Suggested Categories:

IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Camera Apps
Camera apps are software apps that enable users to take photos or videos using their smartphone or computer. Most devices come with a native camera app, but third-party camera apps can add a wide variety of features that native camera apps do not offer.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Website Security Software
Website security software enables the protection of websites from cyber threats, online attacks and hackers through DDoS protection features and web application firewalls.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
School Safety Software
School safety software is a digital platform designed for educational institutions (K-12, higher education, and campuses) to prevent, manage, and respond to safety, security, and well-being incidents. It typically covers visitor and access control, student behavior monitoring, emergency notification & lockdown, incident reporting, and analytics on safety trends. Many solutions integrate with campus systems (e.g., student/visitor databases, video surveillance, PA systems) as well as mobile apps for staff and first responders. By centralizing workflow, alerts, and documentation, school safety software helps institutions improve response times, increase situational awareness, enforce policy, and create safer environments. It also supports compliance with standards, drills, audits and after-incident reviews.
View more categories (20) for "security camera"

27 Products for "security camera" with 1 filter applied:

  • 1
    Kognition

    Kognition

    Kognition AI

    Kognition AI security stops threats in real-time. Transform legacy security into intelligent protection that pays for itself. Kognition AI integrates seamlessly with existing cameras and access control - no costly rip-and-replace required. Why Security Leaders Choose Us: ✓ 24/7 AI Guardian that never misses threats or calls in sick ✓ Works with Axis, Hanwha, Avigilon, Genetec, Milestone, and other popular platforms and devices. ✓ Real-time alerts deliver actionable intelligence...
    Starting Price: $10,000
    Partner badge
    View Software
    Visit Website
  • 2
    Avira Security Antivirus & VPN
    ... which apps request access to sensitive data. Camera and microphone protection prevents someone from listening and spying on you through your device's camera and microphone. The PIN protects your sensitive applications (chat, calls, Skype, etc.) Find out what other devices are connected to the same Wi-Fi. Free or premium features. The ultimate in antivirus security for Android, Avira Antivirus Security is a comprehensive security and anti-malware application.
    Starting Price: Free
  • 3
    IGZY

    IGZY

    IGZY Group

    IoT BASED SOLUTIONS IGZY is the IoT arm of KocharTech helping organizations in phygital transformation. We, at IGZY, deliver e-surveillance & security solutions that make your business premises intelligent, safe & secure using state of the art unified IoT platform. Retail IoT-enabled camera and sensors offer solutions like motion detection, real-time notifications, remote monitoring,, people counting, and unlimited camera additions using a single dashboard. Smart solutions for actionable...
  • 4
    OnSiteMonitor

    OnSiteMonitor

    Off-Site Labs

    The OnSiteMonitor platform uses your home computer to create a custom Home Security and Home Automation system. With the OnSiteMonitor your computer becomes a machine that can monitor cameras, control the climate, adjust lighting, monitor door/windows, monitor free space on your computer, send email, play audio files, send alerts, make phone calls, and more. OnSiteMonitor allows you to use products from multiple vendors that communicate with each other. Events are used to issue commands...
    Starting Price: $42 per year
  • 5
    Gravwell

    Gravwell

    Gravwell

    Gravwell is an all-you-can-ingest data fusion analytics platform that enables complete context and root cause analytics for security and business data. Gravwell was founded to bring the benefits of usable machine data to all customers: large or small, text or binary, security or operational. When experienced hackers and big data experts team-up you get an analytics platform capable of things never seen before. Gravwell enables security analytics that go well beyond log data into industrial...
  • 6
    Solink

    Solink

    Solink

    Solink is a cloud video security and analytics platform that works with your existing cameras, access controls, and operational technologies like POS and labor management, helping you modernize and improve security and operations without costly upgrades. Solink is already trusted by 30,000 customers across 32 countries.
    Starting Price: $175/location/month
  • 7
    PilarOS

    PilarOS

    PilarOS

    Enhanced, manageable and secure Android Mobile OS. PilarOS, AKA TRDROIDTM, is ARDIC’s industrial Android distro with extended security and manageability framework over 1800 new API’s build on AndroidTM Open Source. AFEX adds manageability to the OS. Additional layers provide device, applications, connection and data security. From kernel to cloud level for industrial grade, secure, manageable, scaleable services. It won’t let no monkey business on your device; secures connection, applications...
  • 8
    ActiveScale
    ... and secure; much of the data being stored is key to market differentiation, product and services support, and raw inputs from sensors, sequencers, cameras, and other devices. To future proof data availability, organizations need to ensure data integrity, infrastructure resiliency and scalability, and continuous and ubiquitous access to data.
  • 9
    Adaware Protect
    Adaware Protect is the all-in-one suite that includes Adaware Safe Browser to increase your online security. Adaware Protect's online security keeps your entire computer safe from suspicious websites. Adaware Protect blocks unsafe sites and lets you see what applications try to access malicious or unknown URLs. With one click, Adaware Protect allows you to block hackers and spyware from accessing your camera and microphone. When it's time to video conference, one quick click and you're ready...
    Starting Price: Free
  • 10
    RecoverXData

    RecoverXData

    RecoverXData

    Our easy, powerful and 100% secure data recovery software for Windows should be your savior to restore deleted and lost files. Win your important lost data back with RecoverXData Free because it knows and is also good at that. Specifically, this freebie not only supports restoring the deleted, lost, and cleaned files from the computer hard disk, desktop, and recycle bin, but also works well on retrieving data on external devices connected to a PC, e.g. HDD, SSD, USB flash drive, and (phone/camera...
    Starting Price: $29.96 per month
  • 11
    Android Things
    Android Things lets you experiment with building devices on a trusted platform, without previous knowledge of embedded system design: Develop using the Android SDK and Android Studio, access hardware such as displays and cameras natively through the Android framework, use the Android Things Console to push over-the-air feature and security updates. Android Things enables you to build apps on top of popular hardware platforms like the Raspberry Pi 3. The Board Support Package (BSP) is managed...
  • 12
    IoTeX

    IoTeX

    IoTeX

    IoTeX is the fastest, most secure, and most scalable blockchain platform on the market. IoTeX currently leads the world’s premier industry consortiums and standards bodies. The IoTeX platform hosts an ever-growing ecosystem of projects and products that have been developed by members of the IoTeX community. The IoTeX blockchain already powers real devices, including award-winning blockchain-powered cameras from Consumer Electronic Show (CES) and the pebble geo device, perfect for supply chain...
  • 13
    Open-E JovianVHR
    Open-E JovianVHR is a cyber-resilient, software-defined storage platform built for maximum data security and durability. It acts as a second defense layer for Hardened Repository feature from Veeam. Utilizing the ZFS file system and its native snapshots integrated with Veeam's features, it protects vital data from insider threats, accidental deletion, and sophisticated ransomware. This essential tool guarantees rapid, reliable data restoration, ensuring business continuity and peace of mind...
  • 14
    Cisco Spaces
    The latest Cisco Wi-Fi 7 access points are built with Smart Spaces in mind. They are faster, more secure, and more resilient, and come pre-integrated with the Cisco Spaces platform, out of the box. A cloud platform that connects people & things with spaces with no additional hardware and drives efficiency & cost optimizations Cisco Spaces captures location signals from people and things within your buildings. By leveraging your Cisco Network Infrastructure – Access Points, Switches...
  • 15
    Visual Data Center
    ... resources, including space, power, cooling, and cable connections, along with modeling and simulation capabilities to assess the impact of moves, adds, and changes prior to deployment. The software includes change management functionalities for generating work orders, assigning tasks, and tracking performance, as well as centralized IP camera management for enhanced security. Environmental monitoring is supported through real-time temperature and humidity tracking, integrating with sensors.
  • 16
    RecoveryFox AI

    RecoveryFox AI

    WonderFox Soft

    RecoveryFox AI is an advanced data recovery software that leverages artificial intelligence to provide efficient and secure recovery of lost or deleted files. Whether you've lost data due to accidental deletion, formatting, or corruption, RecoveryFox AI uses powerful algorithms to recover a wide range of file types, including photos, videos, documents, and more. With a 98% success rate, it supports major file systems such as NTFS, exFAT, and FAT32, and works across various devices like hard...
    Starting Price: $49.95/week/1 PC
  • 17
    ClearBlade

    ClearBlade

    ClearBlade

    ClearBlade is driving enterprise digital transformation through Intelligent Assets. The secure “no-code” IoT Application built on ClearBlade IoT & Edge Platform delivers AI, edge-native computing, and extreme flexibility empowering operation teams to get things done fast. Maintaining aircraft requires that mechanics service airplanes on a very demanding schedule with very specific tools and equipment. Equipment on an airfield is often misplaced, lost or stolen resulting in expensive...
  • 18
    EZ VPN

    EZ VPN

    EZ VPN

    EZ VPNTM gives you fast and secure access to any of your remote network locations. Connect to your office and work remotely, manage your home automation devices, upgrade your industrial control panel, check your webcams, with EZ VPNTM anything behind a firewall can be safely and easily accessed without even touching your existing network configuration. EZ VPNTM creates a secure VPN connection for you to control your home automation, cameras, work from home, remote desktop, etc. No need to deal...
    Starting Price: $149 per year
  • 19
    FaceMe

    FaceMe

    CyberLink

    ... real-time alerts to security personnel or other people in the organization. FaceMe® Security Central compares the extracted facial templates with the database in order to confirm identity. It also provides a web-based console to manage the Microsoft SQL based face database, configure IP cameras, and inform relevant personnel about registered visitors, VIPs, block-listed people, or employees entering each monitored area.
  • 20
    Open-E JovianDSS
    Open-E JovianDSS is a ZFS- and Linux-based data storage software tailored for enterprise-level Software-defined Storage (SDS) environments. It offers a comprehensive, all-in-one solution for data storage, backup, business continuity, and disaster recovery. With advanced features, Open-E JovianDSS ensures data reliability, integrity, and security, making it ideal for the most demanding business environments. Its flexible, hardware-agnostic architecture supports cost-effective data storage...
  • 21
    TALONOID Vault

    TALONOID Vault

    TALONOID Technologies

    ... Easy – Securely back up photos, videos, documents and more with one-tap cloud sync. 🔗 Smart NFC Capsule – One tag for instant app launch, one rewritable for 2FA codes or passphrases. 🌍 Access Anywhere – Restore files, auto-sync camera roll, and view data offline. 🛡️ Privacy-First Design – End-to-end encrypted, zero-knowledge, no ads or tracking. 💎 Expert Support Included – Get live chat and ticketing assistance when using your TALONOID device.
    Starting Price: $6
  • 22
    RePicvid

    RePicvid

    Gihosoft

    100% free photo recovery for deleted/formatted/lost pictures with no limits in size nor period. Recover deleted photos and videos from SD card, hard drive, pen drive, computer, digital camera, etc. Easy to use & 3-step photo recovery software with high quality, efficiency, and security. Recover more files, such as Office documents, PDF, HTML, RAR/ZIP, etc. with RePicvid Standard at discount. With RePicvid, you can get back deleted photos/videos/music in several clicks: Select a disk to scan...
    Starting Price: $35 one-time payment
  • 23
    RecoveryMaster
    100% secure and protected your computer from virus attack. RecoveryMaster recovers your lost files/data from various scenarios. A professional, easy, fast, and reliable tool for data recovery. RecoveryMaster provides all types of solutions for data or file deletion, format, virus attack, system or hard drive failure, etc. Professional and reliable data recovery tool with 100% security guaranteed. RecoveryMaster recovers data from a wide range of devices such as hard drive, HDD/SSD, USB drive...
  • 24
    Recuva

    Recuva

    CCleaner

    Accidentally deleted an important file? Lost files after a computer crash? No problem - Recuva recovers files from your Windows computer, recycle bin, digital camera card, or MP3 player! Recuva can recover pictures, music, documents, videos, emails or any other file type you’ve lost. And it can recover from any rewriteable media you have, memory cards, external hard drives, USB sticks and more! Unlike most file recovery tools, Recuva can recover files from damaged or newly formatted drives...
    Starting Price: $9 per year
  • 25
    Azure IoT Edge
    ... in the cloud and run them on-premises. For example, if you deploy a predictive model to a factory camera to test for quality control and an issue is detected, IoT Edge triggers an alert and processes the data locally or sends it to the cloud for further analysis. Operate your edge devices reliably and securely, even when they’re offline or they have intermittent connectivity to the cloud. Azure IoT Edge device management automatically syncs the latest state of your devices.
  • 26
    SanDisk RescuePRO

    SanDisk RescuePRO

    LC Technology

    ... it easy to recover your files with just a few clicks. Secure media wiping is included for the permanent deletion of personal data on your device. Create a backup image of failing devices or recover from a later time. The exclusive fragmented video recovery option is capable of properly recovering fragmented video files from GoPro, Canon, DJI, Nikon, Sony, and many others. Supports high-end digital backs and SLR camera formats.
    Starting Price: $39.99 one-time payment
  • 27
    getLocus

    getLocus

    getLocus

    The platform works through a browser on any device. Guests connect to the spaces in one click, following a link. No downloads or registration. Manage rights and access to the space, and moderate the content created by guests. All data in the spaces are securely protected in accordance with GDPR. Each of the spaces can accommodate up to 64 people with the microphone on and up to 30 people with the cameras on at the same time. A space is an interactive screen on which you can draw, share...
  • Previous
  • You're on page 1
  • Next