Results for: object detection

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended detection and response (XDR) platforms enable organizations to discover and address cybersecurity incidents across disparate hybrid systems such as networks, applications, endpoints, and the cloud.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
View more categories (20) for "object detection"

238 Products for "object detection" with 1 filter applied:

  • 1
    Graylog

    Graylog

    Graylog

    ...) by aligning threat detection coverage to meet your security objectives 2. Reduce TCO with native data routing and data tiering functionality 3. Reduce key metrics like mean time to respond (MTTR) by quickly resolving the alerts that matter. Graylog Security is a robust, scalable solution that empowers analysts to detect and respond to cybersecurity threats efficiently. With integrated SOAR functionality, it automates repetitive tasks, orchestrates workflows, and accelerates incident response.
    Starting Price: $1550/month
    View Software
    Visit Website
  • 2
    Oracle Cloud Infrastructure Object Storage
    ..., with any corrupt data detected and healed by automatically recreating a copy of the data. For longer-term data storage needs like compliance and audit mandates and log data, OCI Archive Storage uses the same APIs as Object Storage for easy setup and integration but at one-tenth the cost. Data is monitored for integrity, automatically healed, and encrypted at rest.
    Starting Price: $0.0255 per month
  • 3
    FacePlugin

    FacePlugin

    FacePlugin

    ... recognize ID documents from 180+ countries and it can recognize all kinds of ID documents including ID card, Passport and Driver License. SDKs we offer - Face recognition SDK (Android, iOS, Server) - Liveness detection SDK (Android, iOS, Server) - ID document recognition SDK (Android, iOS, Server) - Palmprint recognition SDK (Server) Programming languages: Python, Swift, Object C, Java, Kotlin, Flutter We provide free integration support.
    Leader badge
    Starting Price: $0
  • 4
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides...
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 5
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
    View Software
    Visit Website
  • 6
    Sightbit

    Sightbit

    Sightbit

    SightBit provides an AI-powered solution for enhancing safety and security around open water. The company’s proprietary deep-learning AI models and computer vision technology enable capabilities including object detection and classification, drowning detection, hazard detection and prediction, object penetration detection and pollution detection. SightBit’s technology addresses climate challenges by detecting, monitoring, and providing alerts regarding events such as tsunamis and rip currents...
  • 7
    PlantFCE Model Builder

    PlantFCE Model Builder

    Storm Consulting

    ... and save time.** PlantFCE Model Builder's automatic clash check** reduces time spent on clash check sessions and gives you more time to work on your project. Download for Windows and Mac on the PlantFCE website. *Exporting through Model Builder does not include Model Builder specific functionality like properties set on objects or features specific to Model Builder. **Clash check will be released in version 2.
    Starting Price: $49/month/user
  • 8
    Satim

    Satim

    Satim

    Satim provides a world-class and unique AI-based software solution for object detection, classification, and identification using Synthetic Aperture Radar (SAR) satellite imagery. Satim has built a highly accurate simulator for generating synthetic SAR signatures. The simulator allows us to simulate a SAR signature of any object and any SAR system. Thanks to the simulator, we can add new object types to train our AI model and to be classified with 90% accuracy within days. Thanks to our...
  • 9
    Frigate+

    Frigate+

    Frigate+

    Frigate is an open-source NVR built around real-time AI object detection. All processing is performed locally on your own hardware, and your camera feeds never leave your home. Traditional NVRs can require hours of fine tuning to reduce false positive rates because they rely on simple motion detection. By offloading object detection to the Google Coral TPU, even modest hardware can run advanced analysis to determine if the motion is actually a person, car, or other object of interest...
  • 10
    RectLabel

    RectLabel

    RectLabel

    An offline image annotation tool for object detection and segmentation. Draw polygons, cubic bezier curves, line segments, and points. Draw oriented bounding boxes in aerial images. Draw key points with a skeleton. Draw pixels with brushes and superpixels. Read/write in PASCAL VOC xml and YOLO text formats. Export to CreateML object detection and image classification formats. Export to COCO, Labelme, YOLO, DOTA, and CSV formats. Export indexed color mask images and grayscale mask images...
    Starting Price: Free
  • 11
    Colorixor

    Colorixor

    Colorixor

    Change colors on demand. Select any object, from the image and let Colorixor’s AI transform it with absolute precision. Forget tedious selections. Colorixor intelligently detects objects in your images, saving you time and effort. Our prices are the best in the market. Buy AI tokens and spend them on your needs. From subtle shades to bold hues, explore infinite color combinations. Upload, select, and create. Choose any object in your image, apply your ideal colors, and let Colorixor’s AI...
  • 12
    alwaysAI

    alwaysAI

    alwaysAI

    ... in a real-time video feed. Follow the same object across a series of frames. Find faces or full bodies in a scene to count or track. Locate and define borders around separate objects. Separate key objects in an image from background visuals. Determine human body poses, fall detection, emotions. Use our model training toolkit to train an object detection model to identify virtually any object. Create a model tailored to your specific use-case.
  • 13
    herdProtect

    herdProtect

    herdProtect

    herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud. Since no single anti-malware program is perfect 100% of the time, herdProtect utilizes a 'herd' of multiple engines to guarantee the widest coverage and the earliest possible detection. As a second line of defense anti-malware solution, herdProtect is designed to run with any existing anti-virus program already installed on a user's PC. herdProtect is a free service to help user...
    Starting Price: Free
  • 14
    Photo Eraser

    Photo Eraser

    Toscanapps

    ... by the removed item is filled in with an accurate and natural-looking background, making the edit invisible. The Photo Eraser feature comes equipped with a range of intuitive tools designed to speed up the editing process, ensuring you achieve professional-quality results in just a few taps. The AI detection feature automatically identifies objects and people that you may want to remove. This intelligent detection capability saves you time and effort.
    Starting Price: Free
  • 15
    Bosch Intelligent Video Analytics
    Intelligent Video Analytics 8.10 from Bosch is the guard-assistant system of choice when you need mission-critical, long-distance intrusion detection in extreme weather conditions, traffic monitoring at intersections, highways or tunnel, high-performance people counting or other high-performance video analytics. Intelligent Video Analytics8.10 includes state-of-the-art artificial intelligence (AI) based detectors for video analysis that reliably detects, tracks, and analyzes moving objects...
  • 16
    intuVision VA

    intuVision VA

    intuVision

    intuVision VA offers an all-in-one, server side video analytics solution to meet a wide range of requirements, with application modules in security, retail, parking, traffic, manufacturing, and face & text detection. intuVision VA is fully integrated with popular video management systems (VMS) to add intelligence to your VMS, to analyze video and generate alerts or collect object and event data. Running on Windows or Linux, intuVision VA ingests and analyzes either live or archived video...
  • 17
    FlyPix AI

    FlyPix AI

    FlyPix AI

    FlyPix AI is an object detection platform designed for analyzing satellite and drone imagery . It allows users to effortlessly detect, segment and localize objects and areas within geospatial data. Users can use FlyPix AI advanced functionalities to track changes and detect anomalies. Plus, it's user-friendly and intuitive interface empowers users without coding expertise to create customized use cases and extract valuable information from earth observation data.
    Starting Price: €890
  • 18
    PatrolEyes Video Redaction
    Our PatrolEyes video redaction software is the fastest redaction software out there. With our simple web interface and automatic face detection, our software will save you hours of time. No more need to go through videos frame by frame and apply a crude black box. Our professional software is compatible with all major file formats. Simply upload your file to the website, select face detection, and let the software do the rest. You can also select an object such as a credit card, license plate...
    Starting Price: $50 per month
  • 19
    eCognition Developer

    eCognition Developer

    Amigo Optima Software Solutions

    eCognition Developer is a powerful development environment for object-based image analysis. It is used in earth sciences to develop rule sets (or applications for eCognition Architect) for the automatic analysis of remote sensing data. eCognition Developer can be applied for all common remote sensing tasks such as vegetation mapping, feature extraction, change detection and object recognition. The object-based approach facilitates analysis of all common data sources, such as medium to high...
  • 20
    ObjectSecurity BinLens
    ... analysis. BinLens™ (formerly ObjectSecurity OT.AI Platform) uses an integrated approach, combining multiple techniques to uncover potential zero-days with unmatched precision. Powered by automated symbolic execution, it excels at detecting memory-safety violations and other undefined behaviors in binary programs, delivering a dramatically lower false-positive rate than competing tools. BinLens™ automates key manual reverse engineering tasks like static analysis, disassembly, and decompilation.
  • 21
    Pic Detective

    Pic Detective

    Pic Detective

    PicDetective is a free, privacy-focused reverse image search tool that allows users to identify the origin of images, detect duplicates, and find higher-resolution versions across the web. Leveraging advanced AI image recognition, PicDetective analyzes visual elements such as objects, shapes, color schemes, and facial features to deliver accurate and precise results within seconds. It searches over 146 billion images, providing comprehensive coverage for various use cases, including verifying...
    Starting Price: Free
  • 22
    Dragoneye

    Dragoneye

    Dragoneye

    Personalize your results by selecting categories of interest and optimizing detection sensitivity. Combine our detection building blocks into powerful conditions. Map them to your custom data labels for easy integration with your existing systems. Detect new custom attributes such as SKU or item condition, even if you don’t have a lot of data. Our model's deep understanding of object categories means that we can deliver fantastic real-world accuracy with just a few images. All changes happen...
  • 23
    SnapEdit

    SnapEdit

    SnapEdit

    Remove people, remove objects from photo faster with AI technology. There are only 4 simple steps to remove object from photo, clean up picture, and create beautiful images like a professional photographer. Upload or Drag and drop images into the "Upload Photo" Frame to start editing with SnapEdit.App - the free photo editor. Select Objects automatically detected by AI to remove object from photo or choose Eraser to blur, beautify, remove acne, restore old photos. SnapEdit’s AI edit...
    Starting Price: $5 per month
  • 24
    Quest Security Guardian
    ..., if you're exposed, and how to remediate. It allows you to benchmark your AD and Entra ID configurations against industry best practices, lock down critical objects such as Group Policy Objects (GPOs) from misconfiguration and compromise, and continuously monitor for anomalous user activities and emerging hacker tactics. By leveraging cross-product AI insights from Microsoft Security Copilot, it simplifies and accelerates threat detection and response.
  • 25
    Optalert

    Optalert

    Optalert

    Scientifically validated, objective drowsiness monitoring solutions. Exceed required safety standards. Make your driver monitoring system the best in class. License our solution or validate yours against 20 years of objective data. Commercially validated by Vale, one of the world’s largest mining companies. Instant, cloud-based managing and reporting. This is the future, identifying breakthrough biomarkers for neurological conditions at the wheel. Manage your team in real-time, remotely...
  • 26
    EVLib

    EVLib

    Irida Labs

    EV Lib is a complete embedded vision software library based on deep learning and AI with functionalities for people, vehicle and object detection, identification tracking and 3D pose estimation.
  • 27
    Eyewey

    Eyewey

    Eyewey

    Train your own models, get access to pre-trained computer vision models and app templates, learn how to create AI apps or solve a business problem using computer vision in a couple of hours. Start creating your own dataset for detection by adding the images of the object you need to train. You can add up to 5000 images per dataset. After images are added to your dataset, they are pushed automatically into training. Once the model is finished training, you will be notified accordingly. You can...
    Starting Price: $6.67 per month
  • 28
    Clearspeed

    Clearspeed

    Clearspeed

    ... compliance, or any type of transaction or individual vetting, Clearspeed delivers amazing and objective speed and efficacy. With greater than 50% of resumes reported to be fraudulent, it’s really difficult to know if you have a good match and not knowing leads to bad hiring decisions. Background checks aren’t effective in detecting most resume fraud. By using Clearspeed, you will kickstart an amazing domino effect that will result in better hiring decisions and save you time and money.
  • 29
    Florence-2

    Florence-2

    Microsoft

    Florence-2-large is an advanced vision foundation model developed by Microsoft, capable of handling a wide variety of vision and vision-language tasks, such as captioning, object detection, segmentation, and OCR. Built with a sequence-to-sequence architecture, it uses the FLD-5B dataset containing over 5 billion annotations and 126 million images to master multi-task learning. Florence-2-large excels in both zero-shot and fine-tuned settings, providing high-quality results with minimal training...
    Starting Price: Free
  • 30
    Cintoo Cloud
    If you are building, renovating, or managing your AEC or infrastructure assets using terrestrial laser scanning, Cintoo Cloud is your platform of choice to enhance all your scan-BIM workflows and make collaboration both easy and fast. Different stakeholders all have different objectives, resources, and technical knowledge. Cintoo Cloud makes it easy for you to share projects with your team, clients, or subcontractors, creating different permission levels to manage project access and what users...
    Starting Price: €90 per month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next