Suggested Categories:

Email Template Design Software
Email template design software enables email professionals to build email templates. Email template builders offer easy to use tools like drag and drop template creation, as well as tools that let more advanced users create email templates coded from scratch.
Document Template Management Software
Document template management software is software used to help create, store and manage documents according to specified templates.
Account Planning Software
Account planning software helps businesses and marketing teams develop strategies and manage relationships with clients or key accounts. These tools allow users to organize and track detailed information about their clients, including their needs, goals, and performance metrics. Account planning software often includes features such as customer segmentation, sales forecasting, and campaign management to ensure that client objectives are met. By offering insights and data-driven recommendations, it helps create personalized and effective account strategies. This software is especially useful for sales teams, account managers, and marketing departments to strengthen client relationships and drive business growth.
Scholarship Management Software
Scholarship management software provides educational institutions with the tools to manage and process scholarship and financial assistance applications.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Business Plan Software
Business plan software is a tool designed to help entrepreneurs, startups, and businesses create, organize, and manage comprehensive business plans. These platforms typically provide templates, financial forecasting tools, and guidance to assist users in outlining their business objectives, market research, financial projections, and operational strategies. Business plan software often includes features for budgeting, cash flow management, and performance tracking to help users develop realistic and achievable goals. Many platforms also offer collaboration tools, allowing teams to work together on the business plan in real-time. By providing structure and insights, business plan software helps businesses present a clear roadmap for growth and attract investors or secure funding.
Document Generation Software
Document generation software automates the creation of documents, typically by merging data from various sources into predefined templates. It is commonly used to generate reports, contracts, invoices, or proposals with minimal manual effort. The software enables users to define document structures, integrate dynamic fields, and ensure consistent formatting across multiple documents. With features like batch processing and integration with databases or CRM systems, document generation tools can handle large volumes of documents efficiently. This automation reduces errors, speeds up workflows, and ensures that generated documents meet organizational standards.
Regulatory Reporting Software
Regulatory reporting software gathers data from an organization's systems and produces regulatory reports required by industry regulations. Regulatory reporting systems help manage and automate the regulatory reporting and compliance processes of organizations like financial institutions, banks, financial services, healthcare organizations, insurance companies, manufacturing, oil & gas, and more.
Offboarding Software
Offboarding software helps organizations manage the process of transitioning employees out of the company, ensuring that all tasks related to an employee's departure are handled efficiently and in compliance with company policies. These platforms typically include features for managing tasks such as collecting company property, revoking access to systems and accounts, conducting exit interviews, and ensuring the proper transfer of responsibilities.
Logbook Software
Logbook software is software to record and track operational activities, such as vehicle usage, maintenance, and employee tasks. It enables users to maintain accurate logs for compliance, efficiency, and record-keeping purposes. The software typically supports features like automated entries, customizable templates, and real-time data entry, making it easier to manage day-to-day operations. It is commonly used in industries like transportation, fleet management, and equipment maintenance. Logbook software helps organizations streamline processes, reduce errors, and improve overall operational oversight.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
HR Case Management Software
HR case management software enables businesses and HR departments with a single platform for handling human resource cases, investigations, requests, and issues. HR case management software, also known as HR investigation software or employee relations software, streamline that entire process around human resource case management and investigation. HR case management software handles cases like co-worker complaints, disciplinary issues, long-term sick leave, harassment, and more. Effective HR case management software includes everything an HR manager needs to manage every type of HR case, for every step in the process.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (13) for "spring template"

34 Products for "spring template" with 2 filters applied:

  • 1
    MetaPhish

    MetaPhish

    MetaCompliance

    ...Ultimately, this will keep staff safe from phishing scams through automated training that increases their vigilance and identifies the need for additional cyber awareness training. Choose from an extensive range of regularly updated phishing templates. Templates are based on current phishing threats which imitate reputable websites and brands. The templates can be matched with relevant domain names that improve the ease of use within your organization’s network. The templates are all fully customizable and can be adapted to suit specific business sectors. Phishing emails can be created from the ground up using our in-house design team and the extensive range of templates are available in 12 different languages.
  • 2
    Hypervault

    Hypervault

    Hypervault

    ...Organize your data in separate folders and subfolders. Combine this with the speed & flexibility of tags. For the lack of anything better, stop messing around with plain secure notes. Our handy templates for many data types and formats allow you to securely store and manage any type of sensitive data in the most structured way. No more need to store everything that is not a password in a meaningless secure note. For every type of sensitive data we have pre-formatted templates to keep everything clean and organized.
    Starting Price: €3.8 / month / user
  • 3
    CloudABIS

    CloudABIS

    M2SYS Technology

    ...There are many viable fingerprint readers on the market. Most fingerprint SDKs allow you to generate a standard ISO template since this is a universal format.
  • 4
    Powertech Identity Manager for IBM i
    ...When you have new employees or existing employees changing roles in your organization, you can create new user profiles with the exact settings they’ll need based on that employee’s department and title—no need to start from scratch. Ensure employees in the same roles receive identical authorities, system permissions, and partition access required to do their job. Templates provide consistency in user profile settings across the board. Change profile settings and update profile templates on multiple systems without actually having to sign on to each system. Powertech Identity Manager for IBM i’s central administration menu allows you to create or change user profiles across systems.
  • 5
    Microsoft Purview Insider Risk Management
    ...Quickly create a policy with customizable machine learning templates that require no scripting or endpoint agents to deploy. Identify patient data misuse risks with built-in indicators and detectors that use data from electronic medical record systems. Easily understand the context of an alert to help focus your investigation on the riskiest activities.
  • 6
    Gataca

    Gataca

    Gataca

    Gataca provides simple, compliant, and secure decentralized identity management technology, also known as self-sovereign identity (SSI) technology. Create and digitally sign identity credentials in a standardized format. Design customizable verification templates for on boarding and sign-in processes to offer frictionless access to digital services. Let your users authenticate seamlessly in digital services and control their data with the Gataca Wallet. User data and ID credentials are issued by trusted authorities and protected with biometrics and post-quantum cryptography to ensure they are tamper-proof, allowing instant identity verification without relying on centralized systems.
    Starting Price: €12 per month
  • 7
    SQL Secure

    SQL Secure

    IDERA, an Idera, Inc. company

    SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.
    Starting Price: $1,036 per instance
  • 8
    Concealer

    Concealer

    BeLight Software

    This reliable encryption Mac software stores information in the form of cards and uses industry-standard methods of data encryption (AES-256) to protect your credit card numbers, website passwords, software license codes, confidential files and photos, and much more. This password manager comes with card templates that make it quick and easy to store credit card details, passwords and login information, software serial numbers. Just choose a category and copy your data into the fields. Without your master password, no one will ever be able to find this encrypted data. Our encryption software not only hides your files, but also protects them by putting them in a sparse bundle with AES-256 encryption. ...
    Starting Price: $19.99 one-time payment
  • 9
    First Strike

    First Strike

    1Strike.io

    First Strike (1Strike.io) platform in a SaaS model is the only European Breach and Attack Simulation tool working with GenAI. Ready to use templates help to: -> focus on real, crucial risk pain points, -> allocate time and IT forces smartly & effectively, -> improve processes of protection their digital assets by CONTINUOUSLY, STRATEGICALLY, CYCLICALLY AND AUTOMATICALLY executing in ethically practices the sequences of techniques and scenarios that hackers perform to test, vulnerabilities possible to use before they will be used for real. ...
    Starting Price: $1000/month
  • 10
    Reporter

    Reporter

    Security Reporter

    ...The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments. Key capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes. Security Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. ...
  • 11
    Libraesva PhishBrain
    ...With an intuitive management interface, the solution provides detailed reporting on user behavior, including who opened messages, clicked malicious links, or submitted credentials, enabling targeted follow-up training. It supports a wide range of ready-to-use phishing templates and allows companies to tailor scenarios to their specific threat landscape, industries, or internal policies. By combining automated campaign scheduling, performance analytics, and user risk scoring, the tool helps organizations build continuous security awareness programs.
  • 12
    Kemp LoadMaster

    Kemp LoadMaster

    Progress Software

    The Kemp LoadMaster load balancing solutions and extensive library of application deployment templates provide high-performance and secure delivery of application workloads from a wide range of vendors in multiple sectors. Award-winning hardware, virtual and cloud-native deployment options, including the industry’s first per-app software load balancer/ADC. Make informed decisions and deal with network anomalies in real-time. Optimized load-balancing hardware that delivers a high-performance application experience for any environment. ...
    Starting Price: $1990.00/year
  • 13
     Keepabl SaaS
    ...Keepabl's BenchMark, automatic Scores, and instant Activity Analysis light the way to GDPR compliance. Keepabl's Impact Assessment Procedures lead you through assessing privacy risk, with template and specimen DPIAs.
    Starting Price: $125 per month
  • 14
    FortiPAM

    FortiPAM

    Fortinet

    ...In this way, FortiPAM ensures that the users and devices accessing critical assets are secure and prevents threats from impacting the asset. You can use the pre-built applications, or web-based launchers, or easily create your own launch templates.
  • 15
    TikBox

    TikBox

    TikBox

    Transforming how digital content is secured, shared, and monetized. Available to all creators. Our custom-built tools, template agreements, and auto-invoicing enable you to establish copyrights, add provenance, and monetize your assets with ease. In-house legal teams can create custom agreements or integrate existing ones into the contract builder, ensuring colleagues in various functions have access to appropriate contractual arrangements. Our multi-layered encryption ensures the integrity of your copyright & provenance metadata & labels. ...
    Starting Price: $5.84 per month
  • 16
    Devici

    Devici

    Security Compass

    ...Teams map system components, describe their behavior through attributes, and Devici identifies relevant threats and possible mitigations from its maintained library. The platform supports real-time collaboration, reusable patterns, templates, and version history, which helps groups standardize how they document risks across applications. Developers can contribute without needing deep threat modeling knowledge, while security teams can guide reviews and maintain consistency. Devici offers a practical way to keep threat models current as designs change and reduces the effort required to move from architecture diagrams to actionable security decisions.
    Starting Price: Free
  • 17
    VeriEye SDK

    VeriEye SDK

    Neurotechnology

    ...Liveness detection protects systems from spoofing attempts using photos or patterned contact lenses, while automatic left and right iris separation streamlines processing. Image quality checks ensure only high-grade templates are stored, supporting dependable 1-to-1 and 1-to-many performance. The SDK runs on Windows, Linux, macOS, iOS and Android, and provides programming support in C/C++, C#, VB .NET, Java and Python, offering a flexible and well-supported platform for modern biometrics.
    Starting Price: €339.00
  • 18
    PracticeProtect

    PracticeProtect

    PracticeProtect

    ...With 50+ custom-built features and 6,000+ integrations, accounting firms are safer, and more scalable with Practice Protect. From up to 10x more encryption than retail password managers to compliance templates, security training and unlimited person-to-person support, Practice Protect is the complete cloud and cyber security platform for the modern accounting firm. Find out why more accountants choose Practice Protect than any other data security tool, worldwide.
  • 19
    Activu

    Activu

    Activu

    ...-based company to develop video wall technology, more than 1,000 control rooms and command centers depend on Activu. The most Intuitive, Flexible, Feature rich wall control on the market. Organize information easily based on specific user needs. Easily create Layouts and Templates based on user needs. Organize, place and even move information across multiple video walls. Organize information assets in easily accessible, searchable Spaces. Support for virtually any information source type.
  • 20
    SolarWinds Access Rights Manager
    ...By analyzing user authorizations & access permissions, you get visualization of who has access to what, and when they accessed it. Customized reports can be generated to help demonstrate compliance with many regulatory requirements. Provision & deprovision users via role-specific templates to help assure conformity of access privilege delegation, in alignment with security policies.
  • 21
    MediaRights Revolution
    ...Managing diverse intellectual properties - music, audiovisual content, texts, images, and brands - provides detailed metadata, including rightsholder shares, and securely stores digital content copies with shared access functionality. MR2 enhances licensing processes with real-time control, simplifying deal creation through contract templates. Manage financial reports, including licensee royalties, using intricate fund distribution calculations based on contracts and rights holders' shares. Ensure effective sales management through reports for counterparts and internal analytics. Automation in royalty and licensing payments accelerates workflows, reducing manual efforts and ensuring financial precision, enhancing efficiency, and lowering operational costs.
  • 22
    Cortado

    Cortado

    Cortado Mobile Solutions

    ...Regardless of whether it’s an organization’s own or a private device – with Cortado MDM, you’re ready to go right away and can manage mobile devices easily and securely via your central MDM console. Just sign up and you’re ready to start. Templates for BYOD, COPE, kiosk mode and other deployment methods help you to set up mobile device management within minutes. Share apps from public app stores or self-developed apps. Simply make your curated apps available in your own app store or push apps to devices with a few clicks. Help keep sensitive data secure. If devices are used for business and private purposes, Cortado MDM ensures the strict separation of both data sets. ...
    Starting Price: $5.40 per device per month
  • 23
    Barracuda PhishLine
    ...Guard against a range of threats with patented, highly-variable attack simulations for Phishing (Email), Smishing (SMS), Vishing (Voice) and Found Physical Media (USB/SD Card). Train users with comprehensive, SCORM-compliant courseware. Choose from hundreds of email templates, landing pages and domains. Automatically direct training and testing with the built-in workflow engine. Make it easy for users to instantly report suspicious emails with the Phish Reporting Button.
  • 24
    IBM i Server Suites
    ...A single download and simple implementation makes it easy to install your solution across the enterprise. Once you’re up and running, enjoy intuitive features, automatic upgrades, and built-in templates. Pick and choose the modules you actually need. Our tiered solution suites progress from entry-level monitoring to advanced operations management. As your business grows, it’s easy to add functionality to meet monitoring, automation, and reporting requirements. Simplify your monitoring of multiple servers and applications with at-a-glance management—anytime, anywhere.
  • 25
    ManageEngine Endpoint DLP Plus
    ...This includes print or clipboard operations concerning sensitive files, upload of sensitive data to major Cloud platforms like Google Drive and Dropbox, offloading classified data on to removable storage devices and much more. Endpoint DLP Plus enables IT admins to create and deploy DLP policies for an organization's network from a centralized console and even offers ready-to-use templates to better meet compliance requirements of major regulatory bodies such as HIPAA & GDPR.
    Starting Price: $795/100 Workstations
  • 26
    Panorays

    Panorays

    Panorays

    ...Panorays’ automated customized security questionnaires include only the questions that are relevant for each supplier, and you can track progress with a click. Choose from a built-in template or create your own.
  • 27
    Knowee

    Knowee

    Knowee

    ...Individual use. Paperless digital card. Enriched content with video. New communication channel in your email signature. and for business. Corporate identity with customizable templates. Centralised management. Usage KPIs. Corporate cardholder, CRM. Domain URL masking. Anti - Phishing. SSO - Single Sign-On. IT integrations. Traditional way 88% of all cards are lost in this process. Functional cards on any device. No sign up, no previous knowledge of the tool required. Share via email, WhatsApp, text, Bluetooth, NFC, AirDrop. ...
    Starting Price: $5 per user per month
  • 28
    ESET PROTECT
    ...Smart predefined policies and automated tasks help IT admins save time and better protect against future attacks. Easily meet reporting requirements and save time with scheduled reporting and dozens of customizable templates. A user within your network might open a malicious email containing a new form of ransomware. Programmers who work with code on their work computers might tend to create false positives due to compiling software.
    Starting Price: $239 per year
  • 29
    Cyberday

    Cyberday

    Cyberday

    ...Tasks are proven to be implemented (for auditors, top management, or your own team) through assurance information. Assurance info differs according to task type. With the report library's dynamic templates, you can create the desired summaries of cyber security with "one-click". Once you have a clear plan, you can start improving it smartly. You can utilize our tools for risk management, internal auditing, and improvement management to get better every day.
    Starting Price: €680 per month
  • 30
    Encyro

    Encyro

    Encryo Inc

    ...You control the login options and the type of signature to ensure that the right person is signing. Encyro also provides custom branding, automated reminders, and re-usable e-sign templates. NIST-800-63 compliant access codes by text/SMS for added security.
    Starting Price: $9.99/month/user
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB