Suggested Categories:

One-on-One (1:1) Meeting Software
One-on-one meeting software tools for managers are specialized software designed to facilitate private and productive conversations with team members. These tools typically include features like video conferencing, agenda setting, note-taking, and task management, which help managers conduct structured and focused meetings. They often provide scheduling functionalities to coordinate meeting times and integrate with calendar systems for ease of planning.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
All-in-One Marketing Software
All-in-one marketing platforms are comprehensive software solutions designed to streamline and automate various marketing tasks and processes across multiple channels. These platforms provide a suite of integrated tools that support email marketing, social media management, lead generation, analytics, customer segmentation, and campaign automation. By centralizing marketing efforts, they help organizations improve efficiency, deliver consistent messaging, and track performance in real-time.
On-Demand Staffing Platforms
On-demand staffing platforms and services are online platforms that provide a marketplace for employers to hire hourly and shift workers for temporary positions. On-demand staffing service providers can enable employers to hire temporary workers directly, or through a staffing agency.
Virtual Try-On Software
Virtual try-on software is a type of interactive technology that allows users to virtually experiment with different styles or looks. It utilizes computer vision, machine learning and augmented reality to provide an accurate representation of how clothes would look on the user. This technology has become increasingly popular as online shopping becomes more common.
On-Demand Catering Software
On-demand catering software is software designed to streamline the process of managing and organizing catering services. With this software, users can easily create menus and manage orders in real-time. The platform also allows for efficient communication between clients, vendors, and event venues. Additionally, the software offers customizable features to fit the specific needs of each individual business. Overall, on-demand catering software provides a convenient and modern approach to catering management.
Advocacy Software
Advocacy software is a platform designed to support organizations in mobilizing supporters, engaging stakeholders, and driving action on important issues. It provides tools for creating petitions, organizing campaigns, and facilitating communication with policymakers, helping users advocate effectively for change. With features like targeted messaging, contact management, and social media integration, advocacy software empowers organizations to reach the right audience and amplify their message. Many platforms also offer analytics to track campaign performance and measure supporter engagement, allowing for data-driven decision-making. By streamlining outreach efforts, advocacy software enhances the impact and efficiency of advocacy campaigns.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Community Software
Community software provides organizations with the tools to build, manage, and engage online communities, enabling users to interact, collaborate, and share content. These platforms typically include features like discussion forums, messaging, content sharing, event management, and member directories. Community software is used by businesses, educational institutions, nonprofits, and other organizations to foster engagement, create support networks, and promote collaboration among members. It can be customized to suit different types of communities, such as customer communities, social groups, or professional networks, and can include tools for moderation, analytics, and member management.
Travel Software
Travel software encompasses a wide range of applications designed to simplify and automate various processes in the travel industry. These platforms provide tools for managing bookings, reservations, itineraries, customer interactions, and travel-related transactions. Travel software includes solutions for both travel agencies and travelers, offering features like trip planning, real-time updates, pricing comparisons, and travel experience management. By integrating with airlines, hotels, car rentals, and tour operators, travel software enables seamless travel arrangements and efficient operations across multiple channels. This software helps businesses in the travel industry streamline their operations, enhance customer service, and improve overall travel management.
Law Enforcement Software
Law enforcement software is used by public safety organizations to manage and keep track of cases, reports, legal documentation, and investigations.
Team Communication Software
Team communication software facilitates effective interaction and collaboration within organizations by providing tools for messaging, voice and video calls, file sharing, and project coordination. It often includes features like group channels, threaded conversations, presence indicators, and integrations with other business applications to streamline workflows and keep everyone aligned. The software supports real-time and asynchronous communication, helping teams stay connected regardless of location or time zone. By improving transparency and reducing communication silos, team communication software boosts productivity and decision-making. It is widely used across industries to support remote work, cross-functional collaboration, and internal communications.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Print On Demand Software
Print on demand software enables businesses to sell customized printed products without holding inventory or managing production in advance. It connects online storefronts with printing and fulfillment providers to automatically process orders as they are placed. The software supports product customization, order routing, and real-time status tracking. Many platforms integrate with eCommerce systems, marketplaces, and payment processors to streamline sales and fulfillment. By eliminating upfront inventory costs, print on demand software allows businesses to scale efficiently and offer a wide range of personalized products.
Call Accounting Software
Call accounting software tracks, records, and analyzes telephone usage within an organization to help manage costs and improve communication efficiency. It captures details such as call duration, destination, extensions used, and associated costs across VoIP, PBX, or unified communications systems. The software provides reports that help businesses identify misuse, allocate expenses to departments, and optimize telecom spending. Many platforms also include security features like fraud detection and alerts for unusual calling patterns. Overall, call accounting software gives organizations greater visibility into their phone systems while reducing unnecessary costs.
Sandbox Software
Sandbox software enables IT professionals and developers to create a sandbox on their machine, or a virtual sandbox in the cloud, in order to isolate potentially dangerous programs and applications for testing and development.
Business Management Software
Business management software is a suite of tools designed to help organizations streamline and automate various operational processes, including project management, financial tracking, resource allocation, and workflow optimization. These platforms offer features for managing tasks, employees, budgets, and client relationships, enabling businesses to improve efficiency, reduce costs, and enhance decision-making. Business management software often includes modules for accounting, inventory management, human resources, and customer relationship management (CRM), allowing for centralized control over critical business functions. By automating routine tasks and providing real-time data insights, these solutions support strategic planning and operational growth.
Data Lake Solutions
Data lake solutions are platforms designed to store and manage large volumes of structured, semi-structured, and unstructured data in its raw form. Unlike traditional databases, data lakes allow businesses to store data in its native format without the need for preprocessing or schema definition upfront. These solutions provide scalability, flexibility, and high-performance capabilities for handling vast amounts of diverse data, including logs, multimedia, social media posts, sensor data, and more. Data lake solutions typically offer tools for data ingestion, storage, management, analytics, and governance, making them essential for big data analytics, machine learning, and real-time data processing. By consolidating data from various sources, data lakes help organizations gain deeper insights and drive data-driven decision-making.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.

342 Products for "only one" with 2 filters applied:

  • 1
    New Relic

    New Relic

    New Relic

    ...As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 2
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. ...
    Starting Price: $6.99/user/month
    View Software
    Visit Website
  • 3
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access...
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 4
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona...
  • 5
    Feroot

    Feroot

    Feroot Security

    Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis,...
  • 6
    Airlock Digital

    Airlock Digital

    Airlock Digital

    ...Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service.
  • 7
    Cisdem AppCrypt
    Cisdem AppCrypt is an app lock and website blocker rolled into one. You can use it to protect privacy by locking certain apps with a password. You can also use it to improve focus and productivity by blocking distracting sites. With it, parents can protect their children from inappropriate sites. Protect apps - Lock individual apps, such as Photos and WhatsApp - Allow access to your chosen apps only (on Mac only) Block websites - Block specific sites, such as facebook.com - Filter URLs including the keywords you specify - Restrict certain categories of sites, such as social media - Allow access to approved sites only Set schedules - Schedule app locking and website blocking to be active at all times or during specific times - Provide a General Schedule feature - Provide a Custom Schedule feature (on Mac and Windows only) Offer password protection - Require a password unlock apps, unblock sites, or change schedules - Require a password to quit Cisdem AppCrypt
    Starting Price: $19.99 per year
  • 8
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks.
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
  • 9
    DNS Shield

    DNS Shield

    AReTori Solutions Ltd.

    Protect yourself on all your Apple devices by encrypting DNS queries and using no-logging DNS servers. Safeguard your online presence. Key features: - Ease of configuration. - Effortlessly switch DNS servers. - No vendor lock in. - No need for VPN. - Minimise or completely eliminate, in some cases, the amount of harmful sites contacted by your device. - Works System wide (not only in the browser). - Extensive In-App Help system. - We don't collect any data and we don't track...
    Starting Price: $1.99
  • 10
    Symantec Integrated Cyber Defense
    ...We know Symantec will never be your only vendor. That’s why we created Integrated Cyber Defense Exchange (ICDx), which makes it easy to integrate third-party products and share intelligence across the platform. Symantec is the only major cyber defense vendor that builds solutions to support all infrastructures, whether entirely on-premises, entirely in the cloud, or a hybrid of the two.
  • 11
    Darkscope

    Darkscope

    Darkscope

    ...Most other threat intelligence providers aggregate threat information using OSINT. Commonly, you will receive a threat intelligence stream that is only between 1% and 5% relevant to you. When you consider that those preparing a cyber attack on your business will have researched you: your staff, partners, and customer base, a stream of generic threat intelligence has only little value if any.
  • 12
    Cloudbrink

    Cloudbrink

    Cloudbrink

    ...The high-performance ZTNA service that is part of a personal SASE solution from Cloudbrink can upgrade or replace traditional VPNs while fixing the performance and complexity that come from other vendors in the ZTNA and SASE space. Built as a software-only service, Cloudbrink delivers sub-20ms latency and 1Gbps+ speeds per user using dynamically deployed FAST edges and a proprietary protocol that recovers packet loss before it impacts the app. Security isn’t bolted on—it’s built in. With mutual TLS 1.3, short-lived certs, and no exposed IPs, Cloudbrink provides real zero trust without making users suffer through poor connections or overloaded POPs. ...
  • 13
    Chainguard

    Chainguard

    Chainguard

    Chainguard Containers are a guarded catalog of 1,700+ minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps customers build and deploy software better. Modern software development practices and deployment pipelines require secure, up-to-date containerized applications for cloud-native applications.
  • 14
    iSafeSend

    iSafeSend

    iSafeSend

    ...This data can only be viewed once, and after being viewed, it is deleted. Since these links can only be viewed once, recipients should not forward the links to other people. Specify the number of days until the links expire and select the number of links you wish to generate. Remember, each generated link can only be viewed once.
  • 15
    FortKnoxster

    FortKnoxster

    FortKnoxster

    One-stop E2E encrypted platform made by cybersecurity experts. Crypto Suite™ is all you need in the jungle of crypto apps. The safest app available for all your crypto needs. All your valuable and private stuff in one secure place. Communications, cryptocurrencies and private files. End-to-end encryption and blockchain integration to ensure that only you are in control.
  • 16
    Securden Unified PAM
    Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of...
    Starting Price: Per User Pricing
  • 17
    Veriam

    Veriam

    Veriam

    Veriam brings access and subscriptions together in one simple, secure solution. Our brand new platform makes it faster and simpler for SaaS providers to manage onboarding, access, contracting, renewals, and billing—all in one place. How Veriam stands out ✔️ All-in-one platform: Manage access and subscriptions from a single platform, reducing admin and improving workflows. ✔️ Real-time updates: Access permissions update instantly as subscription changes happen—no delays, no downtime...
    Starting Price: Free
  • 18
    Active Wall

    Active Wall

    Active Network CO

    Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. ...
    Starting Price: $10 per user
  • 19
    Foxpass

    Foxpass

    Foxpass

    Foxpass offers enterprise-grade infrastructure identity and access control to companies of every size. Our cloud-hosted or on-premise LDAP, RADIUS, and SSH key management solutions ensure that employees have access to only the networks, VPNs, and servers required for each employee, and only for the time period desired. Foxpass integrates with a company’s existing products (like Google Apps, Office365, Okta, Bitium) for a seamless experience.
    Leader badge
    Starting Price: $3/User/Month
  • 20
    OTPfy

    OTPfy

    OTPfy

    ...Pay-as-you-go is the way; pay only for what you actually consume with generous volume discounts. Only use our OTPfy mobile app and a call to our REST API with your private token. No flat fees, no subscriptions, just pay as you go and for what you actually consume and get additional discounts for committed usage as you scale.
  • 21
    First Strike

    First Strike

    1Strike.io

    ...FirstStrike is the only cost-effective BAS platform available to use in minutes not months. Perfect for “One Man Show CISO” leading cyber-resilience in medium-sized businesses, fast growing companies that want to scale their core business safely.
    Starting Price: $1000/month
  • 22
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    ...Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 23
    Dropbox Passwords
    Dropbox Passwords is currently in private beta and only available to some Dropbox customers. Dropbox Passwords (beta) provides password security by storing all your passwords in one secure place, then fills in usernames and passwords so you can instantly sign in to websites and apps. You can easily create and store unique, secure passwords as you sign up for new accounts. Features: - Sign in to apps and websites with one click - Store passwords as you sign in to sites and apps - Access your passwords from anywhere with automatic syncing to all your devices Never get locked out of your accounts again. ...
  • 24
    Concealer

    Concealer

    BeLight Software

    ...This password manager comes with card templates that make it quick and easy to store credit card details, passwords and login information, software serial numbers. Just choose a category and copy your data into the fields. Without your master password, no one will ever be able to find this encrypted data. Our encryption software not only hides your files, but also protects them by putting them in a sparse bundle with AES-256 encryption. Use only the master password or assign a separate password for each file vault to double the protection. Adding files is as simple as dragging and dropping them from the Finder.
    Starting Price: $19.99 one-time payment
  • 25
    PortalGuard

    PortalGuard

    BIO-key International

    ...PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 26
    F5 BIG-IP DDoS Hybrid Defender
    ...Fortunately, F5 BIG-IP DDoS Hybrid Defender provides a greater depth of defense. It’s the only multi-layered defense that protects against blended network attacks and sophisticated application attacks, while enabling full SSL decryption, anti-bot capabilities, and advanced detection methods, all in one appliance.
  • 27
    Unistal Anti Virus

    Unistal Anti Virus

    Unistal Systems

    Unistal is a name synonymous to data security. Unistal’s brand Protegent is the most advanced & fastest antivirus. Protegent is deciphered from French word ‘Protegee’, which means ‘To Protect’. As the name suggests Protegent products have been designed to provide protection to your business, data and computer/Laptop. It is world’s only antivirus with inbuilt data recovery software. It is available in three variants Protegent antivirus, Total Security and Complete Security. Unistal has...
    Starting Price: $49 one-time payment
  • 28
    Observe

    Observe

    Observe

    ...Customers such as Capital One, Dialpad AI, Top Golf and more trust Observe to turn their data into actionable insights.
    Starting Price: $0.35 Per GiB
  • 29
    Protectstar Camera Guard
    Put an end to spying and unsightly taping. Not only millions of users but also the founder of Facebook, Mark Zuckerberg, and former FBI chief James Comey are taping over the webcam of their devices. Everything and everyone is being spied on. We have known this since June 2013, when the first NSA documents by whistleblower Edward Snowden were published. But not only hackers found ways to misuse the webcam without a warning signal to the user: Also, the latest malware is highly dangerous because it specifically targets control of the integrated device camera. ...
    Starting Price: $8.90 per year
  • 30
    CHEQ

    CHEQ

    CHEQ AI Technologies

    CHEQ FOR PPC Save significant wasted ad-spend and lower your CPA's across all major PPC buying channels with the world's No. 1 click-fraud prevention platform for advertisers PROTECT YOUR ENTIRE MARKETING SPEND The only solution covering all your paid search and paid social buying channels REMOVE BOTS FROM YOUR AUDIENCES The only solution that excludes invalid audiences, protecting your remarketing and lookalikes NEVER BLOCK REAL PAYING CUSTOMERS The only real-time cyber-driven solution that blocks all the bad traffic, but never the good traffic
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB