Suggested Categories:

Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
Account-Based Orchestration Platforms
Account-based orchestration platforms enable businesses to coordinate and automate their marketing and sales efforts, focusing specifically on high-value target accounts. These platforms integrate data, processes, and communication channels to create personalized, multichannel engagement strategies for each account. By aligning teams and workflows, they ensure that marketing, sales, and customer success teams work in sync to provide a consistent and customized experience. They also use analytics and automation to optimize outreach, track engagement, and adapt strategies based on real-time insights. Ultimately, account-based orchestration platforms help drive higher conversion rates and stronger relationships with key accounts by delivering targeted, cohesive campaigns.
Value-Based Care Software
Value-based care software is designed to support healthcare providers in delivering patient-centered care that emphasizes quality and outcomes over volume of services. It provides tools to track patient progress, manage chronic conditions, and coordinate care effectively, aligning with the goal of improving health outcomes while controlling costs. By analyzing patient data and monitoring key performance indicators, the software enables providers to identify high-risk patients and proactively intervene. It also helps ensure that healthcare organizations meet regulatory standards and achieve value-based care incentives. Overall, value-based care software is crucial for transitioning healthcare systems to models that reward quality and efficiency in patient care.
AI Knowledge Base Software
AI knowledge base software and AI knowledge management tools are a type of artificial intelligence that helps to store, manage and retrieve data. It can be used for a variety of purposes, such as customer service, product support and research.
Contact-Based Marketing Software
Contact-based marketing platforms are tools designed to facilitate personalized marketing efforts by leveraging contact data to engage prospects or customers through targeted communications. These platforms enable businesses to create, manage, and optimize campaigns that focus on specific contacts, such as leads, current clients, or users within a defined list. By utilizing customer profiles, behavioral data, and interaction history, contact-based marketing platforms allow companies to send personalized emails, messages, or offers to individuals, fostering stronger relationships and increasing the likelihood of conversions.
Project-Based ERP Software
Project-based ERP software is designed to manage the unique needs of organizations that operate on a project basis, integrating essential functions like budgeting, scheduling, resource management, and accounting. This software provides real-time insights into project performance, tracking costs, timelines, and resources to help teams stay on budget and on schedule. It facilitates seamless collaboration by centralizing project data, ensuring that all stakeholders have access to accurate, up-to-date information. With built-in compliance and reporting tools, project-based ERP software aids in adhering to industry regulations and producing detailed project reports. Overall, it enhances project efficiency, improves resource utilization, and provides transparency across all stages of the project lifecycle.
Location-Based Marketing Software
Location-based marketing software helps businesses target and engage customers based on their geographic location, providing personalized and relevant offers, advertisements, and promotions. These platforms use technologies such as GPS, geofencing, beacons, and IP address tracking to deliver real-time marketing messages to customers when they are in specific locations, such as near a store, event, or point of interest. Location-based marketing software often includes features for campaign management, analytics, and customer segmentation, enabling businesses to optimize their marketing strategies based on location data. It can also be integrated with other marketing tools like CRM systems and mobile apps to enhance customer engagement and drive conversions. By using location-based marketing, businesses can improve the customer experience and increase foot traffic, sales, and brand awareness.
Risk-Based Authentication Software
Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification.
Contact Center Knowledge Base Software
Contact center knowledge base software is a type of software used to store and easily access customer service information. It is used to create, store and update self-service resources such as help documents and FAQs. It generally consists of an online searchable database that can be accessed from multiple devices. This allows contact center customer service agents to provide customers with accurate, up-to-date information quickly and efficiently.
Risk-Based Vulnerability Management Software
Risk-Based Vulnerability Management software is a software solution that helps organizations identify, assess and prioritize the security risks associated with their IT systems. This type of solution works to identify and measure any existing vulnerabilities within the organization's environment, allowing for better risk management decisions. It also includes tools used to monitor an organization's environment for potential new threats. Furthermore, it can provide guidance on how to remediate any existing vulnerabilities identified in the network. Finally, it enables organizations to track progress over time as they work to strengthen their cyber security posture.
Account-Based Direct Mail Software
Account-based direct mail software enables businesses to send personalized, physical marketing materials directly to high-value target accounts as part of their account-based marketing (ABM) strategy. The software integrates with CRM and marketing platforms to automate the selection of recipients and customize messages based on account data, ensuring that each piece of mail is relevant to the recipient. It offers tracking and analytics features to monitor engagement, such as delivery confirmation and responses, providing insights into the effectiveness of the campaigns. This approach helps bridge digital and physical marketing channels, creating a more memorable and impactful experience for potential customers. Ultimately, account-based direct mail software enhances outreach efforts by adding a tangible, personalized touch to account-focused marketing strategies.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
AI-Based Learning Management Systems Software
AI-based learning management systems (LMS) leverage artificial intelligence to enhance the educational experience by personalizing learning paths for each student. These systems use algorithms to analyze learners' progress and adapt content, making recommendations based on individual strengths, weaknesses, and preferences. AI-powered LMS can automate administrative tasks, such as grading and feedback, allowing instructors to focus more on interaction and engagement. Additionally, they provide real-time analytics, offering insights into student performance, engagement levels, and overall learning trends.
FAQ Software
FAQ software enables companies to create and manage Frequently Asked Questions sections on their website. FAQ software typically adds or integrates FAQs with a website, but some FAQ software works via a chatbot.
Knowledge Management Software
Knowledge management software is an application used to store, capture, manage and distribute knowledge within organizations. It facilitates the sharing of information between employees and departments in order to ensure better efficiency in operations. This type of software can also provide easy access to organizational documents, data sources and other content. Many tools such as search capabilities, document libraries and collaboration workspaces are typically included in knowledge management software platforms.
Database Software
Database software and database management systems are a type of software designed to store, manage and retrieve data. It is used to organize all kinds of information in an efficient manner, allowing users to quickly access the data they need. Many databases are tailored for specific purposes and applications, ranging from transaction processing systems to large-scale analytics platforms. Database software may be used on its own or connected with other software services for complex operations.
Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
  • 1
    Acryl Data

    Acryl Data

    Acryl Data

    ...Continuously detect data quality incidents in real-time, automate anomaly detection to prevent breakages, and drive fast resolution when they do occur. Acryl Cloud supports both push-based and pull-based metadata ingestion for easy maintenance, ensuring information is trustworthy, up-to-date, and definitive. Data should be operational. Go beyond simple visibility and use automated Metadata Tests to continuously expose data insights and surface new areas for improvement. Reduce confusion and accelerate resolution with clear asset ownership, automatic detection, streamlined alerts, and time-based lineage for tracing root causes.
  • 2
    SmartFlow

    SmartFlow

    Solana Networks

    SmartFlow is an IT cyber security monitoring tool that uses Anomaly Detection to pinpoint hard-to-detect security threats. SmartFlow complements existing signature based security monitoring tools. It analyzes network flow traffic to detect zero-day security attacks. Smartflow is an appliance based solution and targeted for medium and large enterprises. SmartFlow utilizes patent-pending anomaly detection techniques and network behaviour analysis to identify security threats in a network. It applies Solana algorithms on flow data such as Netflow to detect address scans, DDoS attacks, Botnets, port scans, malware etc. ...
    Starting Price: $5000 per year
  • 3
    PowerAI

    PowerAI

    Buzz Solutions

    ...Optimize your inspection with the highest accuracy. PowerAI makes inspections safer, more cost and time-efficient, and more collaborative than ever before. Embrace the future with AI-based visual data processing and keep your people, assets, and community safe. Our AI-based anomaly detection redefines accuracy and consistency in power infrastructure inspections with the most accurate visual data processing in the industry. This precision leads to 50-70% cost savings on data processing and visual anomaly detections as well as 50-60% time savings. ...
  • 4
    Subex Fraud Management
    ...At the heart of the Subex Fraud Management solution is a hybrid rule engine that covers detection techniques like thresholds, expressions, and trends. Rule engine comprises of a combination of threshold rules, geographic rules, pattern (sequential) rules, combinatorial rules, ratio/proportion-based rules, negative rules, hotlist-based rules, etc. which enable you to monitor advanced threats in the network.
  • 5
    Validio

    Validio

    Validio

    ...Anomaly detection learns from your data and seasonality patterns, with automatic backfill from historical data. Machine learning-based thresholds are trained per data segment, trained on actual data instead of metadata only.
  • 6
    Bedrock Security

    Bedrock Security

    Bedrock Security

    ...Your data isn’t static, it’s growing, changing, and moving, making it critical for you to perform security assessments continuously. Efficiently manage remediation and response, integrating behavior-based anomaly detection, SIEM/SOAR integration, policy enforcement, and prioritization based on data context. Mature security programs can frictionlessly enable business operations while effectively managing risk to the brand, revenue, and reputation of the organization. Bedrock’s AIR helps organizations with data minimization, identity and access minimization, and data hardening.
  • 7
    Arkestro

    Arkestro

    Arkestro

    ...Our flexible data model works for every category of spend. If you can source it in Excel, you can source it using Arkestro. Predictive anomaly detection catches and corrects errors before they reach procurement. Role-based access simplifies project management for sourcing events, enabling any stakeholder to get updates. Sourcing events in Arkestro learn from your supplier's behavior to shorten cycles. A simplified email-based workflow provides you with any set of award scenarios for any size or complexity of sourcing events. Supplier quotes are filled with errors from data entry and copy-paste. ...
  • 8
    Sensai

    Sensai

    Sensai

    Sensai provides AI based anomaly detection, root cause analysis and prediction tool, enabling real time resolution of issues. Sensai AI solution significantly improves uptime & time to root cause. Empowers IT leaders to manage SLAs for improved performance and profitability. Streamlines & automates anomaly detection, prediction, root cause analysis (RCA) & resolution.
  • 9
    SentinelTrails

    SentinelTrails

    LogSentinel

    Our blockchain-based technology does not allow any audit trail changes or deletion even by privileged users. Meet the audit trail requirements of many standards and regulations: GDPR, PSD2, PCI-DSS, ISO 27001, HIPAA, SOX, etc. Real-time detailed analysis of everything that happens, as well as AI-driven anomaly detection will prevent any fraud attempts.
  • 10
    Anomalia

    Anomalia

    Scry AI

    Anomalia® uses proprietary AI-Algorithms to identify potential fraud, risk, conflict and non-compliance in financial and legal engagements at transactional level. Anomalia® anomaly detection in ACH Transactions uses customer’s transactional as well as behavioral data to detect anomalies in ACH transactions and prevents fraudulent transactions. Anomalia® anomaly detection in mobile check deposits analyzes authenticity of mobile checks, accounts in which they are deposited and their...
  • 11
    VictoriaMetrics Anomaly Detection
    ...In the dynamic and complex world of system monitoring, VictoriaMetrics Anomaly Detection, a part of our Enterprise offering, is a pivotal tool for achieving advanced observability. It empowers SREs and DevOps teams by automating the intricate task of identifying abnormal behavior in time-series data. It goes beyond traditional threshold-based alerting, utilizing machine learning techniques to detect anomalies and minimize false positives, thus reducing alert fatigue. Providing simplified alerting mechanisms atop unified anomaly scores enables teams to spot and address potential issues faster, ensuring system reliability and operational efficiency.
  • 12
    Shield34

    Shield34

    Shield34

    ...Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests are a huge pain! Shield34 adds defense-and-recovery AI algorithms to every Selenium command, including dynamic element locator, eliminating false positive results, driving self-healing and maintenance-free testing. ...
  • 13
    Lumeus

    Lumeus

    Lumeus

    ...Optimize digital experiences. Modernize network security leveraging your existing infrastructure through an agentless, AI-assisted approach. Enforce access by least privilege. Create identity-based boundaries. Extend to applications, devices, and infrastructure. Instant notifications of escalations. Review all session activity and details from cohesive logs. Enable device fingerprinting and gain network topology insights. Seamlessly connect to your existing infrastructure. Unify connectivity and control from campus to cloud. ...
  • 14
    Digna

    Digna

    Digna

    ...Digna prioritizes data privacy, ensuring compliance with stringent data regulations. Moreover, it's built to scale, growing alongside your data infrastructure. With the flexibility to choose cloud-based or on-premises installation, Digna aligns with your organizational needs and security policies. In conclusion, Digna stands at the forefront of modern data quality solutions. Its user-friendly interface, combined with powerful AI-driven analytics, makes it an ideal choice for businesses seeking to improve their data quality. With its seamless integration, real-time monitoring, and adaptability, Digna is not just a tool; it’s a partner in your journey towards impeccable data quality.
  • 15
    Revelock

    Revelock

    Revelock

    We build a digital fingerprint for each user based on biometric, behavioral, device, IP and network data, then continuously verify users across the user journey. In addition to detection, we empower you to configure policies that automatically respond to malware, phishing, and RATs with Revelock Active Defense. We build the BionicID™ from thousands of parameters collected from behavioral biometrics, behavioral analytics, device, network and threat data.
  • 16
    Mona

    Mona

    Mona

    ...Monitoring is the ‘eyes and ears' needed to observe your data and workflows to tell you if they’re performing well. Mona exhaustively analyzes your data to provide actionable insights based on advanced anomaly detection mechanisms, to alert you before your business KPIs are hurt. Take stock of any part of your production workflows and business processes, including models, pipelines, and business outcomes. Whatever datatype you work with, whether you have a batch or streaming real-time processes, and for the specific way in which you want to measure your performance.
  • 17
    Zilliz Cloud
    Zilliz Cloud is a fully managed vector database based on the popular open-source Milvus. Zilliz Cloud helps to unlock high-performance similarity searches with no previous experience or extra effort needed for infrastructure management. It is ultra-fast and enables 10x faster vector retrieval, a feat unparalleled by any other vector database management system. Zilliz includes support for multiple vector search indexes, built-in filtering, and complete data encryption in transit, a requirement for enterprise-grade applications. ...
    Starting Price: $0
  • 18
    Metaplane

    Metaplane

    Metaplane

    ...Identify downstream impact with automated warehouse-to-BI lineage. Trust takes seconds to lose and months to regain. Gain peace of mind with observability built for the modern data era. Code-based tests take hours to write and maintain, so it's hard to achieve the coverage you need. In Metaplane, you can add hundreds of tests within minutes. We support foundational tests (e.g. row counts, freshness, and schema drift), more complex tests (distribution drift, nullness shifts, enum changes), custom SQL, and everything in between. ...
    Starting Price: $825 per month
  • 19
    Netdata

    Netdata

    Netdata, Inc.

    The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can...
    Leader badge
    Starting Price: Free
  • 20
    Splunk IT Service Intelligence
    ...Predict future incidents using machine learning algorithms and historical service health scores. Use adaptive thresholding and anomaly detection to automatically update rules based on observed and historical behavior, so your alerts never become stale.
  • 21
    Splunk Enterprise
    Splunk Enterprise is a powerful platform that turns data into actionable insights across security, IT, and business operations. It enables organizations to search, analyze, and visualize data from virtually any source, providing a unified view across edge, cloud, and hybrid environments. With real-time monitoring, alerts, and dashboards, teams can detect issues quickly and act decisively. Splunk AI and machine learning features predict problems before they happen, improving resilience and...
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB