Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended detection and response (XDR) platforms enable organizations to discover and address cybersecurity incidents across disparate hybrid systems such as networks, applications, endpoints, and the cloud.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
View more categories (20) for "object detection"

26 Products for "object detection" with 2 filters applied:

  • 1
    Graylog

    Graylog

    Graylog

    ...) by aligning threat detection coverage to meet your security objectives 2. Reduce TCO with native data routing and data tiering functionality 3. Reduce key metrics like mean time to respond (MTTR) by quickly resolving the alerts that matter. Graylog Security is a robust, scalable solution that empowers analysts to detect and respond to cybersecurity threats efficiently. With integrated SOAR functionality, it automates repetitive tasks, orchestrates workflows, and accelerates incident response.
    Starting Price: $1550/month
    View Software
    Visit Website
  • 2
    Oracle Cloud Infrastructure Object Storage
    ..., with any corrupt data detected and healed by automatically recreating a copy of the data. For longer-term data storage needs like compliance and audit mandates and log data, OCI Archive Storage uses the same APIs as Object Storage for easy setup and integration but at one-tenth the cost. Data is monitored for integrity, automatically healed, and encrypted at rest.
    Starting Price: $0.0255 per month
  • 3
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
    View Software
    Visit Website
  • 4
    LTU Visual Search API

    LTU Visual Search API

    LTU Technologies

    ... or object. Access a suite of visual search functionalities in web service, open and configurable. This SaaS solution gives you access to our multiple proprietary algorithms, and can also integrate third-party technologies to operate a visual search specifically adapted to your needs. LTU offers a SaaS comparison and change detection solution that is highly configurable to operate tailored processing based on your use case.
  • 5
    Nutanix Unified Storage
    ..., cloud, or edge. Consumption-based model to tackle exponential growth in unstructured data while meeting performance requirements. Integrated data security and analytics provide deep data insights to prevent, detect, and recover from ransomware and cyber-attacks. Simplify management, automation, and availability with a consolidated data services platform. Extend Unified Storage platform across core, edge, or cloud while supporting multiple protocols to accommodate all your workloads and users.
  • 6
    SpamCheckAI

    SpamCheckAI

    SpamCheckAI

    Built for SpamCheck-ing free form JSON, not emails like all the other spam APIs. Detect and block spam at the source with our extensive IP address analysis. Sophisticated analysis tools for detecting and assessing potential spam content. Validate and verify emails with our thorough multi-stage process. SpamCheckAI not only identifies and blocks spam but equips you with the comprehensive data needed to make informed decisions. Unleash the unparalleled power of SpamCheckAI’s URL Analysis...
  • 7
    IBM Z Service Management Suite
    IBM® Z® Service Management Suite offers a single point of control for systems management functions for many system elements. This suite delivers multiple AIOps capabilities required to manage both hardware and software enterprise resources in an IBM Systems complex. Achieve operational excellence with policy-based automation, maximizing availability of IBM Z systems and IBM Parallel Sysplex® clusters and optimizing key IT operations objectives. Leverage IBM Z OMEGAMON® to extend monitoring...
  • 8
    Ymonitor

    Ymonitor

    Sentia

    ... and from all devices. One single point of truth for all layers of IT and business on desktop, tablet and mobile. Recognize data trends, detect anomalies, and correlate multiple data sources using the API. Receive alerts by email and sms and take proactive action before end-users experience impact. Index your performance data to determine the quality of your IT services. In order to objectively analyze the performance of your application, Sentia measures from the perspective of the end-user.
  • 9
    SynergyBackup

    SynergyBackup

    Cloud Synergy

    Ransomware is a growing threat to the security of our data, with damages costing billions each year. SynergyBackup keeps your files safe by scanning and not backing up files detected to be compromised by ransomware. Keep as many file versions as you need to meet your continuity objectives. There are no limits to the number of versions you can backup with SynergyBackup. SynergyBackup gives you the ability to encrypt your files with strong AES-256 bit encryption. Encrypt your file names as well...
  • 10
    Aruba Cloud

    Aruba Cloud

    Aruba Cloud

    Cloud made simple and made-to-measure. IaaS and PaaS solutions for your cloud computing applications. A service that allows you to create and set up auto-backups, ideal solution to manage and protect your backups. With our Object Storage solution, based on the IaaS model, you can create and manage storage space to store all the data that you want. Domain Center is a web service offered by Aruba Cloud that allows users to purchase and transfer domain names and manage DNS. Monitor all your...
  • 11
    Azure Percept

    Azure Percept

    Microsoft

    ...T services. Pre-built AI models and solution management to help you start your proof of concept in minutes. Security measures built in to your edge AI solution to help protect your most sensitive and high-value assets. Start with a library of prebuilt AI models for vision capabilities including object detection, shelf analytics, vehicle analytics, and audio capabilities like voice control and anomaly detection. Customize AI model training with no code and deploy locally or in the cloud.
  • 12
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello...
  • 13
    Google Cloud Vision AI
    ... your models for accuracy, latency, and size; and export them to your application in the cloud, or to an array of devices at the edge. Google Cloud’s Vision API offers powerful pre-trained machine learning models through REST and RPC APIs. Assign labels to images and quickly classify them into millions of predefined categories. Detect objects and faces, read printed and handwritten text, and build valuable metadata into your image catalog.
  • 14
    Sonrai Security

    Sonrai Security

    Sonraí Security

    ... critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 15
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    ... network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 16
    AKIPS Network Monitor
    AKIPS Network Monitoring Software is a fully featured, fast and cost-effective network and infrastructure performance-monitoring tool. It delivers unmatched visibility across your network. AKIPS detects faults and performance issues. This empowers your business to maintain its operational state and minimise possible disruptions due to IT infrastructure failing or risk events occurring. AKIPS is a multi-award-winning company and prides itself on its innovative technology. Benefits...
  • 17
    piXserve

    piXserve

    piXlogic

    piXserve™ is an enterprise class application that automatically creates a searchable index of visual content in media files. piXserve scans digital images and videos, stores searchable descriptions of its contents, and assigns keywords to things it recognizes. piXserve can detect and recognize individual faces, objects, scenes, and text strings in a variety of languages. You can put piXserve to work on your archived media and on your live video sources. Use piXserve to help you discover, flag...
  • 18
    Nasuni

    Nasuni

    Nasuni

    The industry’s first ‘in-line’ edge detection combined with rapid ransomware recovery patent capabilities gives IT confidence to effectively mitigate cyber attacks. Nasuni is disrupting the file storage market with a cloud-based approach that replaces traditional on-premises primary and secondary file storage. Nasuni delivers a file storage platform that leverages object storage delivering a simpler, lower cost, and more efficient SaaS solution that scales easily to handle rapid unstructured...
  • 19
    Honeycomb

    Honeycomb

    Honeycomb.io

    Log management. Upgraded. With Honeycomb. Honeycomb is built for modern dev teams to better understand application performance, debug & improve log management. With rapid query, find unknown unknowns across system logs, metrics & traces with interactive charts for the deepest view against raw, high cardinality data. Configure Service Level Objective (SLOs) on what users care about so you cut-down noisy alerts and prioritize the work. Reduce on-call toil, ship code faster and keep customers...
    Starting Price: $70 per month
  • 20
    Telerik Test Studio

    Telerik Test Studio

    Progress Software

    ..., additional capabilities and improvements puts pressure all around. Meanwhile, most of the automated testing approaches aren’t designed to support QA testers without much coding experience. Simply record your test and use automated playback for an easy and fast way to craft your test and then run that same script to test multiple browsers. Maintenance is greatly reduced with patent-pending element detection, centralized object repository, intelligent suggestions and multi-mechanism element search.
  • 21
    LOGIQ

    LOGIQ

    LOGIQ.AI

    LOGIQ.AI’s LogFlow provides centralized control of your observability data pipelines. As data streams arrive, they are automatically organized and optimized for your business teams and knowledge workers. XOps teams can centralize data flow management, gain data EPS control, and increase data quality and relevance. Built on any object store, LogFlow’s InstaStore enables infinite data retention and on-demand data replay to any target observability platform of your choice. Analyze operational...
  • 22
    Cayosoft Guardian
    ... Active Directory security, by combining threat detection, monitoring, and recovery into one comprehensive solution. Cayosoft Guardian continuously monitors directories and services, allowing you to isolate suspect changes and immediately recover unwanted changes made to both objects and settings. This is done across on-premises AD, hybrid AD, Azure AD, Office 365, Microsoft Teams, and Exchange Online, all from Cayosoft Guardian’s single, unified console.
  • 23
    QuickData SQL Server Recovery
    Download and Install the SQL Server database recovery tool on your system to begin the restoration process. Choose the files that you want to recover and set a specific configuration that you want for the recovery process. Click on export to restore the corrupted files on your system. You can also export your database files and SQL script. After you have successfully recovered the MDF & NDF database files, the SQL repair tool will give a quick preview of your restored database objects...
    Starting Price: $249 one-time payment
  • 24
    Amazon EC2 P4 Instances
    ... clusters called Amazon EC2 UltraClusters, P4d instances combine high-performance computing, networking, and storage, enabling users to scale from a few to thousands of NVIDIA A100 GPUs based on project needs. Researchers, data scientists, and developers can utilize P4d instances to train ML models for use cases such as natural language processing, object detection and classification, and recommendation engines, as well as to run HPC applications like pharmaceutical discovery and more.
    Starting Price: $11.57 per hour
  • 25
    Tenzir

    Tenzir

    Tenzir

    ... features and enriches data by adding context from threats, assets, and vulnerabilities. It supports real-time detection and stores data efficiently in Parquet format within object storage systems. Users can rapidly search and materialize necessary data and reactivate at-rest data back into motion. Tension is built for flexibility, allowing deployment as code and integration into existing workflows, ultimately aiming to reduce SIEM costs and provide full control.
  • 26
    Coreviz

    Coreviz

    Coreviz

    CoreViz Studio is a visual-AI platform that helps users automatically understand, organize, edit, search, tag, generate, and collaborate on images and videos without writing code. It supports natural-language search (RAG style) so you can describe what you’re looking for and find matching visual content, and it provides tools for background removal, object removal, upscaling/enhancement, and image editing via text instructions. It also has features for tagging and organizing media, detecting...
    Starting Price: $15 per month
  • Previous
  • You're on page 1
  • Next