Suggested Categories:

Programming Languages
Programming languages are a set of rules that form a language that programmers and developers can use to write software, applications, web apps, mobile apps, scripts, and more.
PLC Programming Software
PLC programming software is used to program industrial automation systems that are based on programmable logic controllers (PLCs). It enables users to create, modify and debug programs for PLCs in a structured, user-friendly manner. The software can also be used to design control systems for various industries such as pharmaceuticals, aerospace and automotive production. In addition, it provides features such as data logging, trending and simulation capabilities.
Pair Programming Tools
Pair programming tools, also known as remote pair programming tools, facilitate real-time collaboration between two or more developers working on the same codebase simultaneously. These tools often include features like shared code editors, live cursors, voice or video chat, and version control integration. Popular tools like Visual Studio Live Share, CodeTogether, and Replit allow remote developers to work together as if they were in the same room. By enabling instant feedback and collaborative problem-solving, these tools enhance productivity, knowledge sharing, and code quality. Pair programming tools are especially valuable in agile development environments and for mentoring junior developers.
Robot Offline Programming (OLP) Software
Robot Offline Programming (OLP) software allows users to create, simulate, and optimize robotic movements and tasks in a virtual environment without the need for physical robots. It enables users to program robot paths, test collision avoidance, and visualize workflows before deployment. This software helps reduce production downtime, improve accuracy, and streamline robotic automation processes. Industries like manufacturing, automotive, and aerospace rely on OLP software to enhance productivity and reduce costly on-site programming. By allowing for virtual testing and iteration, it minimizes errors and speeds up the implementation of robotic systems.
Appointment Scheduling Software
Appointment scheduling software helps businesses and service providers manage their appointments, bookings, and client schedules efficiently. These platforms typically allow customers to book appointments online, send automatic reminders, and allow for easy rescheduling or cancellations. Key features often include calendar integrations, real-time availability tracking, automated notifications, payment processing, and customer management tools. Appointment scheduling software is commonly used in industries such as healthcare, beauty salons, fitness centers, and professional services, improving client experience, reducing no-shows, and streamlining administrative tasks.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Employee Referral Software
Employee referral software enables organizations to hire better talent based on employee referrals. Employee referral software streamlines that tracking, management, and incentivization of employee referrals to hiring departments and HR managers. Employee referral software makes it easier to engage employees in recruitment efforts, track referral success, and measure the effectiveness of the referral program.
Homeschool Software
Homeschool software is used to assist in the process of organizing, creating and managing lesson plans, course materials and progress reports for homeschooling purposes.
Affiliate Software
Affiliate software helps businesses manage and track their affiliate marketing programs. It enables companies to recruit affiliates, monitor performance, and process payments based on predefined commission structures. The software typically provides tools to track clicks, sales, conversions, and other key metrics in real-time. It also offers reporting and analytics to help optimize affiliate campaigns and identify high-performing partners. With affiliate software, businesses can streamline their marketing efforts, reduce manual tracking, and maximize their revenue through strategic partnerships.
Drawing Software
Drawing software, also known as painting software, enables users to draw or paint and create digital artwork.
Loyalty Management Software
Loyalty management software helps businesses design, manage, and optimize customer loyalty programs to increase customer retention and drive repeat business. These platforms allow businesses to track customer behaviors, reward purchases, and offer personalized incentives based on customer preferences and activity. Loyalty management software often includes features like points accumulation, tiered rewards systems, promotional offers, and referral tracking. By using this software, companies can enhance customer engagement, strengthen brand loyalty, and gather valuable insights into customer behavior to refine marketing and retention strategies.
Customer Loyalty Software
Customer loyalty software helps organizations design, manage, and optimize loyalty programs that reward repeat purchases and deepen customer relationships. It enables businesses to issue points, track tiers, referrals, or membership statuses, then automate redemption and campaigns. These platforms integrate with CRM, e-commerce, and point-of-sale systems to monitor behavior, segment users, and deliver personalized offers. With analytics and reporting, the software helps measure program performance and customer lifetime value. Ultimately, customer loyalty software transforms occasional buyers into engaged brand advocates and improves retention over time.
Bug Bounty Platforms
Bug bounty platforms enable organizations to create bug bounty programs in order to crowdsource bug and vulnerability identification and remediation. Bug bounty programs allow companies to find and fix bugs and security vulnerabilities at scale.
Vector Graphics Software
Vector graphics software is designed to provide users with the tools to develop, design, create and manipulate vector graphics images.
Label Printing Software
Label printing software enables businesses to design, customize, and print labels for products, packaging, shipping, and inventory management. It provides tools for creating label layouts, adding barcodes, serial numbers, logos, and text with precise formatting options. This software often supports integration with various printers and databases to automate printing and ensure accurate, consistent labeling. By streamlining the label creation and printing process, it helps reduce errors and improve operational efficiency. Ultimately, label printing software supports branding consistency and compliance with industry standards.
Maintenance Management Software
Maintenance management software is software that helps organizations track, schedule, and optimize maintenance activities for equipment, facilities, and assets. It enables users to manage work orders, preventive maintenance, and repair tasks in a centralized system. The software improves operational efficiency by reducing downtime, extending asset lifespans, and minimizing unexpected failures. It provides real-time reporting, inventory tracking, and cost analysis to support data-driven decision-making. By automating maintenance workflows, the software enhances productivity, reduces operational costs, and ensures regulatory compliance.
Artificial Intelligence Software
Artificial Intelligence (AI) software is computer technology designed to simulate human intelligence. It can be used to perform tasks that require cognitive abilities, such as problem-solving, data analysis, visual perception and language translation. AI applications range from voice recognition and virtual assistants to autonomous vehicles and medical diagnostics.
Brand Ambassador Software
Brand ambassador management software enables companies and brands to manage all processes involved with their brand ambassador program. Brand ambassador software is essential for brands that want to improve their brand ambassador marketing program. Brand ambassador platforms offer features such as ambassador management, campaign management, reporting dashboards, support, and more.
Word Processors
Word processors are software applications that allow users to create, edit, and format written documents. They offer a variety of tools and features, such as spell check, font styles, and page layout options. Word processors are commonly used for tasks such as writing essays, creating business reports, or composing emails. They can also save documents in various file formats for easy sharing and printing. Overall, word processors provide a user-friendly platform for creating and managing written content.
View more categories (20) for "set program"

32 Products for "set program" with 2 filters applied:

  • 1
    Zerocopter

    Zerocopter

    Zerocopter

    ...Through our platform, you can easily control your security projects, while we manage and validate all the reports your team(s) receives. The best the ethical hacker world has to offer, joining your team in the effort of improving security. Set up your team of superb ethical hackers to search for unknown vulnerabilities in your application. We assist in selecting services, setting up programs, defining scopes and matching you with ethical hackers we vetted rigorously that match your scope. Together, we decide the scope of the Researcher Program, you specify the budget of the Researcher Program, we determine the start date and length of the Program together, and we assemble the best team of ethical hackers to match your scope.
    Starting Price: €1.000 per month
  • 2
    Xvirus Firewall
    ...Xvirus Firewall allows you to control what programs run on your computer. With its simple rules list, you can manage which program should be allowed to run or block.
    Starting Price: €19.99 per year
  • 3
    Widevine

    Widevine

    Google

    ...Widevine supports the use of standards-based royalty-free solutions for encryption, adaptive streaming, transport and player software without licensing fees or required participation in the CWIP training program. Widevine supports the use of standards-based royalty-free solutions for encryption, adaptive streaming, transport and player software without licensing fees or required participation in the CWIP training program. Widevine supports the largest number of devices on the broadest number of chipsets and is currently available on 5 billion mobile, desktop, set top box and living room devices.
  • 4
    Mobile Guardian

    Mobile Guardian

    Mobile Guardian

    ...Get the best out of your mobile device investment, whatever the operating system, with Campus. Transform your online classroom with our classroom management tools and get the best out of your mobile device program. Create a safer digital learning program with our world-class web filtering tools. Bring versatility and safety to your online learning environments. Cloud-based device management to make life easier, Manage your 1:1 program of thousands of devices with quick, direct actions. Set permissions and ensure device software is kept up to date.
  • 5
    Auslogics Anti-Malware
    ...Checks system memory for malicious programs that could be running. Detects cookies that track your activity and collect your personal data. Checks system and temporary folders for security issues. Analyzes auto-start items and suspicious entries in the registry. Checks the safety of programs set to auto-start in the task schedule. Scans browser extensions to prevent data leaks.
    Starting Price: $39.95 per year
  • 6
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 7
    AhnLab Xcanner
    ...This leaves them vulnerable to malware infection. As such these systems are placed in air-gapped network or low bandwidth network environments, which are designed to perform only set processes with bare minimum system requirements, it is often impossible to perform engine updates, real-time detection, and remediation with security programs built for PC environment. AhnLab Xcanner enables users to set scan and repair options according to each operating environment and provides minimal clashes with pre-installed security agents. ...
  • 8
    Cybriant

    Cybriant

    Cybriant

    Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services. These services include; Risk Assessments and vCISO Counseling, 24/7 Managed SIEM with LIVE Monitoring, Analysis, and Response, 24/7 Managed EDR, Real-Time Vulnerability Scanning, and Patch Management. We make enterprise grade cyber security strategy and tactics accessible to the Mid-Market and beyond. ...
  • 9
    HackenProof

    HackenProof

    HackenProof

    We are a web3 bug bounty platform since 2017. We help to set a clear scope (or you can do it by yourself), agree on a budget for valid bugs (platform subscription is free), and make recommendations based on your company`s needs. We launch your program and reach out to our committed crowd of hackers, attracting top talent to your bounty program by with consistent and coordinated attention.
    Starting Price: $0 per month
  • 10
    Kovrr

    Kovrr

    Kovrr

    Quantum is a cyber risk quantification (CRQ) platform with a set of new functionality and services that will help your business translate cyber risk into business impact. Quantum is designed to help CISOs, Chief Risk Officers and boards take control. It enables them to visualize the effectiveness of a cybersecurity program, assess the potential risk reduction for future cybersecurity investments, and form a solid risk transfer strategy.
  • 11
    Riot

    Riot

    Riot

    Albert achieves the impossible: teaching cybersecurity basics to your employees, in a way they love. The secret ingredient? The courses are chat-based, 5 minutes long, immersive and interactive. Set up your awareness program thanks to our vast catalog of courses covering everything from CEO fraud to tailgating. Courses are dynamically customized for each employee and sent all year long. Follow in real-time the rollout of your program directly from the dashboard, and easily find and ping the drop-outs. And export the overview as a CSV file for compliance purposes. ...
    Starting Price: $5.89 per user per month
  • 12
    Cryptainer Pro

    Cryptainer Pro

    Cypherix Software

    Cryptainer Pro a 448-bit encryption software. Simple, easy to use encryption program that creates encrypted vaults within which all sensitive information can be stored. Cryptainer Pro allows you to encrypt any file or folder on any Windows PC. Password protect any file or folder with strong Encryption. Cryptainer includes Password strength and monitor meter which is useful in setting up effective and strong passwords.
    Starting Price: $69.95
  • 13
    Birdseye

    Birdseye

    Ostrich Cyber-Risk

    We offer a risk-based management approach with our Birdseye™ assess and quantify SaaS solutions, including our cyber risk quantification simulator, to optimize your security program. After identifying vulnerabilities in the assessment, prioritize each control and set personalized targets. This provides a continuously optimized roadmap for improvement. Simulates risk scenarios based on the qualitative assessment results including assigning dollar figures to your areas of risk to quantify the likelihood of both cyber and operational impact. ...
  • 14
    Stronghold Antivirus

    Stronghold Antivirus

    Security Stronghold

    ...It also identifies and removes even unknown threats with help of active on-access shield protection Thanks to easy, handy and eye-pleasing interface Stronghold Antivirus is great for novice users, and professionals will be amused by the power of its additional features. Being powerful it is still very lightweight and will not consume any noticeable system resources of your computer. You can set up any scan area you want, customize both on-demand and on-access protection modules, schedule scanning with separate settings, add programs to white and black lists and manage them, and more.
  • 15
    Wise Anti Malware
    ...If you download a program from an unsafe/unknown website, it may contain an ad-supported application, and once it is installed on your computer, you will keep seeing pop-up ads, news, or else. Wise Anti Malware can clean such kinds of applications, fix IE homepage settings, etc.
  • 16
    Frontline Vulnerability Manager
    Frontline Vulnerability Manager is more than a just a network vulnerability scanner or vulnerability assessment. It's a proactive, risk-based vulnerability and threat management solution that is a vital part of any cyber risk management program. Its robust features set it apart from other VM solutions, providing vital security information in a centralized, easily understood format so you can protect your business-critical assets efficiently and effectively. More than ever, cyber attackers are looking for vulnerabilities they can exploit in a company’s network. So having a vulnerability management solution in place is critical. ...
  • 17
    Zip Security

    Zip Security

    Zip Security

    ...We integrate the best-in-class security tooling like CrowdStrike, Jamf, and Intune to build the enterprise security stack that scales with you, and it’s all behind a single pane of glass. Set consistent security policies across Windows and macOS devices without juggling platform-specific configuration. Zip is your single partner to procure, deploy, configure, and manage your enterprise security program. We’ll manage all of the software you need to buy to meet the standards of your customers, insurers, and compliance regimes.
  • 18
    SecureAd

    SecureAd

    Oxford BioChronometrics

    ...Using 100 different data points and other factors, SecureAd shows you where your money is best spent, and who is just stealing from you and hoping you don’t notice. Bots are great if you’re a criminal, you set up a program for a few dollars and then rake in affiliate sales all day long. If an advertiser discovers you and your bot, you just move on to the next one.
  • 19
    MetaCompliance Security Awareness Training
    ...Using a “set it and forget it” approach, automation of security training allows CISOs to save time and resources.
  • 20
    TSplus Advanced Security
    Use our advanced security software specifically designed for remote access security. The cybersecurity program that protects your remote desktop connections and your remote access environment. Our unique cybersecurity software provides the fundamental protections every remote server admin needs, and more. Activate up to seven measures and set the right level of security for your network. As you use remote desktop to allow your employees to work from home, reduce your attack surface and increase your peace of mind with TSplus Advanced Security’s powerful features. ...
    Starting Price: $50/Server
  • 21
    Zillya! for Android
    ...To ensure the most reliable protection the base of malicious sites is updated several times a day. The Battery module displays the current charge level and provides additional features such as battery usage history and power-saving settings. The module provides you the possibility to clear the cache memory of the phone and delete unnecessary files. Also, the module provides the ability to independently choose to clear the downloads folder. Includes an antivirus scanner and protection against malicious links. The program offers users a simple interface that allows them to easily configure and manage device protection. ...
    Starting Price: Free
  • 22
    IriCoreLite

    IriCoreLite

    Iritech, Inc.

    IriCoreLite is an iris recognition library that provides a comprehensive set of application programming interfaces and functions for developers and system integrators to build iris recognition–based applications. It is specifically designed for large‑scale iris identification deployments on PCs and enterprise systems using IriTech’s iris scanners. The library incorporates highly accurate iris segmentation for feature extraction based on variable multi‑sector analysis and non‑linear segmentation, a robust image enhancer to handle varying illumination levels and obstructions, and a powerful occlusion detection algorithm to remove eyelids and eyelashes. ...
  • 23
    Fable

    Fable

    Fable

    ...Its assess risk module synthesizes data on role, access, and behavior to pinpoint vulnerability hotspots, while shape behavior delivers adaptive, bite‑sized interventions on security hygiene, data handling, and social engineering to shrink error rates. The Ensure Compliance suite runs modern training programs, phishing simulations, and policy modules with audit‑ready reporting that streamlines regulatory requirements. A unified dashboard aggregates analytics on risk scores, behavior metrics, and compliance status, enabling teams to visualize progress, set goals, and demonstrate ROI.
  • 24
    SAINTcloud

    SAINTcloud

    Carson & SAINT Corporations

    ...No software to install – set up and running in minutes. Full vulnerability scanning, penetration testing, social engineering, configuration, compliance, and reporting in one product. Role-based access controls for separation of duties and accountability. Internal host and remote site scans from the cloud.
  • 25
    Siemba

    Siemba

    Siemba

    Orchestrate an enterprise-grade pentesting program to strengthen your security posture. Transform testing into a well-oiled machine. Enterprise dashboard for your CISO and other high-level stakeholders. Asset-level dashboards to track progress, issues, blockers, and action items. Issue-level dashboards to understand its impact, and steps to reproduce and resolve. Bring clarity to chaotic processes.
  • 26
    IriMaster

    IriMaster

    Iritech, Inc.

    IriMaster is IriTech’s state‑of‑the‑art middleware server software providing a complete set of iris recognition functions, including enrollment, verification, identification, and de‑duplication, powered by advanced algorithms. Designed for seamless integration into legacy enterprise infrastructures, it addresses the demands of large‑scale biometric systems such as national ID programs, customs and border control, and access control.
  • 27
    Scrut Automation
    With Scrut, automate your risk assessment and monitoring, build your own unique risk-first infosec program, effortlessly manage multiple compliance audits, and demonstrate trust with your customers, all from a single window. Discover cyber assets, set up your infosec program and controls, continuously monitor your controls for 24/7 compliance, and manage multiple compliance audits simultaneously, all through a single window on Scrut.
  • 28
    SecureSheet

    SecureSheet

    SecureSheet Technologies, LLC

    ...What sets SecureSheet apart is its patented security model, which allows you to control access at the sheet, row, column, or even cell level. This makes it possible to share one master sheet with hundreds or even thousands of users, while ensuring each person only views the data relevant to them.
    Starting Price: $15.00/month/user
  • 29
    GoGuardian

    GoGuardian

    GoGuardian

    ...With an average response time of 30 seconds, our world-class support team is here to help you solve virtually any problem. We even provide direct support for your teachers. And our dedicated implementation team ensures you’re set up for success from the moment you deploy GoGuardian.
  • 30
    Strobes PTaaS

    Strobes PTaaS

    Strobes Security

    ...Pentesting as a Service (PtaaS) seamlessly combines the power of manual, human-driven testing with a state-of-the-art delivery platform. It’s all about effortlessly setting up ongoing pentest programs, complete with integrations for smooth operation and easy reporting. Say goodbye to the time-consuming process of procuring pentests one by one. To truly appreciate the benefits of a PtaaS platform, you need to dive in and witness the innovative delivery model in action for yourself. It’s an experience like no other! ...
    Starting Price: $499 per month
  • Previous
  • You're on page 1
  • 2
  • Next