Results for: object detection - Page 5

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
Ad Fraud Detection Software
Ad fraud detection software identifies and prevents fraudulent activities within digital advertising campaigns, protecting advertisers from wasted spend and ensuring ad effectiveness.
VPN & Proxy Detection Software
VPN and proxy detection tools are software applications designed to identify the use of virtual private networks (VPN) and proxy services.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
View more categories (20) for "object detection"

188 Products for "object detection" with 1 filter applied:

  • 1
    LevaData

    LevaData

    LevaData

    Artificial Intelligence company that powers the smartest supply chains in the world. Our Cognitive Supply Management platform analyzes your procurement objectives alongside real-time market activity to generate predictions and customized recommendations. The AI-powered system is on a constant search for opportunities to reduce costs and mitigate risk, with built-in tools for quick collaboration and decisive action. See your exposure across suppliers, parts and products. It’s everything you need to detect risk, evaluate options and take action. ...
  • 2
    SynergyBackup

    SynergyBackup

    Cloud Synergy

    Ransomware is a growing threat to the security of our data, with damages costing billions each year. SynergyBackup keeps your files safe by scanning and not backing up files detected to be compromised by ransomware. Keep as many file versions as you need to meet your continuity objectives. There are no limits to the number of versions you can backup with SynergyBackup. SynergyBackup gives you the ability to encrypt your files with strong AES-256 bit encryption. Encrypt your file names as well to ensure maximum privacy of your data. ...
  • 3
    Powertech SIEM Agent for IBM i
    ...Monitor security-related events from the network, operating system, and any journal or message queue in real-time, including changes to user profiles and system values, invalid login attempts, intrusion detections, and changed or deleted objects. Maintain awareness of every security event on your system in real-time so you never miss a potential security breach. Powertech SIEM Agent for IBM i will provide alerts to ensure critical issues are escalated.
  • 4
    Deepfactor

    Deepfactor

    Deepfactor

    ...Deepfactor generates prioritized insights that enable developers to pinpoint insecure code, streamline remediation, analyze drift between releases, and understand potential impact to compliance objectives.
  • 5
    Helin Remote CCTV Manager
    ...Define who can or can’t watch and download videos with user roles. Create automatic alerts based on events in the video stream using our numerous native analytics features. Detect people and objects and integrate them with your machines and equipment.
  • 6
    Lattice for Command & Control
    ...It autonomously parses data from thousands of sensors & data sources into an intelligent common operating picture in a single pane of glass. Lattice uses technologies like sensor fusion, computer vision, edge computing, and machine learning, and artificial intelligence to detect, track, and classify every object of interest in an operator's vicinity. Lattice can scale to integrate thousands of sensors and effectors globally across multiple domains.
  • 7
    Cloudflare Vectorize
    ...Vectorize is a globally distributed vector database that enables you to build full-stack, AI-powered applications with Cloudflare Workers AI. Vectorize makes querying embeddings, representations of values or objects like text, images, and audio that are designed to be consumed by machine learning models and semantic search algorithms, faster, easier, and more affordable. Search, similarity, recommendation, classification & anomaly detection based on your own data. Improved results & faster search. String, number & boolean types are supported.
  • 8
    Group-IB Business Email Protection
    ...As cyberattacks become increasingly sophisticated, your organization needs to implement email security best practices for protecting email accounts and preventing damaging data breaches, financial losses, and legal risks. Group-IB Business Email Protection leverages patented technologies and industry-leading threat intelligence to detect, block, and analyze all email-borne attacks, from spam and phishing attempts to malware delivery and business email compromise (BEC) attacks. Recursively analyze suspicious URLs, attachments, and objects.
  • 9
    WithoutBG

    WithoutBG

    WithoutBG

    WithoutBG is an AI-powered image background removal API designed to deliver premium-quality cutouts with exceptional speed and affordability. Utilizing advanced transformer architectures combined with convolutional neural networks, the API ensures precise object detection and accurate background separation, catering to a wide range of applications from e-commerce product images to professional portraits. The service operates on specialized AWS Inferentia hardware, enabling sub-second processing times for high-volume requests without compromising quality. Users can start with 50 free credits upon registration, with pricing plans starting at €0.05 per image, approximately 50% less than competitors. ...
    Starting Price: €10 per month
  • 10
    Moondream

    Moondream

    Moondream

    ...Both models support quantization formats like fp16, int8, and int4, allowing for reduced memory usage without significant performance loss. Moondream's capabilities include generating detailed image captions, answering visual queries, performing object detection, and pinpointing specific items within images. Its design emphasizes versatility and accessibility, enabling deployment across a wide range of platforms. ​
    Starting Price: Free
  • 11
    piXserve

    piXserve

    piXlogic

    piXserve™ is an enterprise class application that automatically creates a searchable index of visual content in media files. piXserve scans digital images and videos, stores searchable descriptions of its contents, and assigns keywords to things it recognizes. piXserve can detect and recognize individual faces, objects, scenes, and text strings in a variety of languages. You can put piXserve to work on your archived media and on your live video sources. Use piXserve to help you discover, flag, and keep track of content. Let piXserve help you discover relationships between content from different sources and different types. ...
  • 12
    SentiVeillance SDK

    SentiVeillance SDK

    Neurotechnology

    SentiVeillance SDK is designed for developing software that performs biometric face identification, detects moving pedestrians or vehicles or other objects and performs automatic license plate recognition using live video streams from digital surveillance cameras. The SDK is used for passive identification – when passers-by do not make any efforts to be recognized. List of possible uses includes law enforcement, security, attendance control, visitor counting, traffic monitoring and other commercial applications. ...
  • 13
    Phase One Geospatial
    ...Effortless execution of photogrammetry mapping missions, capturing high-resolution images for 2D and 3D mapping. Achieve large surface coverage at extremely high resolution for accurate inspection of the objects as well as the surrounding areas. Get millimeter-sized damage spotting detection, fast repair, increased performance, and low environmental impact with Phase One drone solutions and cameras specially designed for drones. Phase One aerial cameras and solutions are designed exclusively for geospatial and industrial imaging. Developed with leading experts in the field, the medium format and large format cameras offer the world’s best image quality, high resolution, dynamic range, color fidelity and geometric accuracy.
  • 14
    Ashampoo Photo Optimizer
    ...Taking shots of buildings often leads to unpleasant, and easily noticeable, perspective distortions, due to the position of the photographer. Buildings and other tall objects almost seem to fall over, putting an unintended comical spin on your photos. Enter Photo Optimizer 8's new perspective correction! Fix horizontal or vertical distortions in just a few clicks and save shots!
    Starting Price: $29.99
  • 15
    PatPat360

    PatPat360

    PatPat360

    ...Different types of praise and rewards to establish a culture of feedback and recognition that makes talent shine and evolve. A set of modular features that empowers leaders to define challenging objectives, manage evaluations, and allocate rewards. Organizational Network Analysis to detect informal leaders, strengthen successful informal networks, and leverage on cooperation. Continuous data gathering and powerful algorithms on metadata to inform and support the decision-making process with meaningful insights. Alignment on shared priorities and transparency increase employee engagement, cooperation, and trust. ...
    Starting Price: $1.5 per user per month
  • 16
    NVIDIA DIGITS

    NVIDIA DIGITS

    NVIDIA DIGITS

    The NVIDIA Deep Learning GPU Training System (DIGITS) puts the power of deep learning into the hands of engineers and data scientists. DIGITS can be used to rapidly train the highly accurate deep neural network (DNNs) for image classification, segmentation and object detection tasks. DIGITS simplifies common deep learning tasks such as managing data, designing and training neural networks on multi-GPU systems, monitoring performance in real-time with advanced visualizations, and selecting the best performing model from the results browser for deployment. DIGITS is completely interactive so that data scientists can focus on designing and training networks rather than programming and debugging. ...
  • 17
    QlueDashboard
    ...By utilizing QlueDashboard, you can monitor your company from the highest point of view. Integrated with a CCTV that is powered by QlueVision, Qlue empowers you to automatically detect, count, and classify objects, people, and vehicles which will be streamed in real-time. Easier communication is why live chat is being featured.
  • 18
    ACTi

    ACTi

    ACTiACTi Corporation

    ACTi video analytics are designed to help you transform your video surveillance network into a smart detection system and a valuable resource for business management. Advanced image processing algorithms, such as, people counting or license plate recognition, are being used to recognize and track movement of people and objects to determine their behavior and provide analytical insights. The summary reports can then be displayed as interactive graphs and exported.
  • 19
    Ipsotek

    Ipsotek

    Ipsotek

    ...Our global team of Video Analytics and AI experts work closely with you to ensure support is given at every stage of the project from design right through to commissioning. Ipsotek offer a range of intrusion detection applications to protect different areas within the perimeter of your facility. Our products offer tested and robust solutions including abandoned object, wrong-direction, anti-tailgating and loitering which can be fine-tuned to meet site specific requirements. Ipsotek is government certified for sterile zone monitoring and can be deployed as a stand-alone system for perimeter protection.
  • 20
    Warp 10
    ...Warp 10 is both a time series database and a powerful analytics environment, allowing you to make: statistics, extraction of characteristics for training models, filtering and cleaning of data, detection of patterns and anomalies, synchronization or even forecasts. The analysis environment can be implemented within a large ecosystem of software components such as Spark, Kafka Streams, Hadoop, Jupyter, Zeppelin and many more. It can also access data stored in many existing solutions, relational or NoSQL databases, search engines and S3 type object storage system.
  • 21
    Cayosoft Guardian
    ...Whether from malicious actions, like cyberattacks and malware, or mistakes, like accidental deletions and misconfigurations, corruption of your Active Directory can stop your business in its tracks and cause costly outages that can last hours, days, or even weeks. Cayosoft Guardian was designed to reduce the complexity of hybrid Active Directory security, by combining threat detection, monitoring, and recovery into one comprehensive solution. Cayosoft Guardian continuously monitors directories and services, allowing you to isolate suspect changes and immediately recover unwanted changes made to both objects and settings. This is done across on-premises AD, hybrid AD, Azure AD, Office 365, Microsoft Teams, and Exchange Online, all from Cayosoft Guardian’s single, unified console.
  • 22
    Edge Impulse

    Edge Impulse

    Edge Impulse

    Build advanced embedded machine learning applications without a PhD. Collect sensor, audio, or camera data directly from devices, files, or cloud integrations to build custom datasets. Leverage automatic labeling tools from object detection to audio segmentation. Set up and run reusable scripted operations that transform your input data on large sets of data in parallel by using our cloud infrastructure. Integrate custom data sources, CI/CD tools, and deployment pipelines with open APIs. Accelerate custom ML pipeline development with ready-to-use DSP and ML algorithms. ...
  • 23
    Phyron

    Phyron

    Phyron

    ...So you highlight the best selling points. Car dealers around the world are using Phyron. Video is the most attractive and engaging format for presenting a car. Intelligent object detection. So you highlight the best selling points. Automatic background removal. So all cars are presented in the same way. Automatic publishing, So you eliminate a lot of work. Marketplace aggregation. So your ads are ready for marketplaces and social. Phyron multifunctional video player. So every ad can start a dialog. Phyron will continue to develop new, innovative solutions to make life easier and more profitable for car dealers and OEMs around the world. ...
  • 24
    icetana

    icetana

    icetana

    ...It’s a lot to expect. With far too many cameras and a shift towards smaller teams, even the most diligent security people fail more often than they want. Technology helps with simple object detection, but it’s often not focused on real-time events. Add increased scrutiny by the media and the public, and pressure mounts quickly. It can feel like preventing crime and protecting people and property is impossible tasks. It shouldn’t be this way.
    Starting Price: $650 per month
  • 25
    AWS Panorama
    ...AWS Panorama is a collection of machine learning (ML) devices and a software development kit (SDK) that brings CV to on-premises internet protocol (IP) cameras. Easily track throughput, optimize freight operations, and recognize objects such as parts or products, or text in labels or barcodes. Monitor traffic lanes for issues such as stopped vehicles, and send real-time alerts to staff to keep traffic flowing. Quickly detect manufacturing anomalies so you can take corrective action and decrease costs.
  • 26
    Amazon Lookout for Vision
    ...Spot damage to a product’s surface quality, color, and shape during the fabrication and assembly process. Determine what’s missing based on the absence, presence, or placement of objects, like a missing capacitor in a printed circuit board. Detect defects with repeating patterns, such as repeated scratches in the same spot on a silicon wafer. Amazon Lookout for Vision is an ML service that uses computer vision to spot defects in manufactured products at scale. Spot product defects using computer vision to automate quality inspection.
  • 27
    Big Room

    Big Room

    LiveLiveLive

    Convert landscape videos to vertical clips 10x faster for social media, TikTok, Instagram, YouTube Shorts, Facebook, and more. Our in-house AI can detect the most important people or objects in every frame of video and cut to them, so the vertical video we auto-edit for you will look like a camera crew was by your side the entire time. We track subjects across frames and automatically reframe your vertical clip so the right thing is always in focus. Sometimes you need to make a final adjustment to your video before posting to social. ...
  • 28
    Finch

    Finch

    Finch

    ...Focus on the design and Finch stays in the background, making sure that your buildings are compliant with the rules of your firm, customer, and municipality. Share a fully interactive 3D model to anyone with a browser. Let them comment on massing, plans, and objects in the design. Get feedback right into your project.
  • 29
    Entri

    Entri

    Entri

    Your user enters the domain they would like to set up. Alternatively, can you pass the domain directly to Entri via our JS SDK. Don't make your users play a guessing game. After the DNS provider is detected, the user logs in with their credentials. There’s no need for copying and pasting complex records or reading cumbersome documentation. Just pass your desired DNS settings to the Entri modal window using a configuration object. Then, Entri will apply these settings for your end user. Entri provides a seamless user experience that guides users through the process of logging in with their DNS provider. ...
  • 30
    Asseter

    Asseter

    Asseter

    ...Transform the search process into a completely visual approach and artist-friendly experience. Easily discover assets needed to assemble pictures in 3D using the built-in computer vision and AI object detection features.
    Starting Price: $10 per month