Suggested Categories:

One-on-One (1:1) Meeting Software
One-on-one meeting software tools for managers are specialized software designed to facilitate private and productive conversations with team members. These tools typically include features like video conferencing, agenda setting, note-taking, and task management, which help managers conduct structured and focused meetings. They often provide scheduling functionalities to coordinate meeting times and integrate with calendar systems for ease of planning.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
All-in-One Marketing Software
All-in-one marketing platforms are comprehensive software solutions designed to streamline and automate various marketing tasks and processes across multiple channels. These platforms provide a suite of integrated tools that support email marketing, social media management, lead generation, analytics, customer segmentation, and campaign automation. By centralizing marketing efforts, they help organizations improve efficiency, deliver consistent messaging, and track performance in real-time.
On-Demand Staffing Platforms
On-demand staffing platforms and services are online platforms that provide a marketplace for employers to hire hourly and shift workers for temporary positions. On-demand staffing service providers can enable employers to hire temporary workers directly, or through a staffing agency.
Virtual Try-On Software
Virtual try-on software is a type of interactive technology that allows users to virtually experiment with different styles or looks. It utilizes computer vision, machine learning and augmented reality to provide an accurate representation of how clothes would look on the user. This technology has become increasingly popular as online shopping becomes more common.
On-Demand Catering Software
On-demand catering software is software designed to streamline the process of managing and organizing catering services. With this software, users can easily create menus and manage orders in real-time. The platform also allows for efficient communication between clients, vendors, and event venues. Additionally, the software offers customizable features to fit the specific needs of each individual business. Overall, on-demand catering software provides a convenient and modern approach to catering management.
Advocacy Software
Advocacy software is a platform designed to support organizations in mobilizing supporters, engaging stakeholders, and driving action on important issues. It provides tools for creating petitions, organizing campaigns, and facilitating communication with policymakers, helping users advocate effectively for change. With features like targeted messaging, contact management, and social media integration, advocacy software empowers organizations to reach the right audience and amplify their message. Many platforms also offer analytics to track campaign performance and measure supporter engagement, allowing for data-driven decision-making. By streamlining outreach efforts, advocacy software enhances the impact and efficiency of advocacy campaigns.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Community Software
Community software provides organizations with the tools to build, manage, and engage online communities, enabling users to interact, collaborate, and share content. These platforms typically include features like discussion forums, messaging, content sharing, event management, and member directories. Community software is used by businesses, educational institutions, nonprofits, and other organizations to foster engagement, create support networks, and promote collaboration among members. It can be customized to suit different types of communities, such as customer communities, social groups, or professional networks, and can include tools for moderation, analytics, and member management.
Travel Software
Travel software encompasses a wide range of applications designed to simplify and automate various processes in the travel industry. These platforms provide tools for managing bookings, reservations, itineraries, customer interactions, and travel-related transactions. Travel software includes solutions for both travel agencies and travelers, offering features like trip planning, real-time updates, pricing comparisons, and travel experience management. By integrating with airlines, hotels, car rentals, and tour operators, travel software enables seamless travel arrangements and efficient operations across multiple channels. This software helps businesses in the travel industry streamline their operations, enhance customer service, and improve overall travel management.
Law Enforcement Software
Law enforcement software is used by public safety organizations to manage and keep track of cases, reports, legal documentation, and investigations.
Team Communication Software
Team communication software facilitates effective interaction and collaboration within organizations by providing tools for messaging, voice and video calls, file sharing, and project coordination. It often includes features like group channels, threaded conversations, presence indicators, and integrations with other business applications to streamline workflows and keep everyone aligned. The software supports real-time and asynchronous communication, helping teams stay connected regardless of location or time zone. By improving transparency and reducing communication silos, team communication software boosts productivity and decision-making. It is widely used across industries to support remote work, cross-functional collaboration, and internal communications.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Print On Demand Software
Print on demand software enables businesses to sell customized printed products without holding inventory or managing production in advance. It connects online storefronts with printing and fulfillment providers to automatically process orders as they are placed. The software supports product customization, order routing, and real-time status tracking. Many platforms integrate with eCommerce systems, marketplaces, and payment processors to streamline sales and fulfillment. By eliminating upfront inventory costs, print on demand software allows businesses to scale efficiently and offer a wide range of personalized products.
Call Accounting Software
Call accounting software tracks, records, and analyzes telephone usage within an organization to help manage costs and improve communication efficiency. It captures details such as call duration, destination, extensions used, and associated costs across VoIP, PBX, or unified communications systems. The software provides reports that help businesses identify misuse, allocate expenses to departments, and optimize telecom spending. Many platforms also include security features like fraud detection and alerts for unusual calling patterns. Overall, call accounting software gives organizations greater visibility into their phone systems while reducing unnecessary costs.
Sandbox Software
Sandbox software enables IT professionals and developers to create a sandbox on their machine, or a virtual sandbox in the cloud, in order to isolate potentially dangerous programs and applications for testing and development.
Business Management Software
Business management software is a suite of tools designed to help organizations streamline and automate various operational processes, including project management, financial tracking, resource allocation, and workflow optimization. These platforms offer features for managing tasks, employees, budgets, and client relationships, enabling businesses to improve efficiency, reduce costs, and enhance decision-making. Business management software often includes modules for accounting, inventory management, human resources, and customer relationship management (CRM), allowing for centralized control over critical business functions. By automating routine tasks and providing real-time data insights, these solutions support strategic planning and operational growth.
Data Lake Solutions
Data lake solutions are platforms designed to store and manage large volumes of structured, semi-structured, and unstructured data in its raw form. Unlike traditional databases, data lakes allow businesses to store data in its native format without the need for preprocessing or schema definition upfront. These solutions provide scalability, flexibility, and high-performance capabilities for handling vast amounts of diverse data, including logs, multimedia, social media posts, sensor data, and more. Data lake solutions typically offer tools for data ingestion, storage, management, analytics, and governance, making them essential for big data analytics, machine learning, and real-time data processing. By consolidating data from various sources, data lakes help organizations gain deeper insights and drive data-driven decision-making.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.
  • 1
    New Relic

    New Relic

    New Relic

    ...As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 2
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona...
    View Software
    Visit Website
  • 3
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks.
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
    View Software
    Visit Website
  • 4
    Securden Unified PAM
    Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of...
    Starting Price: Per User Pricing
  • 5
    Smallstep

    Smallstep

    Smallstep

    Smallstep is the world’s first Device Identity Platform™, built to ensure that only company-owned devices can access sensitive enterprise resources. It secures Wi-Fi, VPNs, ZTNA, SaaS applications, cloud APIs, and developer infrastructure using hardware-bound credentials. At its core is ACME Device Attestation, a modern standard co-developed with Google that binds identity directly to device hardware. This approach prevents credential theft, phishing, and impersonation by making credentials...
    Starting Price: $0
  • 6
    1Kosmos

    1Kosmos

    1Kosmos

    ...BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 7
    Oneleet

    Oneleet

    Oneleet

    ...Then we'll build you out a custom security program that is stage-appropriate. We'll perform your penetration test with highly qualified OSCE-certified or OSWE-certified testers, only around 1,000 of whom exist worldwide. Finally, we'll take you through the SOC 2 auditing process with a 3rd party CPA. Oneleet has everything you need to become compliant and secure in one place. Having all tools under one roof makes the compliance journey smooth and seamless.
  • 8
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. ...
  • 9
    Portnox Security

    Portnox Security

    Portnox Security

    Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances.
  • 10
    SafeConsole

    SafeConsole

    DataLocker

    ...Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. ...
    Starting Price: $28 per device per year
  • 11
    Password Depot

    Password Depot

    AceBIT GmbH

    Password Depot securely protects your passwords and documents from unauthorized access. Whether you work from home or at a large corporation access your passwords on your Windows, Android, iOS or macOS device. From now on, you will only need to remember one single password - for Password Depot. State-of-the-art security measures are in place to secure your sensitive data against external access by double encryption based on the highest security standard AES (Rijndael 256). All whilst remaining under your control as Password Depot functions as an on-premises solution. ...
  • 12
    Keyfactor EJBCA
    EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem.
  • 13
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    ...If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 14
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. ...
  • 15
    Psono

    Psono

    esaqa GmbH

    ...Hosting Psono on your server offers enhanced access control, eliminating the need to depend on public services for data storage. Psono stands out as one of the most secure password managers, prioritizing the online safety of its users on their servers.
    Starting Price: Free
  • 16
    Trellix Data Encryption
    ...Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
  • 17
    Fasoo Enterprise DRM
    Fasoo Enterprise DRM (FED) is an advanced data-centric security solution designed to protect sensitive information at rest, in transit, and in use. With granular permission control, organizations can define and enforce user-specific access rights to ensure only authorized personnel can view or edit sensitive files. Centralized policy management simplifies the enforcement of consistent security policies across the organization, reducing administrative overhead. FED’s enhanced monitoring...
  • 18
    MiniAiLive

    MiniAiLive

    MiniAiLive

    MiniAiLive is a provider of Touchless Biometrics Authentication, ID verification solutions. We offer strong security solutions with cutting-edge technologies for facial recognition, liveness detection, and ID document recognition. We also ensure that these solutions seamlessly integrate with our clients’ existing systems. MiniAiLive face recognition app is an advanced face recognition app designed to provide secure and reliable access control solutions with the added layer of passive...
    Leader badge
    Starting Price: lifetime license
  • 19
    Code Intelligence

    Code Intelligence

    Code Intelligence

    Our platform uses various security techniques, including coverage-guided and feedback-based fuzz testing, to automatically generate millions of test cases that trigger hard-to-find bugs deep within your application. This white-box approach protects against edge cases and speeds up development. Advanced fuzzing engines generate inputs that maximize code coverage. Powerful bug detectors check for errors during code execution. Uncover true vulnerabilities only. Get the input and stack trace as...
  • 20
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling.
  • 21
    Rencore Code (SPCAF)
    Rencore Code (SPCAF) is the only solution on the market that analyzes and assures code quality for SharePoint, Microsoft 365 and Teams development by checking violations against over 1100 policies and checks regarding security, performance, best practices, maintainability, and supportability. Rencore Code (SPCAF) client both works as standalone desktop application or SaaS service. Dev teams run Rencore Code Server, allowing multiple developers to use it as a quality gate and seamlessly...
    Starting Price: $70 per user per month
  • 22
    ConnectWise SIEM

    ConnectWise SIEM

    ConnectWise

    ...Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Starting Price: $10 per month
  • 23
    LumenVox Voice Biometrics
    Using voice biometrics authentication, companies can provide a delightful customer experience without sacrificing security. LumenVox Voice Biometrics technology screens customers by comparing input voice audio to a collection of stored voice samples (“voiceprints”) that are known to be authentic or fraudulent. Just like a fingerprint, each voice is unique. This makes Voice Biometric Authentication an incredibly effective way to validate identity. LumenVox’s flexible voice biometrics...
  • 24
    Cribl Stream
    Cribl Stream allows you to implement an observability pipeline which helps you parse, restructure, and enrich data in flight - before you pay to analyze it. Get the right data, where you want, in the formats you need. Route data to the best tool for the job - or all the tools for the job - by translating and formatting data into any tooling schema you require. Let different departments choose different analytics environments without having to deploy new agents or forwarders. As much as 50%...
    Starting Price: Free (1TB / Day)
  • 25
    Acunetix

    Acunetix

    Invicti Security

    ...With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 26
    Edge Delta

    Edge Delta

    Edge Delta

    Edge Delta is a new way to do observability that helps developers and operations teams monitor datasets and create telemetry pipelines. We process your log data as it's created and give you the freedom to route it anywhere. Our primary differentiator is our distributed architecture. We are the only observability provider that pushes data processing upstream to the infrastructure level, enabling users to process their logs and metrics as soon as they’re created at the source. We...
    Starting Price: $0.20 per GB
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB