ...Enable employees to use their own device for work. Android work profiles separate business apps from personal apps so employees can use their favorite Android device for both work and play. Android’s work profile separates work and personal applications so IT can manage business data while employees keep their personal apps, photos, and other data private. It's peace of mind for both users and IT. Setting up a work profile is as easy as downloading an EMM app from Google Play and following the setup wizard.
    Starting Price: $0.99 per month
  • 12
    Google Endpoint Management
    ...Enforce passcodes and wipe specific accounts without installing software on a user's Android and iOS device with agentless endpoint management. This feature is on by default. Manage and secure Windows 10 devices through the Admin console. Distribute business applications from the Admin console on Google Play (agentless) or Apple’s App Store. Host internal-only Android apps in the Play Private Channel.
    Starting Price: $6 per user per month
  • 13
    AirDroid Business
    ...AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
    Leader badge
    Starting Price: $12 /device/year
  • 14
    CyberMaxx

    CyberMaxx

    CyberMaxx

    Effective defense against cyber threats requires a proactive approach – enhance security postures and better protect against sophisticated adversaries. In today’s rapidly evolving threat landscape, defensive cybersecurity services play a crucial role in safeguarding organizations. Digital forensics and incident response is a critical components in protecting organizations by leveraging cutting-edge technology, advanced analytical techniques, and expert investigators. Governance, risk, and compliance is a crucial framework that enables organizations to effectively manage and mitigate risks while ensuring compliance.
  • 15
    BusinessSimulations.com

    BusinessSimulations.com

    Business Simulations

    Our Business Simulations are used with a proven structured learning process which is based on best practices in experiential learning, social learning and game-based learning – this ensures participants learn what they need to learn as well as having fun! Because the Business Simulation Games are played in teams, participants do not only learn about the simulation topic but also about what it means to create and be part of an effective team and also have insight into having effective interpersonal styles.
  • 16
    Aobo Internet Filter for Mac
    ...Computer becomes an indispensable facility in many offices and organizations. However, many employees are unable to use it appropriately, they are watching inappropriate videos, shopping on the internet, playing computer games, which give rise to the low working efficiency. Therefore, blocking unsuitable websites and applications is really important.
    Starting Price: $29.99 per month
  • 17
    Pareto Security
    ...Pareto Security checks devices to see if specific settings have been turned on and lets teams know what can be improved. Pareto Security checks Mac against a list of security settings, including whether FileVault and Firewall are on, AirPlay receiver is off, boot is secure, and password is on after inactivity. Additional security checks are being consistently added.
    Starting Price: $17
  • 18
    Fujitsu Biometrics-as-a-Service
    Fujitsu is transforming the market with its cloud-based identity platform, or Biometrics-as-a-Service, through quick deployment that lowers costs and allows customers to choose and blend modalities to develop the best use case for their particular organization and requirements, permitting rapid integration with existing business intelligence and systems. Fujitsu provides pay per use, plug-n-play biometric-enabled solutions that enable support for more than 50 biometric devices while instantaneously responding to different types of modalities. Offering a rapid deployment cycle and lower costs of biometric enablement with a pay for use business model. Providing financial services, retail, healthcare and manufacturing industries with an agnostic approach, permitting multiple modalities such as voice, facial and fingerprinting applications.
  • 19
    NeSSi2

    NeSSi2

    NeSSi2

    In contemporary communication infrastructures, IP-based computer networks play a prominent role. The deployment of these networks is progressing at an exponential rate as different kinds of participants such as corporations, public authorities and individuals rely on sophisticated and complex services and communication systems. With regard to information security, this leads to new challenges as large amounts of data, which may hold malicious content such as worms, viruses, or Trojans, are transferred over open networks. ...
  • 20
    OpenLogin

    OpenLogin

    Torus Labs

    ...Your OpenLogin account is a cryptographic key that acts as a proxy to traditional SSOs. Accounts are secured across user devices and authentication methods - there is no central server, no data honey pot. Plug and play your different logins of choice for your application. Customizable UI screens to fit seamlessly into your application screens. After registration, if chosen a user can easily use face/touchID to access your app, biometrics never leave a users device. OpenLogin accounts are analogous with a cryptographic key pair. They are initialized in with at least two factors, which are by standard a users login and their first device. ...
    Starting Price: $0.058 per user
  • 21
    InfiniGuard

    InfiniGuard

    Infinidat

    Today, ransomware, malware, and cyberattacks put your data at significant risk. Infinidat’s modern data protection and cyber resilience solution, InfiniGuard®, plays an essential role in your overall cyber security strategy. InfiniGuard offers unmatched backup and lightning-fast recovery performance, at scale, for all of your data protection needs and is enhanced by our InfiniSafe cyber recovery technologies to ensure you are always ready in the event of a cyberattack, natural disaster, or basic human error. ...
  • 22
    BPROT

    BPROT

    BPROT

    ...It provides visibility into what's happening, allowing for simple and easy control of all aspects of internet usage within businesses. Installation is quick and easy (plug and play), and from that moment on, it provides access to information and management related to: - Internet browsing - Network control - Email - Asset inventory (software and hardware) - Protection of off-site devices - Vulnerability analysis - Web application firewall Detailed reports are available in real time or historical data, and no advanced cybersecurity knowledge is required to be properly protected.
    Starting Price: $97 per month
  • 23
    SSProtect

    SSProtect

    Definitive Data Security

    ...Restore content, acquire and review Usage Reports, and even protect large data sets – all from the same set of User Interface controls available to every User independent from the Role they play in an organization.
  • 24
    R&S Web Application Firewall

    R&S Web Application Firewall

    Rohde & Schwarz Cybersecurity

    ...Our web application firewall ensures optimal protection of critical enterprise applications, including legacy applications and custom APIs, against complex attacks while considering data protection regulations. As the business world becomes increasingly web-based, web applications play a growing role in enterprises. Cybercriminals are increasingly taking advantage of vulnerabilities in these web applications.
  • 25
    Cuckoo Tech Biometric Attendance
    ...It generates healthy comparisons, and eventually leads to rewards and recognitions. This motivates the employees to adhere to company Attendance and Leave policies. It is a plug and play device and saves a good amount of money on installation and manpower costs. It provides finger template management on cloud. So, the floating workforce doesn’t need to register their fingerprints multiple times, in multiple locations. Once it is done, it’s done.
  • 26
    LogIsland

    LogIsland

    Hurence

    ...Everything is actually an event. The LogIsland platform allows you to capture all these events, put them in a message bus for large volumes and analyze them in real time with plug and play analyzers ranging from simple (counting, alerts, recommendations), to the most sophisticated: artificial intelligence models for predictions and detection of anomalies or defects. Your Swiss knife for analyzing events in real time with custom analyzers for two verticals, web analytics and industry 4.0.
  • 27
    WizyEMM

    WizyEMM

    WizyEMM

    WizyEMM is a Cloud SaaS solution built on Android Enterprise management API’s & Google Cloud Platform. Using Android API’s enables us to leverage the full Android Enterprise Security Stack as well as the Google Play store functionalities for Public and Private Apps. We have initially developed this solution for a European Express Courier company with a fleet of 30.000 Android devices used by delivery drivers
    Starting Price: $2/month/device
  • 28
    Infosequre Security Awareness
    ...Take your security awareness training to the next level with our game-based learning experiences specifically designed to complement e-learning and cement security awareness in the minds and behavior of your people. Play our VR game or escape our truck before the bang. A real custom security awareness program is based on precise measurements that give you the edge you need. Stay in the loop and gain powerful insights into your company's progress.
  • 29
    Lightspeed Filter

    Lightspeed Filter

    Lightspeed Systems

    ...Built for out-of-the-box compliance, Lightspeed Filter is the only solution on the market that employs all four key components of effective, accurate, consistent protections; dynamic, comprehensive database, always-on web crawling, advanced machine-learning, and in-house data scientists. Unlike other filters, Lightspeed Filter, with our proprietary SmartPlay™ technology, makes YouTube a safe and reliable instructional tool.
  • 30
    SecLytics Augur
    ...These predictions are fed to your SIEM or MSSP via our integrations to automate blocking. Augur builds and monitors a pool of more than 10k adversary profiles, with new profiles identified daily. Augur identifies threats before day zero and levels the playing field by removing the element of surprise. Augur discovers and protects against more potential threats than conventional TIPs. Augur detects the buildup of cybercriminal infrastructure online before attack launch. The behavior of infrastructure acquisition and setup is both systematic and characteristic.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next