Suggested Categories:

School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
Compliance Training Software
Compliance training software enables organizations to train their workforce on various topics such as anti-harassment, ethics, workplace safety, diversity and inclusion, financial fraud, and more. Compliance training programs, also known as compliance learning management systems (LMS), help companies improve their workplace and remain compliant with HR regulations.
Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Gymnastics Software
Gymnastics software is software for gymnastics clubs, coaches, and organizations to manage their operations, training, and competitions. These platforms often include features like scheduling, attendance tracking, athlete management, progress tracking, and score management for competitions. Gymnastics software can help coaches create personalized training plans, monitor skill development, and track individual athlete performance over time. Additionally, the software may offer tools for registration, payment processing, and communication with athletes and parents. It streamlines administrative tasks, improves organization, and enhances the overall experience for athletes and coaches.
Fire Department Software
Fire department software helps fire stations manage incident reporting, personnel scheduling, equipment tracking, and overall operational readiness. It streamlines workflows such as dispatch coordination, training management, hydrant inspections, and response documentation. Many platforms integrate with CAD systems and provide mobile access so firefighters can quickly retrieve critical information in the field. The software also supports compliance reporting, analytics, and performance reviews to help departments meet regulatory requirements and improve service outcomes. Overall, fire department software enhances communication, efficiency, and safety for emergency response teams.
Skills Management Software
Skills management software enables organizations to identify, monitor, track, and analyze the skills and skillsets of their workforce. These platforms typically include features for skill assessments, employee skill inventories, training and development tracking, and skills gap analysis. Skills management software allows HR teams and managers to identify skill shortages, match employees with appropriate projects, and create personalized learning and development plans. It also helps organizations align their workforce's capabilities with business objectives, ensuring they have the right skills for current and future needs.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    SparkView

    SparkView

    beyond SSL

    ...) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 2
    Diplomat Managed File Transfer
    Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more. With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. ...
    Starting Price: $1,149/year
    View Software
    Visit Website
  • 3
    Control D

    Control D

    Control D

    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with client level granularity - Re-route traffic via proxies (through DNS) for improved privacy and security - Enjoy superior UX and simplicity Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 4
    PentestBox

    PentestBox

    PentestBox

    ...By default PentestBox runs like a normal user, no administrative permission is required to launch it. To make PentestBox more awesome we have also included HTTPie, HTTPie is a command line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as possible. It provides a simple http command that allows for sending arbitrary HTTP requests using a simple and natural syntax, and displays colorized output. HTTPie can be used for testing, debugging, and generally interacting with HTTP servers. PentestBox also contains a modified version of Mozilla Firefox with all the security addons pre installed in it.
  • 5
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    ...This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
  • 6
    CIAgent

    CIAgent

    SNMP Research

    ...In addition, a powerful subagent development kit for building custom extensions can also be purchased as an option. This intelligent agent supports SNMPv1, SNMPv2c, SNMPv3, and HTTP. CIAgent is optionally available as an SNMPv3-Only Edition that supports SNMPv3 and HTTP. This is a special version of CIAgent that has been hardened for use in network environments having the most stringent security requirements to protec
  • 7
    Squid

    Squid

    Squid

    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows, and is licensed under the GNU GPL. Squid is used by hundreds of Internet Providers worldwide to provide their users with the best possible web access.
  • 8
    DNSSense

    DNSSense

    DNSSense

    DNSEye detects malicious traffic on your network and reports whether this traffic can be blocked by your other security devices. DNS is used by all protocols like HTTP, HTTPS, SMTP, and IoT. DNS traffic provides information about your entire network, regardless of its network protocol. With DNS tunnelling, data exfiltration attacks cannot be detected by DLP products. It requires DNS log analysis for an effective solution. 80% of malware domains currently do not have an IP address. Malware requests that do not have an IP address can only be detected in the DNS log. ...
    Starting Price: $1000
  • 9
    Virus Vanish

    Virus Vanish

    DigitalBulls

    Virus Vanish is an antivirus program that ensure the device security in all aspects. It helps device to detect malicious files after scanning and removes all kinds of threat involved in it. It helps to improve the speed and performance of the device.
    Starting Price: $99
  • 10
    Pound

    Pound

    Apsis IT Security

    The Pound program is a reverse proxy, load balancer and HTTPS front-end for Web server(s). Pound was developed to enable distributing the load among several Web-servers and to allow for a convenient SSL wrapper for those Web servers that do not offer it natively. Pound is distributed under the GPL - no warranty, it's free to use, copy and give away. Pound is a very small program, easily audited for security problems.
  • 11
    KeePass

    KeePass

    KeePass

    KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can store all your passwords in one database, which is locked with a master key. So you only have to remember one single master key to unlock the whole database. Database files are encrypted using the best and most secure encryption algorithms currently known (AES-256, ChaCha20 and Twofish). KeePass can be downloaded for free from SourceForge.
    Starting Price: Free
  • 12
    Spendgo

    Spendgo

    Spendgo

    Spendgo is an integrated loyalty and marketing platform that allows businesses of all sizes to automate and manage campaigns, creating a unified customer experience for its 12 million users by connecting point of sale and e-commerce platforms with third-party solutions. Spendgo provides behavioral data, as well as customer profiles and purchases history, empowering businesses to more effectively engage with their customers. With Spendgo you can reach your customers in-store, online or via mobile.
    Starting Price: $10 per month
  • 13
    ManageEngine Patch Manager Plus
    Keep all your production businesses up to date by automating the entire patching process using Patch Manager Plus. Available as both cloud-based and on-premise software, Patch Manager Plus offers features that include scanning for and detecting missing patches, automated scheduled patch deployments, test and approve patches, patch tracking, patch compliance and reporting. Patch Manager Plus also enables users to provide detailed audit and compliance reports.
    Starting Price: $245 per year
  • 14
    Privatoria

    Privatoria

    Privatoria

    ...When you connect to a VPN server all your traffic goes through an encrypted tunnel and none can see it until it exits the tunnel and accesses a public internet. If you are connecting to websites with HTTPS encryption, your personal data stays secure even when it exits the tunnel. VPN protects information and allows to leave no footprints while surfing the web.
    Starting Price: $2.74 per user per month
  • 15
    InterceptSuite

    InterceptSuite

    InterceptSuite

    InterceptSuite is a comprehensive MITM proxy and TLS interception tool designed for security professionals, developers, system administrators, and network engineers. It features advanced SOCKS5 proxy capabilities with Python extension support, allowing users to write custom protocol dissectors and analysers for any TLS-encrypted protocol. The platform offers cross-platform compatibility across Windows, macOS, and Linux, with both free open-source and professional editions available. Key...
    Starting Price: $10/month
  • 16
    DDP Endpoint Security Suite
    ...With centralized management, consolidated compliance reporting, and console threat alerts, businesses can easily enforce and prove compliance for all of their endpoints. Ensure that security device drivers are up-to-date for the best customer experience. Visit http://www.dell.com/support to download Dell ControlVault drivers. Software-based Data Centric Encryption enables IT to easily enforce encryption policies, whether the data resides on the system drive or external media. Designed for mixed vendor environments, it also won’t get in the way of existing IT processes for patch management and authentication. ...
  • 17
    Barracuda Application Protection
    ...The platform offers features such as machine learning-powered auto-configuration, full-spectrum DDoS protection, advanced bot protection, and client-side protection to safeguard applications from sophisticated attacks. Additionally, it includes a hardened SSL/TLS stack for secure HTTPS front-end, built-in content delivery network (CDN) for optimized performance, and integration with various authentication services for granular access control. Barracuda Application Protection simplifies application security by providing a unified solution that is easy to deploy, configure, and manage.
  • 18
    LUCY Security Awareness Training
    Train. phish. assess. engage. alarm. Lucy Security from Switzerland allows organizations to measure and improve the security awareness of employees and test their IT defenses. Turn employees into a human firewall with simulated attacks and our E-Learning platform with hundreds of preconfigured videos, training, quiz ready for usage. The most powerful IT Security Awareness Solution in the market. Fixed Prices | On-Premise or SaaS | Phish-Button | Threat Analytics | Over 10.000 installations...
  • 19
    Caido

    Caido

    Caido Labs Inc.

    Caido is a modern web security toolkit designed for pentesters, bug bounty hunters, and security teams who need an efficient and customizable solution for web application testing. Caido features a powerful intercept proxy for capturing and manipulating HTTP requests, replay functionality for testing endpoints, and automation tools for handling large-scale workflows. Its sitemap visualization provides a clear view of web application structures, helping users map and navigate complex targets. With HTTPQL, users can efficiently filter and analyze traffic, while no-code workflows and a plugin system enable easy customization to fit specific testing needs. ...
    Starting Price: Free
  • 20
    GoAccess

    GoAccess

    GoAccess

    GoAccess is an open source, real-time web log analyzer and interactive viewer that operates within a terminal on Unix-like systems or through a browser interface. Designed for rapid analysis, it provides immediate HTTP statistics, making it ideal for system administrators who need quick insights into server performance. The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. ...
    Starting Price: Free
  • 21
    RTG Bills

    RTG Bills

    RTG Data Systems

    ...It's the ultimate in Billing Made Easy®! Easy to use, full-featured legal billing. Zero software installation required. Works with any modern Web browser. Secure Web site (https) protects your data as it travels on the Internet. Many users can work at the same time, from different locations. Low monthly fee - starting at $15.95 per month.
    Starting Price: $95.00/one-time
  • 22
    Atomicorp Enterprise OSSEC
    ... - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. More info on Atomic Enterprise OSSEC is available at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 23
    SpectX

    SpectX

    SpectX

    ...It does not ingest or index data but runs queries directly on log files stored in file systems or blob storage. Local log servers, cloud storage, Hadoop clusters, JDBC-databases, production servers, Elastic clusters, or anything that speaks HTTP - SpectX turns any text-based log files into structured virtual views. SpectX query language is inspired by piping in Unix. An extensive library of built-in query functions allows analysts to compose complex queries and get advanced insights. In addition to the browser-based interface, every query can be easily executed via RESTful API, with advanced options to customize the resultset. ...
    Starting Price: $79/month
  • 24
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. ...
  • 25
    Azure Front Door
    Scalable and secure entry point for fast delivery of your global applications. Easily join your distributed microservice architectures into a single global application using HTTP load balancing and path-based routing rules. Automate turning up new regions and scale-out with API-driven global actions, and independent fault-tolerance to your back end microservices in Azure—or anywhere. Deliver and protect your global application close to your end users with a "battle-tested" service built on world-class Microsoft Global Network infrastructure. ...
  • 26
    Fudo Security

    Fudo Security

    Fudo Security

    ...Through the request management section, you can easily define and schedule when a specific resource is available to a certain user and control it accordingly. Fudo allows you to permanently monitor and record all the ongoing sessions for 10+ protocols, including SSH, RDP, VNC, and HTTPS. You can watch the session live or use the footage for post-mortem analysis. Both the server and end-user computers do not require any agents. Furthermore, Fudo offers the ability to join the session, sharing, pausing, and terminate, as well as great tools like OCR and tagging.
    Starting Price: Free
  • 27
    WEDOS Protection

    WEDOS Protection

    WEDOS Group SA

    ...Our global infrastructure WEDOS Global uses edge servers distributed worldwide to analyze and control traffic in real time. The service provides DNS protection, an advanced Web Application Firewall (WAF), HTTPS proxy, smart caching, anti-bot filters, and multiple protection layers that together form a robust security and performance ecosystem. ✅ Effective L3–L7 DDoS mitigation ✅ Global content acceleration via proprietary network ✅ Easy to implement – no code changes needed ✅ High availability and low latency even during attacks An ideal choice for high-traffic websites, ecommerce projects, agencies, and hosting providers.
    Starting Price: $1
  • 28
    Tresorit

    Tresorit

    Tresorit

    ...Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shield
    Leader badge
    Starting Price: $10.42/month
  • 29
    Cribl Stream
    ...Cribl Stream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the Cribl Stream universal receiver to collect from any machine data source - and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIs
    Starting Price: Free (1TB / Day)
  • 30
    Paessler PRTG

    Paessler PRTG

    Paessler GmbH

    ...All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many more
    Leader badge
    Starting Price: $2149 for PRTG 500
  • Previous
  • You're on page 1
  • Next