Suggested Categories:

Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
Ad Fraud Detection Software
Ad fraud detection software identifies and prevents fraudulent activities within digital advertising campaigns, protecting advertisers from wasted spend and ensuring ad effectiveness.
VPN & Proxy Detection Software
VPN and proxy detection tools are software applications designed to identify the use of virtual private networks (VPN) and proxy services.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended Detection and Response (XDR) platforms unify security data from endpoints, networks, cloud environments, and applications to provide a holistic defense against advanced threats. They use automation, analytics, and threat intelligence to detect attacks earlier and respond faster than traditional security tools. XDR platforms correlate signals from multiple sources to reduce false positives and deliver more accurate, actionable alerts. Many solutions include automated response workflows that help teams contain threats quickly across the entire security ecosystem. Overall, XDR helps organizations strengthen their cybersecurity posture by improving visibility, response times, and operational efficiency.
AI Gun Detection Systems Software
AI gun detection systems use artificial intelligence and computer vision to automatically identify firearms in video feeds or images for enhanced security and safety. These systems analyze real-time surveillance footage from cameras in public spaces, schools, airports, or workplaces to detect guns and alert security personnel immediately. They leverage deep learning models trained on vast datasets to distinguish firearms from other objects, minimizing false alarms.
  • 1
    Modernizr

    Modernizr

    Modernizr

    ...Modernizr makes it easy to deliver tiered experiences and make use of the latest and greatest features in browsers that support them, without leaving less fortunate users high and dry. Modernizr is a small piece of JavaScript code that automatically detects the availability of next-generation web technologies in your user's browsers. Modernizr uses feature detection to allow you to easily tailor your user's experience.
    Starting Price: Free
  • 2
    Plaid

    Plaid

    Plaid

    Plaid is a global fintech infrastructure platform that enables businesses and consumers to securely connect to financial data and services. Through APIs that connect to more than 12,000 financial institutions across 20+ countries, Plaid operates the world’s largest open banking data network. By removing the complexity of direct bank integrations, Plaid enables developers, financial institutions, and enterprises to build secure, user-friendly, and conversion-optimized financial products....
    Starting Price: Free
    View Software
    Visit Website
  • 3
    Parsley

    Parsley

    Parsley

    ...Like no other form validation library, simply write in English your requirements inside your form HTML tags, Parsley will do the rest! No need to write even a single JavaScript line for simple form validation. Parsley is now smarter, it automatically detects your forms' modifications and adapts its validation accordingly. Simply add, remove or edit fields, Parsley validation will follow! Parsley is shipped with more than a dozen useful validators. If not enough, use the awesome Parsley extra Ajax validator or tons of other extended validators provided by the community. Parsley strongly focuses on UI and UX. ...
    Starting Price: Free
  • 4
    Screenfull.js

    Screenfull.js

    Screenfull.js

    ...Fullscreen the page or fullscreen an element. Hide the navigation user interface on mobile devices. Fullscreen an element with jQuery and toggle fullscreen on an image with jQuery. Detect fullscreen change, remove listeners, detect fullscreen errors, and fullscreen elements with Angular.js. Keep in mind that the browser will only enter fullscreen when initiated by user events like click, touch, or key.
    Starting Price: Free
  • 5
    ManageEngine OpManager
    ...Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Leader badge
    Starting Price: $95.00/one-time
    Partner badge
  • 6
    Pikkart AR SDK

    Pikkart AR SDK

    Pikkart_AR

    Build your Augmented Reality apps with a light, easy to use, fast, stable, computationally inexpensive on-device detection and tracking SDK. No image dataset limits with the Cloud Recognition Service, fast, precise and easily scalable to giant image datasets. Use our image recognition SDK and develop the best-augmented reality experience with native API, Unity 3D or Xamarin platform. No matter how many images you have to recognize. You can build your app in a simple and scalable way, using your CMS to manage your markers. ...
    Starting Price: €499 one-time payment
  • 7
    Splunk AppDynamics
    Splunk AppDynamics delivers full-stack observability for hybrid and on-prem environments, linking technical performance directly to business outcomes. It enables teams to detect anomalies, diagnose root causes, and prioritize issues based on their real business impact. With capabilities ranging from network performance correlation to SAP system optimization, the platform offers deep insights across applications, APIs, and infrastructure. Its runtime security features safeguard applications by detecting vulnerabilities, blocking attacks, and highlighting potential risks. ...
    Starting Price: $6 per month
  • 8
    Airbrake

    Airbrake

    Airbrake

    Capture and track application exceptions in minutes with Airbrake, an error monitoring and detection solution. Fast and effective, Airbrake enables users to quickly identify, asses and resolve errors such as parameters, stacktraces, affected users, and more. Airbrake features detailed dashboards that tracks and manages errors with ease. Airbrake is also accessible via mobile devices with its mobile optimized web application.
    Starting Price: $49.00/month
  • 9
    Recite Me

    Recite Me

    Recite Me

    ...Furthermore, Recite Me offers an Accessibility Checker, which is free of charge and can be used to efficiently measure your websites accessibility. Allowing you to detect specific on-site accessibility issues, to fix them and improve your websites accessibility.
  • 10
    Evinced

    Evinced

    Evinced

    ...Weave accessibility into all facets of software development - Design, development, automated testing, QA testing, and production monitoring. Large enterprises are making Evinced their platform of choice for accessibility engineering operations. Evinced helps them automatically detect issues, fix the issues and collaborate on accessibility. Browser extensions, SDKs for integration with automated tests, and scanning solutions for pre-production and production environments. Accessibility debugger browser extension, SDK/CLI for pre-commit checks. SDK for integration with automated tests, Scanning for on-premises dev/QA environments. ...
  • 11
    ARCore

    ARCore

    Google

    ...Some of the APIs are available across Android and iOS to enable shared AR experiences. Motion tracking allows the phone to understand and track its position relative to the world. Environmental understanding allows the phone to detect the size and location of all type of surfaces: horizontal, vertical and angled surfaces like the ground, a coffee table or walls. Light estimation allows the phone to estimate the environment's current lighting conditions. ARCore's motion tracking technology uses the phone's camera to identify interesting points.
  • 12
    Cardboard SDK
    ...You can use the Cardboard SDK to turn a smartphone into a VR platform. A smartphone can display 3D scenes with stereoscopic rendering, track and react to head movements, and interact with apps by detecting when the user presses the viewer button.
  • 13
    ColdFusion Builder
    Build with a lightweight, quick-loading IDE that complements Adobe ColdFusion. Finish faster with tools that help you to develop, test, debug and deploy applications. Automatically detect vulnerabilities in your code. Identify bottlenecks with reports from the Performance Monitoring Toolset. Ride the wave, easily develop, test, debug and deploy mobile and browser-based applications, and get a head start in the fast-growing apps market. Keep it safe, use debugging, refactoring, preview and other smart features for identifying security vulnerabilities, and maintain the integrity of your code. ...
    Starting Price: $299 one-time payment
  • 14
    TechPDFKit

    TechPDFKit

    PDF Technologies

    ...Apply electronic and digital signatures in PDFs to speed up paperless workflow and secure document signing. Certify, and validate certificate-based documents you receive. Automatically detect font and size of the original text content. Easily update PDF documents by changing text and images.
  • 15
    Apache Usergrid
    ...Underneath everything is stored in a standard Cassandra instance, but we’ve added the ability to retrieve data via an SQL-like syntax and manage collections and connections between entities. Our asset storage can handle anything from text files to videos of several terabytes, with automatic content detection and full URL access control.
    Starting Price: Free
  • 16
    Devknox

    Devknox

    XYSEC Labs

    ...Details of commonly exploited vulnerabilities, quick fixes and alternate suggestions on how to fix them. Devknox is a developer friendly Android Studio plugin that helps Android developers detect and resolve security issues in their apps, while writing code. Imagine Devknox to similar to what autocorrect is for English. As you write code, Devknox highlights possible security risks and also gives you a suggested solution which you can select and replace across your code.
  • 17
    Backtrace

    Backtrace

    Backtrace

    Don’t let app, device, or game crashes get in the way of a great experience. Backtrace takes all the manual labor out of cross-platform crash and exception management so you can focus on shipping. Cross-platform callstack and event aggregation and monitoring. Process errors from panics, core dumps, minidumps, and during runtime across your stack with a single system. Backtrace generates structured, searchable error reports from your data. Automated analysis cuts down on time to resolution by...
  • 18
    DeepAR

    DeepAR

    DeepAR

    ...Using advanced deep learning techniques we can dynamically change hair color in live video. Create an immersive AR experience by replacing backgrounds in real-time. Detect faces showing sad, happy, angry, surprised, and scared emotions in a video feed. Track 17 key body points on the waist, shoulders, elbows, arms, and head. Turn any 3D file into an AR asset Benefit from every feature, pay as you grow. Create an account for free and integrate the SDK within minutes. We even have a load of prebuilt integrations to make your life easier.
    Starting Price: $25 per month
  • 19
    Core ML

    Core ML

    Apple

    ...You use a model to make predictions based on new input data. Models can accomplish a wide variety of tasks that would be difficult or impractical to write in code. For example, you can train a model to categorize photos or detect specific objects within a photo directly from its pixels. After you create the model, integrate it in your app and deploy it on the user’s device. Your app uses Core ML APIs and user data to make predictions and to train or fine-tune the model. You can build and train a model with the Create ML app bundled with Xcode. Models trained using Create ML are in the Core ML model format and are ready to use in your app. ...
  • 20
    Product Science

    Product Science

    Product Science

    Maximize app performance and increase business metrics. Tool for engineering and product teams to make their mobile apps faster. Detect performance issues before they are shipped to users. Little to no development effort is required. Results are presented in a familiar, easy-to-use format. Our AI-powered developer tool transforms your entire development team into sophisticated performance engineers. PS tool provides a visual tool for performance analysis. With no code needed, video recordings of apps next to the performance traces yield insights into what is happening behind the screen. ...
  • 21
    iPrism Web Security
    iPrism Web Security offers a unique combination of fine-grained content filtering combined with threat detection and mitigation methods to assure powerful protection from Advanced Persistent Threats, including botnets, malware, viruses and others. iPrism Web Security is designed to be “set it and forget it” easy to use, self-contained to provide advanced threat protection and policy enforcement, yet require nearly zero maintenance. And our comprehensive on-box reporting makes managing your network a snap. ...
  • 22
    8th Wall

    8th Wall

    8th Wall

    8th Wall is the world-class developer platform that lets you harness the full power and freedom of the web to create meaningful augmented reality experiences. 8th Wall's instant surface detection, lighting estimation and relative scale lets users experience realistic 3D assets, volumetric video and animations in their own environment without the need to waive their phone or resize content. World Effects work across both iOS and Android devices. Upload endless image targets including packaging, logos, signage, posters, ads, labels and more to trigger or interact with WebAR content. ...
    Starting Price: $99 per month
  • 23
    AppSecure Security

    AppSecure Security

    AppSecure Security

    ...Continuously fortify your security posture and uncover concealed vulnerabilities from a hacker’s perspective. Evaluate the efficacy of your security team’s readiness posture, detection, and response measures to tenacious hacker attacks on your network’s susceptible pathways. Identify and redress the key security lapses with our balanced approach that tests your APIs in accordance with the OWASP paradigm, along with tailored test cases for preventing any recurrences. Pentest as a service offers continuous, expert-led security testing to identify and remediate vulnerabilities, enhancing your website’s defenses against evolving cyber threats and making it secure, compliant, and reliable.
  • 24
    Kochava

    Kochava

    Kochava

    Kochava is a real-time data solutions company offering a comprehensive growth stack of solutions for data-driven advertisers. We empower advertisers to measure what matters with tools that deliver better insights and actionable data in one operational platform. Advertisers can map their growth journey with Kochava, leveraging mobile measurement partner (MMP) services, a next-generation marketing mix modeling (MMM) SaaS platform, and a premium platform for search ads automation and app...
    Starting Price: FREE
  • 25
    Fullstory

    Fullstory

    Fullstory

    Fullstory is a behavioral data platform that surfaces the sentiment buried between clicks, revealing the untold story behind consumer behaviors. From building better fraud detection and forecasting to creating personalization that genuinely resonates, Fullstory enables product, engineering, and data teams to connect sentiment signals with other data sources to intentionally design the next best action. Providing deeper and more immediately actionable insights beyond conventional web and product analytics that can only surface what’s happening but not why, Fullstory is the only behavioral data platform that provides the context needed to build in-the-moment experiences that drive revenue. ...
  • Previous
  • You're on page 1
  • Next