Results for: x-mouse button control

Suggested Categories:

Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Advanced Process Control (APC) Systems
Advanced Process Control (APC) systems are computer-based systems that use mathematical models and algorithms to optimize the performance of industrial processes. APC systems aim to maintain a steady state operation with tight control over process variables such as temperature, pressure, flow rate, and composition. It incorporates feedback from sensors in the process to monitor performance and take corrective action when needed, in order to keep the process operating in the desired range. APC systems can help improve efficiency, reduce energy usage, increase throughput, and reduce product variability.
Model Predictive Control (MPC) Software
Model Predictive Control (MPC) software is a type of advanced process control algorithm used to optimize process performance. It uses mathematical models and predictive algorithms to anticipate future conditions and automate how a system should respond. MPC is often used in industrial settings to adjust variables in real time, such as temperature, pressure, and flow rate. It enables manufacturers to maintain desired process operations with greater efficiency than traditional methods.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Session Border Controllers (SBC)
Session Border Controllers (SBCs) are network devices or software solutions that manage and secure real-time communication sessions, such as Voice over IP (VoIP) calls, video conferencing, and other multimedia exchanges, particularly between different networks. SBCs are deployed at the borders of networks, typically between an enterprise and a service provider network, to protect the communication infrastructure and optimize traffic flow. Their primary functions include session signaling, traffic routing, encryption, and ensuring secure interconnection between different communication systems. SBCs handle tasks like ensuring high-quality service (QoS), mitigating security threats (such as denial-of-service (DoS) attacks and eavesdropping), and maintaining compliance with industry standards.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
SPC Software
SPC (Statistical Process Control) software helps manufacturers monitor and control production quality by analyzing real-time process data. It uses charts, control limits, and statistical algorithms to detect variation, identify trends, and prevent defects before they occur. Many platforms automatically collect data from machines, sensors, and manual inputs to ensure accuracy and consistency. SPC software also provides alerts, reports, and root-cause analysis tools to help quality teams respond quickly to process deviations. Overall, SPC software strengthens quality management, reduces waste, and supports continuous improvement across manufacturing operations.
Dental Imaging Software
Dental imaging software is used by dental professionals to capture, manage, and analyze various types of dental images such as X-rays, 3D scans, and intraoral photographs. This software helps in diagnosing and planning treatments for oral health issues by providing clear, detailed images that are critical for assessment and treatment planning. Features often include image enhancement tools, integration with patient records, digital radiography support, 3D visualization, and measurement tools for accurate diagnosis. Dental imaging software can also improve patient communication by allowing them to view their images and understand their treatment plans more effectively.
Currency Exchange Software
Currency exchange software helps businesses, financial institutions, and individuals manage currency conversions and foreign exchange transactions efficiently. These platforms typically include features for real-time exchange rate tracking, multi-currency management, transaction processing, and integration with payment systems. Currency exchange software often allows users to monitor market trends, set exchange rate alerts, and automate currency conversions for both international payments and trading. By using this software, organizations can optimize foreign exchange operations, reduce risks related to exchange rate fluctuations, and improve the efficiency of cross-border transactions.
View more categories (20) for "x-mouse button control"

26 Products for "x-mouse button control" with 1 filter applied:

  • 1
    Footprint

    Footprint

    Footprint

    ...Our ecosystem keeps bad actors out while creating a seamless experience for real users. Footprint’s technology combines storage and verification. Our solution is up to 2x cheaper than traditional methods to verify and store PII because we are able to condense what today requires multiple tools into one.
    Starting Price: 30¢per user per year
  • 2
    IdentityX
    Daon’s IdentityX Digital Onboarding product enables quick, accurate identity establishment for a range of purposes, including Anti-Money Laundering (AML) and Know Your Customer (KYC) checks.
  • 3
    Fourthline

    Fourthline

    SAFENED Fourthline

    ...Select the level of verification that fits your business. Industry-leading conversion levels Onboard customers with the most comprehensive level of verification - all in less than 2 minutes. Other KYC providers have 5x-10x longer handling times or significantly fewer checks at similar conversion levels. Unparalleled compliance and security. Benefit from the only KYC provider licensed by regulators (both DNB and FCA). Our products are built in-house and locally compliant. And all data is processed and stored in the EU. Lowest Cost of Compliance. ...
  • 4
    Wallester

    Wallester

    Wallester

    ...We ensure swift time-to-market with simplified integration and dedicated support. 2️⃣ Wallester Business: Corporate Expense Management Wallester Business modernises corporate expense management with instant access to virtual and physical Visa cards. Through our app and portal, companies can track expenses, analyse budgets, and integrate seamlessly with accounting systems for better financial control.
    Starting Price: $0
  • 5
    SymphonyAI Sensa
    ...Sensa can also be deployed on premises or in the cloud to leverage the customers’ existing data set and deliver unparalleled results. Sensa customers can also experience up to an 81x risk-to-alert ratio improvement and a 263% increase in SARs. Lastly, predictive insights deliver a drastically reduced timeframe to identify genuine anomalies and achieve operational efficiencies.
  • 6
    Formalize

    Formalize

    Formalize

    ...Pinpoint friction points where leads abandon, down to the second or field, with comprehensive analytics and screen recordings. Maximize conversion and boost productivity by 10x. Say goodbye to tedious manual tasks and hello to effortless automation.
  • 7
    inVOID

    inVOID

    inVOID

    ...Consistency & fraud check for documents. Speed-up your user onboarding & verification process with us. Get 7 days free trial now. inVOID enables businesses to onboard 5x more users everyday. We strive for seamless onboarding & faster conversions.
  • 8
    Wibmo

    Wibmo

    Wibmo

    ...Experience the future of secure, frictionless payments with Wibmo’s nextgen authentication platform. ACCOSA IVS is a payment authentication platform that uses 3-D secure 1.0 and EMV 3-D secure 2.X protocols for securing online payments. Coupled with its powerful Risk-Based Authentication (RBA) engine, it provides the frictionless experiences consumers expect. Powered by cutting-edge fraud prevention technology, ACCOSA IVS combines the prowess of EMV 3D secure protocol and a dynamic risk authentication engine to accurately calculate risk scores in real-time. ...
  • 9
    Signzy

    Signzy

    Signzy

    ...We work with over 10 fortune 30 companies, all the largest banks in India, a Top 3 acquiring Bank in the US, and have a strong global partnership with Mastercard and Microsoft. The best part? Our customers have seen some delightful results: -4x Applicant growth -99% Reduced fraud -80% Cost reduction -60% Less customer drop-offs Signzy has helped businesses like Stripe, HDFC, PayPal, and AmazonPay be more secure and globally compliant.
  • 10
    HyperVerge

    HyperVerge

    HyperVerge

    ...With an accuracy of 99.5% (the highest among competitors) and 600+ million KYCs across 200+ countries since 2019, HyperVerge’s technology is built for scale. They work with SBI, LIC, Jio, Vodafone, Bajaj Finserv, L&T, Swiggy, WazirX, Coinswitch, Razorpay, ICICI Securities, SBI Cards, Grab, CIMB, FE Credit, Home Credit, and 100+ clients across 5+ geographies for their onboarding journeys.
  • 11
    AMLYZE

    AMLYZE

    AMLYZE

    ...Developed by a team of former regulators, IT, and AML/CFT experts, we’ve got you covered. Prevent financial crime, money laundering, and terrorist financing with our transaction monitoring module. Focus your AML/CFT controls on real threats with regulatory requirements by continuously tracking and analyzing suspicious financial transactions throughout customer relationships. Timely reporting of suspicious behavior in accordance with AML/CFT regulations is critical. Mitigate ML/TF risks effectively with our customer risk assessment solution. Conduct automated risk assessments on new and existing customers to identify high-risk individuals and focus AML/CFT controls on real threats. ...
  • 12
    Sanction Scanner

    Sanction Scanner

    Sanction Scanner

    ...We automate your business' AML control processes with a powerful API that has been powered by webhook and reduces your workload. Webhook provides two-way data transfer between the sanction scanner and your project.
  • 13
    Flowsecure

    Flowsecure

    Flowsecure

    FlowSecure is a comprehensive data security and compliance platform designed to help organizations protect sensitive information, ensure regulatory compliance, and manage data governance with ease. Built to address modern security challenges, FlowSecure enables businesses to monitor, control, and secure data flows across cloud and on-premise environments. It offers advanced tools for data classification, real-time monitoring, and access control, giving organizations full visibility into where their data resides and how it's being used. With FlowSecure, companies can detect unauthorized access, prevent data leaks, and enforce compliance with regulations like GDPR, CCPA, HIPAA, and more. ...
    Starting Price: $25 per month
  • 14
    Flagright

    Flagright

    Flagright

    ...It enables financial institutions to centralize detection, investigation, and reporting of suspicious activity, streamlining regulatory workflows and strengthening financial crime controls. By replacing fragmented systems, Flagright helps reduce false positives by 93% and lower compliance costs by 80%, thereby setting the modern standard for financial crime compliance.
  • 15
    AMLcheck

    AMLcheck

    Prosegur

    ...AMLcheck makes it possible to perform functions including but not limited to identifying people or assets during the onboarding process, performing the mandatory KYC for customers by establishing a profile or score based on the available information and analyzing transactions applying different control scenarios to detect anomalous behaviors. Our partner in this venture is Dow Jones Risk & Compliance, a global leader in data intelligence for anti-money laundering, corruption and economic sanctions.
  • 16
    Merlon

    Merlon

    Merlon

    The world’s most advanced AI-powered adverse media research platform for enhanced AML and KYC Investigations. Merlon’s advanced natural language processing engine extracts and categorizes risk topics to ensure relevance to both FATF guidelines and financial institution controls. Key biographical information is extracted to effectively match against client details. Articles are clustered into unique events, thereby minimizing the number of articles that must be read. Duplicates are intelligently identified and filtered out, significantly cutting investigation time. Results are sorted by AML risk relevancy, ensuring analysts uncover risk sooner. ...
  • 17
    IDTrust360
    ...Built on an enterprise hybrid-cloud platform certified and operational in several U.S. federal agencies, IDTrust360 enables rapid deployment of digital identity services within complex operational ecosystems, handling millions of identity transactions across various devices, including workstations, kiosks, laptops, smartphones, and access control systems. The platform offers capabilities such as identity verification and assurance, biometric capture and matching, document capture and validation, and omnichannel enrollment. It supports touchless, live scan, and wet fingerprint card scanning, and aligns with federal agency guidelines for digital identity, enrollment, and identity proofing.
  • 18
    Clear View KYC

    Clear View KYC

    Clear View Systems

    ...CXR is compliant with PCMLTFA and Customer Identification Program (CIP) under the Bank Secrecy Act (BSA) and USA Patriot Act. CXR is also compliant with Sweden's Tax Authority (Skatteverket) control box. CXR consolidates customer information and documents in its database so that you won't require to integrate with other CRM systems. All customer transactions, profile info, and KYC profile are shown under one umbrella.
    Starting Price: $500 per month
  • 19
    TruNarrative

    TruNarrative

    TruNarrative

    ...Digital Transformation for; Identity Verification, eKYC & eKYB, Fraud Detection, AML Compliance, FRAML, Risk Assessment, and Account Monitoring in a single solution through one API. Make real-time automated decisions on transactional and customer account behavior through our sophisticated yet simple-to-use no-code platform. Control operational expense, reduce false positives alerts, and deploy virtual AI agents in one click to review at scale in line with your own volumes. Orchestration of complex decisions combined with share
    Starting Price: £99.50
  • 20
    UnBlockGUI

    UnBlockGUI

    UnBlock Analysis

    Real-time KYC/AML for easy compliance and effective monitoring KYC/AML platform that gives deep insights into every transaction, empowering you to make informed decisions. Building trust and making compliance easy. Financial crime insight that puts you in control. We help our customers experience the most insightful and powerful tools for AML compliance. Target Customers. Financial Institutions, Blockchain Industries, Governments. UnBlockGUI - Investigation. Software Suite Automate. Know Your Customer and Know Your Transaction (KYC & KYT) process and reduce false positives by 90% Identify Suspicious People. ...
  • 21
    GetID

    GetID

    GetID

    GetID is an all-in-one identity verification service that streamlines your customer onboarding process, ensures full regulatory compliance and reduces fraud. Try it now! Manage your processes and collaborate seamlessly with team members with an easy-to-use dashboard that gives you complete control, wherever you may be. Ready-made solutions for automated onboarding with fast set-up and easy configuration. Send a link to customers and get verification results instantly in your Admin Panel or via webhook. Integrate our KYC and customer verification solutions into your platform, collect data you need and get the results via API. ...
    Starting Price: €0.89 per verification
  • 22
    OnBoard by MVSI

    OnBoard by MVSI

    OnBoard by MVSI

    OnBoard by MVSI is an end-to-end automated onboarding and compliance software platform that centralizes and streamlines the full customer lifecycle from initial offer generation through digital application, verification, approval, and ongoing due diligence with built-in regulatory controls. It helps companies design branded onboarding journeys with drag-and-drop smart forms, dynamic contract generation, and customizable workflows while embedding real-time risk, risk scoring, and compliance checks such as KYC, KYB, AML, and OCDD to ensure audit-ready regulatory adherence and reduce manual work, errors, and customer drop-offs. ...
  • 23
    Hyarchis

    Hyarchis

    Hyarchis

    ...Ensure your regulatory compliance throughout the lifecycle of your customers with a fully automated solution powered by artificial intelligence. By continuously monitoring, you effortlessly pass strict controls and contribute to a healthy financial ecosystem. In addition, our products, Risk Screening, and Customer Due Diligence make your life easier. A comprehensive, digital document management system designed for efficient onboarding, remediation, and customer file lifecycle management. The tool balances efficient, compliant, secure data management and a seamless user experience.
  • 24
    IDcheck

    IDcheck

    IDcheck

    ...If a device is lost or stolen, the pin would fail after a few incorrect attempts and by using a keypad, even a Key-Logger could not detect the pin. There are multiple industry-specific, automated portals, with strict access management, permissions and internal controls, including sanctions, credit & wealth source checks.
  • 25
    EnQualify
    ...AI-driven, self-service KYC solutions instantly detect and prevent deepfakes, ensuring businesses stay secure and compliant. With decentralized technology, EnQualify enhances security, speeds up validation processes, and gives individuals control over their personal data. Additionally, EnQualify's cutting-edge Virtual Audio Assistance revolutionizes the user experience of digital ID verification.
  • 26
    FaceOnLive

    FaceOnLive

    FaceOnLive

    ...Our robust suite of services includes state-of-the-art technologies such as Face Recognition, Face Liveness Detection, ID Document Recognition, ID Document Liveness Detection, and Touchless Fingerprint Recognition. With our cutting-edge solutions, businesses can enhance security, streamline processes, and combat fraud effectively. Whether for customer onboarding, access control, or fraud prevention, our comprehensive platform ensures secure and reliable identity verification. Join us in shaping the future of biometric authentication and ID verification with FaceOnLive. Experience the unparalleled accuracy, efficiency, and security of our advanced biometric solutions. Elevate your security standards and stay ahead in today's rapidly evolving digital landscape with FaceOnLive's innovative biometric solutions.
    Leader badge
    Starting Price: $0
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB