Suggested Categories:

Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Ad Fraud Detection Software
Ad fraud detection software identifies and prevents fraudulent activities within digital advertising campaigns, protecting advertisers from wasted spend and ensuring ad effectiveness.
VPN & Proxy Detection Software
VPN and proxy detection tools are software applications designed to identify the use of virtual private networks (VPN) and proxy services.
AI Gun Detection Systems Software
AI gun detection systems use artificial intelligence and computer vision to automatically identify firearms in video feeds or images for enhanced security and safety. These systems analyze real-time surveillance footage from cameras in public spaces, schools, airports, or workplaces to detect guns and alert security personnel immediately. They leverage deep learning models trained on vast datasets to distinguish firearms from other objects, minimizing false alarms.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended Detection and Response (XDR) platforms unify security data from endpoints, networks, cloud environments, and applications to provide a holistic defense against advanced threats. They use automation, analytics, and threat intelligence to detect attacks earlier and respond faster than traditional security tools. XDR platforms correlate signals from multiple sources to reduce false positives and deliver more accurate, actionable alerts. Many solutions include automated response workflows that help teams contain threats quickly across the entire security ecosystem. Overall, XDR helps organizations strengthen their cybersecurity posture by improving visibility, response times, and operational efficiency.
  • 1
    ZeroPath

    ZeroPath

    ZeroPath

    ...ZeroPath provides complete security coverage: 1. AI-powered SAST for business logic flaws & broken authentication 2. SCA with reachability analysis 3. Secrets detection and validation 4. Infrastructure as Code 5. Automated patch generation. any more... ZeroPath delivers 2x more real vulnerabilities with 75% fewer false positives. Our research team has been successful in finding vulns like critical account takeover in better-auth (CVE-2025-61928, 300k+ weekly downloads), identifying 170+ verified bugs in curl, and discovering 0-days in production systems at Netflix, Hulu, and Salesforce. ...
    Starting Price: Free
    View Software
    Visit Website
  • 2
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your...
    View Software
    Visit Website
  • 3
    Metabob

    Metabob

    Metabob

    Metabob detects, explains, and fixes coding problems created by humans and AI. Metabob utilizes proprietary graph neural networks to detect problems and LLMs to explain and resolve them, combining the best of both worlds. GNN detects and classifies problematic code with contextual understanding. Problematic code along with enriched context is stored in Metabob's backend.
    Starting Price: $20 per month
  • 4
    Aikido Security

    Aikido Security

    Aikido Security

    ...Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Starting Price: Free
  • 5
    Imvision

    Imvision

    Imvision

    ...By analyzing the full API data, Imvision allows you to go beyond predefined rules in order to discover unknown vulnerabilities, prevent functional attacks, and automatically shift-left to outsmart attackers. Natural Language Processing (NLP) allows us to achieve high detection accuracy at scale while providing detailed explainability. It can effectively detect ‘Meaningful Anomalies’ when analyzing API data as language. Uncover the API functionality using NLP-based AI to model the complex data relations. Detect behavior sequences attempting to manipulate the logic, at any scale. Understand anomalies faster and in the context of the business logic.
  • 6
    BytePlus Effects

    BytePlus Effects

    Byteplus Pte Ltd

    Bring augmented reality experiences to life with our world-class computer vision capabilities. Enables real-time detection of human bodies in images or videos. Supports multi-person detection, half-body detection, position framing and key point output. Detects 18 key points on the human body, including the head, shoulders, feet and others. Tracks movements such as hand raising, bending, jumping and more. Powered by industry-leading algorithms, BytePlus Effects products are highly efficient in computing power consumption, providing unrivaled accuracy and performance. ...
  • 7
    Modernizr

    Modernizr

    Modernizr

    ...Modernizr makes it easy to deliver tiered experiences and make use of the latest and greatest features in browsers that support them, without leaving less fortunate users high and dry. Modernizr is a small piece of JavaScript code that automatically detects the availability of next-generation web technologies in your user's browsers. Modernizr uses feature detection to allow you to easily tailor your user's experience.
    Starting Price: Free
  • 8
    ARMO

    ARMO

    ARMO

    ...It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack
  • 9
    mFaaS

    mFaaS

    mTraction

    ...Our core technology backed by 7+ patent applications ensure multi-level quality checks across campaigns. mFaaS is a mobile ad fraud detection platform that identifies fraudulent traffic across 15+ fraud types in real-time.
  • 10
    Deleaker

    Deleaker

    Softanics

    Deleaker 🛠️ is a powerful memory leak detection tool for C++, .NET, and Delphi developers. It seamlessly integrates with Visual Studio, RAD Studio, and works as a standalone app. Deleaker helps identify and fix memory leaks, GDI leaks, and handle leaks 🔍 in real time. With an intuitive UI, detailed reports, and precise stack traces, it makes debugging easier ⚡.
    Starting Price: $149
  • 11
    UAParser.js

    UAParser.js

    UAParser.js

    UAParser.js simplifies user-agent detection by providing a structured approach, offering a clean alternative to the unstructured mess of real-world user-agent strings.
    Starting Price: $12
  • 12
    Infoglide

    Infoglide

    Infoglide Software

    Most financial institutions already have all the data necessary to detect fraudulent activity, but because that data is spread out in different locations and departments, it’s difficult to bring it all together in one place. In addition, errors in data – whether deliberate or accidental – make linking even more difficult. Infoglide’s IRE technology enables financial institutions to perform real-time (or batch) federated searches across their enterprise data to find, match, and link similar entities. ...
  • 13
    Mintlify

    Mintlify

    Mintlify

    Detect how users engage with your documentation to improve its readability and clarity. Improve code readability without clustering your codebase with comments. Tag documentation ownership to those responsible of the code - or have it automatically detected.
    Starting Price: $40 per month
  • 14
    Arm DDT
    ...Arm DDT is a powerful parallel debugger, available standalone or as part of the Arm Forge debug and profile suite. Its intuitive graphical interface provides automatic detection of memory bugs and divergent behavior at all scales.
  • 15
    ReversingLabs

    ReversingLabs

    ReversingLabs

    ...ReversingLabs helps organizations move from reactive threat detection to proactive risk management. It delivers trusted insights that strengthen software trust and security operations.
  • 16
    Captain
    Captain is an open source CLI that can detect and quarantine flaky tests, automatically retry failed tests, partition files for parallel execution, and more. It's compatible with 16 testing frameworks. Captain tracks the time each test takes to run and partitions your test suite into balanced partitions to minimize test suite runtime in CI. Captain determines and reports on which tests in your test suites are flaky so that you can easily resolve issues with flakiness.
    Starting Price: $10 per million test results
  • 17
    Oligo

    Oligo

    Oligo Security

    Oligo Security offers a runtime application security platform that provides deep visibility into application behavior at the library and function levels. By leveraging patented eBPF technology, Oligo enables organizations to detect and mitigate vulnerabilities in real-time, focusing on actual exploitability to reduce false positives. The platform's key features include instant attack detection, monitoring of application behavior, and the ability to observe true exploitability with actionable insights. Oligo's solutions, such as Oligo Focus and Oligo ADR, are designed to keep developers focused on features by identifying which vulnerable libraries and functions are executed, and to uncover ongoing attacks, even from undisclosed zero-days. ...
  • 18
    VideoCap Pro SDK ActiveX
    For Windows Developers who need to view IP Camera, add video capture with overlay text, image, chroma key effect, face detection, motion detection with C++ , C#, VB.NET , VB, Delphi, Vfp, Ms Access, Labview.
  • 19
    CAST SBOM Manager
    CAST SBOM Manager enables users to automatically create, customize, and maintain Software Bill of Materials (SBOMs) with the ultimate level of control and flexibility. It detects open source dependencies and related risks (vulnerabilities and security advisories, licenses, obsolescence) directly from scanning source code, and allows you to create and maintain SBOM metadata over time (proprietary components, custom licenses, vulnerabilities) and much more.
    Starting Price: Free
  • 20
    Virtuoso

    Virtuoso

    OpenLink Software

    ...Using Virtuoso, you can easily generate financial profile knowledge graphs from near real time financial activity that reduce the cost and complexity associated with detecting fraudent activity patterns. Courtesy of its high-performance, secure, and scalable dbms engine, you can use intelligent reasoning and inference to harmonize fragmented identities using personally identifying attributes such as email addresses, phone numbers, social-security numbers, drivers licenses, etc. for building fraud detection solutions. ...
    Starting Price: $42 per month
  • 21
    OpenSpace3D

    OpenSpace3D

    OpenSpace3D

    OpenSpace3D support two augmented reality techniques to make AR applications. The feature marker detection that allows to detect an image on the camera and the Aruco fiducial marker detection that allows to make fast applications with several markers and also use them as a tangible interface. With native support of Google Carboard, HTC Vive, Oculus, Leap motion and a lot of other low cost or professional systems like Quad buffer render and VRPN, you can make your application VR ready! ...
  • 22
    Amazon SageMaker Debugger
    Optimize ML models by capturing training metrics in real-time and sending alerts when anomalies are detected. Automatically stop training processes when the desired accuracy is achieved to reduce the time and cost of training ML models. Automatically profile and monitor system resource utilization and send alerts when resource bottlenecks are identified to continuously improve resource utilization. Amazon SageMaker Debugger can reduce troubleshooting during training from days to minutes by automatically detecting and alerting you to remediate common training errors such as gradient values becoming too large or too small. ...
  • 23
    Latta

    Latta

    Latta

    Latta AI is an innovative platform designed to streamline the software development process by automating the detection and resolution of bugs. By recording user sessions and applying AI-driven fixes, Latta AI enables developers, project managers, and testers to focus more on feature development, thereby boosting productivity and accelerating release cycles. The platform integrates seamlessly with popular version control systems like GitHub and GitLab and maintains strict security protocols to ensure code privacy and protection. ...
    Starting Price: $0.05 per fix
  • 24
    Plaid

    Plaid

    Plaid

    Plaid is a global fintech infrastructure platform that enables businesses and consumers to securely connect to financial data and services. Through APIs that connect to more than 12,000 financial institutions across 20+ countries, Plaid operates the world’s largest open banking data network. By removing the complexity of direct bank integrations, Plaid enables developers, financial institutions, and enterprises to build secure, user-friendly, and conversion-optimized financial products....
    Starting Price: Free
    View Software
    Visit Website
  • 25
    Mend Renovate
    Save time and reduce risk by automating dependency updates in software projects. Fully customizable with a setting to suit every workflow. Renovate runs continuously to detect the latest available versions. Multiple languages and file types are supported in order to detect dependencies wherever you use them. Changelogs and commit histories are extracted and included with each update. Run your existing suite of tests on every update to avoid regression errors.
    Starting Price: Free
  • 26
    gitleaks

    gitleaks

    gitleaks

    Gitleaks is a SAST tool for detecting and preventing hardcoded secrets like passwords, api keys, and tokens in git repos. Gitleaks is an easy-to-use, all-in-one solution for detecting secrets, past or present, in your code. Gitleaks can be installed using Homebrew, Docker, or Go. Gitleaks is also available in binary form for many popular platforms and OS types on the releases page.
  • 27
    Arya.ai

    Arya.ai

    Arya.ai

    ...Its Apex API library provides access to over 100 domain‑specific models for NLP, computer vision, predictive analytics, biometric verification (face recognition, liveness detection), OCR, document fraud detection, health vitals scanning, translation, named‑entity recognition, QR code masking, image enhancement, and more. Weave, its AI orchestration layer, enables seamless integration with existing databases, ERPs, and cloud services, facilitating real‑time, secure inference and end‑to‑end governance. Arya supports hybrid deployment (cloud, on‑premise, or edge) and emphasizes regulatory compliance, auditability, low latency, and scalability.
  • 28
    Bugsmirror MASST
    MASST (Mobile Application Security Suite & Tools) is a unified mobile app security platform designed to detect, protect, and monitor mobile applications across development and runtime. The suite’s Threat Detection layer includes modules such as CodeLock for static analysis across 50+ vulnerability vectors, RunLock for runtime testing and attack simulations, APILock for discovering and securing API endpoints, and ThreatLock for deep red-teaming assessments.
  • 29
    BugHunter AI

    BugHunter AI

    BugHunter

    BugHunter AI is an AI-powered testing and quality assurance solution that continuously and automatically tests games and software to detect critical issues before they reach production, helping studios reduce QA costs, accelerate release cycles, and improve product quality. It uses intelligent automation to run tests 24/7 across all platforms, scales without the need to hire additional QA staff, and finds edge cases that manual testing often misses, delivering faster bug detection and broader coverage. ...
    Starting Price: $499 per month
  • 30
    Jazzer

    Jazzer

    Code Intelligence

    ...It is based on libFuzzer and brings many of its instrumentation-powered mutation features to the JVM. You can use Docker to try out Jazzer's autofuzz mode, which automatically generates arguments to a given Java function and reports unexpected exceptions and detected security issues. You can also use GitHub release archives to run a standalone Jazzer binary that starts its own JVM configured for fuzzing.
    Starting Price: Free
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next