Suggested Categories:

Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
Account-Based Orchestration Platforms
Account-based orchestration platforms enable businesses to coordinate and automate their marketing and sales efforts, focusing specifically on high-value target accounts. These platforms integrate data, processes, and communication channels to create personalized, multichannel engagement strategies for each account. By aligning teams and workflows, they ensure that marketing, sales, and customer success teams work in sync to provide a consistent and customized experience. They also use analytics and automation to optimize outreach, track engagement, and adapt strategies based on real-time insights. Ultimately, account-based orchestration platforms help drive higher conversion rates and stronger relationships with key accounts by delivering targeted, cohesive campaigns.
Value-Based Care Software
Value-based care software is designed to support healthcare providers in delivering patient-centered care that emphasizes quality and outcomes over volume of services. It provides tools to track patient progress, manage chronic conditions, and coordinate care effectively, aligning with the goal of improving health outcomes while controlling costs. By analyzing patient data and monitoring key performance indicators, the software enables providers to identify high-risk patients and proactively intervene. It also helps ensure that healthcare organizations meet regulatory standards and achieve value-based care incentives. Overall, value-based care software is crucial for transitioning healthcare systems to models that reward quality and efficiency in patient care.
AI Knowledge Base Software
AI knowledge base software and AI knowledge management tools are a type of artificial intelligence that helps to store, manage and retrieve data. It can be used for a variety of purposes, such as customer service, product support and research.
Contact-Based Marketing Software
Contact-based marketing platforms are tools designed to facilitate personalized marketing efforts by leveraging contact data to engage prospects or customers through targeted communications. These platforms enable businesses to create, manage, and optimize campaigns that focus on specific contacts, such as leads, current clients, or users within a defined list. By utilizing customer profiles, behavioral data, and interaction history, contact-based marketing platforms allow companies to send personalized emails, messages, or offers to individuals, fostering stronger relationships and increasing the likelihood of conversions.
Project-Based ERP Software
Project-based ERP software is designed to manage the unique needs of organizations that operate on a project basis, integrating essential functions like budgeting, scheduling, resource management, and accounting. This software provides real-time insights into project performance, tracking costs, timelines, and resources to help teams stay on budget and on schedule. It facilitates seamless collaboration by centralizing project data, ensuring that all stakeholders have access to accurate, up-to-date information. With built-in compliance and reporting tools, project-based ERP software aids in adhering to industry regulations and producing detailed project reports. Overall, it enhances project efficiency, improves resource utilization, and provides transparency across all stages of the project lifecycle.
Location-Based Marketing Software
Location-based marketing software helps businesses target and engage customers based on their geographic location, providing personalized and relevant offers, advertisements, and promotions. These platforms use technologies such as GPS, geofencing, beacons, and IP address tracking to deliver real-time marketing messages to customers when they are in specific locations, such as near a store, event, or point of interest. Location-based marketing software often includes features for campaign management, analytics, and customer segmentation, enabling businesses to optimize their marketing strategies based on location data. It can also be integrated with other marketing tools like CRM systems and mobile apps to enhance customer engagement and drive conversions. By using location-based marketing, businesses can improve the customer experience and increase foot traffic, sales, and brand awareness.
Risk-Based Authentication Software
Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification.
Contact Center Knowledge Base Software
Contact center knowledge base software is a type of software used to store and easily access customer service information. It is used to create, store and update self-service resources such as help documents and FAQs. It generally consists of an online searchable database that can be accessed from multiple devices. This allows contact center customer service agents to provide customers with accurate, up-to-date information quickly and efficiently.
Risk-Based Vulnerability Management Software
Risk-Based Vulnerability Management software is a software solution that helps organizations identify, assess and prioritize the security risks associated with their IT systems. This type of solution works to identify and measure any existing vulnerabilities within the organization's environment, allowing for better risk management decisions. It also includes tools used to monitor an organization's environment for potential new threats. Furthermore, it can provide guidance on how to remediate any existing vulnerabilities identified in the network. Finally, it enables organizations to track progress over time as they work to strengthen their cyber security posture.
Account-Based Direct Mail Software
Account-based direct mail software enables businesses to send personalized, physical marketing materials directly to high-value target accounts as part of their account-based marketing (ABM) strategy. The software integrates with CRM and marketing platforms to automate the selection of recipients and customize messages based on account data, ensuring that each piece of mail is relevant to the recipient. It offers tracking and analytics features to monitor engagement, such as delivery confirmation and responses, providing insights into the effectiveness of the campaigns. This approach helps bridge digital and physical marketing channels, creating a more memorable and impactful experience for potential customers. Ultimately, account-based direct mail software enhances outreach efforts by adding a tangible, personalized touch to account-focused marketing strategies.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
AI-Based Learning Management Systems Software
AI-based learning management systems (LMS) leverage artificial intelligence to enhance the educational experience by personalizing learning paths for each student. These systems use algorithms to analyze learners' progress and adapt content, making recommendations based on individual strengths, weaknesses, and preferences. AI-powered LMS can automate administrative tasks, such as grading and feedback, allowing instructors to focus more on interaction and engagement. Additionally, they provide real-time analytics, offering insights into student performance, engagement levels, and overall learning trends.
FAQ Software
FAQ software enables companies to create and manage Frequently Asked Questions sections on their website. FAQ software typically adds or integrates FAQs with a website, but some FAQ software works via a chatbot.
Knowledge Management Software
Knowledge management software is an application used to store, capture, manage and distribute knowledge within organizations. It facilitates the sharing of information between employees and departments in order to ensure better efficiency in operations. This type of software can also provide easy access to organizational documents, data sources and other content. Many tools such as search capabilities, document libraries and collaboration workspaces are typically included in knowledge management software platforms.
Database Software
Database software and database management systems are a type of software designed to store, manage and retrieve data. It is used to organize all kinds of information in an efficient manner, allowing users to quickly access the data they need. Many databases are tailored for specific purposes and applications, ranging from transaction processing systems to large-scale analytics platforms. Database software may be used on its own or connected with other software services for complex operations.
Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
  • 1
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona or task-based dashboards. ...
    View Software
    Visit Website
  • 2
    Diplomat Managed File Transfer
    ...With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. It features robust capabilities such as PGP encryption, multi-factor authentication, IP-based access rules, and built-in threat intelligence. If you're still relying on manual scripts or outdated FTP tools and you're concerned about audit failures, security gaps, or compliance risks, Diplomat MFT offers a scalable, secure solution you can trust. Start your free trial today.
    Starting Price: $1,149/year
    Partner badge
    View Software
    Visit Website
  • 3
    Feroot

    Feroot

    Feroot Security

    Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis,...
    View Software
    Visit Website
  • 4
    Panda Full Encryption

    Panda Full Encryption

    WatchGuard Technologies

    ...Data encryption minimizes data exposure and provides an additional layer of security and control to your organization. data protection regulations by monitoring and enforcing BitLocker activation on Windows devices. All Aether-based solutions provide intuitive dashboards, detailed reports and change audits. Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
  • 5
    IBM Storage Protect Plus
    ...Cost-effective data retention, data compliance and disaster recovery are achieved via data copy to both on-premises, cloud-based object storage and IBM Storage Protect, including support for physical tape.
    Starting Price: $60 per 10 managed VMs
  • 6
    Prosperoware CAM

    Prosperoware CAM

    Prosperoware

    CAM fixes the challenges, mitigates the risks, and reduces the costs of using multiple collaboration systems, making it easier to provision, classify, protect, move and minimize data for project & relationship-based organizations. CAM streamlines the process of managing & governing data, making it accessible, secure and compliant. CAM minimizes the chaos of data spread across systems, making it easier for users to place documents in the right place and for risk management teams to understand context. Quickly provision Teams, Channels, workspaces, folders, & documents automatically or through a human workflow across systems. ...
  • 7
    TrustLogix

    TrustLogix

    TrustLogix

    The TrustLogix Cloud Data Security Platform breaks down silos between data owners, security owners, and data consumers with simplified data access management and compliance. Discover cloud data access issues and risks in 30 minutes or less, without requiring visibility to the data itself. Deploy fine-grained attribute-based access control (ABAC) and role-based access control (RBAC) policies and centrally manage your data security posture across all clouds and data platforms. TrustLogix continuously monitors and alerts for new risks and non-compliance such as suspicious activity, over-privileged accounts, ghost accounts, and new dark data or data sprawl, thus empowering you to respond quickly and decisively to address them. ...
  • 8
    GRASP German GRC
    ...With the help of the data protection impact assessment (DPIA) and corresponding deletion concepts, you keep your data under control. GRASP guides you through business impact and risk analysis in accordance with ISO 22301 based on the applicability of the standard areas.
    Starting Price: 79€
  • 9
    Azure Information Protection
    ...From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it’s shared with. Configure policies to classify, label, and protect data based on its sensitivity. Classification with Azure Information Protection is fully automatic, driven by users, or based on recommendation. Add classification and protection information for persistent protection that follows your data—ensuring it remains protected regardless of where it’s stored or who it’s shared with. Track activities on shared data and revoke access if necessary. ...
  • 10
    Bedrock Security

    Bedrock Security

    Bedrock Security

    ...Your data isn’t static, it’s growing, changing, and moving, making it critical for you to perform security assessments continuously. Efficiently manage remediation and response, integrating behavior-based anomaly detection, SIEM/SOAR integration, policy enforcement, and prioritization based on data context. Mature security programs can frictionlessly enable business operations while effectively managing risk to the brand, revenue, and reputation of the organization. Bedrock’s AIR helps organizations with data minimization, identity and access minimization, and data hardening.
  • 11
    Normalyze

    Normalyze

    Normalyze

    ...Display a graph of access and trust relationships that includes deep context with fine-grained process names, data store fingerprints, IAM roles and policies in real-time. Quickly locate all data stores containing sensitive data, find all-access paths, and score potential breach paths based on sensitivity, volume, and permissions to show all breaches waiting to happen. Categorize and identify sensitive data-based industry profiles such as PCI, HIPAA, GDPR, etc.
    Starting Price: $14,995 per year
  • 12
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). ...
  • 13
    Ping Identity

    Ping Identity

    Ping Identity

    ...Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 14
    NextLabs

    NextLabs

    NextLabs

    ...It’s powered by a patented dynamic authorization policy engine and is the backbone of NextLabs’ Data Centric Security Suite consisting of Entitlement Management, Data Access Security, and Digital Rights Management (DRM) products. CloudAz integrates automated data classification, attribute-based access control (ABAC), data masking & segregation, digital rights (DRM) protection, and audit capabilities into one powerful platform that enables you to better align policies with rapidly changing business requirements while keeping up with the increasing cybersecurity challenge. The platform can be delivered either on-premises or in the cloud.
  • 15
    Sertainty

    Sertainty

    Sertainty Corporation

    Sertainty Corporation is a Nashville based technology company offering software architects, developers and IT administrators an easy way to embed intelligence into data-files empowering data with an ability to act and react to protect itself. Our goal is to prevent theft of intellectual property, proprietary and confidential information. Data is passive and inert. Data loss and theft is a symptom of the problem.
  • 16
    IBM DataPower Gateway
    ...DataPower appliances deliver a robust XML firewall for the enterprise, using sophisticated checks. The DataPower appliance enables the classification of data requests based on service and application-level information. Enterprise-grade security with the highest level of security assurance certification for critical enterprise apps.
  • 17
    Huawei Data Security Center
    ...DSC displays high, medium, and low risks in data collection, transmission, storage, exchange, usage and deletion. You can efficiently locate the risks and take immediate actions to ensure data security. DSC precisely and efficiently identifies sensitive data sources based on the expert expertise and Natural Language Processing (NLP). DSC provides one-stop protection for both structured and unstructured data from a wide range of sources, such as Object Storage Service, databases, and big data sources. DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, preventing unauthorized access to sensitive data. ...
  • 18
    JetStream DR

    JetStream DR

    JetStream Software

    ...JetStream DR implements Continuous Data Protection (CDP) by constantly replicating data directly into cost-effective Azure Blob Storage and Azure NetApp Files (ANF) to scale independently from compute resources and not compromise performance. Real-time, hypervisor-based replication for continuous data protection. JetStream DR doesn’t require snapshots, so in addition to providing near-zero RPO and instant RTO, application performance stays high. Data transfer is resilient to network interruptions, ensuring that VM protection can continue despite interference or outages in the network connection to the recovery site.
  • 19
    Evervault

    Evervault

    Evervault

    ...We’ll work with you to understand your architecture and provide recommendations on how to integrate Evervault to reduce your compliance scope as much as possible. You’ll integrate Evervault based on one of our architecture templates and we’ll validate your integration to ensure it’s fully compliant. We’ll give you an audit-ready PCI DSS policies and procedures bundle, as well as our PCI DSS Attestation of Compliance (AoC). We’ll also introduce you to an auditor who’s familiar with Evervault’s architecture.
    Starting Price: $395 per month
  • 20
    Abstract Security

    Abstract Security

    Abstract Security

    ...Additionally, let our AI SME help build your policies via natural language requests. No Alert Fatigue – Our AI SME can help summarize insights and prioritize alerts based on MITRE ATT&CK Framework.
  • 21
    Falcon Data Protection
    ...Get instant visibility into data flows, with near-zero configurations, to understand both the known and unknown regresses. Easily define nuanced data classifications based on content patterns, web sources, and more to accurately detect data theft. Reliably detect and prevent the movement of sensitive data by combining both content and context across endpoints, identities, data, and egress channels. Stay compliant and ensure security control with minimal configuration to detect and prevent sensitive PCI, PHI, and PII data leakage. ...
    Starting Price: $99.99 per year
  • 22
    Netwrix Enterprise Auditor
    ...What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. Netwrix Enterprise Auditor contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.
    Starting Price: $10.00/one-time/user
  • 23
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    ...Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 24
    Symmetry DataGuard
    Modern businesses make decisions based on data. Modern privacy legislation is focused on the security and privacy of data. Some businesses are built on data. And as businesses become increasingly digital and move to the cloud, securing that data is more important than ever. While the cloud offers many advantages with flexibility and scalability, it also presents new challenges for data protection.
  • 25
    IBM Guardium Quantum Safe
    ...Guardium Quantum Safe provides comprehensive, consolidated visibility into your organization’s cryptographic posture, vulnerabilities, and remediation progress. Users can define and run policies based on internal security policies and external regulations, integrating with enterprise issue-tracking tools to accelerate compliance.
  • 26
    Thales Data Protection on Demand
    The award-winning Thales Data Protection on Demand (DPoD) is a cloud‑based platform providing a wide range of cloud HSM and key management services through a simple online marketplace. Deploy and manage key management and hardware security module services, on‑demand and from the cloud. Security is now simpler, more cost-effective, and easier to manage because there is no hardware to buy, deploy, and maintain.
  • 27
    Dataguise

    Dataguise

    Dataguise

    ...Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. ...
  • 28
    e-Safe Compliance

    e-Safe Compliance

    e-Safe Systems

    We offer a quick, yet comprehensive assessment to identify and measure risky user actions and offer suggestions on how they can be plugged before they cause damage. e-Safe Compliance is a purpose-built compliance solution that covers all the criteria of major regulations to make sure that your company is completely safe. Traditional DLP relies rigid blocking schemes, which hinder productivity. e-Safe’s People-Centric DLP implements a protection regime based on education, trust, and verification, while ensuring key information remains secure using multi-level encryption. Malicious user actions are detected using machine learning user behaviour analytics, and detection time is greatly reduced by empowering the information owners themselves to be part of the monitoring process. It has been shown time and time again that the biggest threat to the security of sensitive data is human error.
  • 29
    InfoSum

    InfoSum

    InfoSum

    ...There are many applications for InfoSum’s technology, including standard ‘data-onboarding’ to much more sophisticated use cases that allow for the creation of owned identity platforms, the development of new data and advertising products, and the formation of entirely new marketplaces. InfoSum was founded in 2015. The company has multiple patents, protecting its invention of the ‘non-movement of data.’ InfoSum is based in the US, UK and CE, with offices, and customers across Europe and North America. The company is poised for exponential growth
  • 30
    Doppler

    Doppler

    Doppler

    ...The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!
    Starting Price: $6 per seat per month
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB