Suggested Categories:

One-on-One (1:1) Meeting Software
One-on-one meeting software tools for managers are specialized software designed to facilitate private and productive conversations with team members. These tools typically include features like video conferencing, agenda setting, note-taking, and task management, which help managers conduct structured and focused meetings. They often provide scheduling functionalities to coordinate meeting times and integrate with calendar systems for ease of planning.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
All-in-One Marketing Software
All-in-one marketing platforms are comprehensive software solutions designed to streamline and automate various marketing tasks and processes across multiple channels. These platforms provide a suite of integrated tools that support email marketing, social media management, lead generation, analytics, customer segmentation, and campaign automation. By centralizing marketing efforts, they help organizations improve efficiency, deliver consistent messaging, and track performance in real-time.
On-Demand Staffing Platforms
On-demand staffing platforms and services are online platforms that provide a marketplace for employers to hire hourly and shift workers for temporary positions. On-demand staffing service providers can enable employers to hire temporary workers directly, or through a staffing agency.
Virtual Try-On Software
Virtual try-on software is a type of interactive technology that allows users to virtually experiment with different styles or looks. It utilizes computer vision, machine learning and augmented reality to provide an accurate representation of how clothes would look on the user. This technology has become increasingly popular as online shopping becomes more common.
On-Demand Catering Software
On-demand catering software is software designed to streamline the process of managing and organizing catering services. With this software, users can easily create menus and manage orders in real-time. The platform also allows for efficient communication between clients, vendors, and event venues. Additionally, the software offers customizable features to fit the specific needs of each individual business. Overall, on-demand catering software provides a convenient and modern approach to catering management.
Advocacy Software
Advocacy software is a platform designed to support organizations in mobilizing supporters, engaging stakeholders, and driving action on important issues. It provides tools for creating petitions, organizing campaigns, and facilitating communication with policymakers, helping users advocate effectively for change. With features like targeted messaging, contact management, and social media integration, advocacy software empowers organizations to reach the right audience and amplify their message. Many platforms also offer analytics to track campaign performance and measure supporter engagement, allowing for data-driven decision-making. By streamlining outreach efforts, advocacy software enhances the impact and efficiency of advocacy campaigns.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Community Software
Community software provides organizations with the tools to build, manage, and engage online communities, enabling users to interact, collaborate, and share content. These platforms typically include features like discussion forums, messaging, content sharing, event management, and member directories. Community software is used by businesses, educational institutions, nonprofits, and other organizations to foster engagement, create support networks, and promote collaboration among members. It can be customized to suit different types of communities, such as customer communities, social groups, or professional networks, and can include tools for moderation, analytics, and member management.
Travel Software
Travel software encompasses a wide range of applications designed to simplify and automate various processes in the travel industry. These platforms provide tools for managing bookings, reservations, itineraries, customer interactions, and travel-related transactions. Travel software includes solutions for both travel agencies and travelers, offering features like trip planning, real-time updates, pricing comparisons, and travel experience management. By integrating with airlines, hotels, car rentals, and tour operators, travel software enables seamless travel arrangements and efficient operations across multiple channels. This software helps businesses in the travel industry streamline their operations, enhance customer service, and improve overall travel management.
Law Enforcement Software
Law enforcement software is used by public safety organizations to manage and keep track of cases, reports, legal documentation, and investigations.
Team Communication Software
Team communication software facilitates effective interaction and collaboration within organizations by providing tools for messaging, voice and video calls, file sharing, and project coordination. It often includes features like group channels, threaded conversations, presence indicators, and integrations with other business applications to streamline workflows and keep everyone aligned. The software supports real-time and asynchronous communication, helping teams stay connected regardless of location or time zone. By improving transparency and reducing communication silos, team communication software boosts productivity and decision-making. It is widely used across industries to support remote work, cross-functional collaboration, and internal communications.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Print On Demand Software
Print on demand software enables businesses to sell customized printed products without holding inventory or managing production in advance. It connects online storefronts with printing and fulfillment providers to automatically process orders as they are placed. The software supports product customization, order routing, and real-time status tracking. Many platforms integrate with eCommerce systems, marketplaces, and payment processors to streamline sales and fulfillment. By eliminating upfront inventory costs, print on demand software allows businesses to scale efficiently and offer a wide range of personalized products.
Call Accounting Software
Call accounting software tracks, records, and analyzes telephone usage within an organization to help manage costs and improve communication efficiency. It captures details such as call duration, destination, extensions used, and associated costs across VoIP, PBX, or unified communications systems. The software provides reports that help businesses identify misuse, allocate expenses to departments, and optimize telecom spending. Many platforms also include security features like fraud detection and alerts for unusual calling patterns. Overall, call accounting software gives organizations greater visibility into their phone systems while reducing unnecessary costs.
Sandbox Software
Sandbox software enables IT professionals and developers to create a sandbox on their machine, or a virtual sandbox in the cloud, in order to isolate potentially dangerous programs and applications for testing and development.
Business Management Software
Business management software is a suite of tools designed to help organizations streamline and automate various operational processes, including project management, financial tracking, resource allocation, and workflow optimization. These platforms offer features for managing tasks, employees, budgets, and client relationships, enabling businesses to improve efficiency, reduce costs, and enhance decision-making. Business management software often includes modules for accounting, inventory management, human resources, and customer relationship management (CRM), allowing for centralized control over critical business functions. By automating routine tasks and providing real-time data insights, these solutions support strategic planning and operational growth.
Data Lake Solutions
Data lake solutions are platforms designed to store and manage large volumes of structured, semi-structured, and unstructured data in its raw form. Unlike traditional databases, data lakes allow businesses to store data in its native format without the need for preprocessing or schema definition upfront. These solutions provide scalability, flexibility, and high-performance capabilities for handling vast amounts of diverse data, including logs, multimedia, social media posts, sensor data, and more. Data lake solutions typically offer tools for data ingestion, storage, management, analytics, and governance, making them essential for big data analytics, machine learning, and real-time data processing. By consolidating data from various sources, data lakes help organizations gain deeper insights and drive data-driven decision-making.
Orthopedic Software
Orthopedic software enables orthopedic surgeons and doctors to run their orthopedic and sports medicine practice.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.
  • 1
    Proton VPN

    Proton VPN

    Proton AG

    Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. ...
    Starting Price: $6.99/user/month
    View Software
    Visit Website
  • 2
    Symantec Integrated Cyber Defense
    ...We know Symantec will never be your only vendor. That’s why we created Integrated Cyber Defense Exchange (ICDx), which makes it easy to integrate third-party products and share intelligence across the platform. Symantec is the only major cyber defense vendor that builds solutions to support all infrastructures, whether entirely on-premises, entirely in the cloud, or a hybrid of the two.
  • 3
    Active Wall

    Active Wall

    Active Network CO

    Active Wall uses the middle layer drivers developed independently as the filter engines, which are more low-leveled than other software which uses WinPCap. Because WinPCap is a protocol-type driver, it can only monitor but not block. The other software which uses WinPCap can only block TCP communications, but cannot block UDP, ICMP, IGMP data packets. It has been proved that Active Wall is more stable, correct and effective after working online for a long time. Most similar software support the only one mode- Passby monitoring mode. Besides the Passby mode, Active Wall supports more modes including Gateway mode, Bridge mode and Single mode. ...
    Starting Price: $10 per user
  • 4
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    ...Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.
    Starting Price: $49.95 one-time payment
  • 5
    Unistal Anti Virus

    Unistal Anti Virus

    Unistal Systems

    Unistal is a name synonymous to data security. Unistal’s brand Protegent is the most advanced & fastest antivirus. Protegent is deciphered from French word ‘Protegee’, which means ‘To Protect’. As the name suggests Protegent products have been designed to provide protection to your business, data and computer/Laptop. It is world’s only antivirus with inbuilt data recovery software. It is available in three variants Protegent antivirus, Total Security and Complete Security. Unistal has...
    Starting Price: $49 one-time payment
  • 6
    RedSeal

    RedSeal

    RedSeal Networks

    ...Most security tools only work in one of these environments, leaving security teams with common, urgent concerns. Continuously validate and ensure security compliance with your network segmentation policies and regulations.
  • 7
    Shieldoo

    Shieldoo

    Cloudfield

    Shieldoo is a next-gen private network for remote connection from anywhere built with a well-known open-source tool called Nebula. The Shieldoo secure network is a collection of nodes, a lighthouse, and an admin center. The user device is a node, the server is a node, the cloud stack is a node, and the LAN access box is a node. Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use....
    Starting Price: $0,49 per hour/server/user
  • 8
    OnDMARC

    OnDMARC

    Red Sift

    OnDMARC is a Red Sift product. Red Sift is an open cloud platform that makes cybersecurity accessible to everyone to prevent cyber attacks. OnDMARC makes implementing and maintaining a secure DMARC policy easy. OnDMARC not only processes complex XML reports for you but, combined with machine learning and excellent customer support, gets users to full protection quickly but sustainably.
    Starting Price: $35.00/month
  • 9
    Ivanti Connect Secure
    Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. ...
  • 10
    602LAN SUITE

    602LAN SUITE

    Software602

    ...Up-to-date information on topics such as circulation, approval, document management using DMS systems, trusted digital archiving, qualified services, eIDAS regulations, electronic signatures and seals, timestamps, business processes and workflows. How to get rid of unnecessary paperwork and use time efficiently. There is an eBook Paperless office on this topic. Here you will find answers not only to how to cleverly digitize the office, but much more. Just one click and you have everything with you. Simply and digitally.
    Starting Price: $299.95/one-time/user
  • 11
    PerfectMail Antispam
    PerfectMail delivers better than 99% filter accuracy with false positives (wanted e-mail blocked as spam) at less than 0.1%. PerfectMail automatically learns about your users and their regular e-mail peers and never blocks their e-mail. The only time PerfectMail might have an issue is with a questionable e-mail from new senders. This takes the risk out of antispam filtering. Most spam filters work like this: receive e-mail, queue, filter, deliver or send a non-delivery reply. ...
    Starting Price: $499 one-time payment
  • 12
    BluSapphire

    BluSapphire

    BluSapphire

    The only Cybersecurity platform you will ever need. Cloud-Native, seamless, unified platform for businesses of all scales and sizes. Prevent a cyberattack even before it happens. For creating disruption in the cybersecurity space with unified advanced threat detection, response, and remediation platform that is completely agentless. BluSapphire solutions are built with one aim- to ensure you never have to suffer another cyberattack, or its consequences, ever again.
  • 13
    Twingate

    Twingate

    Twingate

    The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain. Inability to secure access at the app level means hacks can expose whole networks. ...
    Starting Price: $10 per user per month
  • 14
    InstaSafe

    InstaSafe

    InstaSafe Technologies

    ...InstaSafe ZTAA relies on continuously assessing the trust and risk associated with every user, and the context of their access request, and simultaneously employs a system of comprehensive authentication before grnating least privilege access. By only making authorised applications accessible to the user, and not exposing the network to these users, ZTAA serves to negate the exploitable attacks surface
    Starting Price: $8/user/month
  • 15
    IronCore Labs

    IronCore Labs

    IronCore Labs

    IronCore's SaaS Shield is a platform for managing Application-Layer Encryption in cloud software applications. It manages all of the concerns of such a system from key orchestration to rotation to audit trails. And it supports multi-tenant setups and BYOK/HYOK needs. Together with IronCore's other products, meaningfully protected data can still be usable and it can be searched over with Cloaked Search and Cloaked AI.
    Starting Price: $299/tenant
  • 16
    CyberGatekeeper

    CyberGatekeeper

    InfoExpress

    Protecting your organization is a complex task that requires the right tools to meet your needs. Insecurity, one size does not fit all, and organizations must carefully determine their requirements. InfoExpress offers a family of appliances to meet different NAC requirements. All appliances support enforcement that secures access for mobile, desktop, and IoT devices without network changes while supporting a core set of features. Support is provided to administrators only. ...
  • 17
    Blesk

    Blesk

    Prival

    blësk is the only all in one solution available on the market that performs all aspects of network monitoring from a single machine. The solution provides fast, scalable deployments and a high ROI. It’s the industry’s first monitoring application to integrate major Open Source monitoring technologies that are used throughout the world in a single and very easy-to-use application. blësk layers are added on top bringing enhanced features and a uniform graphical interface. ...
    Starting Price: $1300.00/year
  • 18
    NextDNS

    NextDNS

    NextDNS

    ...Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in a matter of nanoseconds) in order to detect and block malicious behavior. With usually only a few hours between domain registration and the start of an attack, our threat intelligence system is built to catch malicious domains earlier than classic security solutions. Block ads and trackers on websites and in apps, including the most devious ones.
    Starting Price: $39 per month
  • 19
    RBLTracker

    RBLTracker

    RBLTracker

    ...RBLTracker is the only company providing URIBL, Safe Browsing, Threat Exchange, and DNS Security monitoring, for your email, websites, and social media. Manage thousands of IP addresses just as easily as a single IP address.
    Starting Price: $8.00/month
  • 20
    CIAgent

    CIAgent

    SNMP Research

    ...CIAgent is built on the EMANATE® Master Agent and includes many subagent extensions for system and application management. agent may be configured to perform policy-based automated actions based on threshold events and commands from management applications. In addition, a powerful subagent development kit for building custom extensions can also be purchased as an option. This intelligent agent supports SNMPv1, SNMPv2c, SNMPv3, and HTTP. CIAgent is optionally available as an SNMPv3-Only Edition that supports SNMPv3 and HTTP. This is a special version of CIAgent that has been hardened for use in network environments having the most stringent security requirements to protec
  • 21
    Praetorian Chariot
    Chariot is the first all-in-one offensive security platform that comprehensively catalogs Internet-facing assets, contextualizes their value, identifies and validates real compromise paths, tests your detection response program, and generates policy-as-code rules to prevent future exposures from occurring. As a concierge managed service, we operate as an extension of your team to reduce the burden of day-to-day blocking and tackling.
  • 22
    Alert Logic
    Alert Logic is the only managed detection and response (MDR) provider that delivers comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. Since no level of investment prevents or blocks 100% of attacks, you need to continuously identify and address breaches or gaps before they cause real damage. With limited expertise and a cloudcentric strategy, this level of security can seem out of reach.
  • 23
    Spam Marshall

    Spam Marshall

    ITA Networks

    Spam Marshall has kept Exchange servers spam-free since 2003, as hundreds of small and medium-sized businesses throughout the world have come to rely on Spam Marshall as their first line of defense in keeping corporate inboxes clean. Spam Marshall's proprietary Customs Rules Engine Technology (CuRE) is a leading-edge tool that prevents spam from infiltrating Exchange Servers on multiple fronts: SpamMarshall features include Real-time monitoring, Usage of content filters, Grey Listing, Anti...
    Starting Price: $749 one-time payment
  • 24
    TunnelBear

    TunnelBear

    TunnelBear

    ...Hackers can steal passwords and data over insecure public WiFi. TunnelBear blocks them to keep you secure. Network owners and internet providers can see everything you do online. With TunnelBear on, they can't see a thing. Some content is only available in certain regions. TunnelBear changes your virtual location so you can see it anywhere. Ad services use your IP address to track your behavior across sites. TunnelBear stops them by assigning you a new IP. Some governments block popular websites and apps. TunnelBear unblocks them by changing your virtual location.
    Starting Price: $59.88/year/user
  • 25
    AVG File Server Business Edition
    AVG File Server Business Edition's network virus scanner helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need. Hackers and malware can sneak in and disrupt your operations, costing you time and money. Worse still, hackers and malware can take down your business completely. Your business files and customer data are critical to running a successful company. Our Windows file server security helps keep it safe, private and out of the...
    Starting Price: $20.41 one-time payment
  • 26
    Acunetix

    Acunetix

    Invicti Security

    ...With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 27
    Coro

    Coro

    Coro Cybersecurity

    Coro puts an end to the security tool sprawl and to the constant worry that things have been overlooked. No need to check everything 10 times a day. Coro will take care of the ongoing security, and will alert you only when you need to take action. Coro analyses the threats to your entire business, takes action to eliminate the risk, and guides you on what to do next to improve your security posture. Coro is the central control point for sensitive data, practice data, and user activity,...
    Starting Price: $8.99 per user per month
  • 28
    Intelligent Management Center

    Intelligent Management Center

    Hewlett Packard Enterprise

    Aruba AirWave is the only multi-vendor wired and wireless network management solution designed with mobile devices, users and apps in mind. By proactively monitoring the health and performance of all things connected, AirWave gives IT the insights needed to support today’s digital workplace. As network management becomes more complex, the risks associated with compromised data flow have also increased. HPE Intelligent Management Center (IMC) delivers comprehensive management across campus...
    Starting Price: $2000.00/one-time
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB