Results for: object detection - Page 7

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended detection and response (XDR) platforms enable organizations to discover and address cybersecurity incidents across disparate hybrid systems such as networks, applications, endpoints, and the cloud.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
View more categories (20) for "object detection"

237 Products for "object detection" with 1 filter applied:

  • 1
    ACTi

    ACTi

    ACTiACTi Corporation

    ACTi video analytics are designed to help you transform your video surveillance network into a smart detection system and a valuable resource for business management. Advanced image processing algorithms, such as, people counting or license plate recognition, are being used to recognize and track movement of people and objects to determine their behavior and provide analytical insights. The summary reports can then be displayed as interactive graphs and exported. The system can also trigger...
  • 2
    Gorilla IVAR

    Gorilla IVAR

    Gorilla Technology Group

    Video Analytics are sets of processes that use AI algorithms and metadata to scan video in order to detect patterns or recognize specific objects. Once processed, the video data can then be queried and searched for various/specific results. These are also known as IVAs - Intelligent Video Analytics. Government bodies actively opting for AI-based video systems to monitor traffic congestion. Face recognition technologies are being speedily adopted to support video-based data analytics and enhance...
  • 3
    Ipsotek

    Ipsotek

    Ipsotek

    ... to commissioning. Ipsotek offer a range of intrusion detection applications to protect different areas within the perimeter of your facility. Our products offer tested and robust solutions including abandoned object, wrong-direction, anti-tailgating and loitering which can be fine-tuned to meet site specific requirements. Ipsotek is government certified for sterile zone monitoring and can be deployed as a stand-alone system for perimeter protection.
  • 4
    Site Scan for ArcGIS
    ... that can be quickly shared throughout your organization, on any device. Save time by using the measurement and analysis tools to get the answers you need from your data. Directly publish your drone data to your ArcGIS organization to perform advanced drone analytics such as object detection and application of artificial intelligence (AI).
  • 5
    Warp 10
    ... for training models, filtering and cleaning of data, detection of patterns and anomalies, synchronization or even forecasts. The analysis environment can be implemented within a large ecosystem of software components such as Spark, Kafka Streams, Hadoop, Jupyter, Zeppelin and many more. It can also access data stored in many existing solutions, relational or NoSQL databases, search engines and S3 type object storage system.
  • 6
    LibrePhotos

    LibrePhotos

    LibrePhotos

    ... in Berlin", face recognition, face classification, reverse geocoding, object/scene detection, semantic image search, and search by metadata. You need a x86 processor, and it is recommended to have 8GBs of RAM. You will need at least 10 GB of HDD Space for the Docker images. It needs that space because of the machine learning models. Librephotos will also create a database and thumbnails which will need additional space. LibrePhotos comes with separate backend and frontend servers.
  • 7
    Salt

    Salt

    Salt Security

    The Salt Security API Security Platform protects APIs across their full lifecycle – build, deploy and runtime phases. Only Salt can capture and baseline all API traffic -- all calls and responses -- over days, weeks, even months. Salt uses this rich context to detect the reconnaissance activity of bad actors and block them before they can reach their objective. The Salt API Context Engine (ACE) architecture discovers all APIs, pinpoints and stops API attackers, and provides remediation...
  • 8
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational...
  • 9
    Luminar Neo
    ... created on the basis of MaskAI, the smart AI technology that quickly detects and selects the objects in the photo. Forget about time-consuming manual selections. Remove the whole background behind the people in your photo, automatically. Portrait Background RemovalAI helps every Luminar artist expand their ideas. Pull the focus on your subject or get the perfect space for further adjustments in your creative compositions.
    Leader badge
    Starting Price: $59 per year
  • 10
    Cayosoft Guardian
    ... Active Directory security, by combining threat detection, monitoring, and recovery into one comprehensive solution. Cayosoft Guardian continuously monitors directories and services, allowing you to isolate suspect changes and immediately recover unwanted changes made to both objects and settings. This is done across on-premises AD, hybrid AD, Azure AD, Office 365, Microsoft Teams, and Exchange Online, all from Cayosoft Guardian’s single, unified console.
  • 11
    Ziggeo

    Ziggeo

    Ziggeo

    ..., and devices. Organize, curate, brand, and launch videos from your own personal dashboard. Our management system streamlines your process. Ziggeo has launched the ability to record computer desktop screens right from the browser. Audio transcription, keyword extraction, NSFW filtering, and object detection to make your videos classifiable. Understand when, where, and how your customers are recording and playing your videos. All your video hosting needs, including content delivery.
    Starting Price: $99 per month
  • 12
    CyberManager
    Time and cost-saving. Easy set-up & management, intuitive and user-friendly. Subscriptions suit your objectives and organization. Integrated management systems for cyber security, information security, privacy & business continuity. The CyberManager management system gives you full insight and control of an ISMS according to the ISO 27001, NEN 7510, or e.g. BIO norms, and is in line with the certification requirements. Tasks with clear deadlines can be assigned in a focused and often recurring...
    Starting Price: €1,850 per year
  • 13
    dbForge Schema Compare for SQL Server
    dbForge Schema Compare for SQL Server is a powerful tool designed for comparing and synchronizing schemas in SQL Server databases. It detects all discrepancies in the schemas and presents them in a neat and informative visual interface so that users can immediately synchronize changes — either fully or selectively — and deploy them onto supported platforms. Key Features: - Supports for live databases, snapshots, and native backups as data sources - Easy task configuration through...
    Starting Price: $219.95
  • 14
    Edge Impulse

    Edge Impulse

    Edge Impulse

    Build advanced embedded machine learning applications without a PhD. Collect sensor, audio, or camera data directly from devices, files, or cloud integrations to build custom datasets. Leverage automatic labeling tools from object detection to audio segmentation. Set up and run reusable scripted operations that transform your input data on large sets of data in parallel by using our cloud infrastructure. Integrate custom data sources, CI/CD tools, and deployment pipelines with open APIs...
  • 15
    Phyron

    Phyron

    Phyron

    The Phyron solution combines outstanding visual presentation with automated ad production, handling, and publishing. We enable car dealers to engage more buyers and sell their cars faster. So you highlight the best selling points. Car dealers around the world are using Phyron. Video is the most attractive and engaging format for presenting a car. Intelligent object detection. So you highlight the best selling points. Automatic background removal. So all cars are presented in the same way...
  • 16
    Powertech SIEM Agent for IBM i
    ..., and any journal or message queue in real-time, including changes to user profiles and system values, invalid login attempts, intrusion detections, and changed or deleted objects. Maintain awareness of every security event on your system in real-time so you never miss a potential security breach. Powertech SIEM Agent for IBM i will provide alerts to ensure critical issues are escalated.
  • 17
    Salesforce Shield
    ... with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 18
    DeepCover

    DeepCover

    DeepCover

    Deep Cover aims to be the best coverage tool for Ruby code. More accurate line coverage, and branch coverage. It can be used as a drop-in replacement for the built-in Coverage library. It reports a more accurate picture of your code usage. In particular, a line is considered covered if and only if it is entirely executed. Optionally, branch coverage will detect if some branches are never taken. MRI considers every method defined, including methods defined on objects or via define_method, class...
    Starting Price: Free
  • 19
    icetana

    icetana

    icetana

    ... safe. It’s a lot to expect. With far too many cameras and a shift towards smaller teams, even the most diligent security people fail more often than they want. Technology helps with simple object detection, but it’s often not focused on real-time events. Add increased scrutiny by the media and the public, and pressure mounts quickly. It can feel like preventing crime and protecting people and property is impossible tasks. It shouldn’t be this way.
    Starting Price: $650 per month
  • 20
    AWS Panorama
    ... and a software development kit (SDK) that brings CV to on-premises internet protocol (IP) cameras. Easily track throughput, optimize freight operations, and recognize objects such as parts or products, or text in labels or barcodes. Monitor traffic lanes for issues such as stopped vehicles, and send real-time alerts to staff to keep traffic flowing. Quickly detect manufacturing anomalies so you can take corrective action and decrease costs.
  • 21
    Cogniflow

    Cogniflow

    Cogniflow

    Classify customer interactions, extract info from text or images, identify and count objects in images or video, or even transcribe audio. Just follow a few easy steps to train a custom model or use our pre-trained AI models ready to use. Connect any app or program to your AI models using an API-ready service, or use our add-ons for Excel or Google Sheets. Train and predict from text, image/video or audio. Full native support for Spanish, Portuguese and English. Add intention recognition...
    Starting Price: $40 per month
  • 22
    Sweephy

    Sweephy

    Sweephy

    ... database from different data sources with Sweephy Dedupu API. With Sweephy API, easily create object detection models by finetuning pre-trained models. Just send us some use cases, and we will create an appropriate model for you. Such as classifying documents, pdfs, receipts, or invoices. Just upload the image dataset. Our model will clean the noise on the image easily or we can create a finetuned model for your business case.
    Starting Price: €59 per month
  • 23
    Amazon Lookout for Vision
    ... on the absence, presence, or placement of objects, like a missing capacitor in a printed circuit board. Detect defects with repeating patterns, such as repeated scratches in the same spot on a silicon wafer. Amazon Lookout for Vision is an ML service that uses computer vision to spot defects in manufactured products at scale. Spot product defects using computer vision to automate quality inspection.
  • 24
    Big Room

    Big Room

    LiveLiveLive

    Convert landscape videos to vertical clips 10x faster for social media, TikTok, Instagram, YouTube Shorts, Facebook, and more. Our in-house AI can detect the most important people or objects in every frame of video and cut to them, so the vertical video we auto-edit for you will look like a camera crew was by your side the entire time. We track subjects across frames and automatically reframe your vertical clip so the right thing is always in focus. Sometimes you need to make a final...
  • 25
    Core ML

    Core ML

    Apple

    Core ML applies a machine learning algorithm to a set of training data to create a model. You use a model to make predictions based on new input data. Models can accomplish a wide variety of tasks that would be difficult or impractical to write in code. For example, you can train a model to categorize photos or detect specific objects within a photo directly from its pixels. After you create the model, integrate it in your app and deploy it on the user’s device. Your app uses Core ML APIs...
  • 26
    Finch

    Finch

    Finch

    Optimize building design with AI and graph technology. Get immediate feedback on performance, detect errors, and find optimal solutions in the early stages of design. Get flow in a tool that is focused on buildable exploration. Move freely between massing, setting programs, story design, and space planning. Compare variants in seconds. Automatically fill stories with plans. No more Excel roundtrips to calculate key figures. Instantly know how you match your customers’ demands. Unit and area...
  • 27
    HeyPhoto

    HeyPhoto

    HeyPhoto

    Change gaze direction, nose shape, skin tone, age, hairstyle, and other facial features. Make production-quality face swaps with AI. Forget about photo editors. The largest resolution for face swaps on the market. Create photorealistic headshots with a face generator. The future is here, create a unique person with your parameters in a few clicks. HeyPhoto uses artificial intelligence to detect faces in photos and make changes depending on the selected tool. The service is intuitive...
    Starting Price: $8.25 per month
  • 28
    Shaip

    Shaip

    Shaip

    Shaip offers end-to-end generative AI services, specializing in high-quality data collection and annotation across multiple data types including text, audio, images, and video. The platform sources and curates diverse datasets from over 60 countries, supporting AI and machine learning projects globally. Shaip provides precise data labeling services with domain experts ensuring accuracy in tasks like image segmentation and object detection. It also focuses on healthcare data, delivering vast...
  • 29
    Entri

    Entri

    Entri

    Your user enters the domain they would like to set up. Alternatively, can you pass the domain directly to Entri via our JS SDK. Don't make your users play a guessing game. After the DNS provider is detected, the user logs in with their credentials. There’s no need for copying and pasting complex records or reading cumbersome documentation. Just pass your desired DNS settings to the Entri modal window using a configuration object. Then, Entri will apply these settings for your end user. Entri...
  • 30
    QuickData SQL Server Recovery
    Download and Install the SQL Server database recovery tool on your system to begin the restoration process. Choose the files that you want to recover and set a specific configuration that you want for the recovery process. Click on export to restore the corrupted files on your system. You can also export your database files and SQL script. After you have successfully recovered the MDF & NDF database files, the SQL repair tool will give a quick preview of your restored database objects...
    Starting Price: $249 one-time payment