Suggested Categories:

Full-Stack AI Coding Agents Software
Full-stack AI coding agents are autonomous systems capable of handling both frontend and backend development tasks using AI-driven logic and machine learning models. They can analyze project requirements, generate code, debug errors, and optimize performance without human intervention. These agents leverage natural language processing to understand user prompts and convert them into functional, production-ready applications.
Compliance Software
Compliance software helps organizations ensure that their operations, processes, and reporting adhere to regulatory standards and internal policies. It centralizes compliance management by tracking regulatory changes, automating audits, and managing documentation to reduce the risk of non-compliance. Many compliance tools include features for risk assessment, incident tracking, and policy enforcement, helping businesses identify and address compliance gaps proactively. By automating compliance workflows, the software saves time and minimizes human error, ensuring more consistent and reliable compliance practices. Compliance software is essential in highly regulated industries such as finance, healthcare, and manufacturing, where adherence to standards is critical to avoid penalties and maintain trust.
  • 1
    CoreStack

    CoreStack

    CoreStack

    CoreStack is a Microsoft Azure Gold & Co-Sell Partner and Amazon AWS Advanced Technology Partner.
    Starting Price: $49.00 per month
  • 2
    MedStack

    MedStack

    MedStack

    The go-to compliance solution for digital health. MedStack is the only solution that combines the power of a platform with built-in security and provable compliance, so you can automatically provide the assurance needed to sell your application. With the vast majority of HIPAA controls covered out-of-the-box and pre-written privacy policy documentation, MedStack makes it faster, easier, and more affordable to build and launch digital healthcare solutions that automatically meet the requirements of today’s health enterprises. ...
  • 3
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments.
  • 4
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. ...
  • 5
    Soveren

    Soveren

    Soveren

    We help IT and engineering teams eliminate the time lost on managing personal data across your entire tech stack. We’ve built secure integrations to popular applications and databases to automate personal data management across your entire IT stack. Our privacy platform evolves with regulations, so you can focus on your core product’s functionality and a scalable IT infrastructure. Soveren puts you one step ahead by allowing you to automate privacy compliance before it becomes an uncontrollable risk and time sink. ...
  • 6
    Supply Wisdom

    Supply Wisdom

    Supply Wisdom

    Today as the risk of disruption arises from a wide array of risk events beyond cyber and financial, Supply Wisdom provides a full-stack of risk coverage across 7 risk domains. The market’s only single source comprehensive solution, our Risk Packages enable businesses to cost effectively and efficiently access a comprehensive view of their third-party and locations risks without having to pull together intelligence from multiple disparate solutions. We understand that for some business functions perhaps only one or two particular risk domains fit their needs, while others want full coverage. ...
  • 7
    Aqua

    Aqua

    Aqua Security

    ...Prevent them before they happen, stop them when they happen. Aqua Security’s Team Nautilus focuses on uncovering new threats and attacks that target the cloud native stack. By researching emerging cloud threats, we aspire to create methods and tools that enable organizations to stop cloud native attacks. Aqua protects applications from development to production, across VMs, containers, and serverless workloads, up and down the stack. Release and update software at DevOps speed with security automation. ...
  • 8
    DigiKYC

    DigiKYC

    Digio.in

    Digital solutions to eliminate the need for physical KYC processes. Easily fetch verified documents straight from issuing authority within your processes. Make the onboarding process hassle-free using our pluggable KYC solutions. Set auto-approve rules or manually approve, re-request KYC and get real time events using webhooks. Rapidly parse and analyze ID card data with our best-in-class OCR, face detection and matching algorithms. Digio can bring down these costs by 60%, increase...
    Starting Price: $0.68 per 2 months
  • 9
    Elaborate

    Elaborate

    Elaborate

    Whether you're delivering results through your EMR's patient portal, your own digital front door, or by phone and email, Elaborate can be embedded into any workflow and tech stack. Our technology leverages your patient’s comprehensive medical history, including prior results, diagnoses, demographics, and medications, alongside your practice-specific clinical protocols to determine key findings and necessary next steps. Embedded in both the practitioner EMR and patient portal, Elaborate is the only solution on the market that takes a preventive approach to the inbasket, putting an end to panicked patient messages and hours of admin time weekly for practitioners. ...
  • 10
    Vital4

    Vital4

    VITAL4

    ...Vital4’s automated AML/KYC data tools analyze more than 6,000 global watchlists to help identify subjects involved in financial crimes, terrorism, or corruption. But we don’t just check compliance boxes, and we don’t rely on human researchers or archaic technology stacks that drive up costs. By leveraging advanced AI, relationship extraction, and machine learning ⁠— along with customizable source lists and relevancy scores ⁠— our innovative solutions help you filter out irrelevant noise, find missed matches, and reduce false positives up to 100%. Make sure you’re getting the right data, at the right time, with the most compliant AML/KYC search on the market.
  • 11
    Imperium

    Imperium

    Imperium

    ...Organize different types of risk and control assessments on a single platform to remove duplication in effort, thereby improving business engagement. Manual processes and complex system stacks are expensive. A streamlined operational risk platform can remove much of the inefficiency and therefore significantly reduce cost. Operational risk has a ‘tick box’ brand problem. Designing highly engaging/initiative tools can change this mindset. Simplify the data model to drive efficient insightful reporting across all three lines of defense. ...
  • 12
    Norm Ai

    Norm Ai

    Norm Ai

    ...Risk and compliance challenges are evolving, placing stress on compliance teams to acquire new expertise. Norm Ai agents are constantly gaining new regulatory skills so you can benefit from an ever-expanding toolkit. Norm’s proprietary AI stack ensures unparalleled regulatory comprehension by our AI agents. Operating within networks of large language learning models, our AI Agents can make immediate compliance determinations, undertake complex multi-step tasks, and provide actionable feedback grounded in deep regulatory understanding.
  • 13
    Tealbook

    Tealbook

    Tealbook

    ...Only 7% of CPOs surveyed have confidence in their data quality and completeness. Tealbook’s rigorous data standards introduce trust into your decision-making process. Supercharge your technology stack. Tealbook acts as a dynamic data foundation, continually improving the data that powers your business. Evaluate a worldwide network of suppliers. Tealbook gathers highly disparate information, giving you trusted data at your fingertips.
  • 14
    Anitian FedRAMP Comprehensive
    ...Obtain FedRAMP authorization in half the time and at half the cost using Anitian’s unique combination of automation and in-person assistance. Use Anitian’s pre-built security stack and automation tools to eliminate much of the manual, complex work typically required for FedRAMP authorization. Depend on Anitian’s compliance team to keep both your internal and external stakeholders fully appraised of project status, required actions and critical path dependencies.
  • 15
    ConsentCheq

    ConsentCheq

    PrivacyCheq

    ConsentCheq is the premier full-stack transparency and consent management service for enterprises all over the globe. With "single source of truth" API/database architecture that delivers user preferences to internal and third party data processors in real time, ConsentCheq provides operational compliance to modern enterprises that ingest private data through many methods.
    Starting Price: $500/month
  • 16
    Kion

    Kion

    Kion

    ...Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. ...
  • 17
    Oneleet

    Oneleet

    Oneleet

    We help companies build trust by creating real-world security controls, and then attesting to those controls with a SOC 2 report. Oneleet is a full-stack cybersecurity platform that makes effective cybersecurity easy and painless. We help businesses stay secure so that they can focus on providing value to their customers. We'll start by doing a scoping call to learn about your infrastructure, security concerns, & compliance needs. Then we'll build you out a custom security program that is stage-appropriate. ...
  • 18
    Fable

    Fable

    Fable

    ...Skip recruitment and quickly collect feedback from assistive technology users. Collect and action insights through a central hub. Courses tailored to your team’s unique roles, tech stacks, and design systems. Learn from, not just about, people with disabilities. Track course completion and skill development across your teams. Drive compliance by working with people with disabilities. Measure the usability of your digital experiences with our free Accessible Usability Scale (AUS). Fable’s enterprise-grade security standards are trusted by leading organizations. ...
  • 19
    IBM PowerSC
    IBM PowerSC is a security and compliance solution optimized for virtualized environments on IBM Power servers running AIX, IBM i, or Linux. It integrates security features across different layers of the IBM Power server stack, enabling centralized management of security and compliance for all IBM AIX and Linux on Power endpoints. PowerSC supports industry standards such as PCI DSS, HIPAA, GDPR, and more, through prebuilt security profiles. Key features include real-time compliance monitoring, which provides immediate visibility to administrators when system changes violate configuration policy rules; trusted boot, which measures and attests the integrity of the boot image, operating system, and applications using virtual trusted platform module technology; trusted firewall, which ensures appropriate network isolation for virtual machines; trusted logging, which provides tamper-proof logging and convenient log backup and management; and multifactor authentication.
  • 20
    Caveonix

    Caveonix

    Caveonix

    ...Created by industry veterans that know digital risk and compliance inside and out, Caveonix RiskForesight is a platform trusted by our customers and partners that provides proactive workload protection. Detect, Predict and Act on threats that occur in your technology stack and hybrid cloud environments. Automate your digital risk and compliance processes, and proactively protect your hybrid and multi-cloud environments. Implement cloud security posture management and cloud workload protection, as defined by Gartner's standards.
  • 21
    Brellium

    Brellium

    Brellium

    ...Its core capabilities include real-time chart review using machine learning to check every note, session, and encounter for coding compliance (MDM/E/M/ICD-10), clinical quality standards, payor rules, and documentation integrity, delivering audits up to 13x faster and reducing chart-review costs by approximately 98%. Brellium integrates with any EMR, supports custom and prebuilt audit criteria, sends automatic provider-feedback emails, and provides trend-data dashboards that stack-rank clinicians based on documentation quality. It also offers a unique clawback-protection guarantee: if a payor retracts reimbursement on a Brellium-approved chart, Brellium will cover the cost. The platform serves specialties such as behavioral health, ABA, home health, chronic-care management, and telehealth.
  • 22
    HICX

    HICX

    HICX Solutions

    ...And it’s what makes the biggest and best trust us to deliver their highly complex projects in record time. We’re built around the data, not the transaction. Unlike P2P or ERP, our data model is flexible enough for the most demanding tech stack and architecture. Without full integration, there is no joined-up supplier experience. HICX is at the core of a connected ecosystem of procure-tech and supply chain applications.
  • 23
    Aptible

    Aptible

    Aptible

    ...Logs are generated and backed up for every deploy, config change, database tunnel, and console operation, and session. Aptible monitors the underlying EC2 instances in your stacks for potential intrusions, such as unauthorized SSH access, rootkits, file integrity issues, and privilege escalation. The Aptible Security Team responds on your behalf 24/7 to investigate and resolve issues as they arise.
  • 24
    Opsware

    Opsware

    Opsware

    Legal and engineering teams are using Opsware to embed privacy workflows across their organizations to simplify compliance with modern privacy laws. No coding is required. Eliminate the tedious work that comes with building data maps and managing vendors. Discover data sources using our fast and reliable data discovery and classification solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Get your teams...
  • 25
    Zendata

    Zendata

    Zendata

    Manage data security & risk across your entire stack. Your customer-facing assets are where the data collection/shaping occurs. Source code with data flows and third-party components. Distrust with how companies handle data arises due to data breaches, sharing/selling of personal information, and targeted advertising without consent, eroding trust between companies and customers. Don’t forfeit your customers’ trust by exposing them to privacy risks.
    Starting Price: $299 per month
  • 26
    Zip Security

    Zip Security

    Zip Security

    ...Monitor your system’s devices, identities, and 3rd party tools at a bird’s eye view and get each metric to where it needs to be. We integrate the best-in-class security tooling like CrowdStrike, Jamf, and Intune to build the enterprise security stack that scales with you, and it’s all behind a single pane of glass. Set consistent security policies across Windows and macOS devices without juggling platform-specific configuration. Zip is your single partner to procure, deploy, configure, and manage your enterprise security program. We’ll manage all of the software you need to buy to meet the standards of your customers, insurers, and compliance regimes.
  • 27
    OpenWater

    OpenWater

    OpenWater

    OpenWater is an all-in-one software platform that lets your organization collect and review any type of application and provide for online review. OpenWater is a software platform that helps grow your awards, abstracts, fellowships, grants, and more! The OpenWater Growth Stack has been battle tested and is capable of handling the most demanding application and review processes for awards, grants, scholarships, fellowships, abstracts and more. Provide your audience with an intuitive and engaging virtual conference experience through OpenWater software. Our enterprise grade virtual event software delivers high quality broadcasts at scale. ...
  • 28
    Vouched

    Vouched

    Vouched

    ...Vouched plugs into any platform, language or app and is entirely device-agnostic. Configure our APIs and SDKs to work in lockstep with your product, and get more out of your existing tech stack. Pay only for what you use. No matter how your business scales, you’re always covered by the most competitive rates in the industry. Vouched detects, verifies and analyzes a user’s face, and provides the security needed to detect fraud by analyzing the identity document and multiple perspectives of a user’s face and testing for liveness.
    Starting Price: $50 per month
  • 29
    Resistant AI

    Resistant AI

    Resistant AI

    Resistant AI, protects fintech AI and automation systems from manipulation and attack — without replacing their existing tech stack. We have two main products: - Resistant Documents. Document fraud detection software checks any document, from anywhere, for fraud and authenticity (in seconds). - Resistant Transactions. Transaction monitoring software upgrades existing rules-based TM systems, targeting advanced fincrime typologies with 80+ AI models.
  • 30
    SignOnSite

    SignOnSite

    SignOnSite

    ...SignOnSite makes a wide range of safety & productivity processes easier and more effective, from pre-starts and briefings to high-risk work, driving tangible outcomes for site and project teams. It's also a powerful tool for managing stakeholders for the entire lifecycle of a project.Remove the roadblocks for the people on site. Create and stack value in safety, efficiency and data for the entire organisation.
    Starting Price: $1000/year
  • Previous
  • You're on page 1
  • 2
  • Next