Suggested Categories:

P&C Insurance Software
Property and casualty insurance software is designed to streamline the way insurance companies manage risks, process claims, and provide accurate customer service. It typically includes features such as policy management, billing automation, and analytics functions to help companies optimize their operations. The software is an important tool for insurers looking to increase efficiency and improve customer experience.
B2C Marketplaces
B2C marketplaces are online platforms that connect businesses directly with consumers to facilitate the buying and selling of goods and services. These marketplaces provide a centralized space for various businesses to list their products or services, allowing consumers to browse, compare, and make purchases from multiple sellers in one location. B2C marketplaces typically handle transactions, payment processing, and sometimes fulfillment, offering consumers a seamless shopping experience. Examples of B2C marketplaces include ecommerce giants and niche platforms, ranging from general consumer goods to specialized products. These platforms benefit businesses by expanding their reach, while consumers enjoy a broad selection of products, competitive pricing, and convenience.
Voice of the Customer (VoC) Software
Voice of the customer software provides businesses with the ability to capture customer feedback in a number of different formats.
Customer-to-Customer (C2C) Community Marketing Software
Customer-to-customer (C2C) community marketing software is a tool designed to facilitate and manage online platforms where customers can interact and share information about products or services. It provides features such as discussion forums, review systems, and social media integration to enable users to exchange experiences and recommendations. The software often includes moderation and analytics tools to manage content and monitor community engagement. Its purpose is to create a space for authentic customer interactions, helping brands build trust and loyalty through peer-to-peer communication. C2C community marketing software supports the growth of customer-driven communities by enhancing user engagement and connection.
Cyber Supply Chain Risk Management (C-SCRM) Software
Cyber Supply Chain Risk Management (C-SCRM) platforms are software solutions designed to help organizations identify, assess, and mitigate cyber risks within their supply chains. These platforms provide tools to monitor and analyze the cybersecurity posture of suppliers, partners, and third-party vendors, ensuring that all links in the supply chain meet security standards. C-SCRM platforms typically include features like risk assessments, real-time threat monitoring, vendor risk management, and compliance tracking.
Convenience Store Software
Convenience store software allows convenience store and bodega owners to improve the process of managing customers, employees, inventory, ordering, and financial operations.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
Order-to-Cash Software
Order-to-cash (O2C) software enables companies to handle all processes related to sales including receiving an order, receiving payment, onboarding the customer, running a credit risk assessment, and more. Order-to-cash software is also known as quote-to-cash or lead-to-cash software.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Chemical Software
Chemical software is designed to manage, track, and analyze chemical inventories, processes, and safety data within various industries. It allows users to monitor chemical quantities, storage conditions, hazard classifications, and regulatory compliance in real-time, ensuring safe and efficient handling. With integrated features like Material Safety Data Sheets (MSDS) and automated compliance checks, the software helps organizations meet regulatory standards and reduce risks. It streamlines data entry, automates alerts for stock or safety issues, and supports complex chemical analyses and modeling. Chemical software is essential in fields such as pharmaceuticals, manufacturing, research, and education, where precise chemical management is critical for both safety and operational success.
Insurance Software
Insurance software is software used by insurance carriers, insurance agents, insurance brokerages, and insurance professionals. Insurance software is specifically designed for the insurance industry and can perform a wide variety of tasks and processes including insurance agency management, insurance rating, insurance policy management, and much more.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
CDN Providers
CDN providers offer content delivery network (CDN) services to websites. CDNs are geographically distributed server networks designed to improve website performance, reduce load times and optimize virtual content and media delivery.
PACS Software
PACS (Picture Archiving and Communication System) software that enables medical professionals manage, store, retrieve, and display medical images, such as X-rays, MRIs, and CT scans, in a digital format. It replaces traditional film-based systems, allowing healthcare providers to access and share images quickly and securely across different locations. PACS software typically integrates with other healthcare systems, such as Electronic Health Records (EHR) and Radiology Information Systems (RIS), to provide a comprehensive solution for medical imaging. Key features include secure storage, image viewing, diagnostic tools, and the ability to collaborate with other medical professionals remotely. PACS software plays a crucial role in improving workflow efficiency, reducing costs, and enhancing the quality of care in healthcare settings.
Fund Accounting Software
Fund accounting software allows organizations to manage project funding and spending amounts in order to generate reports that ensure their validity.
HMI Software
HMI software enables machine operators to effectively operate, monitor, and manage a machine or a system of machines. HMI is short for Human Machine Interface. HMI offers both machine-level or supervisory-level functionality, and the operation of HMI software is done by people using a GUI (Graphical User Interface). HMI software is designed to make machine processes less redundant, and more efficient.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
Continuing Education Software
Continuing education software provides a learning management system (LMS) designed for continuous education, and tools to streamline the tracking and management of post-secondary continuing education programs and credits.
Product Compliance Software
Product compliance software enables organizations to manage regulatory and compliance processes associated with products, supply chain, manufacturing, quality, safety, packaging, and more. Product compliance software is essential for companies that want to comply with regulations that apply to their current product offerings and new product launches. Different industries and markets have various regulations that are constantly changing, and product compliance software ensures the ability to comply and stay up to date with regulatory changes.
  • 1
    Aikido Security

    Aikido Security

    Aikido Security

    ... covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Starting Price: Free
    View Software
    Visit Website
  • 2
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    Quick License Manager (QLM) is a license protection framework that creates professional and secure license keys to protect your software against piracy. Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your...
    Leader badge
    Starting Price: $200 one-time payment
  • 3
    C2 Identity

    C2 Identity

    Synology C2

    ... Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 4
    EaseFilter

    EaseFilter

    EaseFilter Technologies

    Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.
    Starting Price: $1500
  • 5
    Revenera Usage Intelligence
    ... software applications doesn’t just provide a better foundation for Product Management decisions. Technical and environment data gives insights for Development teams trying to plan for infrastructure and support requirements. Usage Intelligence, the first software usage analytics solution designed for distributed C/C++, .NET, Obj-C and native Java applications on Windows, Macintosh, and Linux, provides deep insight into application usage. See which features are used most and least.
  • 6
    AhnLab TrusGuard
    The NGFW TrusGuard has been acknowledged by a through market assessment for its technology, performance and stability. The firewall, IPS, application control, VPN, C&C, Anti-Virus/Anti-Spam and DLP protect the business environment. TrusGuard has full lineup from the low-end to data center level models. Scales up to protect high-performance networks. Capable of handling growing network traffic, thanks to optimization for high-performance multicore environments. Ensures network stability...
  • 7
    Binary Ninja

    Binary Ninja

    Binary Ninja

    Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, and Linux. Disassemble executables and libraries from multiple formats, platforms, and architectures. Decompile code to C or BNIL for any supported architecture, including your own. Automate analysis with C++, Python, and Rust APIs from inside or outside the UI. Visualize control flow...
    Starting Price: $299 one-time payment
  • 8
    Polar Crypto Component
    Polar Crypto Component gives your Windows applications the functionality of unbreakable encryption. It enables you to build your own security systems instantly, or to easily integrate it into your existing systems, enhancing their security and performance. Polar Crypto features the latest encryption technology and includes full source code written in MS Visual C++ included. Polar Crypto is an ActiveX and DLL component which can be implemented whenever secure information, authenticity and data...
    Starting Price: $239.00/one-time/user
  • 9
    MATLAB

    MATLAB

    The MathWorks

    ..., then automatically generate a MATLAB program to reproduce or automate your work. Scale your analyses to run on clusters, GPUs, and clouds with only minor code changes. There’s no need to rewrite your code or learn big data programming and out-of-memory techniques. Automatically convert MATLAB algorithms to C/C++, HDL, and CUDA code to run on your embedded processor or FPGA/ASIC. MATLAB works with Simulink to support Model-Based Design.
  • 10
    RDS-Shield

    RDS-Shield

    Marty Soft Conception

    RDS-Shield is a standalone Windows Service managing a lot of server events, and an intuitive Administration interface. No need to install Java, update PHP, download MS C++ libraries or .NET. All is included and so powerful. Just download it, install it, and discover. Forget the complexity of GPO & AD. Simply say: Now, all users of this group are in the Highly secured user environment, but in this same group, this account will be in a Secured user session, while others will work in Kiosk Mode...
    Starting Price: $299 one-time payment
  • 11
    Avatier Identity Anywhere
    ... dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 12
    RMail

    RMail

    RPost

    ...-regulated information. These RMail services are generally applied to those messages where the sender needs functionality beyond standard email in terms of (a) easier to use and more automated email encryption for privacy compliance, (b) returning a verifiable proof record of who said what to whom by email, (c) assurance and peace of mind related to delivery and open status of important and time-deadline email, (d) need a timestamped proof of content delivered, (f) need to share large files securely.
    Starting Price: $7/month/user
  • 13
    CIAgent

    CIAgent

    SNMP Research

    ... actions based on threshold events and commands from management applications. In addition, a powerful subagent development kit for building custom extensions can also be purchased as an option. This intelligent agent supports SNMPv1, SNMPv2c, SNMPv3, and HTTP. CIAgent is optionally available as an SNMPv3-Only Edition that supports SNMPv3 and HTTP. This is a special version of CIAgent that has been hardened for use in network environments having the most stringent security requirements to protec
  • 14
    Vinchin Backup & Recovery
    Vinchin Backup & Recovery, a comprehensive next-generation backup solution self-developed by Vinchin, supports the world’s most mainstream virtual environments including VMware, Hyper-V, XenServer, XCP-ng, oVirt, RHV, Oracle OLVM, Sangfor HCl, OpenStack, Huawei FusionCompute(Xen Based), H3C CAS/UIS, ZStack, Proxmox, database including Oracle DB, MySQL, SQL Server, PostgreSQL, Postgres Pro, MariaDB, Windows and Linux physical machines, file shares/NAS, and supports cross-platforms recovery...
  • 15
    Armor Anywhere

    Armor Anywhere

    Armor Cloud Security

    ... prefer open source software and open frameworks, and cloud-native implementations freeing you from conventional provider lock-in. Our IaC-based continuous deployment model easily integrates into your existing DevOps pipeline, or we can manage the stack for you. We aim to empower your business by making security and compliance accessible, understandable, and easy to implement and maintain.
  • 16
    Cellebrite

    Cellebrite

    Cellebrite

    .... Review history in APFS Snapshots and Time Machine backups, display and search Spotlight metadata and KnowledgeC data, review network connections, recent documents, user activity, and more. Ingest data into Cellebrite Pathfinder, Berla, APOLLO and, ICAC tools such as Project Vic and PhotoDNA. Share your case findings with other stakeholders using customized reporting capabilities. The most complete workstation designed to handle the most rigorous datasets for digital intelligence and eDiscovery.
  • 17
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    ..., JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
  • 18
    RST Cloud

    RST Cloud

    RST Cloud

    RST Threat Feed, RST Report Hub, RST Noise Control, RST IoC Lookup, RST Whois API are a subscription-based services delivered by RST Cloud. RST Cloud collects actual knowledge about threats from all the available public TI sources. Normalise, filter, enrich and score it and gives it to your SOC and SecOps team, or directly put to your security solutions in ready-to-use format. RST Cloud includes: - Intelligence data from more than 250 sources and more than 250 000 indicators each day...
    Starting Price: $50/month
  • 19
    NdSecure

    NdSecure

    Ndende Technologies

    ... frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • 20
    GoAccess

    GoAccess

    GoAccess

    ... and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.
    Starting Price: Free
  • 21
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto...
  • 22
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program...
    Starting Price: $5,249 per year
  • 23
    Snyk

    Snyk

    Snyk

    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk’s Developer Security Platform automatically...
    Starting Price: $0
  • Previous
  • You're on page 1
  • Next