Alternatives to Athena Security

Compare Athena Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Athena Security in 2026. Compare features, ratings, user reviews, pricing, and more from Athena Security competitors and alternatives in order to make an informed decision for your business.

  • 1
    A10 Defend Threat Control
    A10 Defend Threat Control, a SaaS component of the A10 Defend suite, offers a real-time DDoS attack map and proactive, detailed list of DDoS weapons. Unlike other tools available today that provide convenience at the cost of false positives and false negatives, A10 Defend Threat Control provides hands-on insights into attackers, victims, analytics, vectors, trends, and other characteristics, helping organizations establish a more robust security posture by delivering actionable insights to block malicious IPs that can launch or amplify DDoS attacks.
    Compare vs. Athena Security View Software
    Visit Website
  • 2
    Omnilert

    Omnilert

    Omnilert

    Save lives through early threat detection and rapid response with visual gun detection. Our AI-powered Gun Detect software brings reliable, 24x7 monitoring to security cameras, creating a widely deployable early gun detection solution. Our Emergency Communications and Automation Platform shares needed intelligence through automatic activation of emergency response plans and safety systems. No matter the threat, from guns to severe weather, we help you maximize every critical second and keep your people from harm's way. Safeguard your people, facilities and operations from all of the threats you face today.
    Compare vs. Athena Security View Software
    Visit Website
  • 3
    SMS Storetraffic

    SMS Storetraffic

    SMS Storetraffic

    Smart, efficient, and anonymous People Counters & Analytics for the real world. Our solution allows for simple deployment, capture, and analysis of the number of people that enter a physical location. Optionally we also capture and report occupancy in real-time. We help Retailers, Libraries, Casinos, Universities, Places of worship, Office buildings, and other industries to analyze and take action on their people traffic trend. For Retailers, we offer a specialized package to measure Performance on Traffic, including Conversion Rate and Service Levels. Combining POS data and staff data is easy with our direct integrations. Our Retail Equation simulator allows users to run simulations to plan sales improvement. It is also extremely beneficial as a learning tool to understand the relationship between traffic, staffing, conversion rate, and good quality service.
    Leader badge
    Partner badge
    Compare vs. Athena Security View Software
    Visit Website
  • 4
    ZeroEyes

    ZeroEyes

    ZeroEyes

    ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond.
  • 5
    Amazon Rekognition
    Amazon Rekognition makes it easy to add image and video analysis to your applications using proven, highly scalable, deep learning technology that requires no machine learning expertise to use. With Amazon Rekognition, you can identify objects, people, text, scenes, and activities in images and videos, as well as detect any inappropriate content. Amazon Rekognition also provides highly accurate facial analysis and facial search capabilities that you can use to detect, analyze, and compare faces for a wide variety of user verification, people counting, and public safety use cases. With Amazon Rekognition Custom Labels, you can identify the objects and scenes in images that are specific to your business needs. For example, you can build a model to classify specific machine parts on your assembly line or to detect unhealthy plants. Amazon Rekognition Custom Labels takes care of the heavy lifting of model development for you, so no machine learning experience is required.
  • 6
    Xtract One

    Xtract One

    Xtract One

    Xtract One is the future of entry and perimeter security, offering industry-leading AI-powered software and hardware solutions designed to protect people more effectively and efficiently, without sacrificing their sense of well-being or privacy. SafeGateway is an accurate, fast, and unobtrusive solution to the seamlessly secure patron and employee entrances. This innovative solution automatically scans entrants for concealed weapons such as guns, knives, and IED components more efficiently and accurately than conventional security measures like metal detectors. This technology reduces or eliminates long lineups, uncomfortable pat downs, and invasive searches. SafeGateway is the ideal choice for stadiums, arenas, live entertainment venues, theaters, casinos, nightclubs, art galleries, and other attractions that require effective security screening, without detracting from the guest experience. Offers a covert security system that alerts to potential threats without disturbing alarms.
  • 7
    SafePointe

    SafePointe

    SoundThinking

    ​SafePointe by SoundThinking is an AI-based concealed weapons detection system designed for high-throughput facilities. Each lane comprises two discreet metal bollards positioned 8–10 feet apart, equipped with an advanced 3D camera and an NVIDIA-powered edge processor running a state-of-the-art AI model. As individuals pass through, the system utilizes magnetic moment technology to identify digital signatures of magnetically conductive objects, analyzing motion data to determine direction, speed, and movement. If a potential threat is detected, information is reviewed by human analysts within 10 seconds to filter out non-threats, such as armed security personnel. Verified threats prompt digital alerts sent to the facility's security team via the SafePointe app, including images and short video clips identifying the individual. It supports unmanned screening, reducing operational costs, and is safe for individuals with medical devices due to its passive screening technologies.
  • 8
    Evolv Express

    Evolv Express

    Evolv Technology

    The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. Visitors want to move quickly through security checkpoints at a seamless pace, knowing they’re well-protected everywhere inside your venue—while your security teams want the assurance that they can reliably pinpoint and stop threats. The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. The new outdoor Evolv Express system has a ruggedized design making it easier to move over rough and sloped surfaces. Customers also have the option to order a retrofit kit for their existing outdoor systems.
  • 9
    Alibi Security

    Alibi Security

    Alibi Security

    Our security solutions and gun detection analytics work with educational institutions of all types to provide their communities with improved security and peace of mind. Our gun detection technology turns any existing security camera into an intruder and gun-detecting smart camera, enabling instant, real-time responses to trespassing and brandished weapons. The system increases school administrations’ ability to react to threats without adding a visible layer of security, providing a safer and more secure campus. AI technology and machine learning are used to recognize weapons from hundreds of thousands of images in a proprietary data set. The solution recognizes the instances guns are brandished, not fired, providing notifications and real-time alerts. The solution detects weapons as soon as they are visible on camera, flagging threats before shots are fired. This provides building security and law enforcement with precious seconds to address the situation.
  • 10
    SafetySmart Platform
    ​The SafetySmart Platform by SoundThinking integrates AI-based software solutions and objective data to assist security teams in ensuring the safety of staff and patrons. Trusted by over 250 agencies across the U.S., the platform offers discreet, unmanned weapons detection systems like SafePointe, which do not interfere with medical devices and enhance visitor experiences in hospitals, corporate locations, hospitality venues, and higher education campuses. It is HIPAA and SOC 2 compliant, emphasizing its commitment to privacy and security standards. Additionally, SafetySmart integrates with existing systems to maximize technology for safety and security.​ SoundThinking prioritizes privacy and has structured our technology, processes, and policies to comply with generally recognized safety and security requirements while safeguarding personal information.
  • 11
    Defendry

    Defendry

    Defendry

    The Defendry Security Suite is a powerful, automated set of components designed to work seamlessly together whether you only need one or two components or the entire suite. The Defendry SeeSay mobile app is the perfect way to get started! It is fast and easy to deploy, and quickly makes everyone part of your security solution. SeeSay empowers anyone with a smartphone to send texts, alerts, and videos of potential threats directly to your security staff. SeeSay can exponentially speed intelligence and communication as a potential threat situation emerges. The smartphone instantly turns into a security camera. Secure direct messaging with security staff. Everyone is part of your security solution. IoTalk gives operations teams the ability to pre-plan every detail of automatic threat response by creating customized, pre-programmed workflows, to speed a well-coordinated response to any type of threat. Defendry can auto-detect hundreds of different kinds of guns and weapons.
  • 12
    Actuate

    Actuate

    Actuate

    Join the 1,000+ companies and schools that use Actuate's AI technology to detect threats and reduce false positives. Instantly detect visibly brandished guns. Detect unpermitted people and vehicles. Identify the formation of large groups of people. Low-cost, cloud-based integration. No new hardware is required. Instant detections are followed by informative alerts within seconds. Built to eliminate bias and respect privacy. Collects no personally identifiable information. Actuate helps organizations be more secure, in the face of high risk, budget limitations, and privacy concerns. Actuate enables moveable construction cameras to automatically detect threats to safety and security. Actuate’s AI software enables central station operators to do more with less. Alerts staff to threats at offices, shopping malls, and other commercial buildings. Detects threats instantly in hospitals and clinics, keeping staff and patients safe.
  • 13
    Interplay

    Interplay

    Iterate.ai

    Interplay Platform is a patented low-code platform with 475 pre-built connectors (enterprise, AI, IoT, Startup Technologies). It's used as middleware and as a rapid app building platform by big companies like Circle K, Ulta Beauty, and many others. As middleware, it operates Pay-by-Plate (frictionless payments at the gas pump) in Europe, Weapons Detection (to predict robberies), AI-based Chat, online personalization tools, low price guarantee tools, computer vision applications such as damage estimation, and much more. It also helps companies to go to market with their digital solutions 10X to 17X faster than in old ways.
  • 14
    Coram AI

    Coram AI

    Coram AI

    Coram AI is a modern video security platform that integrates advanced artificial intelligence to enhance physical security operations. Compatible with any IP camera, Coram AI offers seamless integration, allowing businesses to utilize their existing surveillance infrastructure without the need for extensive replacements. It delivers instant alerts for critical events, such as slip-and-fall incidents and weapon detection, powered by cutting-edge AI technology. Users can quickly locate specific footage using natural language search capabilities, simplifying the process of finding relevant video clips. Additionally, Coram AI provides tools to optimize operations by tracking productivity, identifying inefficiencies, and supporting data-driven decision-making. The system is designed for scalability, accommodating setups ranging from a few cameras to thousands, and offers a variety of IP cameras that are NDAA and ONVIF compliant, ensuring high-quality video surveillance.
  • 15
    AmberBox

    AmberBox

    AmberBox

    AmberBox is an indoor gunshot detection and response system designed to automatically sense firearm discharge, alert responders, and provide detailed real-time situational data. Its detectors use a patented “tri-factor authentication” method, combining percussion sensing (muzzle blast and shockwave), infrared detection (muzzle flash), and a machine-learning audio analysis that matches shots against thousands of firearm signatures, to reliably detect gunshots without needing a line of sight. Detection happens in as little as 3.6 seconds, with location accuracy accurate to roughly 60 feet, enabling instant alerts to 911 and on-site security through its cloud-based AmberBox Response Platform. Once a shot is detected, it delivers precise information, including the time, number of shots fired, approximate location, and shooter movement; it can integrate with existing security infrastructure (cameras, access control, mass-notification, lockdown systems).
  • 16
    Armory Master Pro

    Armory Master Pro

    Armory Master

    Our weapons tracking system, designed for armory management, is perfect for law enforcement, the military, security firms, gun shops, shooting clubs, and sports shooters. This system ensures efficient and secure firearm tracking. Secures with military-grade technology. Field-tested weapons tracking system. Secure SSL encryption and RFID tracking. RFID technology has greatly improved how we keep track of things like equipment and assets, making it a key player in digital weapons tracking systems. Our experts can help you customize Armory Master Pro, our advanced weapons tracking system, to perfectly fit your needs and prevent weapon loss. Leveraging over 20 years of expertise in asset tracking expertise and a robust portfolio of field-tested projects, our Armory Master Pro offers military-grade precision for weapons tracking systems. Employing advanced SSL encryption and RFID technology, we guarantee high-accuracy firearm tracking.
  • 17
    BE.WEAPON
    BE.WEAPON is a hardware and software solution specially developed to secure and simplify the management of armories for the various army corps and all police forces. BE.WEAPON simplifies and secures your armory management. BE.WEAPON consists of a monitoring application that is combined with an RFID system (passive RFID readers and tags). BE.WEAPON tells you at any time where your equipment is and who is carrying it. If your equipment is not in the armory, you know why and for how long. Optimized management of material handling processes within the armory. Secure and reliable traceability of equipment, weapons, and ammunition. Real-time visualization of the status of weapons, equipment, and ammunition stock (movement history, etc.) Simplified management of hardware maintenance. Simple and fast management of collection/return operations for weapons and equipment. Shortens the time it takes agents to become operational in the field.
  • 18
    IntelliSee

    IntelliSee

    IntelliSee

    IntelliSee is a real-time artificial intelligence (AI) risk mitigation platform working 24/7/365 to detect and mitigate threats before an incident occurs. IntelliSee turns your existing passive surveillance cameras into proactive risk-mitigation tools so you can protect your people, reputation, and financial well-being. Most surveillance today is unmonitored and used only for post-incident documentation. Even when cameras are monitored, overtaxed security staff are performing an error-prone and tedious task on an unmanageable number of screens. IntelliSee offers a reliable, proactive solution by overlaying and continuously scanning your live surveillance feeds for potential threats. When a threat is detected, IntelliSee instantly alerts designated contacts and systems to the nature and location of the threat so you can act.
  • 19
    INTELLEO

    INTELLEO

    INTELLEO

    As the vanguard of our law enforcement software, our Range and Armory Management (RAM) software solution is a scalable, user-friendly, and web-based program. The RAM software allows for the importing of your entire firearms inventory. Standard modules built into the system will assist you with weapons assignment tracking along with maintenance and training records for duty and special team firearms. A weapons testing protocol tracks all weapons repairs and upgrades for safety assurance. Printable reports (derived directly from the software) will assist your agency’s record-keeping by tracking maintenance, use & training and assist in accreditation schedules where applicable. RAM can greatly reduce the frustration associated with documentation of local and federal compliance, including government (1033) surplus programs. Our range and armory software is available to law enforcement agencies throughout the United States.
  • 20
    DragonFly IoT Active Shooter Sensors
    An outdoor wireless gunshot sensor performing energy capture, waveform analysis, and transmitting resultant data to the Emergency Automatic Gunshot Detection & Lockdown (EAGL) system, a Gunshot Detection System (GDS). Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy waveform algorithms. Sensor contained within resonance chamber allowing flat wall, corner, or pole mounting capability while providing an optimum spherical detection coverage area. Threat validation data is wirelessly transmitted by sensor to the EAGL System Server via internal Quectel. Sensor data received by the EAGL System Server is processed further while initiating the appropriate pre-programmed automatic and autonomous adaptive response feature and process. Sensor also receives calibration data from the EAGL Server using similar communication processes and methods.
  • 21
    Exigent-GR

    Exigent-GR

    Arcarithm

    Applying Artificial Intelligence to identify guns as early as possible to save lives. The Exigent®-GR gun detection capability is based on AI technology developed by Arcarithm for the US Army. The technology was originally developed to detect both drones and guns, based on the concept that a larger operational space allows more reaction time. Current security camera systems require a human to identify gun threats. Even dedicated security professionals using the best camera system cannot provide 100% real-time observation. An effective, proactive solution is needed to identify guns before they enter the building and shots are fired. Autonomously detects people with guns as early as possible, before shots are fired. Instantly analyzes imagery using AI algorithms to determine the type of gun (long gun vs. pistol). Automatically notifies security officials via text message or email showing the person with the gun, their location and type of gun.
  • 22
    FireFly Indoor Gunshot Detector
    The FireFly® Indoor Gunshot Detector is wireless and designed to work in Indoor environments. Installation basically entails attaching each sensor using only two fasteners. Sensor placement determines detection area coverage, unobstructed spherical range can be as much as 31,415 sqft. Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy level and waveform analysis algorithms. The sensor is mounted to horizontal ceiling substrates providing a spherical detection coverage area of ~31,415 FT2. Sensors can be attached to vertical columns presenting a decreased coverage area. Threat validation data is wirelessly transmitted by the sensor to the EAGL System Server via the EAGL Gateway. Data received by the EAGL System Server is processed further initiating the appropriate pre-programmed automatic and autonomous Adaptive Response feature and process.
  • 23
    Tutelare Corporation

    Tutelare Corporation

    Tutelare Corporation

    We are committed to maximizing the protection of people using innovative and proprietary technologies. Our founders bring over 20 years of experience and proven track records for designing and building high-level electronics, sensors, and mechanical devices for space, defense, and security industries under UNI EN 9100:2009 Certification. The Tutelare Corporation is a USA-based company that combines new technology development capabilities, industrial design, system integration, and access to financial programs and has a network of top-level international contacts. The Tutelare Corporation expects to offer complete and highly competitive products, solutions, and services. The wearable WFWDs provide mobile threat detection perfect for bodyguards, security guards, and law enforcement. The fixed WFWDs can help secure events and buildings such as churches, airports, synagogues, schools, malls, sports stadiums, public events and crowded areas.
  • 24
    SHIELD

    SHIELD

    Plectrum

    SHIELD is a weapons and armory management system that is designed and customized to fit the specific needs of organizations handling weapons. It is a secure, quick, and efficient system for authenticating users and their assigned weapons, it is a system that keeps track of all weapons and their handlers using RFID and GPS technology to guarantee accountability and responsibility at all times, a single interface connected to all armory locations for quick reliable retrieval of weapon inventory and location information. SHIELD is also used as a critical asset management solution, not just a weapons management solution, that allows for accurate inventories and authenticated transfer of weapon ownership. As an enterprise software system for the management of arms and ammunition. SHIELD consists of various modules that will make the armorer’s administrative operations easier and less tedious. SHIELD comes with a bundle of benefits to the armorer and the services at large.
  • 25
    DarkIQ

    DarkIQ

    Searchlight Cyber

    Spot cyberattacks. Earlier. Monitor, pre-empt, and prevent costly security incidents–against your brand, suppliers, and people with actionable dark web alerts. Think of us like your automated analyst. DarkIQ is your secret weapon, continuously monitoring the dark web for cybercriminal activity. It detects, categorizes, and alerts you to imminent threats so that you can take action against cybercriminals before they strike. See what threat actors are planning. Spot the early warning signs of attack including insider threat, executive threat, and supply chain compromise before they impact your business.
  • 26
    ARMS RFID

    ARMS RFID

    ARMS RFID

    The ARMS armory management system is a computerized registry of weapons, gear, ammo, officers, certifications, and posts integrated with bar coding and RFID technology for rapid assignments, issues, and returns, and supporting security infrastructure to prevent the unauthorized removal of weapons. ARMS was initially developed for the U.S. Department of State for tracking weapons, gear, and ammo issued to embassies and agents worldwide, and has been enhanced for the specific requirements of military and police for optimized armory management. ARMS is mature, robust COTS commercial-off-the-shelf software that has been in continual development since 2007, and is configured for each customer’s exacting requirements. ARMS software can be utilized for warehouses, depots, static armories, and mobile armories. ARMS also tracks weapons maintenance events and test firing, inspection, and cleaning cycles, and tracks officer qualifications and weapons certifications.
  • 27
    VIPRE Email Security

    VIPRE Email Security

    VIPRE Security Group

    VIPRE Email Security protects your email users and business network from the latest, most sophisticated malware, weaponized attachments, and phishing threats that bypass traditional detection methods. As a secure email gateway, it analyzes inbound and outbound emails in real-time for threats. Powerful visual analytics provide visibility into ongoing attacks, enabling quick and precise response to threats. With a simple integration into Microsoft 365, VIPRE can remove malicious or suspicious emails from a user’s inbox even after delivery. Available in two versions: VIPRE Email Security Cloud provides strong core protection, while VIPRE Email Advanced Threat Protection offers advanced, AI-driven techniques for file attachment and link analysis.
    Starting Price: $30/seat/year
  • 28
    Silent Archer
    SRC’s Silent Archer technology delivers end-to-end counter-UAS capabilities to defeat hostile drones, whether a lone target or a UAS swarm. Detects, tracks, classifies, identifies, and engages hostile UAS threats. Electronically disrupts groups 1-5 UAS, including UAS swarms. Complements kinetic weapon systems for layered defense. Solution of choice for VIP protection and events, and by the U.S. Army and Air Force for force protection. The open architecture and sensor-agnostic design of Silent Archer technologies allow for integration with virtually any command and control system, kinetic weapon system, or additional sensor platforms for added functionality. The Silent Archer system can leverage a variety of proven SRC systems while remaining flexible enough to integrate with almost any existing solution. The Silent Archer system is available in multiple configurations to support any mission.
  • 29
    3deye

    3deye

    3deye

    3deye is a pure cloud video surveillance and AI video analytics platform that transforms existing cameras, NVRs, IoT, drones, and body-worn devices into intelligent video sensors without on-site servers or hardware by centralizing live and recorded video in a web-based system, supporting multi-site, multi-brand deployments, and eliminating bridges or gateways; it includes an admin portal, video portal, alarm monitoring portal, billing module, and native iOS/Android apps, all built on AWS for high uptime, cybersecure streaming, and scalability. Its AI analytics offer on-demand object detection, classification, and tracking with metadata, heat maps, people counting, color and area search, behavior and loitering detection, automatic license plate recognition, face recognition, hard hat and safety vest detection, and fire and smoke detection to reduce false alarms, accelerate incident search, and drive real-time alerts.
    Starting Price: $200 per month
  • 30
    RFID Armory Management System
    Keeping an account of weapons is a critical safety task for keeping personnel safe. RFID weapons tracking systems can help maintain in-depth records of who and when weapons are being handled. The RFID Armory Management System uses the latest in database software and RFID technology to enhance the security, accountability, and efficiency of your armory. The system is designed to track and inventory weapons, ammunition, and equipment as these items are issued, returned, and stored. The RFID Armory Management System maintains a complete chain of custody on each asset in the database from initial acquisition to final disposition as well as actively managing personnel access to those assets. RFID chips are stored discreetly within each asset and RFID antennas are mounted at armory exchange windows to automatically track assets as they are issued and returned. The system is monitored by a touchscreen monitor affixed to each exchange window and is optimized for accurate and secure exchanges.
  • 31
    VeponSoft

    VeponSoft

    Cybatesoft

    VeponSoft is a comprehensive software solution for weapons management and tracking, integrating barcodes and handheld barcode readers, alongside biometric registration and verification systems for secure, real-time tracking of weapons and related items. It enables tracking of weapons, magazines, ammunition, arms, and explosive devices like bombs, grenades, and missiles, supporting operational management with role-based and biometric security for each issue of assets. VeponSoft maintains a complete history of each item, including purchase details, department allocations, make, model, and serial numbers, and multi-level categorization. Weapons can be issued and returned to authorized personnel for various duties, such as operational duty, firing tests, cleaning, inspections, and training. The system facilitates accurate reporting for insurance, audits, loss prevention, and statutory requirements, providing nominal reports, daily abstracts, stock status, and more.
  • 32
    Silent Push

    Silent Push

    Silent Push

    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Our solutions include: Proactive Threat Hunting - Identify and track malicious infrastructure before it’s weaponized. Brand & Impersonation - Protect your brand from phishing, malvertisement, and spoofing attacks. IOFA Early Detection Feeds - Monitor global threat activity with proactive intelligence.
  • 33
    ShotSpotter

    ShotSpotter

    SoundThinking

    Precision policing solutions that help save lives, deter crime, and make communities safer. Detect gunshots for consistent, rapid, precise police response. Detect highest crime risk areas for directed patrols to maximum crime deterrence. Protect your officers with enhanced situational awareness. Protect your community by disrupting crime cycles with data-driven solutions that limit bias. Connect with your community and build trust. Connect to data and insights to drive impactful and measurable outcomes. With law enforcement agencies across the U.S. grappling with budget cuts, reduced staffing and nationwide scrutiny, there’s perhaps never been a more challenging time to work in policing. On top of all of this, many departments are also facing the ramifications of siloed data and aging technology. At a time when expediency and efficiency are more important than ever before, many agencies lack the software they need to keep up with the pace of change.
  • 34
    Guardian Indoor Active Shooter Detection System
    Acoustic and Infrared validation for ZERO false alerts when every second counts. All gunshot data processed within the sensor, having no “human in the loop” reduces the risk of errors and associated delays. Sub-one-second alerting with shot detection location for an immediate, informed response. Floor plan map of the facility with audible and visual shot location information. Instant SMS and e-mail notifications to select recipients. Flush mounted in wallboard or ceiling tile, surface mount box for concrete/brick structures, color matching options. Manufactured in the U.S.A. with strict testing and quality control processes. Built-in self-test, regular heartbeat messages, instant maintenance alerts, and a patented handheld testing device. Simulate shots and initiate integrated actions in active shooter drills. Guardian simultaneously detects gunfire and immediately relays this information via floor plan map with shot location, text, e-mail, and other notification pathways.
  • 35
    Flame Analytics

    Flame Analytics

    Flame Analytics

    Flame Analytics is the leading BigData and AI platform that helps transform and make physical spaces smarter with its omnichannel digital marketing and analytics tools. Flame helps you to transform physical spaces thanks to the power of BigData and AI. We use standard and plug and play hardware to build bridges between the online and physical world offering powerful analytics and marketing tools. The real change begins here. It brings energy to your physical spaces, creating unique and memorable experiences. Discover how your customers behave and measure the performance of your physical spaces thanks to the most powerful and comprehensive analytics platform. Establish communication channels with your clients and visitors in physical spaces thanks to onboarding tools such as Guest WiFi and Mobile Apps. Create audiences based on your customers´ behavior and send them personalized digital campaigns based on location. Boost customer experience like never before.
  • 36
    Bolster

    Bolster

    Bolster

    Auto-takedown is your new secret weapon to combat fraud and risk. Protect your online presence from typosquat attacks, phishing sites, or ATO campaigns. Eliminate these threats for your employees, customers, and supply chain partners automatically with zero human intervention. Rich threat intelligence and real-time results give you maximum visibility and control. Bolster saves you hundreds of hours by gathering brand infringement evidence automatically and taking down phishing and fraud sites automatically in minutes. We also offer a team of takedown analysts that manage more complex takedowns or providers who are difficult to work with. Detect SaaS platform abuse and prevent it from being used for phishing or fraud campaigns. Our real-time detection API detects phishing, fraud, and scam URLs by scanning each site using a combination of computer vision and natural language processing. The API taps a combination of natural language processing, logo detection and computer vision.
  • 37
    Huq

    Huq

    Huq Industries

    Huq's place performance platform offers instant access to the KPIs that matter to teams in retail, government and real-estate. From daily footfall volumes to live catchment areas, visit dwell-time and visit frequency, our verified and trusted insights are powering important decisions around the world today. ▶︎ What makes Huq's platform unique? Leading retail groups, government departments and real-estate companies choose Huq's platform because we put insight quality at the centre of everything we do. • insights are backtested against 15+ external indices • trusted by over 70+ leading gov/CRE/retail organisations • unique visitor footfall reporting for true market sizing • instant coverage across the UK, Europe and beyond • a zero-hardware solution: no equipment, no installation • insights delivered via a clean, decision-ready platform Join over 70+ councils, multiple retailers and real-estate groups who use Huq as an effective evidence base to inform decision-making.
    Starting Price: £1000/Place/Annum
  • 38
    Detector Pro

    Detector Pro

    Detector Pro

    Detector Pro is your ultimate weapon against the AI invasion. Cut through synthetic content with razor-sharp accuracy, exposing fake text and images in an instant. For publishers, marketers, and defenders of authenticity, Detector Pro doesn’t just detect AI—it destroys it. In a world flooded with fakes, only the real gets through.
    Starting Price: $25/month
  • 39
    Pangiam Project DARTMOUTH
    Project DARTMOUTH is a collaboration between Pangiam and Google Cloud. It utilizes AI and pattern analysis technologies to digest and analyze vast amounts of data in real-time, identifying potentially prohibited items in carry-on baggage, checked baggage, airline cargo, and shipments. Pangiam's National Security-grade technology, combined with Google Cloud's AI suite, offers an AI-based solution built to open architecture standards, ensuring interoperability with existing hardware and equipment in a "plug and play" manner. This facilitates the quick transformation of security operations through advanced software. The solution runs on open platforms and software, allowing integration with any security technology regardless of manufacturer, enabling scalability across checkpoints and beyond. By deploying software and machine learning models on disconnected edge devices, it brings powerful capabilities to the frontline.
  • 40
    Senstar

    Senstar

    Senstar

    With intelligent video management, video analytics, access control and innovative perimeter intrusion detection systems, Senstar offers a comprehensive suite of proven, integrated technologies. A modular solution for security management and data intelligence, as well as an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. Senstar’s product portfolio is the industry’s best. By selling what we manufacture, Senstar can service, customize and adjust for any project. Where multiple layers of security are needed, Senstar products can work together for complete facility-level solutions.
  • 41
    Sangfor Athena NDR

    Sangfor Athena NDR

    Sangfor Technologies

    Sangfor Athena NDR is an advanced network detection and response platform that provides real-time visibility into network traffic using AI-driven behavioral analytics. It detects sophisticated threats such as lateral movement, insider attacks, and advanced persistent threats often missed by traditional security tools. Athena NDR offers detailed event insights and automated incident responses to help security teams act quickly and confidently. The platform integrates with firewalls and endpoint security solutions for unified threat management. It captures and analyzes traffic across all network segments, identifying anomalies by learning normal behavior patterns. Designed as a lightweight SOC solution, Athena NDR empowers organizations to detect and respond to complex network threats effectively.
  • 42
    OPTEX

    OPTEX

    OPTEX

    From self-monitoring App based visual verification to VMS integrations and revolutionary devices that pair cameras and detectors, we have a wide range of solutions to add visual verification to the security system. At Optex we have a vast range of innovative intrusion technology to match your security needs, whether you need sensors for a commercial building or just to keep your house safe, we can provide you with the best solution possible. Our Optex intrusion detection products have the flexibility to cater to your every demand, don't take our word for it, our Optex solution stories can prove it. Optex is the preferred supplier for entrance detection systems. Our portfolio includes safety and activation solutions for automatic swinging, sliding, and revolving doors, as well as products for secured entry and industrial door applications like roll-up and high speed doors.
  • 43
    intuVision VA

    intuVision VA

    intuVision

    intuVision VA offers an all-in-one, server side video analytics solution to meet a wide range of requirements, with application modules in security, retail, parking, traffic, manufacturing, and face & text detection. intuVision VA is fully integrated with popular video management systems (VMS) to add intelligence to your VMS, to analyze video and generate alerts or collect object and event data. Running on Windows or Linux, intuVision VA ingests and analyzes either live or archived video from your VMS to detect events or count objects. Upon detection, events are sent to your VMS, all event data can also be reviewed within intuVision dashboards to generate reports and email notifications. Our comprehensive application modules and flexible licensing provide access to all events of interest in any domain. For example, going beyond counting customers in a retail store with queue management, dwell time reporting, and object taken alerts.
  • 44
    ADI EagleEye

    ADI EagleEye

    Analog Devices

    The ADI EagleEye™ people counting technology enables a complete end-to-end, edge-based hardware and software solution for occupancy monitoring in buildings. The people counting reference design building blocks allow for easy integration so you can solve higher complexity customer problems within your existing models. With our proprietary algorithm and advanced Blackfin® processor, you can easily improve your existing solutions by allowing customers to elevate the efficiency of their spaces, while maintaining security and privacy. The data collection unlocks informed insights needed to improve asset and people management, social distancing, security, employee engagement, space utilization, labor productivity, and energy efficiency. From meeting rooms to cafeterias, and lobbies to open desk people counting, ADI EagleEye is there to solve workspace needs and maximize worker wellbeing and productivity.
  • 45
    V-Count

    V-Count

    V-Count

    Visitor analytics is not just for the web. We live in a world where people are constantly on the move, and physical spaces need to be able to adapt. That's where V-Count comes in. We provide a fast and accurate way to count and analyze visitors in physical locations. Our solutions are powered by our secure cloud-based Business Intelligence Platform (BIP) and the best-in-class Ultima AI sensor, with 99.9% accuracy. Our customers are diverse; from retail to airports, museums, theme parks, to transportation, and every industry with footfall traffic. We designed the dashboards with the customer in mind; customizable and user-friendly - providing easy access for businesses to view each of their location’s performance at any time. The future of people counting is here.
  • 46
    AXIS People Counter

    AXIS People Counter

    Axis Communications

    AXIS People Counter offers a cost-effective way to count your visitors, enabling you to analyze your visitor trends and make informed decisions that can drive business growth. From retail stores and public buildings to airports and train stations, this application is ideal for any indoor location where people counting is of interest. Whether you want to evaluate the impact of promotional efforts, enhance visitor experience or reduce costs by optimizing budgets, AXIS People Counter delivers actionable insight. With reliable two-way counting of people in both directions simultaneously you can quickly analyze visitor flow and identify peak visitor times. Direct access to real-time counting data can help you make informed decisions like planning and allocating staff more effectively to increase operational efficiency. Furthermore, its open protocol allows the data to be integrated into third-party business intelligence applications.
  • 47
    Mobile Communications America (MCA)
    MCA can customize video surveillance solutions to fit your specific needs. Our team of professionals assesses your property and designs a solution for you, from installing cameras on your property to setting you up with a security command center to manage it all. Industries ranging from education to manufacturing rely on video surveillance solutions from MCA to protect their property and everyone on it. Trust MCA to do the same for you. And as your security systems integrator, we can integrate a video surveillance system that works with your existing security systems. The best commercial security cameras provide video surveillance that helps businesses and organizations protect their assets and even improve their productivity. At MCA, we partner with leading manufacturers of business security cameras to secure a range of businesses and organizations. Trust MCA’s video surveillance expert technicians to provide cloud video storage you’ll need to keep your property and everyone secure.
  • 48
    Sangfor Athena XDR

    Sangfor Athena XDR

    Sangfor Technologies

    Sangfor Athena XDR is a unified security operations platform that combines GenAI with open architecture to deliver comprehensive threat detection and response across endpoints, networks, email, and cloud environments. It simplifies cybersecurity management by integrating detection, defense, response, reporting, and ticketing into a single centralized system. The platform collects and correlates data from native and third-party sources using AI and machine learning for advanced threat analysis. Athena XDR automates investigation, threat hunting, and response to reduce alert fatigue and accelerate incident handling. Its open architecture supports integration with various security tools, maximizing existing investments. Trusted across industries, Athena XDR enhances security posture and operational efficiency.
  • 49
    Genetec

    Genetec

    Genetec

    Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday.
  • 50
    Scylla

    Scylla

    Scylla

    At Scylla, our mission is to create the best possible AI tech for video surveillance. As a technology-first company, we are committed to leveraging our expertise to deliver unparalleled precision and reliability in our solutions. We not only prioritize safety but also develop highly precise and sensitive AI solutions for video surveillance and security at large. We believe that through innovation and technology, we can provide our clients with the tools they need to protect what matters most and improve productivity of their businesses.