Suggested Categories:

3D Scanning Software
3D scanning software are apps that allow users to capture, process, and analyze three-dimensional data from real-world objects or environments. These platforms enable the conversion of physical objects into accurate 3D digital models, often using technologies such as laser scanning, photogrammetry, or structured light scanning. With 3D scanning software, users can manipulate and edit these models for purposes like design, prototyping, or reverse engineering. The software typically includes features for mesh generation, texture mapping, and data visualization, ensuring that the digital replica accurately represents the physical object. Industries like manufacturing, engineering, and entertainment use 3D scanning software to streamline production processes, enhance precision, and improve product development.
Routers
Routers are networking devices used to connect computer networks and send data between them. They use a process called routing to determine the best way for data to get from one network to another. Routers may be used in both wired and wireless networks, with different models designed for different environments or purposes. Their primary purpose is to act as a gateway between two or more networks, allowing communication to occur effectively and efficiently.
Virtual Routers
A virtual router is a type of software that enables users to create and manage a simulated network environment. It can provide routing services similar to those of physical routers, but without the need for physical hardware or cables. This technology can be used to simulate complex network systems with minimal startup costs and maintenance overhead. Virtual routers are also capable of providing external connections with other networks via the Internet.
LLM Routers Software
​LLM routers are systems that intelligently direct queries to the most appropriate Large Language Model (LLM) based on factors like complexity and cost. By analyzing incoming prompts, these routers balance performance with resource expenditure, ensuring efficient and effective responses. They contribute to operational efficiency by optimizing resource allocation, leading to cost savings without compromising quality.
Document Scanner Software
Document scanner apps are software applications that enable users to scan documents using a device such as a smartphone, tablet, or computer. Document scanning software and apps can scan documents and save them as various file types. Some document scanners come equipped with optical character recognition (OCR) functionality and/or AI that allows for natural language understanding and intelligent document processing and indexing.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Receipt Scanner Software
Receipt scanner apps and software enable users to scan receipts using a mobile device, computer, or scanner. Receipt scanning software may also offer features such as receipt management, OCR, AI, and other intelligent processing capabilities so that receipts and expenses can be classified correctly and expense reports can be created.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Vulnerability Scanners
Vulnerability scanners enable organizations to perpetually track and monitor applications and systems to detect security flaws, threats, and vulnerabilities. Vulnerability scanners scan for vulnerabilities by drawing from a fresh database of vulnerabilities.
Photogrammetry Software
Photogrammetry software gives users the ability to create 3D models by extracting geometric data from 2D images.
OCR Software
OCR (Optical Character Recognition) software is software that converts different types of documents—such as scanned paper documents, PDFs, or images—into editable and searchable text. OCR software analyzes the shapes of characters in the document and translates them into machine-readable data. This technology is particularly useful for digitizing printed documents, allowing businesses and individuals to archive, edit, and search through physical content more efficiently. By using OCR software, organizations can save time, reduce errors, and improve document accessibility while making information easier to manipulate and manage.
Vulnerability Management Software
Vulnerability management software is software that identifies, assesses, and prioritizes security vulnerabilities within an organization's IT infrastructure. These tools continuously scan systems, networks, and applications for potential weaknesses that could be exploited by attackers. They provide detailed reports on discovered vulnerabilities, along with recommendations for remediation or mitigation strategies. Vulnerability management software often integrates with other security tools, such as patch management and threat intelligence platforms, to enhance overall security posture. By helping organizations proactively manage vulnerabilities, these tools reduce the risk of cyberattacks and data breaches, ensuring a more secure IT environment.
Data Discovery Software
Data discovery software is a type of software tool that allows users to quickly identify patterns, trends, and relationships in large datasets. It utilizes tools such as natural language processing and machine learning to quickly analyze data and uncover insights. Data discovery software can be used in a variety of areas such as healthcare, business intelligence, fraud detection, risk management, and more. Its purpose is to give its users quick access to the most relevant data so they can make informed decisions.
Software Composition Analysis (SCA) Tools
Software Composition Analysis (SCA) tools help organizations identify and manage open source and third-party components within their software applications. They scan codebases to detect licenses, vulnerabilities, outdated libraries, and compliance risks associated with external dependencies. SCA tools provide detailed reports and alerts to support secure software development and supply chain risk management. Integration with development environments and CI/CD pipelines enables automated checks throughout the software lifecycle. By enhancing transparency and governance over software components, SCA tools reduce security threats and legal liabilities.
Network Troubleshooting Software
Network troubleshooting software enables the optimization of network issue identification through analysis, testing and functional solution implementation.
PCI Compliance Software
PCI compliance software helps organizations ensure they meet the standards set by the Payment Card Industry Data Security Standard (PCI DSS). These platforms provide tools for securing cardholder data, managing payment transactions, and maintaining the privacy and security of customer information. PCI compliance software typically includes features for vulnerability scanning, risk assessment, encryption, access control, and generating reports for audits. By using this software, businesses can streamline the compliance process, reduce the risk of data breaches, and ensure they are meeting regulatory requirements to protect sensitive payment information. This is particularly critical for organizations that process, store, or transmit credit card data.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
Pharmacy Software
Pharmacy software is software that streamlines pharmacy operations, from prescription management to inventory tracking. It allows pharmacists to process and fill prescriptions efficiently, ensuring accuracy in drug dispensing while adhering to regulatory standards. The software often includes features such as automated drug interactions, patient history tracking, and medication management. It also helps pharmacies manage stock levels, placing orders for medications, and ensuring timely restocking. Overall, pharmacy software improves patient safety, reduces errors, and enhances workflow efficiency in a busy pharmacy setting.
View more categories (20) for "router scan"

58 Products for "router scan" with 2 filters applied:

  • 1
    ManageEngine OpManager
    OpManager is a network management tool geared to monitor your entire network. Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real...
    Leader badge
    Starting Price: $95.00/one-time
    Partner badge
    View Software
    Visit Website
  • 2
    ManageEngine EventLog Analyzer
    ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers...
    Starting Price: $595
    View Software
    Visit Website
  • 3
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we...
    Starting Price: $1000
  • 4
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent...
    Starting Price: $238
  • 5
    Google Chrome Enterprise
    .... It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. It adds an extra layer of security to safeguard your Chrome browser environment, including DLP, real-time URL and file scanning, and context aware access for SaaS and web apps.
    Starting Price: Free
  • 6
    ManageEngine OpUtils
    ... intrusion, keeping an eye on bandwidth usage, monitoring availability of critical devices, backing up Cisco configuration files, and more. Enable advanced IP scanning of IPv4 and IPv6 subnets in your network to identify the available and used IP addresses. Scan all the switches in your network, map switch ports, run port scans and view details such as physical location, user, and more. Identify rogue device intrusions and block access to these devices.
    Starting Price: $138.00
  • 7
    RUSVPN

    RUSVPN

    RUSVPN

    With our VPN all your traffic is encrypted and transmitted to you via a secure connection. Hundreds of secure servers provide stable access to the internet from any point on the globe. All your Internet traffic is encrypted, including your passwords, conversations, etc. We provide the fastest VPN connection and streaming speed on the market. Fair pricing for outstanding quality only at RusVPN. Phone, tablet, PC, router - you name it, we support it!
  • 8
    OpenWrt

    OpenWrt

    OpenWrt

    OpenWrt is a highly extensible GNU/Linux distribution for embedded devices (typically wireless routers). Unlike many other distributions for routers, OpenWrt is built from the ground up to be a full-featured, easily modifiable operating system for embedded devices. In practice, this means that you can have all the features you need with none of the bloat, powered by a modern Linux kernel. Instead of trying to create a single, static firmware, OpenWrt provides a fully writable filesystem...
  • 9
    LogMeIn Hamachi
    Create and manage virtual networks on-demand as you need them. Quickly and easily provision virtual network client software to new computers without having to go onsite. Run Hamachi in the background of networked computers so you always have access even when they’re unattended. Available with Standard, Premium and Multi-network subscriptions. Provide remote users with secure access to specific computers on your network from any location, without modifying firewalls or network routers. Quickly...
    Starting Price: $49 per year
  • 10
    RPort

    RPort

    RPort

    Get full insights into your servers' cpu usage, memory utilization, disk fill levels, network bandwidth, processes, and more. Monitor internet based servers and their services like websites and email servers from different locations around the globe. Network monitoring of intranets, routers, switches, IP-cameras, printers, and other IP-devices behind a firewall. Stop spending more time configuring your monitoring solution than actually monitoring your network. CloudRadar's simple UX...
    Starting Price: $1.50 per host per month
  • 11
    iProVPN

    iProVPN

    iProVPN

    Secure, Private, and Unlimited iProVPN is a premium VPN designed for online privacy, security, and freedom. With AES-256-bit encryption and a strict no-logs policy, it ensures your data stays private and secure. Access geo-restricted content with high-speed servers across 45+ countries, perfect for streaming, gaming, and torrenting. Features like Kill Switch, Split Tunneling, and DNS leak protection add extra layers of safety. Compatible with Windows, macOS, Android, iOS, routers, and more, i...
    Starting Price: $1.26/month
  • 12
    Lokinet

    Lokinet

    Lokinet

    Lokinet is a decentralized onion router that enables anonymous internet access by leveraging the Oxen service node network as relays, providing market-based Sybil attack resistance through the Oxen blockchain. It supports web browsing, onion-routed real-time voice communications, and other applications without requiring specialized software or custom patches. Unlike Tor, Lokinet operates on the network layer, allowing it to onion-route any IP-based protocol, including TCP, UDP, and ICMP...
    Starting Price: Free
  • 13
    eScan

    eScan

    MicroWorld Technologies

    eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection...
    Starting Price: $58.95/one-time/user
  • 14
    X-VPN

    X-VPN

    Free Connected

    ... data. VPN split tunneling is a useful function that lets you totally control internet traffic transfer with or without the VPN tunnel. For instance, you can use X-VPN to watch Netflix while your local applications (such as bank app) connect to local internet bypassing the VPN tunnel. X-VPN deployed 8000+ VPN servers around the world, which can router your data packets to game servers directly, to stabilize the internet connection and reduce your ping.
  • 15
    FastestVPN

    FastestVPN

    FastestVPN

    ..., they want to ensure that every device they own stays protected. Fastest VPN software is compatible with all major devices, including Windows, Mac, iOS, Android, Fire TV, and more. Install VPN in router and get VPN protection on more than 20+ platforms. Are you traveling? Take local content with you. FastestVPN’s global network high-speed VPN servers let you access content no matter where you are in the world.
  • 16
    HideMyAss
    ...’s nothing you can’t access with HMA VPN. Turning on your VPN shouldn't be rocket science. Our simple, easy-to-understand UI ensures you'll be private in a few quick clicks. Install HMA VPN on as many Windows, macOS, iOS, Android, and Linux devices as you want, and keep multiple connected at once: 5 normally, or 10 with the Family Plan. You can even set HMA up on your router to cover your whole home.
  • 17
    ExpressVPN

    ExpressVPN

    ExpressVPN

    ..., Windows, Android, iOS, Linux, routers, and so much more. Defeat hackers and spies with best-in-class encryption and leakproofing. Access any content, no matter your location. Say goodbye to geo-blocks. Connect to any of our unlimited-bandwidth, ultra-fast VPN servers.
    Leader badge
    Starting Price: $6.67 per month
  • 18
    Certero for Enterprise ITAM
    ... ITAM has to offer. Discover and collect inventory data across all your platforms, from Windows desktops & servers to Linux and Unix, on-premises and in the cloud, as well as Android and iOS mobile devices. What’s more, you can also discover and inventory assets like printers, routers, infrastructure and much more. Includes Software Distribution, Patching, Reporting & can integrate with any Service Desk CMDB. Certero are fully ISO27001 Certified for Information Management Security peace of mind.
  • 19
    DropBear

    DropBear

    Matt Johnston

    Dropbear is a relatively small SSH server and client. It runs on a variety of Unix platforms. Dropbear is open-source software, distributed under an MIT-style license. Dropbear is particularly useful for "embedded"-type Linux (or other Unix) systems, such as wireless routers. If you want to be notified of new releases, or for general discussion of Dropbear, you can subscribe to the relatively low-volume mailing list. With a small memory footprint suitable for memory-constrained environments...
    Starting Price: Free
  • 20
    FastVPN

    FastVPN

    FastVPN

    Protect your devices from hackers with VPN. Available for Android, PC Windows, Apple (iPhone, iPad, and Mac), Router, and Linux. Shop and pay safely on public Wi-Fi without any worries. Keep your online activity secure from prying eyes. Stream content securely wherever you are. Securely access websites, apps, streaming platforms, and gaming sites. With FastVPN, all your Internet traffic is encrypted, protecting your private data on public Wi-Fi. We won’t track what you search for online...
    Starting Price: $5.88 per month
  • 21
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and...
    Starting Price: Free
  • 22
    Astrill VPN

    Astrill VPN

    Astrill VPN

    ... restrictions effortlessly, ensuring nothing stands between you and your goals. Astrill VPN works across all your devices—laptops, phones, routers—giving you ultimate freedom with up to five simultaneous connections. Wherever your journey takes you, Astrill VPN protects your data, empowers your adventures, and unlocks the full potential of the internet. With Astrill VPN, you’re not just online; you’re unstoppable. The internet is yours to explore, and Astrill VPN makes it extraordinary.
    Starting Price: $12.50/month
  • 23
    VerifyTool
    VerifyTool is a powerful tool developed in Go, designed for software developers, DevOps engineers, IT administrators and security experts to ensure the integrity of their files. With the increasing need for security and the importance of verifying the authenticity of the files, VerifyTool comes as a boon for these professionals. This tool performs two critical operations, namely, scan and compare. The scan operation analyzes the directory and generates a report that captures the essential...
    Starting Price: Free
  • 24
    Debricked

    Debricked

    Debricked

    Debricked's tool enables for increased use of Open Source while keeping associated risks at bay, making it possible to keep a high development speed while still staying secure. The service runs on state of the art machine learning, allowing the data quality to be outstanding as well as instantly updated. High precision (over 90% in supported languages) in combination with flawless UX and scalable automation features makes Debricked one of a kind and the way to go for open source...
    Starting Price: Free
  • 25
    Angry IP Scanner

    Angry IP Scanner

    Angry IP Scanner

    Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has additional...
    Starting Price: Free
  • 26
    MANTA

    MANTA

    Manta

    Manta is the world-class automated approach to visualize, optimize, and modernize how data moves through your organization through code-level lineage. By automatically scanning your data environment with the power of 50+ out-of-the-box scanners, Manta builds a powerful map of all data pipelines to drive efficiency and productivity. Visit manta.io to learn more. With Manta platform, you can make your data a truly enterprise-wide asset, bridge the understanding gap, enable self...
  • 27
    Saint Security Suite

    Saint Security Suite

    Carson & SAINT

    This single, fully integrated solution conducts active, passive and agent-based assessments while its extensive flexibility evaluates risk according to each business. SAINT’s impressive, flexible and scalable scanning capabilities set it apart from many others in this space. SAINT has partnered with AWS, allowing its customers to take advantage of AWS’s efficient scanning. Should subscribers prefer, SAINT also offers a Windows scanning agent. Security teams can schedule scans easily, configure...
    Starting Price: $1500.00/year/user
  • 28
    REVE Antivirus

    REVE Antivirus

    REVE Antivirus

    REVE Endpoint security provides robust network security solution for precise malware detection through device and application control. Facilitates remote installation, updating and scanning of all individual endpoint PCs. REVE EPS provides a flexible licensing solution due to which no. of protected endpoints can be scaled up as per the requirements anytime with zero license management efforts. Provides advanced security for all your endpoints, which are the Launchpad of malware attacks. Machine...
    Starting Price: $19 per year
  • 29
    Syxsense

    Syxsense

    Syxsense

    ... of patches and vulnerabilities. With our robust automation and orchestration engine, Syxsense Cortex™, automate foundational processes like patch scanning, patch deployment, vulnerability scanning, and vulnerability remediation. Free up staff resources to focus on critical projects and strategic initiatives.
  • 30
    Enginsight

    Enginsight

    Enginsight

    Enginsight is an all-in-one cybersecurity platform made in Germany, combining threat detection and defense capabilities. The features are: Automated security checks, pentesting, IDS/IPS, micro segmentation, vulnerability scans, and risk assessments. It empowers businesses of all sizes to effortlessly implement and monitor robust security strategies through an intuitive interface. Scan your systems automatically and immediately recognize the security status of your IT infrastructure...
    Starting Price: $12.99 per month
  • Previous
  • You're on page 1
  • 2
  • Next