Suggested Categories:

P&C Insurance Software
Property and casualty insurance software is designed to streamline the way insurance companies manage risks, process claims, and provide accurate customer service. It typically includes features such as policy management, billing automation, and analytics functions to help companies optimize their operations. The software is an important tool for insurers looking to increase efficiency and improve customer experience.
Customer-to-Customer (C2C) Community Marketing Software
Customer-to-customer (C2C) community marketing software is a tool designed to facilitate and manage online platforms where customers can interact and share information about products or services. It provides features such as discussion forums, review systems, and social media integration to enable users to exchange experiences and recommendations. The software often includes moderation and analytics tools to manage content and monitor community engagement. Its purpose is to create a space for authentic customer interactions, helping brands build trust and loyalty through peer-to-peer communication. C2C community marketing software supports the growth of customer-driven communities by enhancing user engagement and connection.
B2C Marketplaces
B2C marketplaces are online platforms that connect businesses directly with consumers to facilitate the buying and selling of goods and services. These marketplaces provide a centralized space for various businesses to list their products or services, allowing consumers to browse, compare, and make purchases from multiple sellers in one location. B2C marketplaces typically handle transactions, payment processing, and sometimes fulfillment, offering consumers a seamless shopping experience. Examples of B2C marketplaces include ecommerce giants and niche platforms, ranging from general consumer goods to specialized products. These platforms benefit businesses by expanding their reach, while consumers enjoy a broad selection of products, competitive pricing, and convenience.
Voice of the Customer (VoC) Software
Voice of the customer software provides businesses with the ability to capture customer feedback in a number of different formats.
Cyber Supply Chain Risk Management (C-SCRM) Software
Cyber Supply Chain Risk Management (C-SCRM) platforms are software solutions designed to help organizations identify, assess, and mitigate cyber risks within their supply chains. These platforms provide tools to monitor and analyze the cybersecurity posture of suppliers, partners, and third-party vendors, ensuring that all links in the supply chain meet security standards. C-SCRM platforms typically include features like risk assessments, real-time threat monitoring, vendor risk management, and compliance tracking.
Convenience Store Software
Convenience store software allows convenience store and bodega owners to improve the process of managing customers, employees, inventory, ordering, and financial operations.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
Order-to-Cash Software
Order-to-cash (O2C) software enables companies to handle all processes related to sales including receiving an order, receiving payment, onboarding the customer, running a credit risk assessment, and more. Order-to-cash software is also known as quote-to-cash or lead-to-cash software.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
Chemical Software
Chemical software is designed to manage, track, and analyze chemical inventories, processes, and safety data within various industries. It allows users to monitor chemical quantities, storage conditions, hazard classifications, and regulatory compliance in real-time, ensuring safe and efficient handling. With integrated features like Material Safety Data Sheets (MSDS) and automated compliance checks, the software helps organizations meet regulatory standards and reduce risks. It streamlines data entry, automates alerts for stock or safety issues, and supports complex chemical analyses and modeling. Chemical software is essential in fields such as pharmaceuticals, manufacturing, research, and education, where precise chemical management is critical for both safety and operational success.
Insurance Software
Insurance software is software used by insurance carriers, insurance agents, insurance brokerages, and insurance professionals. Insurance software is specifically designed for the insurance industry and can perform a wide variety of tasks and processes including insurance agency management, insurance rating, insurance policy management, and much more.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
CDN Providers
CDN providers offer content delivery network (CDN) services to websites. CDNs are geographically distributed server networks designed to improve website performance, reduce load times and optimize virtual content and media delivery.
Continuing Education Software
Continuing education software provides a learning management system (LMS) designed for continuous education, and tools to streamline the tracking and management of post-secondary continuing education programs and credits.
Embedded Software Development Tools
Embedded software development tools are used to write, compile, debug and deploy applications for embedded systems. These tools consist of a range of editors, compilers, debuggers and programming languages specifically designed for embedded computing. Most development tools are provided by embedded system vendors or third-party providers. There is also a variety of open-source and free tools available from various online sources. Embedded software development tools are an essential part of the embedded design process and allow developers to create efficient and reliable software designs for their projects.
TDS Software
TDS software provides tax, accounting, and billing tools for businesses that have to deal with TDS (Tax Deducted at Source), which is a form of tax deducted at the point of sale.
Product Compliance Software
Product compliance software enables organizations to manage regulatory and compliance processes associated with products, supply chain, manufacturing, quality, safety, packaging, and more. Product compliance software is essential for companies that want to comply with regulations that apply to their current product offerings and new product launches. Different industries and markets have various regulations that are constantly changing, and product compliance software ensures the ability to comply and stay up to date with regulatory changes.
Fund Accounting Software
Fund accounting software allows organizations to manage project funding and spending amounts in order to generate reports that ensure their validity.
PACS Software
PACS (Picture Archiving and Communication System) software that enables medical professionals manage, store, retrieve, and display medical images, such as X-rays, MRIs, and CT scans, in a digital format. It replaces traditional film-based systems, allowing healthcare providers to access and share images quickly and securely across different locations. PACS software typically integrates with other healthcare systems, such as Electronic Health Records (EHR) and Radiology Information Systems (RIS), to provide a comprehensive solution for medical imaging. Key features include secure storage, image viewing, diagnostic tools, and the ability to collaborate with other medical professionals remotely. PACS software plays a crucial role in improving workflow efficiency, reducing costs, and enhancing the quality of care in healthcare settings.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
  • 1
    c/side

    c/side

    c/side

    cside is the leading client-side intelligence platform. Protecting organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. Leveraging client-side intelligence to provide evidence to fight chargeback fraud cases. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments....
    Leader badge
    Starting Price: $99 per month
    Partner badge
    View Software
    Visit Website
  • 2
    Quin-C

    Quin-C

    AccessData

    ...Feature-rich and easy to use, Quin-C delivers groundbreaking technology to maximize the output of investigative, forensic, IT and legal teams alike. In combination with AccessData core products, Quin-C is the fastest, most scalable solution on the market today. Quin-C dramatically improves efficiency and throughput with next-generation features that guide current and future investigations.
  • 3
    EverC

    EverC

    EverC

    ...At EverC, our goal is to power growth for the online business ecosystem by making the Internet a more transparent and trusted place for ecommerce.
  • 4
    C9Phish

    C9Phish

    C9Lab

    C9Phish by C9Lab is a comprehensive phishing simulation and training platform designed to help organizations identify, measure, and reduce cybersecurity risks related to phishing attacks. By simulating real-world phishing attempts, C9Phish enables companies to test employee awareness, pinpoint vulnerabilities, and strengthen their overall security posture.
  • 5
    Massdriver

    Massdriver

    Massdriver

    ...No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.
    Starting Price: Free trial
  • 6
    Aikido Security

    Aikido Security

    Aikido Security

    ...Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Starting Price: Free
  • 7
    C-Prot Fraud Prevention
    C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and through mobile and web channels. It offers various integration methods, including cloud-based or on-premises, to cater to different needs. With C-Prot Fraud Prevention, businesses can enhance their security measures and safeguard their assets from fraudulent attempts.
    Starting Price: Free
  • 8
    C&W Business DRaaS
    Most Disaster Recovery as a Service products enable companies to restore critical business functions during failures in their information technology solutions. Not C&W’s. Much more than enabling clients to simply restore their technological infrastructure, C&W has developed a series of INTEGRATED SOLUTIONS that enable clients to automate and orchestrate all of their production environments in combination with their disaster recovery. With C&W’s solutions, all the repetitive activities, monitoring, alarms, DR tests, and much more can be programmed to execute automatically, on specific dates, and/or on command with a click of a mouse button. ...
  • 9
    C-Prot Threat Intelligence Portal
    C-Prot Threat Intelligence Portal is a powerful web service for providing access to information about cyber threats. C-Prot Threat Intelligence Portal offers the possibility to check different types of suspicious threat indicators such as files, file signatures, IP addresses, or web addresses. In this way, institutions are informed about potential threats and can take necessary precautions.
    Starting Price: Free
  • 10
    C-Prot Device Fingerprint
    C-Prot Device Fingerprint is a solution developed to securely identify users and analyze web traffic on websites. This solution aims to provide high-level security and enhance user experience by uniquely identifying users. Combine security and advanced analytics in your industry, identify users with C-Prot Device Fingerprint, analyze their behaviors, and prevent fraud by providing top-level security in your organization.
    Starting Price: Free
  • 11
    Fugue

    Fugue

    Fugue

    ...View the results of security and compliance checks on IaC across your organization. Access and export tenant-wide, IaC-specific security and compliance reports.
  • 12
    C-Prot Endpoint Security
    C-Prot Endpoint Security protects computers, servers, and mobile devices in your organization against risks from viruses, trojans, worms, and ransomware. It provides comprehensive protection by detecting spyware, viruses, and other malicious applications on mobile devices in your organization. It prevents your employees from clicking on harmful e-mails and ensures protection against phishing attacks.
    Starting Price: Free
  • 13
    C2 Password

    C2 Password

    Synology C2

    ...Automatically generate and securely store passwords to simplify credential management across all your devices. Check the strength of passwords as you create them or let C2 Password generate complex combinations of letters, numbers, and symbols for you. Always have your credentials on hand when you need them, no matter what device you're using. Add items on one device and access them from anywhere through handy mobile apps, convenient browser extensions, or the C2 Password website. Easily share passwords and other items with family members, friends, and colleagues by inviting them to a shared vault via email. ...
    Starting Price: $4.99 per year
  • 14
    C3M Cloud Control
    ...Manage identity privilege across your cloud and avoid compromised credentials and insider threats. Gain enhanced visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.
  • 15
    PwC Detection and Monitoring Hub
    Detection and Monitoring Hub, a PwC Product, builds on the investments you have already made and identifies compliance insights, such as fraud and corruption, quickly while learning from the results of your monitoring. Target high-risk activities in rapidly changing markets and better allocate your resources accordingly through the application of advanced analytics and machine learning.
  • 16
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts access control models into configuration files based on the PERM metamodel, allowing developers to switch or upgrade authorization mechanisms by simply modifying configurations. ...
    Starting Price: Free
  • 17
    PlatinumCache
    DTS PlatinumCache C4 is a caching system developed by Data Transmission System Incorporation. DTS PlatinumCache C4 is a solution for the storage bottleneck problems. DTS PlatinumCache C4 is basically a caching system supporting Write-Back, Write-Through, Write-Only and Pre-fetching policies. The system uses RAMDISK as its cache. In android we used SD card as our target drive.
    Starting Price: $6 one-time payment
  • 18
    C2 Identity

    C2 Identity

    Synology C2

    ...Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 19
    Cycode

    Cycode

    Cycode

    ...Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 20
    Comodo cWatch

    Comodo cWatch

    Comodo Group

    The CSOC provides 24/7 security monitoring by certified security analysts and uses state-of-the-art technology. Analysts at the CSOC identify and analyze threats, provide alerting when appropriate to engage clients in resolution and to assist in mitigation. Comodo cWatch CSOC extends your internal IT team's capacity to protect your applications with advanced security solutions that are easy to implement, fully managed and do not require large upfront investments. It is designed to absorb the time-consuming and complex security incident investigation process while offloading the high costs of in-house security staff. ...
    Starting Price: $9.90
  • 21
    iLock Security Services
    Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure....
  • 22
    Revenera Usage Intelligence
    ...Technical and environment data gives insights for Development teams trying to plan for infrastructure and support requirements. Usage Intelligence, the first software usage analytics solution designed for distributed C/C++, .NET, Obj-C and native Java applications on Windows, Macintosh, and Linux, provides deep insight into application usage. See which features are used most and least.
  • 23
    Maltiverse

    Maltiverse

    Maltiverse

    ...When you have a cyber security incident and you need context to respond - you can access the database and search for the content manually. You can also connect the customized set of new threats to your Security Systems like SIEM, SOAR, PROXY or Firewall: Ransomware, C&C centers, malicious IP and URLs, Phishing Attacks, Other feeds.
    Starting Price: $100 per month
  • 24
    Authsignal

    Authsignal

    Authsignal

    Authsignal is a B2C consumer authentication and identity platform. Built to enable enterprise and mid-market business product and engineering teams the rapid capabilities to deploy omnichannel authentication and verification flows. Engineered to drop into existing architecture, Authsignal delivers the world's fastest path to uplifting and implementing passkeys and risk-based multi-factor authentication (MFA) flows without the need to overhaul your current identity stack, with seamless integrations for best-in-class identity platforms, such as AWS Cognito, KeyCloak, Azure AD B2C, and IdentityServer, Integration has never been this fast. ...
    Starting Price: $349 USD Per Month
  • 25
    EaseFilter

    EaseFilter

    EaseFilter Technologies

    ...Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.
    Starting Price: $1500
  • 26
    WatchGuard Passport

    WatchGuard Passport

    WatchGuard Technologies

    ...Protect users on the Internet, block phishing attempts and enforce web policy anywhere, anytime without requiring a VPN. Respond by detecting and killing malware and threats while containing ransomware and related C&C channels. WatchGuard’s endpoint security platform delivers maximum protection with minimal complexity to take the guesswork out of endpoint security.
  • 27
    Gomboc

    Gomboc

    Gomboc

    ...Maintain your cloud environment through one platform that continuously ensures compliance and security. Security teams can decide on security policies and Gomboc produces the IaC for DevOps to approve. All manual IaC is reviewed by Gomboc inside the CI/CD pipeline to ensure there is no configuration drift. Never fall out of compliance again. Gomboc does not require you to lock your cloud-native architectures into a pre-defined platform or cloud service provider. We're built to operate with all major cloud providers with all major infrastructure-as-code tools. ...
  • 28
    DX360

    DX360

    NetImpact Strategies

    ...We simplify IT security compliance in the government sector by delivering comprehensive solutions aligned with laws, regulations, and mandates such as FISMA, FedRAMP, NIST 800-83, CIRCIA, and C-SCRM. By leveraging DX360, agencies can take full control of their cyber risk management, ensuring the protection of their IT portfolio.
  • 29
    RunSafe Security

    RunSafe Security

    RunSafe Security

    RunSafe Security protects embedded software across critical infrastructure, delivering automated vulnerability identification and software hardening from build-time to runtime to defend the software supply chain and critical systems without compromising performance or requiring code rewrites. The RunSafe Security Platform includes the authoritative build-time SBOM generator for embedded systems and C/C++ projects, automated vulnerability identification and risk quantification, patented memory relocation techniques to mitigate memory-based vulnerabilities, and pre-hardened open-source packages and containers for immediate protection. RunSafe Security’s customers span the aerospace and defense, energy, operational technology, industrial automation, transportation and automotive, medical device, and high-tech manufacturing verticals.
  • 30
    IBM Cloud Data Shield
    ...IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next