Suggested Categories:

Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
Account-Based Orchestration Platforms
Account-based orchestration platforms enable businesses to coordinate and automate their marketing and sales efforts, focusing specifically on high-value target accounts. These platforms integrate data, processes, and communication channels to create personalized, multichannel engagement strategies for each account. By aligning teams and workflows, they ensure that marketing, sales, and customer success teams work in sync to provide a consistent and customized experience. They also use analytics and automation to optimize outreach, track engagement, and adapt strategies based on real-time insights. Ultimately, account-based orchestration platforms help drive higher conversion rates and stronger relationships with key accounts by delivering targeted, cohesive campaigns.
Value-Based Care Software
Value-based care software is designed to support healthcare providers in delivering patient-centered care that emphasizes quality and outcomes over volume of services. It provides tools to track patient progress, manage chronic conditions, and coordinate care effectively, aligning with the goal of improving health outcomes while controlling costs. By analyzing patient data and monitoring key performance indicators, the software enables providers to identify high-risk patients and proactively intervene. It also helps ensure that healthcare organizations meet regulatory standards and achieve value-based care incentives. Overall, value-based care software is crucial for transitioning healthcare systems to models that reward quality and efficiency in patient care.
AI Knowledge Base Software
AI knowledge base software and AI knowledge management tools are a type of artificial intelligence that helps to store, manage and retrieve data. It can be used for a variety of purposes, such as customer service, product support and research.
Contact-Based Marketing Software
Contact-based marketing platforms are tools designed to facilitate personalized marketing efforts by leveraging contact data to engage prospects or customers through targeted communications. These platforms enable businesses to create, manage, and optimize campaigns that focus on specific contacts, such as leads, current clients, or users within a defined list. By utilizing customer profiles, behavioral data, and interaction history, contact-based marketing platforms allow companies to send personalized emails, messages, or offers to individuals, fostering stronger relationships and increasing the likelihood of conversions.
Project-Based ERP Software
Project-based ERP software is designed to manage the unique needs of organizations that operate on a project basis, integrating essential functions like budgeting, scheduling, resource management, and accounting. This software provides real-time insights into project performance, tracking costs, timelines, and resources to help teams stay on budget and on schedule. It facilitates seamless collaboration by centralizing project data, ensuring that all stakeholders have access to accurate, up-to-date information. With built-in compliance and reporting tools, project-based ERP software aids in adhering to industry regulations and producing detailed project reports. Overall, it enhances project efficiency, improves resource utilization, and provides transparency across all stages of the project lifecycle.
Location-Based Marketing Software
Location-based marketing software helps businesses target and engage customers based on their geographic location, providing personalized and relevant offers, advertisements, and promotions. These platforms use technologies such as GPS, geofencing, beacons, and IP address tracking to deliver real-time marketing messages to customers when they are in specific locations, such as near a store, event, or point of interest. Location-based marketing software often includes features for campaign management, analytics, and customer segmentation, enabling businesses to optimize their marketing strategies based on location data. It can also be integrated with other marketing tools like CRM systems and mobile apps to enhance customer engagement and drive conversions. By using location-based marketing, businesses can improve the customer experience and increase foot traffic, sales, and brand awareness.
Risk-Based Authentication Software
Risk-based authentication (RBA) software are authentication tools that take into account informational and behavioral risk when authenticating users attempting to access systems or identity verification.
Contact Center Knowledge Base Software
Contact center knowledge base software is a type of software used to store and easily access customer service information. It is used to create, store and update self-service resources such as help documents and FAQs. It generally consists of an online searchable database that can be accessed from multiple devices. This allows contact center customer service agents to provide customers with accurate, up-to-date information quickly and efficiently.
Risk-Based Vulnerability Management Software
Risk-Based Vulnerability Management software is a software solution that helps organizations identify, assess and prioritize the security risks associated with their IT systems. This type of solution works to identify and measure any existing vulnerabilities within the organization's environment, allowing for better risk management decisions. It also includes tools used to monitor an organization's environment for potential new threats. Furthermore, it can provide guidance on how to remediate any existing vulnerabilities identified in the network. Finally, it enables organizations to track progress over time as they work to strengthen their cyber security posture.
Account-Based Direct Mail Software
Account-based direct mail software enables businesses to send personalized, physical marketing materials directly to high-value target accounts as part of their account-based marketing (ABM) strategy. The software integrates with CRM and marketing platforms to automate the selection of recipients and customize messages based on account data, ensuring that each piece of mail is relevant to the recipient. It offers tracking and analytics features to monitor engagement, such as delivery confirmation and responses, providing insights into the effectiveness of the campaigns. This approach helps bridge digital and physical marketing channels, creating a more memorable and impactful experience for potential customers. Ultimately, account-based direct mail software enhances outreach efforts by adding a tangible, personalized touch to account-focused marketing strategies.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
AI-Based Learning Management Systems Software
AI-based learning management systems (LMS) leverage artificial intelligence to enhance the educational experience by personalizing learning paths for each student. These systems use algorithms to analyze learners' progress and adapt content, making recommendations based on individual strengths, weaknesses, and preferences. AI-powered LMS can automate administrative tasks, such as grading and feedback, allowing instructors to focus more on interaction and engagement. Additionally, they provide real-time analytics, offering insights into student performance, engagement levels, and overall learning trends.
FAQ Software
FAQ software enables companies to create and manage Frequently Asked Questions sections on their website. FAQ software typically adds or integrates FAQs with a website, but some FAQ software works via a chatbot.
Knowledge Management Software
Knowledge management software is an application used to store, capture, manage and distribute knowledge within organizations. It facilitates the sharing of information between employees and departments in order to ensure better efficiency in operations. This type of software can also provide easy access to organizational documents, data sources and other content. Many tools such as search capabilities, document libraries and collaboration workspaces are typically included in knowledge management software platforms.
Database Software
Database software and database management systems are a type of software designed to store, manage and retrieve data. It is used to organize all kinds of information in an efficient manner, allowing users to quickly access the data they need. Many databases are tailored for specific purposes and applications, ranging from transaction processing systems to large-scale analytics platforms. Database software may be used on its own or connected with other software services for complex operations.
Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
  • 1
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 2
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". ...
    Starting Price: $8 per user per month
  • 3
    ZoneZero

    ZoneZero

    Safe-T Data

    ...Creates true separation of the data and control planes. Applies application-level policies for all of your users. Enables you to apply identity-based segmentation in your network. Introduces MFA to any VPN, service, or application. Central management for full transparency and efficacy. Seamless implementation and rapid deployment.
  • 4
    BeyondCorp Enterprise
    ...A layered approach to security across users, access, data, and applications that helps protect every click from malware, data loss, and fraud. Integrates posture information and signals from leading security vendors, for extra protection. Easily configure policies based on user identity, device health, and other contextual factors to enforce granular access controls to applications, VMs, and Google APIs.
    Starting Price: $6 per user per month
  • 5
    Symatec Secure Access Cloud
    ...Secure Access Cloud provides point-to-point connectivity at the application level, cloaking all resources from the end-user devices and the internet. The network-level attack surface is entirely removed, leaving no room for lateral movement and network-based threats. Its simple-to-set, fine-grained and easy-to-manage access and activity policies prevent unauthorized access to the corporate resources by implementing continuous, contextual (user, device and resource-based context) authorization to enterprise applications allowing secured employee, partners and BYOD access.
  • 6
    Ivanti Connect Secure
    ...Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.
  • 7
    Twingate

    Twingate

    Twingate

    The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain.
    Starting Price: $10 per user per month
  • 8
    Waverley Labs SDP
    ...Removing access to business applications on the internet is reducing attacks. Device posture & identity verified before access granted. Cloud Security Alliance created SDP for its members. SDP connectivity based on need-to-know access model.
  • 9
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. ...
  • 10
    Verizon Software Defined Perimeter (SDP)
    Verizon Software Defined Perimeter (SDP) is a Zero Trust approach to networking for remote access, internal networks and cloud applications. The high-performance solution can help defeat network-based attacks from unauthorized users and devices. One of the top concerns of CIOs today is cloud adoption with many enterprises using two or more cloud vendors. This provides great agility, but often involves the hairpinning of data to access the applications. That makes for lower performance and slower access for users. A second concern is that more employees and contractors are working from home. ...
  • 11
    Sweepatic

    Sweepatic

    Sweepatic

    ...A visual overview of your websites and their response status. A topological, bird’s eye view of your global attack surface with all assets and their interrelation. Knowing what to protect based on actionable insights is key.
  • 12
    Zentry

    Zentry

    Zentry Security

    Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. ...
  • 13
    SAIFE Connect
    ...SAIFE Connect eliminates the concepts of a traditional network perimeter and trusted users and devices. Instead, creating on-demand, zero trust network micro-perimeters for each connected device based on attributes such as user identity, device identity, location, date, time and device posture. Zero trust security monitoring ensures that devices are continuously evaluated as long as they remain connected and are immediately quarantined when found to be out of compliance.
  • 14
    Axis Security

    Axis Security

    Axis Security

    ...Analyze how users interact with your business applications to better detect anomalies, flag potential issues, and ensure networking remains aware of changes in security controls. Use key tech integrations to automatically verify and adapt access rights based on changes in context to protect data and always ensure least-privilege access. Make private apps invisible to the Internet, keep users off the network, and deliver a safer connection to SaaS apps.
  • 15
    Citrix Secure Private Access

    Citrix Secure Private Access

    Cloud Software Group

    Citrix Secure Private Access (formerly Citrix Secure Workspace Access) provides the zero trust network access (ZTNA) your business needs to stay competitive, with adaptive authentication and SSO to IT sanctioned applications. So you can scale your business and still meet today’s modern security standards—without compromising employee productivity. With adaptive access policies based on user identity, location, and device posture, you can continually monitor sessions and protect against threats of unauthorized login from BYO devices—all while delivering an exceptional user experience. And with integrated remote browser isolation technology, users can securely access apps using any BYO device—no endpoint agent needed.
    Starting Price: $5 per user per month
  • 16
    Prisma Access

    Prisma Access

    Palo Alto Networks

    ...Palo Alto Networks is paving the way with Prisma Access. Prisma Access delivers the networking and security that organizations need in a purpose-built cloud-delivered infrastructure Prisma Access uses a common cloud-based infrastructure that delivers protection from over 100+ locations around the world in 76 countries. Customers manage their own security policies with their own dedicated cloud instances, which provides isolation of traffic for privacy.
  • 17
    BloxOne Threat Defense
    ...The solution turns the core network services you rely on to run your business into your most valuable security assets. These services, which include DNS, DHCP and IP address management (DDI), play a central role in all IP-based communications. With Infoblox, they become the foundational common denominator that enables your entire security stack to work in unison and at Internet scale to detect and anticipate threats sooner and stop them faster.
  • 18
    Trustgrid

    Trustgrid

    Trustgrid

    Trustgrid is the SD-WAN for application providers. The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single platform we allow software providers to manage and support distributed application environments from the cloud to the edge. With the Trustgrid platform you can: • Build cloud to on-premise networks at scale • Manage and support 100s of...
  • 19
    InstaSafe

    InstaSafe

    InstaSafe Technologies

    InstaSafe is redefining the challenge of secure access to modern networks by leveraging Zero Trust principles with its security solutions, that ensure seamless access to cloud applications, SAP applications, on-premise data, IoT devices, and multiple other neoteric use cases. InstaSafe discards traditional VPN based conceptions of a network perimeter, instead moving the perimeter to the individual users and the devices they access. The Zero Trust approach followed by InstaSafe mandates a “never trust, always verify' approach to privileged access, without focusing on network locality. InstaSafe ZTAA relies on continuously assessing the trust and risk associated with every user, and the context of their access request, and simultaneously employs a system of comprehensive authentication before grnating least privilege access. ...
    Starting Price: $8/user/month
  • 20
    Appgate

    Appgate

    Appgate

    Bringing together a set of differentiated cloud- and hybrid-ready security and analytics products and services. Today, Appgate secures more than 1,000 organizations across 40 countries. A Focused Approach to Zero Trust. Distributed, on-demand IT created a security problem. With more assets to defend and more complexity to overcome, security leaders are stuck solving today’s problems with yesterday’s solutions. Become a smaller target, making resources invisible and resilient to threat...
  • 21
    Fidelis Halo

    Fidelis Halo

    Fidelis Security

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. ...
    Starting Price: Free
  • 22
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize...
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB