Suggested Categories:

Second Phone Number Services
Second phone number services provide individuals and businesses with an additional phone number that can be used separately from their primary phone line. These services are commonly used for privacy, marketing purposes, or managing work and personal calls. Second phone numbers can be used for different purposes, such as handling customer inquiries, managing online transactions, or protecting personal phone numbers from exposure. Many services offer features like call forwarding, voicemail, text messaging, and the ability to choose a local area code. These services are particularly useful for freelancers, entrepreneurs, or anyone who needs to maintain separate lines for personal and professional use.
Business Phone Systems
Business phone systems are advanced communication networks designed to manage and streamline voice calls and other communication channels within organizations. They range from traditional landline systems to modern VoIP (Voice over Internet Protocol) solutions, offering features like call forwarding, voicemail, auto-attendants, and conferencing. These systems can be tailored to fit businesses of all sizes, from small startups to large enterprises, ensuring seamless internal and external communication. Many modern phone systems integrate with other business tools like CRM software to enhance productivity and customer service. Reliable and scalable, business phone systems play a crucial role in maintaining efficient operations and fostering collaboration.
Reverse Phone Lookup Services
Reverse phone lookup services and apps enable users to determine who is calling you by identifying the caller's phone number. Reverse phone lookup allows users to get caller ID about who is calling them by being able to reveal the caller's identity by checking it against a database using a reverse phone lookup app or service.
Virtual Phone Number Providers
Virtual phone number providers offer services that allow individuals and businesses to obtain phone numbers that are not tied to a physical phone line or location. These numbers can be used for call forwarding, text messaging, voicemail, and other communication services, making them ideal for businesses looking to manage multiple lines or individuals who want to keep their personal number private. Virtual phone numbers often support features like area code selection, international calling, and number masking, and they can be used for business, marketing, customer support, or personal purposes. These services are popular with entrepreneurs, remote teams, and businesses operating in multiple regions.
Dividend Trackers
A dividend tracker is a software tool that allows investors to track the dividends they receive from their investments and manage them in one place. It can provide insight into an investor's overall portfolio performance and financial health. The data stored through a dividend tracker is often comprehensive, including details such as stock prices, dividend payment histories, and other pertinent financial information. Many dividend tracking services offer additional features such as automated dividend reinvestment advice, custom portfolio alerts, and automatic tax reporting.
CE Trackers Software
CE trackers, short for continuing education trackers, are apps or tools used to track continuing education (CE) credits and progress.
Phone Verification Services
Phone verification services are tools that help businesses validate phone numbers provided by users to ensure they are valid and active. These services typically use automated processes to check if a phone number is correct, reachable, and not associated with fraud or spam. Phone verification is commonly used during account sign-ups, transaction processes, or user authentication to prevent fake or incorrect information. These services often include features like SMS-based verification codes, automated voice calls for two-factor authentication (2FA), and number formatting checks. Phone verification is crucial for enhancing security, improving data quality, and reducing the risk of fraud.
Crypto Portfolio Management Software
Crypto portfolio management software is software that enables cryptocurrency investors track, manage, and analyze their cryptocurrency holdings across various exchanges, wallets, and assets. These tools provide users with real-time updates on their portfolio's performance, including market prices, trading volume, gains, and losses. Key features typically include asset tracking, automatic syncing with multiple crypto wallets and exchanges, risk analysis, performance charts, and tax reporting. Crypto portfolio management software helps users make informed investment decisions, improve portfolio diversification, and streamline the tracking of their crypto assets.
Vanity Phone Number Providers
Vanity phone number providers are companies that offer personalized and memorable phone numbers to businesses and individuals. These numbers typically include a combination of letters and numbers that spell out a word or phrase, making them easier to remember for customers. Companies often use these numbers as a marketing tool to increase brand recognition and make it easier for customers to reach them. Some vanity phone number providers offer additional services such as call forwarding and voicemail options. Overall, using a vanity phone number can be a convenient and effective way to stand out in the competitive world of telecommunications.
AI Phone Answering Agents Software
AI phone answering agents are automated systems powered by artificial intelligence that handle incoming phone calls, providing businesses with a way to manage customer interactions without human intervention. These systems use natural language processing (NLP) and speech recognition to understand and respond to customer inquiries, handle routine tasks, and direct calls to the appropriate departments or personnel when necessary. AI phone answering agents can schedule appointments, provide information, answer frequently asked questions, and even assist with troubleshooting.
PBX Phone Systems Software
PBX phone systems are business phone systems that function like traditional phone systems, but work via an IP connection using internet instead of traditional copper wire landlines. PBX phone systems, also known as IP PBX phone systems, are increasingly becoming the most popular type of business phone system due to lower costs and more features than regular phone systems. IP, short for Internet Protocol, and PBX, short for Private Branch eXchange, are the technologies that IP PBX phone systems use. PBX phone systems typically offer a whole host of features like IVR, ACD, find-me/follow-me, call forwarding, virtual extensions, and more.
Call Tracking Software
Call tracking software enables businesses to monitor, record, and analyze incoming and outgoing phone calls to understand marketing effectiveness and improve customer interactions. It assigns unique tracking numbers to different campaigns or channels, allowing attribution of calls to specific marketing efforts. The software often provides features like call recording, call analytics, keyword tracking, and real-time dashboards to optimize sales and support performance. Integration with CRM and advertising platforms helps unify customer data and streamline workflows. Call tracking software is essential for marketers and sales teams seeking to measure ROI and enhance customer experience.
Eye Tracking Software
Eye tracking software monitors and analyzes eye movements and gaze patterns to understand user attention, focus, and behavior. It uses specialized cameras and sensors to capture where and how long a person looks at specific areas on screens, physical environments, or products. This software is widely used in usability testing, market research, psychology, gaming, and assistive technologies to improve user experience, design, and accessibility. Features often include heatmaps, gaze plots, fixation analysis, and real-time tracking data visualization. Eye tracking software provides valuable insights into visual engagement and cognitive processes.
Call Forwarding Services
Call forwarding services allow individuals and businesses to redirect incoming phone calls from one number to another, ensuring that calls are never missed. This service is often used for mobile phones, office lines, or toll-free numbers to forward calls to different devices, such as a home phone, mobile phone, or voicemail. Call forwarding features can include options for unconditional forwarding, time-based forwarding, or forwarding based on the caller’s location or identity. It is widely used in customer service, sales, and remote work scenarios to ensure that calls are routed efficiently and promptly to the right recipient. Call forwarding services can also be helpful in managing high call volumes or maintaining availability outside of regular business hours.
Link Tracking Software
Link tracking software, also known as click tracking software, enables marketers to understand who is clicking their marketing and advertising campaign links, and measure efficacy of campaigns.
Softphone Applications
Softphone applications are software-based phones that allow users to make voice calls over the internet instead of using traditional phone lines. They run on devices like computers, smartphones, or tablets, leveraging VoIP (Voice over Internet Protocol) technology to transmit audio. Softphones offer a range of features, including call forwarding, voicemail, and conferencing, typically integrated with business communication platforms. These apps require only an internet connection and can significantly reduce costs associated with traditional telephony. With the ability to connect globally, softphones are ideal for remote teams, providing flexibility and scalability for businesses.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Email Tracking Software
Email tracking software enables the management, tracking, and monitoring of emails in order to analyze and improve the communication with potential customers.
Time Tracking Software
Time tracking software is used to monitor the amount of time spent on a task or project. It is designed to provide an accurate record of work performance and progress. It can be used to track labor costs, material costs, billing cycles and other such details. This type of software not only helps in tracking time but also provides valuable insights into employee productivity across all departments.
Mobile Payment Apps
Mobile payment apps allow users to make payments, transfer money, and manage their finances directly from their smartphones or other mobile devices. These apps use secure technology, such as tokenization or biometric authentication, to ensure that transactions are safe and private. Mobile payment solutions can be used for in-person transactions via QR codes or near-field communication (NFC), as well as for online purchases and peer-to-peer money transfers. Popular features often include bill payments, money transfers, loyalty rewards, and transaction history tracking. Mobile payment apps are increasingly popular due to their convenience, security, and ability to facilitate faster transactions, making them essential tools for consumers and businesses alike.
View more categories (20) for "phone tracker"

78 Products for "phone tracker" with 2 filters applied:

  • 1
    Skiff

    Skiff

    Skiff

    ... for your email, attachments, documents, and notes. - Create up to 4 free email aliases to protect your identity. Open-source and audited - Skiff Mail is open-source, uses open-source cryptography, and undergoes external security audits. - You can access our whitepaper and code at skiff.com. No trackers or ads - Sign up and upgrade without sharing any personal information; use crypto payments in many different currencies to upgrade. - Your data is never collected, sold, or shared.
  • 2
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have...
    Starting Price: $0.99 per month
    Partner badge
    View Software
    Visit Website
  • 3
    Files.com

    Files.com

    Files.com

    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal...
    Leader badge
    View Software
    Visit Website
  • 4
    Proton Mail

    Proton Mail

    Proton AG

    Proton Mail is the simplest way to protect your communications with built-in end-to-end encryption. Prevent data breaches, stay compliant with regulations like GDPR and HIPAA, and earn client trust. Protected by Swiss privacy laws and trusted by over 50,000 businesses, Proton Mail keeps your business data confidential and under your control. With Proton Mail and Calendar, your team can securely manage their inbox and schedule, while your organization maintains a professional presence with...
    Leader badge
    Starting Price: $6.99/user/month
  • 5
    Proton Drive

    Proton Drive

    Proton AG

    Proton Drive is the all-in-one workspace for storing sensitive data and collaborating with your teams, clients, and partners. Collaborate securely without compromising control: Share client files, contracts, and sensitive business documents with full end-to-end encryption. You control who can access what. Set passwords, add expiry dates, 
 or revoke access anytime. Protect all your business data:
Plans come with 1 TB of storage allowance per user, giving your team enough space for all...
    Starting Price: $1.00/user/month
    View Software
    Visit Website
  • 6
    ESET PROTECT Advanced
    ESET Protect Advanced is a comprehensive cybersecurity solution designed for businesses of all sizes. It offers advanced endpoint protection against ransomware, zero-day threats, and sophisticated attacks with ESET LiveSense technology. It includes full disk encryption for legal compliance and data protection. The solution features proactive cloud-based threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent new threats. Mobile threat...
    Starting Price: $275/month/5 devices
  • 7
    CLEAR

    CLEAR

    Quantum Knight

    ... on a smart phone. It can be deployed online or offline and works on more than 30 types of modern operating systems and embedded equipment. Designed for maximum efficiency and simplicity, CLEAR can dramatically reduce energy usage at scale, relative to other legacy cryptography.
    Starting Price: Free
    View Software
    Visit Website
  • 8
    IceIT

    IceIT

    Quantum Knight, Inc

    IceIT is an always-free desktop utility for encrypting files quickly and easily using quantum-strength encryption. In addition to the community edition, IceIT includes available commercial upgrades for creating always-on sharing and private networks that allow securing files and folders across multiple users and groups, without the need for a centralized cloud account. IceIT frees you to confidently use your email, text message, and legacy communication mediums without worry. Got backups...
    Starting Price: 0
  • 9
    QuantaStor

    QuantaStor

    OSNexus

    QuantaStor is a unified Software-Defined Storage platform designed to scale up and out to make storage management easy while reducing overall enterprise storage costs. With support for all major file, block, and object protocols including iSCSI/FC, NFS/SMB, and S3, QuantaStor storage grids may be configured to address the needs of complex workflows which span sites and datacenters. QuantaStor’s storage grid technology is a built-in federated management system which enables QuantaStor servers...
    Starting Price: $/TB based on scale
    Partner badge
  • 10
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized...
  • 11
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication...
    Leader badge
    Starting Price: Free
  • 12
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a...
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 13
    Silent Circle

    Silent Circle

    Silent Circle

    Joining Silent Circle puts your organization in an exclusive network – the SCircle. You’ll be joining the many other like-minded businesses, NGOs, and governments who have committed to preserving their secrets, their reputation, their intellectual property, and the privacy of their users. Using Silent Phone, your team’s users can contact others in the SCircle with complete peace of mind that your communications are secure. Once your team has joined Silent Circle, other organizations...
  • 14
    passbolt

    passbolt

    passbolt

    Finally, a password manager built for collaboration. Secure, flexible, and automation-ready. Trusted by 10,000 organizations, including Fortune 500 companies, newspapers, governments, and defense forces. Passbolt servers are designed to be simple to install and easy to manage. Yet they are enterprise-ready and can support complex setup for high availability. Passbolt can be used from your browser or mobile phone. Sharing happens in real-time. Desktop apps are coming soon. Retrieve, store...
    Starting Price: €45/month/10 users
  • 15
    Randamu

    Randamu

    Randamu

    Randamu delivers decentralized cryptographic infrastructure that powers the next generation of secure, verifiable, and automated digital systems. Serving Web3 developers, protocols, and blockchains, Randamu offers essential building blocks such as publicly verifiable randomness, time-locked encryption, and cross-chain orchestration. Its flagship stewardship of the Drand protocol and the League of Entropy enables trust-minimized coordination and transparency across distributed systems.
  • 16
    Tresorit

    Tresorit

    Tresorit

    End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their...
    Leader badge
    Starting Price: $10.42/month
  • 17
    MOVEit

    MOVEit

    Progress Software

    MOVEit Managed File Transfer (MFT) software is used by thousands of organizations around the world to provide complete visibility and control over file transfer activities. Assure the reliability of core business processes and the secure and compliant transfer of sensitive data between partners, customers, users and systems with MOVEit. MOVEit's flexible architecture allows you to choose the exact capabilities to match your organizations specific needs. MOVEit Transfer enables the...
  • 18
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules...
    Starting Price: $38 per user per year
  • 19
    Folder Lock

    Folder Lock

    NewSoftwares.net

    Encrypt your files with AES 256-bit military-grade encryption or lock your files from view and access. Keep prying eyes at bay! Folder Lock can Lock and Hide files and folders within seconds. It enables you to Password Protect and restricts unwanted eyes from viewing files, folders, and drives. Once you’ve locked a folder, it will be hidden from its previous location and can only be accessed through the software interface. Folder Lock creates Lockers. Just as you would put your money in a...
    Starting Price: $39.95/one-time/user
  • 20
    Trustifi

    Trustifi

    Trustifi

    Trustifi offers industry-leading solutions for email security that helps small, mid-size, and enterprise organizations manage threat detection, regulatory compliance, data encryption & more. Easily deployed on: Outlook, Gmail, or any email server by relay **Advanced Threat Protection**: -Malware and ransomware virus detection, BEC attack prevention and alerts **Data Loss Prevention**: -100% compliant with HIPAA/HITECH, PII, GDPR, FSA, FINRA, LGPD, CCPA, and more **Encryption**: -NSA-grade....
  • 21
    Vaporstream

    Vaporstream

    Vaporstream

    Vaporstream is how you have leakproof conversations, send disappearing messages, and stay in control of your information, all while remaining compliant. You should always have complete control over who can see your sensitive business information, when it can be forwarded, copied, shared, or saved, across your enterprise, and even after it reaches recipients’ devices. Get the convenience of traditional mobile apps with the functionality, reliability, and privacy your business demands. Our...
    Starting Price: Free
  • 22
    ESET PROTECT Complete
    ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email...
    Starting Price: $287.72 one-time payment
  • 23
    ESET Endpoint Encryption
    A simple to use standalone encryption solution providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Patented technology to protect data for businesses of all sizes. ESET Endpoint Encryption is FIPS 140-2 validated with 256 bit AES encryption. ESET Endpoint Encryption requires no server for deployment and can seamlessly support remote users. Manage encryption on Windows machines and native macOS encryption...
  • 24
    SecureZIP
    Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be...
  • 25
    Trend Micro Endpoint Encryption
    Trend Micro™ Endpoint Encryption encrypts data on a wide range of devices, such as PCs and Macs, laptops and desktops, USB drives, and other removable media. Available as a separate agent, this solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information. A single, well-integrated management console allows you to manage your users holistically—using the same console for endpoint protection and other...
  • 26
    Trellix Data Encryption
    Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and...
  • 27
    OpenText ZENworks Full Disk Encryption
    OpenText ZENworks Full Disk Encryption enables you to centrally enforce policies for encrypting entire hard disks on Windows 7, Windows 8, and Windows 10 machines in your organization. You manage them using the same web-based console and adaptive agent that you use for other ZENworks products. Protect your company data with the proven reliability of encrypting the entire hard disk drive. Ensure that encrypted devices remain easy to manage across the enterprise. You can remotely unlock...
  • 28
    Atakama

    Atakama

    Atakama

    One-of-a-kind information security solution designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to fit your business needs and user workflows. Whether protecting from external or internal threats, securing confidential data is always a top priority. Atakama lets you protect sensitive information such as earnings reports, PII, HR records, M&A deal documents, engineering and scientific data, internal memoranda,...
  • 29
    Fabasoft Secomo
    Fabasoft Secomo is an encryption architecture with true end-to-end encryption. Encryption takes place at the workplace or mobile device and not in the cloud. This ensures end-to-end encryption from the sender to the receiver. The Fabasoft credo "Continuous protection through encryption" means that only you have access to the Fabasoft Secomo and your settings. Fabasoft has neither interfaces to the appliance nor your keys. Fabasoft Secomo is an appliance consisting of Fabasoft Secomo software...
  • 30
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide...
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next