Suggested Categories:

Word Processors
Word processors are software applications that allow users to create, edit, and format written documents. They offer a variety of tools and features, such as spell check, font styles, and page layout options. Word processors are commonly used for tasks such as writing essays, creating business reports, or composing emails. They can also save documents in various file formats for easy sharing and printing. Overall, word processors provide a user-friendly platform for creating and managing written content.
WordPress Management Software
WordPress management software provides WordPress websites and WordPress website managers with tools built specifically to manage and improve WordPress websites.
Office Suites
Office suites are comprehensive software packages that provide a range of productivity tools designed to help users create, manage, and collaborate on documents, spreadsheets, presentations, and other business-related tasks. These suites typically include word processors, spreadsheet applications, presentation tools, email clients, and sometimes databases or note-taking applications. Office suites are used by individuals and organizations alike to streamline work processes, improve communication, and enhance overall productivity. With features like cloud storage, real-time collaboration, and cross-device compatibility, modern office suites are essential tools for both personal and professional use, enabling efficient document management and team collaboration.
Mail Merge Software
Mail merge software is a tool that enables users to create personalized bulk communications, such as letters, emails, or labels, by merging data from a database, spreadsheet, or other data sources. This software allows users to automate the process of sending customized content to large groups, saving time and reducing errors. Key features often include the ability to create dynamic templates, import data from various file formats, and customize fields to personalize each communication. Mail merge software is commonly used for marketing campaigns, customer outreach, and administrative tasks like sending invoices or reminders. By streamlining the process of personalization and mass communication, it helps businesses improve efficiency and engagement.
Keyword Research Tools
Keyword research tools are very useful for SEO professionals, bloggers, ecommerce retailers, content creators, and more. Keyword research tools let you research keywords that are trending, popular, or that your competitors are having success with so that you can create content around and optimize for these keywords.
Speech to Text Software
Speech-to-text software is software that converts spoken language into written text, allowing users to dictate instead of typing. These platforms typically use speech recognition algorithms and natural language processing (NLP) to transcribe spoken words into accurate text in real time. Speech-to-text software is commonly used in various industries for tasks such as transcription, note-taking, dictation, and accessibility. It can be integrated with other tools like word processors, customer service software, and medical or legal documentation systems. Many of these tools also offer features like punctuation insertion, voice commands, speaker identification, and multi-language support to enhance transcription accuracy and productivity.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
OCR Software
OCR (Optical Character Recognition) software is software that converts different types of documents—such as scanned paper documents, PDFs, or images—into editable and searchable text. OCR software analyzes the shapes of characters in the document and translates them into machine-readable data. This technology is particularly useful for digitizing printed documents, allowing businesses and individuals to archive, edit, and search through physical content more efficiently. By using OCR software, organizations can save time, reduce errors, and improve document accessibility while making information easier to manipulate and manage.
  • 1
    IceWarp

    IceWarp

    IceWarp

    The only office rule is, there is no office. Business email, TeamChat for project teamwork, real-time office document collaboration and online meetings. All in our secure cloud and for half the usual cost. Chat in teams organized around projects, upload files, mention coworkers, comment on posted emails, pin important posts. Integration with email enables sharing received messages directly to TeamChat room for colleagues‘ attention. Skyrocket your office work effectivity with Desktop Client...
    Starting Price: $312.00/year/user
  • 2
    WP Sandbox

    WP Sandbox

    WP Sandbox

    Let your customers try your WordPress solutions in a customized sandbox before they buy. Front-end and back-end, fully customizable. Perfect for WordPress developers, designers, & agencies who want to let clients explore fully-functioning backend demos of their work. We’re loved by customer support teams who need to quickly diagnose issues and share their findings with the rest of the team with a simple reusable link. Give your customers access to full WordPress sandbox demo sites — pre...
    Starting Price: $49 per month
  • 3
    iThemes Security Pro
    WordPress currently powers over 40% of all websites, so it has become an easy target for hackers with malicious intent. iThemes Security Pro takes the guesswork out of WordPress security to make it easy to secure & protect your WordPress website. This year alone, grim statistics point to the urgent need for website owners to take active security measures to defend their sites against cyberattacks. Almost half of all website owners say they don’t have solid security measures in place to defend...
    Starting Price: $52 per site per year
  • 4
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    Quick License Manager (QLM) is a license protection framework that creates professional and secure license keys to protect your software against piracy. Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your...
    Leader badge
    Starting Price: $200 one-time payment
  • 5
    Loginizer

    Loginizer

    Loginizer

    Loginizer aims at securing your WordPress websites from all attacks. We at Loginizer believe that security is the most important aspect for a website and it should be easy to secure a website for any website owner, hence we work round the clock to craft features that help you achieve that without having to constantly monitor your site. We are constantly woking hard to add more features and think of ways to protect your site from brute-force attacks. All differences of WordPress Core...
    Starting Price: $24 per year
  • 6
    WP Guardian

    WP Guardian

    WP Guardian

    Keep your entire WordPress fleet up-to-date and protected. Embrace proactive security to maintain control and visibility over the status of both sites and servers, all in one place. Stay ahead of WordPress threats with continuous vulnerability monitoring and effective mitigation strategies. Gain control over the security state for all WordPress sites. Scan connected servers, and identify & report vulnerabilities to keep your infrastructure secure. Manual & auto-updates, virtual patches...
    Starting Price: $5 per month
  • 7
    Quantum Armor

    Quantum Armor

    Silent Breach

    Your attack surface is the sum of every attack vector that can be used to breach your perimeter defenses. In other words, it is the total quantity of information you are exposing to the outside world. Typically, the larger the attack surface, the more opportunities hackers will have to find a weak link which they can then exploit to breach your network. Professional hackers typically follow the cyber kill chain when attacking a target, and surveying the target's attack surface is normally...
    Starting Price: From $49/asset/month
  • 8
    MalCare

    MalCare

    MalCare

    Instant WordPress malware removal at 25% of the industry cost. Detects complex malware other plugins frequently miss. With it’s smart “Cloud Scan”, MalCare’s malware scanner will never impact your website performance nor overload your server. Ever. Clean your malware in less than 60 seconds. Our safe malware removal technology ensures that your website never breaks. MalCare comes with an inbuilt smart and powerful Firewall for real-time protection from Hackers and bots. It is the simplest Word...
    Starting Price: $99 per year
  • 9
    Wordfence

    Wordfence

    Defiant

    Wordfence includes an endpoint firewall and malware scanner that were built from the ground up to protect WordPress. Our Threat Defense Feed arms Wordfence with the newest firewall rules, malware signatures and malicious IP addresses it needs to keep your website safe. Rounded out by a suite of additional features, Wordfence is the most comprehensive security option available. Wordfence runs at the endpoint, your server, providing better protection than cloud alternatives. Cloud firewalls...
    Starting Price: $99 per year
  • 10
    Cerber Security

    Cerber Security

    Cerber Tech

    Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design. A set of specialized request inspection algorithms screen incoming requests for malicious code patterns and traffic anomalies. Bot detection engine identifies and mitigates automated attacks. Mitigates brute force and code injection attacks. Restricts access with GEO country rules. Prevents both REST API and ordinary user enumerations. Restricts access to REST API...
  • 11
    Originality.AI

    Originality.AI

    Originality.AI

    Your needs, as a serious web publisher, for a plagiarism checking and AI detection tool are unique. Yet, all the existing plagiarism checking tools are built with Academia in mind. Originality.AI is built by a team of content marketing and GPT-4 AI experts that deeply understands your needs and includes features like Team Management (no more sharing your login), Auto-Billing, Scan History by User and most importantly an AI Writing Detection tool. You can now have all your content scanned...
    Leader badge
    Starting Price: $0.01 per 100 words
  • 12
    Gumlet

    Gumlet

    Gumlet

    Host, secure, and stream videos in minutes with Gumlet Video. Build custom video processing and delivery with Gumlet Video API. Optimize and deliver images at scale with Gumlet Image. Trusted by 10,000+ businesses, Gumlet handles 1.5B media files daily with a 54% optimization rate. Gumlet Video: Streamline Video Delivery 1. Simplify video streaming with minimal coding. 2. Achieve high compression without quality loss. 3. Manage videos on a unified platform. 4. Automate via APIs,...
    Leader badge
    Starting Price: $10 / month
  • 13
    SentryLogin

    SentryLogin

    Sentry Login

    Since 2001 Sentry has been the #1 Member System for Squarespace, Weebly, WordPress and more. Easy to install paywall and password protection for Weebly, Squarespace, Yola, Blogger, WordPress and more. Sentry is easy: it was created with non-programmers in mind. All login form and protection code is provided so all you have to do is Copy, Paste, and Publish. The built-in Sentry Integration Wizard guides you in setting up your subscription plans and takes you through the installation, too. Sentry...
    Starting Price: $4.95 per month
  • 14
    Patchstack

    Patchstack

    Patchstack

    Patchstack is a comprehensive security solution designed to protect WordPress websites from vulnerabilities in plugins, themes, and the core platform. By automatically deploying highly targeted virtual patches, it mitigates high and medium-priority vulnerabilities without altering your site's code or performance. As the world's largest vulnerability discloser, Patchstack has issued over 9,100 virtual patches, safeguarding users up to 48 hours before competitors. Its real-time detection...
    Starting Price: $89 per month
  • 15
    Smart Privacy

    Smart Privacy

    Smart Privacy

    ... well you are complying at anytime. Generate information about your level of compliance in Excel and PDF, Word format to use internally or to provide to Regulators.
  • 16
    ASGARD Management Center
    ... devices – or in other words: with literally any security device you may have in place. This short demo shows how easy it is to launch a scan with custom IOCs from a connected MISP. In the example we select all events with the keyword “Emotet”, add them to a new rule set and use that rule set in a new Group Scan with THOR.
  • 17
    BunkerWeb

    BunkerWeb

    Bunkerity

    BunkerWeb is a next-generation and open-source Web Application Firewall (WAF). Being a full-featured web server (based on NGINX under the hood), it will protect your web services to make them "secure by default". BunkerWeb integrates seamlessly into your existing environments (Linux, Docker, Swarm, Kubernetes, …) and is fully configurable (don't panic, there is an awesome web UI if you don't like the CLI) to meet your own use-cases . In other words, cybersecurity is no more a hassle...
  • 18
    Confidencial

    Confidencial

    Confidencial

    ... controls, allowing you to protect sensitive information in files and documents. Our patented technology lets you choose exactly what you need to protect and who can access it, down to the word, paragraph, or image inside of a file. Your data never leaves your infrastructure. We do not store your files or data, nor can we access it. Confidencial secures unstructured data across on-prem and multi-cloud environments.
  • 19
    Optelcon Global View
    ... and has saved companies hundreds of millions of dollars. We have never failed to save a client money and our average savings exceed 42%. They say, “you don’t know what you don’t know”. Our team has seen it all. In other words, we are the team you want on your side of the table when dealing with your carriers. Optelcon manages all aspects of our client’s mobility spend. Our experienced team knows how to achieve maximum savings.
  • 20
    Exceptionless

    Exceptionless

    Exceptionless

    Don't let your users walk away in frustration. Discover errors in your app you never knew were happening and use detailed error reports to squash them with ease. Make your app Exceptionless! What Is Exceptionless? The definition of the word exceptionless is: to be without exception. Our product provides real-time error, feature, and log reporting for your ASP.NET, Web API, WebForms, WPF, Console, and MVC apps. It organizes the gathered information into simple actionable data that will help...
  • 21
    CodeGuard

    CodeGuard

    CodeGuard

    Your one-stop solution for website protection. The fastest, most reliable website backup service, which tracks all of your changes daily. CodeGuard scales to your business and your client’s business needs. Provide peace of mind to your clients by using CodeGuard to backup and provide maintenance for their website. Malware Monitoring & Remediation, enterprise-grade, backups made easy, white-label interface, you determine billing, client access, one stop WordPress Management. Offer the security...
    Starting Price: $39 per month
  • 22
    Forcepoint WebShield

    Forcepoint WebShield

    Forcepoint WebShield

    ... of the entire network and allows users to carry out their missions with increased protection. Users surfing lower-level networks can be restricted to specific server and file types as defined by security policies. All requests, responses and transfers go through security controls, such as dirty word search, virus scan and malicious content checks. Forcepoint WebShield is an approved cross domain transfer solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline.
  • 23
    Intermedia Exchange Email

    Intermedia Exchange Email

    Intermedia Cloud Communications

    ... Magazine Editors' Choice Exchange Email with 99.999% SLA and J.D. Power-certified support. Microsoft 365 Apps (Word, Excel®, PowerPoint®, Outlook®). Comprehensive compliance and security capabilities including Archiving and Encryption. Customized deployment options for single tenant environments (500+ users). Expert migration and onboarding included free of charge. Email is the centerpiece, but it doesn’t stand alone.
  • 24
    Qintel CrossLink
    When users first open CrossLink they are met with the words “Know More.” This ethos powers CrossLink. How can we help everyone, be it a SOC analyst, an investigator, or an incident responder, tell a better story around their own data? Search results from six synergistic verticals of network and actor-centric data quickly provide key information that can be assembled and shared across an organization with the click of a button. CrossLink was designed to address the deficiencies in the current...
  • 25
    FortiSandbox
    ... software vulnerability is what is known as a zero-day attack aka 0-day attack, and before sandboxing there was no effective means to stop it. A malware sandbox, within the computer security context, is a system that confines the actions of an application, such as opening a Word document, to an isolated environment. Within this safe environment the sandbox analyzes the dynamic behavior of an object and its various application interactions in a pseudo-user environment and uncovers any malicious intent.
  • 26
    LoginID

    LoginID

    LoginID

    ... a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 27
    BreachQuest

    BreachQuest

    BreachQuest

    ... with compromised systems, while elevating your security posture for the future attacks. Inspired by the Latin word a priori, denoting an understanding of events conceived beforehand, our Priori Platform empowers organizations of all sizes and sectors with end-to-end incident readiness and response capabilities from high-powered tools and our elite-level, managed services.
  • 28
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF Dark...
    Starting Price: $5000
  • 29
    Siterack

    Siterack

    Siterack

    All of your websites are pinged every 60 seconds to make sure they are alive and well. If an error is reported back, Siterack assesses the problem and will send a note to let you know. Siterack automatically runs a daily backup of all your sites and securely stores them in our cloud. All backups are displayed in your site's Control Center so you can easily search for the one you need. Before each update, Siterack grabs a backup - just in case. Afterward, Siterack incrementally updates each...
    Starting Price: $19 per month
  • 30
    Cyqur

    Cyqur

    Binarii Labs

    You control where your passwords and seed phrases are secured via the Cyqur browser extension. Cyqur encrypts, fragments, and distributes your data wherever you want for unprecedented security. Although, it’s always you who owns and controls your data. By adding the proof of record from the blockchain, the security process is complete. Encrypted pieces are stored across multiple cloud providers so data is incomplete and useless if hacked. Multi-cloud data sovereignty, automated seed word...
    Starting Price: €15 one-time payment
  • Previous
  • You're on page 1
  • 2
  • Next