Alternatives to ACID Cyber Intelligence
Compare ACID Cyber Intelligence alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ACID Cyber Intelligence in 2026. Compare features, ratings, user reviews, pricing, and more from ACID Cyber Intelligence competitors and alternatives in order to make an informed decision for your business.
-
1
Guardz
Guardz
Guardz is the unified cybersecurity platform purpose-built for MSPs. We consolidate the essential security controls, including identities, endpoints, email, awareness, and more, into one AI-native framework designed for operational efficiency. Our identity-centric approach connects the dots across vectors, reducing the gaps that siloed tools leave behind so MSPs can see, understand, and act on user risk in real time. Backed by an elite research and threat hunting team, Guardz strengthens detection across environments, turning signals into actionable insights. With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve. -
2
Proton Pass
Proton AG
Proton Pass is an open-source password manager based in Switzerland that encrypts your usernames, passwords, bank cards, and encrypted notes and lets users quickly autofill details across all devices and browsers. Proton Pass goes beyond keeping your password safe, it secures your online identity with its additional features and enables secure sharing of log-in information. Proton Pass is built by the same team of scientists who met at CERN and created Proton Mail, the world’s largest encrypted email service. Proton has been recommended by the United Nations for sharing highly sensitive data, and our encryption is open source and battle tested. Proton Pass is the first password manager built by a security company with a privacy-first philosophy. Join the millions of people who have signed up for Proton to protect their information. -
3
SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers.
-
4
ConnectWise Cybersecurity Management
ConnectWise
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy. -
5
DynaRisk Breach Defence
DynaRisk
As your technology footprint evolves, so does your risk profile; make sure you are protected, with DynaRisk's Breach Defence. Alongside our protection capabilities, teach your staff the cyber security basics with our expert training guides and simulated phishing scams so they don’t fall victim to attacks that could expose your business. Our Dark Web Monitor alerts you to leaked data records like credentials, personal information, credit cards and more. We monitor over 350 cyber criminal communities to find data that can be used to break into your accounts and systems. Our Hack Monitor scours the Internet to find indications that cyber criminals are targeting your company or that you’ve been hacked and don’t know it yet. Vulnerability Monitor scans your external infrastructure to look for weaknesses that hackers can exploit. Cyber security doesn't have to be complicated! Protect your business today with Breach Defence.Starting Price: $99 -
6
Breachsense
Breachsense
Protect your organization & staff from data breaches. Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data breaches in real-time enabling you to prevent cyber threats before they happen. Uncover your company’s breached data and malware-infected devices. Track open, deep, and dark web sources such as Tor websites, private ransomware IRC and Telegram channels, criminal forums, and cybercrime marketplaces. Continuous monitoring enables your team to uncover data breaches related to your VIPs, executive team members, employees as well as clients. Find exposed user & employee credentials, ransomware leaks as well as exposed company data being sold or traded on criminal marketplaces and private ransomware forums. Breachsense continuously monitors the internet for sensitive company information such as account credentials, employee details, leaked company data, session tokens, 3rd party data leaks, and more. -
7
Cybersixgill
Cybersixgill
Empower your teams to detect more phishing, data leaks and fraud – better. Level-up vulnerability assessment, enhance incident response, and provide stronger brand protection with exclusive access to the most comprehensive, fully automated collection available from the deep and dark web that includes closed access forums, instant messaging apps, paste sites, and more. Unique threat intelligence that results in unique products: powered by extraordinary data collection and innovative methodologies. Designed to deliver business and technological value for business leaders and their security teams. Unleash cyber security performance with the ultimate underground threat intelligence feed of IOCs (indicators of compromise) data stream. Supercharge your security stack by enriching your IOCs with Darkfeed intelligence and maximize analysts’ performance with a feedstream of malicious hashes, URLs, domains, and IP addresses – before they are deployed in the wild. -
8
Norton Small Business
Norton
Norton Small Business is an all-in-one cybersecurity solution designed to protect small businesses and entrepreneurs from modern digital threats. It combines essential security tools such as real-time antivirus protection, secure VPN, cloud backup, and password management into a single, easy-to-use platform. The software helps safeguard business devices, sensitive data, and online activities without requiring advanced IT knowledge. Norton Small Business also includes dark web monitoring to alert users if critical business information is exposed. Built-in device optimization and automatic software updates help maintain system performance and reduce security vulnerabilities. The platform runs quietly in the background, allowing teams to stay productive while remaining protected. Overall, Norton Small Business delivers reliable, always-on cyber protection tailored for growing businesses. -
9
Acid Library
Blue Analysis
If you're searching for an extremely fast math parser to use in your .Net Projects, you've come to the right place. The Acid Library is a fast mathematical expression parser for the .Net Framework. If you're working on a math feature for your website or on a heavy scientific application, the Acid Library will fit your numbers. The Acid Library is a software component delivered ready to use with Microsoft .Net Framework. It will run natively, without any performance loss on any .Net Language: C#, VB.Net, Delphi.Net, Boo.Net, ASP.Net etc... Delivered as a .dll file, it takes just a few clicks to load it into Visual Studio 2005 or any other .Net IDE for that matter. From there, solving equations and evaluating expressions, hardly takes any time. -
10
ACID Pro
MAGIX
It’s that magic moment again. You hear a song on the radio and you just can’t wait to sample or remix it. True inspiration. With ACID Pro, you will be able to sketch that idea and turn it into a finished track faster than any other DAW. Its unique workflows, innovative features and professional tools were designed specifically for loop- and sample-based music production. Compose, arrange, record, mix and master. But most importantly: be creative. Experience ACID Pro. ACID Pro 11 takes loop-based music production one step further – yet again. Since its historic invention in 1998 leading to today’s industry standard, ACID has continued to offer the most extensive options for arranging, editing and resampling audio. Countless artists have relied on ACID and its workflow to create some of the most famous compositions in IDM and EDM. ACIDized loops let you manipulate audio material and immediately get creative with stems. -
11
Lunar
Webz.io
Make detecting threats easy by tracking compromised assets, stolen credentials, and hidden dangers across the dark web. Stop reacting and proactively uncover hidden breaches, stolen data, and emerging threats before they wreak havoc. Track attacker tactics, techniques, and procedures (TTPs) to stay one step ahead of the next attack. Take action to protect your domain, digital assets, and employee data from cybercriminal activity. Stay ahead of threats to your domain, illicit mentions, and cyber incidents with relevant real-time alerts. Easily detect leaked credentials and risk incidents using smart filters and dynamic charts. Search faster so you can get to every threat with AI-powered searches on the deep and dark web. Detect stolen credentials and cyber threats from millions of malicious mentions on the dark web. Monitor stolen privileged credentials, PII, and threats on the deep & dark web with a few clicks. -
12
Norton 360
Norton
Multiple layers of protection for your devices and online privacy. Multi-layered, advanced security helps protect against existing and emerging malware threats to your devices, and help protect your private and financial information when you go online. Browse anonymously and securely with a no-log VPN. Add bank-grade encryption to help keep your information like passwords and bank details secure and private. We monitor and notify you if we find your personal information on the Dark Web. Easily create, store, and manage your passwords, credit card information and other credentials online – safely and securely. Automatic, secure cloud backup for PCs – to store and protect important files and documents against hard drive failures, stolen devices and even ransomware. Get notified if cybercriminals try to use your webcam, and we can help block them.Starting Price: $39.99 per year -
13
CTM360
CTM360
CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep & Dark Web Monitoring, Security Ratings, Third Party Risk Management and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360. Register today to take advantage of our Community Edition option and explore a range of features and functionalities at NO cost.Starting Price: Register today to take advanta -
14
Defendify
Defendify
Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security ScanningStarting Price: $0 -
15
Starcounter
Starcounter
Our ACID in-memory technology and application server enable you to build lightning-fast enterprise software. Without custom tooling or new syntax. Starcounter applications let you achieve 50 to 1000 times better performance without adding complexity. Applications are written in regular C#, LINQ, and SQL. Even the ACID transactions are written in regular C# code. Full Visual Studio support including IntelliSense, debugger, and performance profiler. All the things you like, minus the headache. Write regular C# syntax with MVVM pattern to leverage ACID in-memory technology and thin client UI for extreme performance. Starcounter technology adds business value from day one. We leverage technology that’s already developed and in production, processing millions of business transactions for high-demand customers. Starcounter combines ACID in-memory database and application server into a single platform unmatched in performance, simplicity, and price.Starting Price: Free -
16
Rotate
Rotate
Use the Rotate cloud security platform to secure any business with modular hubs and seamless integrations designed to scale your security needs. Gain greater context on cyberattacks and improve remediation by identifying alerts across all hubs, correlating them, and prioritizing incidents by risk level. Synthesize, consolidate, and manage all hubs in Rotate’s XDR. Use your multi-tenancy control center for vulnerability scans and rapid deployments. Manage unlimited clients through a single pane of glass. Empower your business customers with a complete cybersecurity solution and reduce portfolio risk. Rotate protects all types of organizations in the new world of digital-first work. Get complete cybersecurity for every employee who uses email or brings a device to work. Cyber insurance is essential for any organization at risk of a cyber attack, but coverage can be expensive. Comprehensive protection like the type provided by Rotate can help reduce the overall cost of insurance. -
17
Cyble
Cyble
Cyble is a leading AI-native cybersecurity platform that delivers intelligence-driven defense to help organizations stay ahead of evolving cyber threats. Powered by its Gen 3 Agentic AI, Cyble offers autonomous threat detection, real-time incident response, and proactive defense mechanisms. The platform provides comprehensive capabilities including attack surface management, vulnerability management, brand protection, and dark web monitoring. Trusted by governments and enterprises worldwide, Cyble combines unmatched visibility with scalable technology to keep security teams ahead of adversaries. With advanced AI that can predict threats months in advance, Cyble helps reduce response times and minimize risks. The company also offers extensive research, threat intelligence reports, and personalized demos to support customer success. -
18
Dark Web ID
IDAgent, a Kaseya company
Get More Sales. Streamline Your Costs. Differentiate Your MSP. ID Agent helps your MSP sell your security stack to new and current customers by empowering you with real-time dark web search results (creating urgency), complete with sales & marketing-ready resources and coaching, so you can see profits within 30 days or less. Your Customers are often only concerned about their network passwords being exposed and are not really thinking about the breached 3rd party websites and applications that store their usernames and passwords. With three former CEOs of MSPs on staff, more Managed Service Providers globally rely on ID Agent than any other monitoring software to provide actionable cybersecurity threat intelligence. We have (literally) been in your shoes before, know what challenges and objections you face, and how to overcome them.Starting Price: $300 per month -
19
ACID Music Studio
MAGIX
Easily start your music production with loop-based creation in ACID Music Studio. Develop your own, personal style and progress within the ACID family and become one of the greats on the music scene. With no limits, you have complete creative freedom! Start with ACIDized loops, then edit and make them your own. Choose from over 2,500 loops from genres including hip hop, house and rock. Add instruments – anything from classic MPC-style beats to rich electric piano. Choose from a wide variety of sounds and even record your own singing. For the professional edge, add top quality effects and mix the levels and you're done. It's that simple and now your first song is ready for the world! You're in the ACID zone now and your inspiration takes control! Remix your songs creatively, or import your favorite tracks & add your own flavors. Remix music in your own personal style!Starting Price: $19.99 one-time payment -
20
ACID Point of Sale
ACID Point of Sale
Acid point of sale system (pos) with inventory and customer management Consolidate your retail and online store operations all under one system. Acid point of sale is a highly flexible retail management solution for your business. Engineered from the ground up to maximize your retail management. Optimize your retail store management all in one place. eCommerce/Online Integration. Manage your inventory and sales in real time, and optimize your stock replenishment! Secure Remote Access ACID uses industry leading encryption technology and PCI compliance to safeguard your data. Low Processing Rates. We provide you a choice of the lowest rates from the best credit card processors with no added fees! Acid L Series Black Product Granular inventory control. Manage suppliers, purchase ordering, history and more, all in one place through our centralized system. Dynamically sell custom, bundled, special, ticket, and service products.Starting Price: $390 per month -
21
Falcon X Recon
CrowdStrike
Falcon X Recon exposes digital risk by monitoring the hidden recesses of the internet where criminal actors congregate and underground economies thrive. Falcon X Recon provides real-time visibility to potential threats, reducing investigation time and improving efficiency and response. Take immediate action against digital risk on Day One — Falcon X Recon is built on the cloud-native CrowdStrike Falcon® Platform so there’s nothing to install, administer or deploy. Identify business, reputational and third-party risks emanating from leaked credentials, PII and financial data. View current and historical posts and chatter to track adversary activities and behavior that could pose a cyber or physical risk to your organization and personnel. Customize dashboards to enable users to see, at a glance, current notifications and quickly drill into critical alerts and activity for further research. -
22
Kaduu
Kaduu
Kaduu helps you understand when, where and how stolen or accidentally leaked information in dark web markets, forums, botnet logs, IRC, social media and other sources is exposed. Kaduu’s alerting service can also detect threats before they turn into incidents. Kaduu offers AI-driven dark web analysis, real-time threat alerts and pre-Attack threat indicators. Setup in minutes you will receive instant access to real-time reporting. Employees who are heavily exposed to the Internet are at greater risk of social engineering attacks such as phishing. Kaduu offers the option of monitoring any mention of credit card information (name, part of number, etc.) on the Dark Web.Starting Price: $50 per company per month -
23
Darkscope
Darkscope
In contrast to many other so-called dark web intelligence providers that use OSINT and only aggregate data, Darkscope has developed a human-like search technology that works in the deep web, on social media and in the dark web. Darkscope will run a one-off full Threat Scan of the internet, social media and the dark web on your business, your internet presence and your key people. This will show if you are at risk from a cyber attack and how you can improve your cyber security. Most other threat intelligence providers aggregate threat information using OSINT. Commonly, you will receive a threat intelligence stream that is only between 1% and 5% relevant to you. When you consider that those preparing a cyber attack on your business will have researched you: your staff, partners, and customer base, a stream of generic threat intelligence has only little value if any. -
24
usecure
usecure
Measure, reduce and monitor employee cyber risk through automated Human Risk Management (HRM) — the new class of user-focused security. Identify each user's security knowledge gaps and automate training programs that tackle their risk. With a 100% cloud-based setup, seamless integrations and hand-held onboarding, adding your users and launching usecure is an absolute breeze. When you grow, we grow. That's why we've created a partner program that puts your goals before our own with a truly MSP-friendly model that is driven towards joint success from day one - the way partnership should be. Forget slow SLAs, lengthy email chains and unhelpful live chat scripts — usecure gives you real-time support that focuses on quick resolutions, not just responses. -
25
Apache Trafodion
Apache Software Foundation
Apache Trafodion is a webscale SQL-on-Hadoop solution enabling transactional or operational workloads on Apache Hadoop. Trafodion builds on the scalability, elasticity, and flexibility of Hadoop. Trafodion extends Hadoop to provide guaranteed transactional integrity, enabling new kinds of big data applications to run on Hadoop. Full-functioned ANSI SQL language support. JDBC/ODBC connectivity for Linux/Windows clients. Distributed ACID transaction protection across multiple statements, tables, and rows. Performance improvements for OLTP workloads with compile-time and run-time optimizations. Support for large data sets using a parallel-aware query optimizer. Reuse existing SQL skills and improve developer productivity. Distributed ACID transactions guarantee data consistency across multiple rows and tables. Interoperability with existing tools and applications. Hadoop and Linux distribution neutral. Easy to add to your existing Hadoop infrastructure.Starting Price: Free -
26
NexVision
NexVision Lab
NexVision is an AI-powered platform that provides multi-layered, real-time information gathering and cyber protection. It offers deep, contextual intelligence encompassing targets, motivations, and threat analytics. The platform's advanced search algorithm discovers over 120,000 hidden Tor sites daily, enabling users to access the deep and dark web without the need for anonymizing browsers like Tor. NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.Starting Price: Free -
27
RushDB
RushDB
RushDB is an open-source zero-configuration graph database that instantly transforms JSON and CSV into a fully normalized, queryable Neo4j graph - without the overhead of schema design, migrations, or manual indexing. Designed for modern applications, AI, and ML workflows, RushDB provides a frictionless developer experience, combining the flexibility of NoSQL with the structured power of relational databases. With automatic data normalization, ACID compliance, and a powerful API, RushDB eliminates the complexities of data ingestion, relationship management, and query optimization - so you can focus on building, not database administration. Key Features: 1. Zero Configuration, Instant Data Ingestion 2. Graph-Powered Storage & Queries 3. ACID Transactions & Schema Evolution 4. Developer-Centric API: Query Like an SDK 5. High-Performance Search & Analytics 6. Self-Hosted or Cloud-ReadyStarting Price: $9/month -
28
CYRISMA
CYRISMA
CYRISMA is an all-in-one cyber risk management platform that enables you to discover, understand, mitigate, and manage risk in a holistic and cost-effective manner. Identify and mitigate network and endpoint vulnerabilities, discover and secure sensitive data across cloud and on-prem environments, strengthen OS configuration settings, track compliance, and generate cyber risk assessment reports in a few easy steps. Platform capabilities include (everything included in the price): -- Vulnerability and Patch Management -- Secure OS Configuration Scanning -- Sensitive data discovery; data protection (both on-prem cloud including Microsoft Office 365 and Google Workspace) -- Dark web monitoring -- Compliance Tracking (NIST CSF, CIS Critical Controls, SOC 2, PCI DSS, HIPAA, ACSC Essential Eight, NCSC Cyber Essentials) -- Active Directory Monitoring (both on-prem and Azure) -- Cyber risk quantification in multiple currencies -- Cyber risk assessment and reporting -
29
SpyCloud
SpyCloud
After a data breach, criminals quickly monetize the data, often by using stolen credentials to gain easy access to consumer accounts and corporate systems. If your employees, consumers, or third-parties have credentials or PII exposed in a data breach, they are at high risk of account takeover fraud. SpyCloud can help you prevent account takeover and combat online fraud with proactive solutions that leverage the largest repository of recovered breach assets in the world. Reset stolen passwords before criminals can use them to defraud your users or access sensitive corporate data. Draw on decades-worth of digital breadcrumbs to unmask criminals attempting to defraud your business and your customers. Monitor your critical third party relationships for supply chain breach exposures that could endanger your enterprise. Leverage breach data to protect employees, citizens and your supply chain from credential-based cyber attacks. -
30
ZeroFox
ZeroFox
Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it. -
31
Cobwebs Web Intelligence
Cobwebs Technologies
Our powerful web intelligence solution monitors online activity, collecting and analyzing data of endless digital channels – from the open, deep and dark web, to mobile and social. Our exclusive deep and dark web monitoring technology extracts targeted intelligence from the web’s big data using the latest machine learning algorithms, automatically generating critical insights. The increasing use of social media, mobile apps, and dark web has led to significant growth of illegal activities on the internet. These platforms are used by criminals, terrorists, and hackers and to conduct operations with minimal visibility. Enterprises as well as government agencies deal with manual web investigations on a day to day basis facing the various challenges to do with exposing their digital footprint. Web Intelligence has become a crucial part of Intelligence methodologies and security management. -
32
NordStellar
Nord Security
NordStellar enables you to detect and respond to cyber threats targeting your company, before they escalate. Give your security teams visibility into how threat actors work and what they do with compromised data. Cut down on data leak detection times, save resources with automated monitoring, and minimize risk to your organization. Businesses are often unaware of data leaks until it’s too late. This calls for modern threat exposure management solutions that help your security team spot data leaks — before they become a problem. Reduce the risk of ransomware, ATO, session hijacking, and other cyber attacks that lead to financial losses. -
33
TellFinder
Uncharted Software
Use TellFinder to search vast areas of the deep web or other media troves for connections to known subjects. Discover network personas in a fraction of the time. Better understand your partners, customers and relationships. Score for risk, uncover personas and segment across new dimensions. Find connections between complex concepts. Identify precedents and find areas of novelty. Gather intelligence, detect networks and uncover actors on the deep and dark web. Score for risk factors and link ads across time and space using common contact information, writing style and images. Quickly search through archived web data by searching names, addresses, other attributes, and even images using a Google-like interface. Web results with common attributes are grouped into "personas" to help identify key people and organizations. Quickly investigate relationships between personas that shared extracted attributes such as phone numbers, emails, addresses, or even similar images. -
34
Vigilante Operative
Vigilante
Cyber threats are proliferating at an alarming rate and often result in data exfiltration, network infiltration, data loss, account activity takeover, compromised customer data and reputational damage to an organization. As threat actors become more aggressive and malicious, the burden on IT security professionals becomes greater, especially with tight budgets and limited resources. As these threats become overwhelming, it is more challenging for organizations to gain the upper hand. Operative is our advanced threat intelligence hunting service for enterprise organizations. Vigilante lives within the dark web community to remain ahead of emerging threats, enabling deeper visibility and providing a continuous feedback loop of insight into exposures such as: Third-party risk and exposure, leaked or stolen data, malicious campaigns, attack vectors. -
35
F-Secure ID PROTECTION
F-Secure
Avoid online identity theft with 24/7 data breach monitoring and a password vault that makes signing into your accounts easier and safer. With a combination of human intelligence and dark web monitoring, we are the first to know if your personal information has been exposed in a data breach. If a data breach occurs and your information is exposed, we will give you unique expert advice for each individual type of personal information. Identity theft and account takeover often start with a weak password. Create strong passwords, store them securely, and access them anywhere. By using the easiest password manager and monitoring for data breaches, you can prevent data breaches from becoming identity theft. The email address monitor informs you instantly if your personal information such as name, address, or password associated with the entered address has been exposed in data breaches.Starting Price: €3.99 per month -
36
Social Links
Social Links
We bring together data from 500+ open sources covering social media, messengers, blockchains, and the dark web, to visualize and analyze a holistic picture for streamlining investigations. Conduct investigations across 500+ open sources with the help of 1700+ search methods. Extract user profiles, numbers, messages, groups, and more. View transactions, addresses, senders, recipients, and more. Access an expansive set of original search methods. Gain full access to darknet marketplaces, forums, and more. Delve into an extensive set of corporate sources. A suite of data extraction and analysis methods across social media, blockchains, messengers, and the dark web is connected directly to your in-house platform via our API. An enterprise-grade on-premise OSINT platform with customization options, private data storage, and our widest range of search methods. Companies from S&P500 and law enforcement agencies from 80+ countries rely on Social Links' solutions. -
37
Delta Lake
Delta Lake
Delta Lake is an open-source storage layer that brings ACID transactions to Apache Spark™ and big data workloads. Data lakes typically have multiple data pipelines reading and writing data concurrently, and data engineers have to go through a tedious process to ensure data integrity, due to the lack of transactions. Delta Lake brings ACID transactions to your data lakes. It provides serializability, the strongest level of isolation level. Learn more at Diving into Delta Lake: Unpacking the Transaction Log. In big data, even the metadata itself can be "big data". Delta Lake treats metadata just like data, leveraging Spark's distributed processing power to handle all its metadata. As a result, Delta Lake can handle petabyte-scale tables with billions of partitions and files at ease. Delta Lake provides snapshots of data enabling developers to access and revert to earlier versions of data for audits, rollbacks or to reproduce experiments. -
38
AVG BreachGuard
AVG
Take control of your online privacy by protecting your personal info against data breaches and keeping it from falling into the wrong hands. Monitor the dark web non-stop for your leaked personal info and passwords. Scan your passwords to see if your personal info is at risk and get advice on how to make them stronger. Opt out from companies who try to collect and use your personal info as you browse the web. Automatically send requests to remove your personal info from data broker databases. Make sure your info stays protected by automatically resending removal requests. Prevent marketers from collecting your personal info and selling it to third parties. Check how much of your personal information can be seen publicly on social networks. Learn how to set up your privacy settings in your major accounts to not share more info than necessary.Starting Price: $42.99 per year -
39
ThreatMon
ThreatMon
ThreatMon is an AI-powered cybersecurity platform that combines comprehensive threat intelligence with cutting-edge technology to proactively identify, analyze, and mitigate cyber risks. It provides real-time insights across a wide range of threat landscapes, including attack surface intelligence, fraud detection, and dark web monitoring. The platform offers deep visibility into external IT assets, helping organizations uncover vulnerabilities and defend against emerging threats such as ransomware and APTs. With tailored security strategies and continuous updates, ThreatMon enables businesses to stay ahead of evolving cyber risks, enhancing their overall cybersecurity posture and resilience. -
40
DarkOwl
DarkOwl
We are the industry’s leading provider of darknet data, offering the largest commercially available database of darknet content in the world. DarkOwl offers a suite of data products designed to meet the needs of business looking to quantify risk and understand their threat attack surface by leveraging darknet intelligence. DarkOwl Vision UI and API products make our data easy to access in your browser, native environment or customer-facing platform. Darknet data is a proven driver of business success for use cases spanning beyond threat intelligence and investigations. DarkOwl API products allow cyber insurance underwriters and third party risk assessors to utilize discrete data points from the darknet and incorporate them into scalable business models that accelerate revenue growth. -
41
BergDB
BergDB
Welcome! BergDB is a Java/.NET database designed to be simple and efficient. It was created for us developers who prefer to focus on our specific task, rather then spend time on database issues. BergDB has: simple key-value storage, ACID transactions, historic queries, efficient concurrency control, secondary indexes, fast append-only storage, replication, transparent object serialization and more. BergDB is an embedded, open-source, document-oriented, schemaless, NoSQL database. BergDB is built from the ground up to execute transactions exceptionally fast. And there are no compromises, all writes to the database are made in ACID transactions with the highest possible level of consistency (in SQL-speak: serializable isolation level). Historic queries are important when previous data states are of interest, and also as a fast way to handle concurrency. A read operation never locks anything in BergDB. -
42
ParadeDB
ParadeDB
ParadeDB brings column-oriented storage and vectorized query execution to Postgres tables. Users can choose between row and column-oriented storage at table creation time. Column-oriented tables are stored as Parquet files and are managed by Delta Lake. Search by keyword with BM25 scoring, configurable tokenizers, and multi-language support. Search by semantic meaning with support for sparse and dense vectors. Surface results with higher accuracy by combining the strengths of full text and similarity search. ParadeDB is ACID-compliant with concurrency controls across all transactions. ParadeDB integrates with the Postgres ecosystem, including clients, extensions, and libraries. -
43
TiDB Cloud
PingCAP
A cloud-native distributed HTAP database built for elastic scaling and real-time analytics in a fully managed service, with its serverless tier enabling your launching of the HTAP database in seconds. Elastically and transparently scale to hundreds of nodes for critical workloads without changing business logic. Use what you know about SQL, and maintain your relational model and global ACID transactions while coping with your hybrid workloads at ease. Equipped with a built-in high-performance analytics engine to analyze operational data without using an ETL. Scale-out to hundreds of nodes while maintaining ACID transactions. No need to bother with sharding or facing downtime. Ensure data accuracy at scale, even for simultaneous updates to the same data source. Increase productivity and shorten time-to-market for your applications with TiDB’s MySQL compatibility. Easily migrate data from existing MySQL instances without the need to rewrite code.Starting Price: $0.95 per hour -
44
Iris Identity Protection
Iris Powered by Generali
Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch. By integrating Iris' identity monitoring and alerts into your existing product, your company can: Embed specific features: You have full control to design the user interface and use terminology that aligns best with your customers' needs. Customize fields: Choose the types of data that resonate most with your customers. You can even customize the placement, sequence, and titling fields according to your preferences. Choose how to deliver alerts: Whether you prefer to communicate alerts through SMS, email, or in-app notifications – the choice is yours. -
45
Sedna
Sedna
Sedna is a free native XML database which provides a full range of core database services - persistent storage, ACID transactions, security, indices, hot backup. Flexible XML processing facilities include W3C XQuery implementation, tight integration of XQuery with full-text search facilities and a node-level update language. It provides a number of easy exampes which can be run directly in command line and describes how to run examples provided with Sedna. Sedna distribution comes with an example set based on the XMark XML benchmark. This set allows you to investigate the features of Sedna easily. Examples include bulk load of a sample XML document and a number of sample XQuery queries and updates to this document. Below we will show how to run one of them. -
46
ByePass
iolo
Simple, secure automated password management that helps protect your online identity by safeguarding passwords against hackers. Go beyond Windows Password Manager and simplify the password management process across all of your digital devices. ByePass uses local data encryption to store your passwords safely, only calling them up to fill in online login details as they are needed. ByePass encrypts your credit card data for secure checkout. Online vendors have no access and cannot store the information. Manage your passwords by letting ByePass remember and fill in your login details — no typing needed! Scan the Dark Web to see if any of your passwords appear on lists hackers share, and change them immediately right within ByePass. Let ByePass automatically think up strong, unique passwords for you for the very best password security.Starting Price: $15.95 one-time payment -
47
Constella Intelligence
Constella Intelligence
Continuously monitor thousands of data sources across the public, deep & dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs. And accelerate your investigations by delving deeper into risks threatening your organization. Analyze monikers, enrich information with other datasets, and quickly unmask malicious actors to solve cybercrimes faster. Defending your digital assets against targeted attacks, Constella is powered by a unique combination of unparalleled breadth of data, technology and human expertise from world-class data scientists. Data to link real identity information to obfuscated identities & malicious activity to inform your products and safeguard your customers. Profile threat actors faster with advanced monitoring analysis, automated early warning and intelligence alerts. -
48
Darkfeed
Cybersixgill
Unleash cyber security performance, supercharge your security stack and maximize analysts’ performance with the ultimate underground threat intelligence collection available. Darkfeed is a feed of malicious indicators of compromise, including domains, URLs, hashes, and IP addresses. It relies on Cybersixgill’s vast collection of deep and dark web sources and provides unique and advanced warnings about new cyberthreats. It is automated, meaning that IOCs are extracted and delivered in real-time, and it is actionable, meaning that its consumers will be able to receive and block items that threaten their organizations. Darkfeed also offers the most comprehensive IOC enrichment solution on the market. By enriching IOCs from SIEM, SOAR, TIP or VM platforms, users gain unparalleled context and essential explanations in order to accelerate their incident prevention and response and stay ahead of the threat curve. -
49
Kaseya 365
Kaseya
Kaseya 365 provides seamless access to functions in endpoint management, security, and backup. These solutions are joined under one subscription, effortlessly integrated, and live within the unified interface experience of IT Complete. Gain access and control over devices and the network. Ensure devices and data are protected from intrusion or corruption. Preserve critical data from loss, theft, or exploitation. Do it all consistently, accurately, and within the constraints of small teams. Reduce vendor fatigue by putting all critical components in one easy-to-understand, acquire, and manage subscription. Experience massive improvements in technician efficiency by leveraging the power of workflow integrations and automation. Experience significant budget benefits by saving up to 75% when compared to using a mix of separate competing solutions. Your Kaseya 365 subscription offers everything needed to manage, secure, backup, and automate endpoints in your environment. -
50
ECI
ECI
What our brand stands for is more powerful than ever. At ECI, we use the transformative power of technology to accelerate business inside mid-market financial services companies. With recent acquisitions of Alphaserve and NorthOut, our services now extend in three distinct directions— managed IT services, cybersecurity, and business transformation solutions. Now more than ever, ECI stands for progress—and your business stands to benefit. Achieve maximum stability. Proceed with complete confidence as you safeguard vital data and business operations from external threats. Advance your business performance. Deepen your competitive advantage by boosting productivity with digital innovation. Discover the difference that expansive scale and extensive expertise can make in your IT solutions. Achieve total alignment with a partner that is fully committed to your success and dedicated to the importance of flawless IT.