Suggested Categories:

Disk Imaging Software
Disk imaging software creates an exact copy of a computer's hard drive, including the operating system, applications, settings, and files. It is commonly used for system backups, disaster recovery, and deploying standardized configurations across multiple machines. By capturing a full snapshot of a disk, users can restore their system quickly in case of data loss, hardware failure, or malware attacks. Many disk imaging tools offer incremental backups, compression, and encryption for efficient storage and security. This software is essential for IT professionals, businesses, and individuals looking to safeguard their data and streamline system recovery.
Medical Imaging Software
Medical imaging software is used to capture, store, process, and analyze medical images such as X-rays, MRIs, CT scans, ultrasounds, and other diagnostic images. These tools assist healthcare professionals in interpreting images for the purpose of diagnosis, treatment planning, and monitoring of patient progress. Medical imaging software often includes features such as image enhancement, 3D visualization, measurement tools, and the ability to integrate with electronic health records (EHR) systems. It may also offer tools for image sharing, collaboration, and comparison across different time points or imaging modalities. These software solutions improve the accuracy and efficiency of medical imaging workflows, supporting clinicians in delivering better patient care.
Image Recognition Software
Image recognition software enables machines to identify and classify objects, people, or features within images using advanced algorithms and machine learning techniques. This technology is capable of processing vast amounts of visual data to recognize patterns, shapes, and specific elements, making it useful in applications like facial recognition, object detection, and optical character recognition (OCR). The software often integrates with artificial intelligence (AI) models to improve accuracy and adaptability over time through training on diverse datasets. Image recognition is widely used in industries such as security, retail, healthcare, and autonomous vehicles, where it helps automate tasks and enhance decision-making. Overall, this software transforms visual data into actionable insights, providing significant value in various real-world applications.
Dental Imaging Software
Dental imaging software is used by dental professionals to capture, manage, and analyze various types of dental images such as X-rays, 3D scans, and intraoral photographs. This software helps in diagnosing and planning treatments for oral health issues by providing clear, detailed images that are critical for assessment and treatment planning. Features often include image enhancement tools, integration with patient records, digital radiography support, 3D visualization, and measurement tools for accurate diagnosis. Dental imaging software can also improve patient communication by allowing them to view their images and understand their treatment plans more effectively.
Image Optimization Software
Image optimization software is a type of software designed to help reduce the file size of digital images while maintaining the image quality. It typically works by compressing file sizes, changing color profiles or resolution, and stripping out unnecessary metadata and other non-visible data. This reduces the overall file size while still allowing users to keep a high-quality picture. Ultimately, this helps to improve website speed and performance by reducing load times from large image files.
Image Converters
Image converters are software tools and apps that enable users to convert images, graphics, and photos from one file format to another. Some image converters offer the ability for batch image conversion.
Image Annotation Tools
Image annotation tools are used to automatically process and label digital images using advanced techniques in machine learning, AI, and computer vision. These tools can accurately recognize important features in images, such as objects, characters, or facial expressions. This data can then be used for various purposes such as automatic image tagging and sorting. Image annotation is becoming an increasingly popular tool for organizing large databases of images and videos.
Image Compressors
Image compressors are software tools designed to reduce the file size of digital images without significantly compromising visual quality. They use algorithms like lossless or lossy compression to optimize images for faster loading times, reduced storage needs, and improved web performance. Image compressors support various formats such as JPEG, PNG, GIF, and WebP, often allowing users to balance quality and compression level. These tools are essential for photographers, web developers, and marketers aiming to enhance user experience and bandwidth efficiency. Many compressors also include batch processing, automation, and integration capabilities for streamlined workflows.
Image CDN Software
Image CDN (Content Delivery Network) providers are services that optimize and distribute images quickly and efficiently across a global network of servers. They reduce image load times by caching content in multiple geographic locations, ensuring fast delivery to users regardless of their location. These providers often offer features like automatic image optimization, format conversion, and responsive resizing to improve website performance.
Shoppable Image Software
Shoppable image software is a web-based solution that enables businesses to integrate product catalogs with their online images. This allows consumers to buy products they see in photos or videos with just one click.
AI Image Generators
AI image generators use artificial intelligence and machine learning algorithms to create or modify images based on text descriptions, existing images, or stylistic preferences. These platforms typically employ deep learning models, such as Generative Adversarial Networks (GANs), to generate high-quality visuals that mimic real-world elements or create entirely new, artistic designs. AI image generators are widely used in fields like graphic design, marketing, entertainment, and content creation, offering a fast and creative way to produce images. By using these tools, businesses and individuals can save time, enhance creativity, and produce unique visuals tailored to specific needs.
Image Processing API
An image processing API is an API that can be used by developers to add image processing capabilities to applications. Image processing APIs can be used to build features into applications such as image cleanup, OCR, image conversion, image compression, computer vision, image editing, and more.
AI Image Upscalers
AI image upscalers, also known as photo enhancement software, are software tools that use artificial intelligence to enhance, or "upscale", the quality of an image or photo. AI image upscalers can be used to improve the quality of a photograph or image automatically using AI.
Reverse Image Search Tools
Reverse image search tools empower users to trace the origins of images, identify similar visuals, and verify the authenticity of online content. These platforms utilize advanced algorithms to analyze and compare images, providing insights into where and how they appear across the internet. Whether you're a content creator protecting your intellectual property, a researcher verifying sources, or simply curious about an image's background, these tools offer valuable assistance. Many of these services are accessible via web interfaces and mobile applications, ensuring convenience and accessibility. As the internet continues to be a hub for visual content, reverse image search tools remain essential for navigating and understanding the vast array of images online.
Image Compression APIs Software
Image compression APIs provide developers with programmatic access to compress and optimize images automatically within applications, websites, or workflows. These APIs support various image formats such as JPEG, PNG, GIF, and WebP, offering configurable compression levels to balance file size and visual quality. By integrating image compression APIs, developers can reduce bandwidth usage, improve page load speeds, and enhance user experience without manual intervention.
Image Editing APIs Software
Image editing APIs provide developers with programmatic access to tools that modify and enhance images within applications or websites. These APIs offer functionalities such as cropping, resizing, filtering, color adjustment, overlaying text or graphics, and format conversion. They enable automation of image processing tasks without the need for manual editing, supporting dynamic content creation and user customization.
Photo Management Software
Photo management software enables users and organizations to manage and organize their photos and photo libraries. Photo management software tools may offer different features such as photo editing, categorization, tagging, indexing, searching, and more. Some photo management software comes with AI functionality such as image recognition and processing.
Drone Management Software
Drone management software helps organizations plan, monitor, and control drone operations safely and efficiently. It provides tools for flight planning, real-time tracking, fleet management, and data collection, ensuring compliance with aviation regulations. The platform often includes mapping and analytics features to capture and process aerial data for industries such as construction, agriculture, surveying, and public safety. By automating mission scheduling, maintenance tracking, and airspace authorization, it reduces manual effort and operational risks. Ultimately, drone management software enhances productivity, safety, and decision-making through centralized control of all drone activities.
Reference Management Software
Reference management software helps researchers, students, and academics organize and manage their sources and citations for writing papers, articles, or reports. These tools enable users to collect, store, and categorize references from books, journals, websites, and other sources. They often include features for generating citations and bibliographies in various formats (APA, MLA, Chicago, etc.), saving time and ensuring accuracy. Many reference management tools integrate with word processors, allowing users to easily insert citations and create reference lists directly within their documents. Additionally, these platforms often provide collaboration features, making it easy to share and manage research projects with team members.
Club Management Software
Club management software provides organizations with an efficient way to organize member and customer information, manage key processes, such as membership renewal, communication, and billing. It can also help clubs track attendance for events and activities. Club management software can provide a wide range of reporting capabilities that make it easier for club managers to gain insights into the performance of their organization. In addition, most software solutions offer mobile-friendly interfaces so that customers and members can access the system from anywhere.
View more categories (20) for "image manager"

98 Products for "image manager" with 2 filters applied:

  • 1
    Gumlet

    Gumlet

    Gumlet

    Host, secure, and stream videos in minutes with Gumlet Video. Build custom video processing and delivery with Gumlet Video API. Optimize and deliver images at scale with Gumlet Image. Trusted by 10,000+ businesses, Gumlet handles 1.5B media files daily with a 54% optimization rate. Gumlet Video: Streamline Video Delivery 1. Simplify video streaming with minimal coding. 2. Achieve high compression without quality loss. 3. Manage videos on a unified platform. 4. Automate via APIs, SDKs, and webhooks. 5. ...
    Leader badge
    Starting Price: $10 / month
  • 2
    Comet Backup

    Comet Backup

    Comet Backup

    Start running backups and restores in less than 15 minutes! Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup. Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers). Comet’s modern ‘chunking’...
    Leader badge
    Starting Price: $19 per month
    Partner badge
    View Software
    Visit Website
  • 3
    Chainguard

    Chainguard

    Chainguard

    Chainguard Containers are a guarded catalog of 1,700+ minimal, zero-CVE container images with a best-in-class CVE remediation SLA (7 days for critical severity, 14 days for high, medium and low) that helps customers build and deploy software better. Modern software development practices and deployment pipelines require secure, up-to-date containerized applications for cloud-native applications. Chainguard builds minimal images continuously from source in our hardened build infrastructure, with only the components required to build and run your applications. ...
    View Software
    Visit Website
  • 4
    LAPIXA

    LAPIXA

    LAPIXA

    LAPIXA uses the most sophisticated crawling algorithm for reverse image search. It reliably detects copies, even if they are cropped, cutted, changed in coloured or used with text. Manage your copyright with one click. Penalize copyright infringement without having to call in a lawyer yourself. Our lawyers work commission based and without hidden costs. They only receive compensation in the event of success.
    Starting Price: €9.90 per 500 images per month
  • 5
    ImageWare CloudID
    ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures.
  • 6
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader...
  • 7
    Minimus

    Minimus

    Minimus

    ...Minimus provides secure, minimal container and VM images, rebuilt from scratch daily to eliminate over 95% of CVEs.
  • 8
    StackRox

    StackRox

    StackRox

    Only StackRox provides comprehensive visibility into your cloud-native infrastructure, including all images, container registries, Kubernetes deployment configurations, container runtime behavior, and more. StackRox’s deep integration with Kubernetes delivers visibility focused on deployments, giving security and DevOps teams a comprehensive understanding of their cloud-native infrastructure, including images, containers, pods, namespaces, clusters, and their configurations. You get...
  • 9
    Root

    Root

    Root

    Root is a secure supply platform that delivers autonomous vulnerability remediation for container images and application dependencies, enabling organizations to eliminate security risks without disrupting existing workflows. Unlike traditional security tools that only detect or prioritize vulnerabilities, Root automatically fixes them in place, continuously patching CVEs across the versions teams already run. It integrates directly into current development pipelines and infrastructure,...
  • 10
    PicKey

    PicKey

    PicKey

    PicKey.ai is an AI-powered visual password manager that eliminates the need to remember complex text passwords by letting you log in using a unique visual Master Key composed of a personal image (like a favorite place, object, or face) combined with a 3D collectible, and then generates and manages strong site credentials on the fly without ever storing the actual passwords, using advanced neural image recognition and patented MagicPass cryptography to re-create credentials securely when needed. ...
    Starting Price: $4 per month
  • 11
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
  • 12
    Kleptofinder

    Kleptofinder

    Kleptofinder

    Kleptofinder is a tool that helps you protect your pictures/images from people that use them without permission. It searches them online and shows you exactly what websites and social media profiles use them. To put it simply, it's a tool that scours the internet, finds pictures and remembers them. Unlike other tools Kleptofinder does not require you to upload any images manually. Simply paste your website or link your Instagram account, select the security pack that suits your needs...
    Starting Price: $10 for 100 credits
  • 13
    ShadowProtect

    ShadowProtect

    StorageCraft Technology

    Like disasters, IT environments are anything but standard. That’s why businesses need a single cross-platform solution that protects a mixed, hybrid environment. ShadowProtect® backup and disaster recovery software ensures on-prem business systems and data are fully protected and always available. With ShadowProtect, meet or beat your recovery time and recovery point objectives (RTOs and RPOs). Recover files and folders in minutes. Restore failed servers. Use patented VirtualBoot technology...
  • 14
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an...
  • 15
    Docker Scout
    Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security...
    Starting Price: $5 per month
  • 16
    CLEAR

    CLEAR

    Quantum Knight

    The CLEAR™ Cryptosystem is a FIPS-140-3 Validated programmable state-of-the-art encryption SDK for securing files, streaming video, databases, and networks. Compatible with all types of modern computer platforms, CLEAR™ is an easy to integrate, turn-key tool for boosting existing cybersecurity with Post Quantum (PQC) strength. Apply CLEAR™ Cryptosystem anywhere you want to secure data in your own digital ecosystem. CLEAR™ is a single file with a smaller footprint than a single image on...
    Starting Price: Free
    View Software
    Visit Website
  • 17
    Google Cloud Container Security
    ...Securing the software supply chain means that container images are safe to deploy. This is how you make sure your container images are vulnerability free and that the images you build aren't modified.
  • 18
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more...
  • 19
    VNS3

    VNS3

    Cohesive Networks

    The all-in-one networking device promising connectivity, security and flexibility at a fraction of the cost. Launch a VNS3 image through a public cloud marketplace. We are available in AWS, Azure and GCP. Via private image sharing. We will gladly share a private image with your account. We can also provide a VDI/VDK file which you can import into your environment of choice, be that VMWare or a locked down cloud environment. The Cohesive Networks support team will provide you a license in...
    Starting Price: $150 per month
  • 20
    Unisys Modern Device Management
    ...On the other hand, you have the responsibility of securing these multiplying devices against cyberattacks. At Unisys, we resolve these dual pressures through Modern Device Management. We give you the ability to efficiently provision, track, image, secure, deploy, and manage all devices and applications in your environment.
  • 21
    Xendity

    Xendity

    Xendity

    Match a live human face picture or video to a photo —bearing document automatically. That requires facial recognition in which, making manual document authentication a thing of the past. Xendity provides you the best digital customer experience for identification and digital signing which capable of operating with images obtained from a scanner, a mobile device camera as well as web camera (in real time). With Xendity, personal identification and contract conclusion have finally reached the...
  • 22
    Air

    Air

    Air.inc

    Centralize your team's content in a workspace that's organized, versioned, and easy to share. Sure, Air stores your content. But it also has smart search, guest permissions, custom layouts, version tracking, and hassle-free sharing that makes every part of the creative process easier and more enjoyable. Stop hiding your assets in folders and zip files. Plan social media posts, create lightweight presentations, and organize your content in a workspace that reflects your brand. Navigate your...
    Starting Price: $250 per month
  • 23
    StorageCraft OneXafe
    ...OneXafe provides flexible deployment and protects both virtual and physical environments. By integrating data protection with scale-out storage, OneXafe eliminates management complexity while significantly reducing primary and secondary storage costs. Enjoy the end of data management headaches and breaking IT budgets with OneXafe configured as converged secondary storage. Data protection is an optional feature. When it’s enabled, OneXafe is configured as converged secondary storage. OneXafe ensures reliable recovery with automated, advanced reverification of backup images and inflight verification of data. ...
  • 24
    InterVision

    InterVision

    InterVision Systems

    React and respond ASAP. Respond in minutes, any time disaster strikes, 24x7x365. Maximize assurance. Protect critical infrastructure with the strongest SLAs in the market. Hit your marks. Meet third-party requirements with ongoing testing and certifications. Get a customized playbook. Use one source of truth for all DR procedures. InterVision’s Disaster Recovery as a Service (DRaaS) is a comprehensive approach to your disaster recovery solution that includes people, processes, and...
  • 25
    Edgio

    Edgio

    Edgio

    Securely deliver sub-second web applications, stream high quality OTT and live events, or distribute large file quickly to customers around the globe. Supported by Edgio experts in security, web applications, CDN, and managed streaming services. Edgio Uplynk: Optimize streaming with Edgio Uplynk our streaming management and orchestration platform backed by our OTT/live event services team. Cut costs, increase ad revenue, and delivery high quality experiences Edgio Delivery: Power your...
  • 26
    Ocrolus

    Ocrolus

    Ocrolus

    Modernize your back office with automation, powered by artificial intelligence and crowdsourcing. Extract and analyze data from any image regardless of quality, with 99+% accuracy. Data capture has never been easier. Automatically parse images in whatever form is most convenient. Part machine, part human. Ocrolus intertwines its AI with human quality control specialists for outstanding accuracy. Protect your data with bank-level security and a robust audit trail. Eliminate manual review and...
  • 27
    idwall

    idwall

    idwall

    Convert more clients, improve user experience, reduce fraud, and obey regulatory demands. Our Background Check, Document OCR, and Face Match solutions make your processes more secure and up to ten times faster. Your client sends a picture of their driver’s license (CNH) or identity card (RG) and we do the rest. We extract data from the image of a document using OCR (Optical Character Recognition) and check if the data is accurate on public sources. All that is done automatically, making your...
  • 28
    Greypanel

    Greypanel

    Greypanel

    Greypanel CDN is an independently-researched and developed dispatching system that intelligently distributes globally-located acceleration nodes to users based on their access location. By assigning the nearest resources to users, GreypanelCDN improves web services capacity, network access quality, download speeds and reduces response time, providing in smoother user experience. Targeted at portals and e-commerce sites, GreypanelCDN caches static content such as web pages, HTML, CSS, JS,...
  • 29
    Anchore

    Anchore

    Anchore

    DevSecOps at full speed with deep inspection of container images and policy-based compliance. In an environment where application development must be fast and flexible, containers are the future. Adoption is accelerating, but with it comes risk. Anchore makes it possible to manage, secure, and troubleshoot containers continuously, without sacrificing speed. It delivers a process that allows container development and deployment to be secure from the start, by ensuring that the contents of your containers match the standards that you define. ...
  • 30
    Swimage Attune EPM
    In addition to being the best imaging & provisioning tool on the market, Swimage Attune EPM prepares you for today’s cyber threats. Security & compliance monitoring Rapid, hyper-automated remediation Zero trust security Full-disk forensic snapshot Low/no bandwidth Onsite or remote Self-service capability Full system rebuild capability Encryption handler Integrates with other security tools Automated imaging Automated, dynamic provisioning Domain join flexibility Cloud management portal Multi-tenancy Client-side agent Asset management Application delivery & patching PC health monitoring & automated remediation Intelligent driver interrogator Fast & easy installation & configuration Integrates with existing system management tools Flexible & customizable Scalable to any organization size 100% end-to-end automation Requires minimal labor Reduces help desk demands Own & protect your PC information & data Alternative to SCCM & Autopilot
    Starting Price: $15.00 per user per month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next
MongoDB Logo MongoDB