Suggested Categories:

Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
Project-Based ERP Software
Project-based ERP software is designed to manage the unique needs of organizations that operate on a project basis, integrating essential functions like budgeting, scheduling, resource management, and accounting. This software provides real-time insights into project performance, tracking costs, timelines, and resources to help teams stay on budget and on schedule. It facilitates seamless collaboration by centralizing project data, ensuring that all stakeholders have access to accurate, up-to-date information. With built-in compliance and reporting tools, project-based ERP software aids in adhering to industry regulations and producing detailed project reports. Overall, it enhances project efficiency, improves resource utilization, and provides transparency across all stages of the project lifecycle.
Location-Based Marketing Software
Location-based marketing software helps businesses target and engage customers based on their geographic location, providing personalized and relevant offers, advertisements, and promotions. These platforms use technologies such as GPS, geofencing, beacons, and IP address tracking to deliver real-time marketing messages to customers when they are in specific locations, such as near a store, event, or point of interest. Location-based marketing software often includes features for campaign management, analytics, and customer segmentation, enabling businesses to optimize their marketing strategies based on location data. It can also be integrated with other marketing tools like CRM systems and mobile apps to enhance customer engagement and drive conversions. By using location-based marketing, businesses can improve the customer experience and increase foot traffic, sales, and brand awareness.
Risk-Based Authentication Software
Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification.
Account-Based Orchestration Platforms
Account-based orchestration platforms enable businesses to coordinate and automate their marketing and sales efforts, focusing specifically on high-value target accounts. These platforms integrate data, processes, and communication channels to create personalized, multichannel engagement strategies for each account. By aligning teams and workflows, they ensure that marketing, sales, and customer success teams work in sync to provide a consistent and customized experience. They also use analytics and automation to optimize outreach, track engagement, and adapt strategies based on real-time insights. Ultimately, account-based orchestration platforms help drive higher conversion rates and stronger relationships with key accounts by delivering targeted, cohesive campaigns.
Value-Based Care Software
Value-based care software is designed to support healthcare providers in delivering patient-centered care that emphasizes quality and outcomes over volume of services. It provides tools to track patient progress, manage chronic conditions, and coordinate care effectively, aligning with the goal of improving health outcomes while controlling costs. By analyzing patient data and monitoring key performance indicators, the software enables providers to identify high-risk patients and proactively intervene. It also helps ensure that healthcare organizations meet regulatory standards and achieve value-based care incentives. Overall, value-based care software is crucial for transitioning healthcare systems to models that reward quality and efficiency in patient care.
AI Knowledge Base Software
AI knowledge base software and AI knowledge management tools are a type of artificial intelligence that helps to store, manage and retrieve data. It can be used for a variety of purposes, such as customer service, product support and research.
Contact-Based Marketing Software
Contact-based marketing platforms are tools designed to facilitate personalized marketing efforts by leveraging contact data to engage prospects or customers through targeted communications. These platforms enable businesses to create, manage, and optimize campaigns that focus on specific contacts, such as leads, current clients, or users within a defined list. By utilizing customer profiles, behavioral data, and interaction history, contact-based marketing platforms allow companies to send personalized emails, messages, or offers to individuals, fostering stronger relationships and increasing the likelihood of conversions.
Contact Center Knowledge Base Software
Contact center knowledge base software is a type of software used to store and easily access customer service information. It is used to create, store and update self-service resources such as help documents and FAQs. It generally consists of an online searchable database that can be accessed from multiple devices. This allows contact center customer service agents to provide customers with accurate, up-to-date information quickly and efficiently.
Risk-Based Vulnerability Management Software
Risk-Based Vulnerability Management software is a software solution that helps organizations identify, assess and prioritize the security risks associated with their IT systems. This type of solution works to identify and measure any existing vulnerabilities within the organization's environment, allowing for better risk management decisions. It also includes tools used to monitor an organization's environment for potential new threats. Furthermore, it can provide guidance on how to remediate any existing vulnerabilities identified in the network. Finally, it enables organizations to track progress over time as they work to strengthen their cyber security posture.
Account-Based Direct Mail Software
Account-based direct mail software enables businesses to send personalized, physical marketing materials directly to high-value target accounts as part of their account-based marketing (ABM) strategy. The software integrates with CRM and marketing platforms to automate the selection of recipients and customize messages based on account data, ensuring that each piece of mail is relevant to the recipient. It offers tracking and analytics features to monitor engagement, such as delivery confirmation and responses, providing insights into the effectiveness of the campaigns. This approach helps bridge digital and physical marketing channels, creating a more memorable and impactful experience for potential customers. Ultimately, account-based direct mail software enhances outreach efforts by adding a tangible, personalized touch to account-focused marketing strategies.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
AI-Based Learning Management Systems Software
AI-based learning management systems (LMS) leverage artificial intelligence to enhance the educational experience by personalizing learning paths for each student. These systems use algorithms to analyze learners' progress and adapt content, making recommendations based on individual strengths, weaknesses, and preferences. AI-powered LMS can automate administrative tasks, such as grading and feedback, allowing instructors to focus more on interaction and engagement. Additionally, they provide real-time analytics, offering insights into student performance, engagement levels, and overall learning trends.
FAQ Software
FAQ software enables companies to create and manage Frequently Asked Questions sections on their website. FAQ software typically adds or integrates FAQs with a website, but some FAQ software works via a chatbot.
Knowledge Management Software
Knowledge management software is an application used to store, capture, manage and distribute knowledge within organizations. It facilitates the sharing of information between employees and departments in order to ensure better efficiency in operations. This type of software can also provide easy access to organizational documents, data sources and other content. Many tools such as search capabilities, document libraries and collaboration workspaces are typically included in knowledge management software platforms.
Database Software
Database software and database management systems are a type of software designed to store, manage and retrieve data. It is used to organize all kinds of information in an efficient manner, allowing users to quickly access the data they need. Many databases are tailored for specific purposes and applications, ranging from transaction processing systems to large-scale analytics platforms. Database software may be used on its own or connected with other software services for complex operations.
Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
  • 1
    UserLock

    UserLock

    IS Decisions

    Secure Active Directory user logins with Multi-Factor Authentication, Single Sign-On, contextual access controls, and real-time monitoring and reporting. UserLock helps administrators to manage and secure access for every user, without obstructing employees or frustrating IT.
    Starting Price: $2.00/month/user
  • 2
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    ...NetFlow Analyzer is your partner in optimizing bandwidth usage across a million interfaces globally, as well as providing network forensics and network traffic analysis. Reconfigure policies with traffic shaping via ACLs or class-based policies to gain control of the applications that use the most bandwidth. NetFlow Analyzer leverages Cisco NBAR technology to give you deep visibility into Layer 7 traffic and recognize applications that use dynamic port numbers or hide behind known ports.
    Leader badge
    Starting Price: $245
  • 3
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 4
    PathSolutions TotalView
    PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes...
    Leader badge
    Starting Price: $5,747 perpetual
    Partner badge
  • 5
    Allot

    Allot

    Allot

    ...Since 1996 Allot has been helping service providers and enterprises extract more value from their networks and better serve their customers. Learn more about Allot's history and what makes us unique. Differentiate your offering with branded network-based security services for the mass market. Offer your own, branded, network-based security services to the mass market to differentiate your offering. Network-based security services address a real need and generate additional monthly revenues per customer. Service Providers have implemented and delivered Allot Secure as an integral network service, achieving customer adoption rates as high as 50%. ...
  • 6
    AIONCLOUD

    AIONCLOUD

    AIONCLOUD

    ...With so many users and devices connected everywhere, traditional network security only increases complexity and cost, and can no longer solve the underlying problem. MONITORAPP provides Security-as-a-Service (SECaaS) on its cloud-based service platform AIONCLOUD. AIONCLOUD ensures both Website Protection and Secure Internet Access for smooth business operations. The AIONLCOUD Website Protection implemented on edge networks exhibits the same performance strength as physical servers. You can also maintain application performance and security regardless of where your application is located, such as in data centers, cloud, or multi-cloud.
    Starting Price: $35 per month
  • 7
    L7 Defense

    L7 Defense

    L7 Defense

    ...With a team of experienced leaders and innovators, L7 Defense revolutionizes the way organizations protect their APIs from attacks and exposure using disruptive, AI-based technology. Ammune(TM). L7 Defense’s core technology, received in 2020 a Product Leadership Award by Frost & Sullivan, thanks to its novel unsupervised learning AI-based approach regarding applicative protection at the API resolution. Cloud frontend with legacy (on premise) backend tiers through APIs exposes financial institutions to cybersecurity risk.
  • 8
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when...
    Leader badge
    Starting Price: $395
  • 9
    CyCognito

    CyCognito

    CyCognito

    ...Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 10
    GameShield

    GameShield

    Alibaba Cloud

    ...Multi-level disaster recovery architecture and risk management system to block malicious users and prevent DDoS and CC attacks. Supports visual management and multiple built-in features in the console, allowing you to simply scale the architecture. Supports SDK-based query dispatching within several seconds and eight-ISP-based BGP acceleration to guarantee the optimum gaming experience. Supports customization to meet different business demands and save costs. GameShield provides SDKs for multiple platforms, such as Windows, Android, and iOS.
    Starting Price: $1.65 per month
  • 11
    Arista NG Firewall

    Arista NG Firewall

    Arista Networks

    Arista NG Firewall is a modular, software-based network security platform designed to simplify protection and visibility for organizations with limited IT resources. It offers a browser-based, intuitive interface that provides real-time insights into network traffic and user behavior. The firewall proactively blocks malware, phishing, spam, and hacking attempts to safeguard devices and data.
  • 12
    Sectrio

    Sectrio

    Sectrio

    ...To meet this objective, Subex invested in building the world’s largest adaptable honeypot network ground-up while simultaneously building an agile product with features aligned to the needs of our growing customer base. Subex Secure was rebranded as Sectrio in September 2021 to reflect the arrival of the next phase of our product and innovation evolution. Today, Sectrio has deployments across North America, the Middle East, APAC, and Indian markets. Our customer base is spread across verticals. Sectrio also is home to the largest number of cybersecurity domain specialists including the industry’s leading threat research team.
  • 13
    IBM Secure Proxy
    ...Includes proxy support and functions to improve the security of edge-based file exchanges. Provides advanced routing to simplify infrastructure changes, saving time and reducing risk during migrations.
  • 14
    ManageEngine OpManager
    OpManager is a network management tool geared to monitor your entire network. Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with...
    Leader badge
    Starting Price: $95.00/one-time
    Partner badge
  • 15
    MyChat

    MyChat

    Network Software Solutions

    Secure instant messaging system with own server that can work in local area network and over the Internet. Providing collaboration tools for employee engagement. Built-in knowledge base, important notifications with return receipts, Bulletin board, broadcast messages, flexible server management, the system for user rights to access MyChat features, voice/video calls, screen sharing calls, Kanban project management, conferences, private dialogues, extended contact list, available for all platforms: Windows, macOS, Linux, Android, iOS, WEB.
    Starting Price: $6/per user/one-time
  • 16
    Primo VPN

    Primo VPN

    IAInnocationLab

    ...L2TP over IPSec Protocol, L2TP/IPSec VPN Protocol fast and reliable. Multiple connections, supports multiple VPN connections simultaneously. Genuine MAC OS protocol. Based on the original MAC OS VPN protocols. Secured credentials storage and all credentials stored in keychain mac secured infrastructure.
    Starting Price: $3 per month
  • 17
    Soliton

    Soliton

    Soliton Systems

    ...Zero Trust is a security concept where nothing is trusted and assumes a breach is inevitable or has likely already occurred. The Zero Trust approach is a response to trends including hybrid working, Bring Your Own Device (BYOD), and cloud-based assets that are not located within an enterprise-owned network boundary. Zero Trust focuses on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. Treat every user, device, application/workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required using dynamic security policies.
  • 18
    COSGrid MicroZAccess

    COSGrid MicroZAccess

    COSGrid Networks

    ...Highlights: Peer to Peer Overlay model for improved privacy and performance Flexible Deployment - Host/Workload Agent & Gateway approach Integrated Device Trust and Superior Identity MFA based Access Super Simple to Deploy and Manage Platform approach for Comprehensive Security - Support in SD-WAN and SASE Stateful device compliance checks before, and during, a connection Granular policy enforcement
    Starting Price: ₹300 per user
  • 19
    Ettercap

    Ettercap

    Ettercap

    ...The Ettercap source code is stored on the Github pages using a GIT repository. Below are the steps to you should follow to ensure you are working off the same code base as everyone else involved in the project. Once you moved to the rc branch you can begin to review the current source code in development. Have a look at our Github Wiki page which provide lot of recommendations how to work with Git(hub) that help to contribute to the project. We are open to everyone who wants to be a part of this project and continue to make it the best MiTM tool available.
  • 20
    IBM Cloud Network Security
    ...With security groups, easily define security policies at the instance level for virtual firewall protection. Quickly and easily accommodate your security needs with a variety of hardware-based firewalls and scalable security groups. Maintain your essential layer of protection and provision your firewalls on the fly without interrupting your service — when you need to and how you prefer. Single-tenant bare metal servers are dedicated to the customer. Running workloads in an isolated environment adds an extra level of security for your workloads, but not all compute severs are the same when it comes to security. ...
  • 21
    Network Critical

    Network Critical

    Network Critical

    ...Network Critical’s scalable and persistent visibility layer feeds tools and systems the crucial network data needed to optimize, monitor, and control changing network infrastructure without compromising operations or security. Network TAPs are the base layer of smart network access and are able to monitor events on a local network. This means complete network visibility is maintained across all network security and monitoring platforms. Provides excellent performance and flexibility, needed to manage tools that are protecting network infrastructure, securing information, and keep up with the ever-changing attack environment.
  • 22
    Stamus Networks

    Stamus Networks

    Stamus Networks

    Network-based threat detection and response solutions from Stamus Networks. Expose serious threats and unauthorized activity lurking in your network. We tap into the inherent power of network traffic to uncover critical threats to your organization. We offer the best possible asset-oriented visibility and automated detection to help practitioners cut through the clutter and focus on serious and imminent threats.
  • 23
    CacheGuard

    CacheGuard

    CacheGuard Technologies

    CacheGuard-OS transforms a virtual or bare metal machine into a powerful and easy to handle network appliance. It's a Linux based Operating System built from scratch and especially designed to Secure and Optimize the network traffic. Great care has been taken by CacheGuard-OS developers to select the best of the best Open Source technologies to integrate into CacheGuard-OS. The result is a robust and trustworthy solution that can be up and running within minutes.
    Starting Price: $0
  • 24
    Axis Security

    Axis Security

    Axis Security

    ...Analyze how users interact with your business applications to better detect anomalies, flag potential issues, and ensure networking remains aware of changes in security controls. Use key tech integrations to automatically verify and adapt access rights based on changes in context to protect data and always ensure least-privilege access. Make private apps invisible to the Internet, keep users off the network, and deliver a safer connection to SaaS apps.
  • 25
    Isovalent

    Isovalent

    Isovalent

    Isovalent Cilium Enterprise enables cloud-native networking, security, and observability. Your cloud-native infrastructure, powered by eBPF. Connect, secure, and observe cloud-native applications in multi-cluster, multi-cloud environments. A highly scalable CNI and a multi-cluster networking solution that offers high-performance load balancing, advanced network policy management, etc. Shifting security to a process behavior instead of packet header enabling. Open source is at the core of...
  • 26
    Lumeus

    Lumeus

    Lumeus

    ...Optimize digital experiences. Modernize network security leveraging your existing infrastructure through an agentless, AI-assisted approach. Enforce access by least privilege. Create identity-based boundaries. Extend to applications, devices, and infrastructure. Instant notifications of escalations. Review all session activity and details from cohesive logs. Enable device fingerprinting and gain network topology insights. Seamlessly connect to your existing infrastructure. Unify connectivity and control from campus to cloud. ...
  • 27
    DeepSurface

    DeepSurface

    DeepSurface

    DeepSurface helps you make the most of your time so you get the biggest ROI for your activities. Armed with critical knowledge of your as-built digital infrastructure, DeepSurface automates the process of scanning the over 2,000 CVE’s released each month, quickly identifying which vulnerabilities as well as which chains of vulnerabilities pose risk to your environment and which pose no risk – speeding vulnerability analysis so you can focus on what matters most. DeepSurface uses the...
  • 28
    FortiSASE

    FortiSASE

    Fortinet

    SASE is the future of converged security and networking. From ZTNA, SWG to cloud-delivered NGFW, the Fortinet platform provides complete readiness for embracing SASE. FortiSASE is Fortinet’s scalable cloud-based service powered by decades of FortiOS innovations and FortiGuard Labs AI-driven Threat Intelligence delivers best-in-class security and consistent protection for modern hybrid workforce and across all edges. With networks expanding beyond the WAN edge to thin branch networks and the cloud, traditional hub and spoke infrastructure models centered around the corporate data center begin to break down. ...
  • 29
    Trustgrid

    Trustgrid

    Trustgrid

    Trustgrid is the SD-WAN for application providers. The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single platform we allow software providers to manage and support distributed application environments from the cloud to the edge. With the Trustgrid platform you can: • Build cloud to on-premise networks at scale • Manage and support 100s of...
  • 30
    NetBird

    NetBird

    NetBird

    ...It radically simplifies deploying secure private networks using the high-performance WireGuard® protocol. Unlike traditional VPNs, NetBird creates decentralized, low-latency, high-throughput private networks with a single management console for identity-based access control. Integrating seamlessly with your IdP for SSO and MFA, it forms direct, encrypted peer-to-peer tunnels between devices, servers, and clouds - no central bottlenecks or single points of failure. Lightweight clients ensure scalability and privacy, with traffic never passing through management services. NetBird supports integrations with CrowdStrike, Intune, SentinelOne, pfSense, and more. ...
    Starting Price: $5/user/month
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB