Alternatives to CounterMeasures

Compare CounterMeasures alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CounterMeasures in 2026. Compare features, ratings, user reviews, pricing, and more from CounterMeasures competitors and alternatives in order to make an informed decision for your business.

  • 1
    SMS Storetraffic

    SMS Storetraffic

    SMS Storetraffic

    Smart, efficient, and anonymous People Counters & Analytics for the real world. Our solution allows for simple deployment, capture, and analysis of the number of people that enter a physical location. Optionally we also capture and report occupancy in real-time. We help Retailers, Libraries, Casinos, Universities, Places of worship, Office buildings, and other industries to analyze and take action on their people traffic trend. For Retailers, we offer a specialized package to measure Performance on Traffic, including Conversion Rate and Service Levels. Combining POS data and staff data is easy with our direct integrations. Our Retail Equation simulator allows users to run simulations to plan sales improvement. It is also extremely beneficial as a learning tool to understand the relationship between traffic, staffing, conversion rate, and good quality service.
    Leader badge
    Partner badge
    Compare vs. CounterMeasures View Software
    Visit Website
  • 2
    Panopta

    Panopta

    Panopta

    Get a 360-degree view of your global network with Panopta's & infrastructure monitoring solution. Stay on top of server, network, & application performance on-premise & in the cloud. Through custom alerts & reporting learn what you need to know about network activity as soon as you require. With our industry-leading automated remediation tool (CounterMeasures) eliminate issues before they threaten your operation. Monitor - Know everything about your public & private infrastructure with our industry-standard four-dimensional oversight: Within your servers, within your network firewall, from over 50 global viewpoints, & through on-demand cloud platform data. Customize the alerts & reports you require from our broad, completely customizable selection. No more alert fatigue or false positives. Automatically clear up incidents with CounterMeasures remediation. Gain time, budget, & peace of mind.
  • 3
    Trellix Cloud Workload Security
    A single-pane view helps consolidate management across physical, virtual, and hybrid-cloud environments. Benefit from secure workloads all the way from on-prem to cloud, across the board. Automates the defense of elastic workloads to eliminate blind spots and deliver advanced threat defense. Leverage advanced host-based workload defense optimized specifically for virtual instances to avoid straining overall infrastructure. Avail virtual machine-optimized threat defenses that help deliver multilayer countermeasures. Gain awareness and protect your virtualized environment and network from external malicious sources. Comprehensive countermeasures, including machine learning, application containment, virtual machine-optimized anti-malware, whitelisting, file integrity monitoring, and micro-segmentation, to protect your workloads. Helps assign and manage all workloads automatically with the ability to import AWS and Microsoft Azure tag information into Trellix ePO.
  • 4
    CAIRIS

    CAIRIS

    CAIRIS

    From assets to countermeasures, factoids to personas, and requirements to architectural components, enter or import a wide range of security, usability, and requirements data to find new insights ranging from interconnections between requirements and risks, to the justification behind persona characteristics. No single view captures a complex system, so automatically generate 12 different views of your emerging design from perspectives ranging from people, risks, requirements, architecture, and even physical location. Automatically generate threat models such as Data Flow Diagrams (DFDs) as your early stage design evolves. Leverage open source intelligence about potential attacks and candidate security architectures to measure your attack surface. Show all the security, usability, and design elements associated with your product's risks.
  • 5
    Analyst1

    Analyst1

    Analyst1

    Analyst1 offers organizations a more efficient method of gathering and enriching threat intelligence - Inundated with various security tools, analysts rarely have time to investigate and remediate all threats. Analyst1 eliminates labor-intensive tasks required to understand which threats matter most. Built by analysts for the enterprise, Analyst1 allows the ability to author, test and deploy effective countermeasures across multiple intrusion detection and prevention systems.
  • 6
    CIRCADIAN

    CIRCADIAN

    CIRCADIAN

    CIRCADIAN®, the leader in FRMS design and implementation consulting, offers the only complete suite of web-based software tools for fatigue risk management systems that provide all three required levels for FRMS control. Fatigue is one of the most common sources of human impairment, costing businesses billions of dollars each year. Yet most operations don’t have an easy way to measure employee fatigue. Determine who is at greatest risk for a fatigue-related incident right now and employ countermeasures. For the first time, the CAS fatigue risk model is now available as a cloud-based tool (i.e., SaaS) providing customers with the ultimate flexibility to run analyses wherever they have internet access. We know that fatigue is one of the most pervasive causes of human error-related accidents, incidents, and injuries, costing billions of dollars each year. Yet, when asked most companies don’t know how much fatigue-related accidents are costing them each year.
  • 7
    V-CUBE Collaboration
    V-CUBE collaboration thoroughly pursues business reform and cost reduction of remote group work, and is also effective in emergency measures in the event of a disaster. Maximize collaboration between remote locations. High-quality data can be shared in real time even overseas in a narrow band, and high-quality voice can be transmitted. You can creatively activate your work by sharing the movement of CAD data in real time and reviewing the design while comparing the actual products at the design / manufacturing site. You can explain while writing on the screen, and share various contents while displaying them by touching the screen. In an emergency, you can quickly grasp the situation at the site, write the necessary information, and quickly convey the countermeasures.
  • 8
    Microsoft Threat Modeling Tool
    Threat modeling is a core element of the Microsoft Security Development Lifecycle (SDL). It’s an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application's design, meet your company's security objectives, and reduce risk. The Microsoft Threat Modeling Tool makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, and security boundaries. It also helps threat modelers identify classes of threats they should consider based on the structure of their software design. We designed the tool with non-security experts in mind, making threat modeling easier for all developers by providing clear guidance on creating and analyzing threat models.
  • 9
    Precise BioLive

    Precise BioLive

    Precise Biometrics

    ​BioLive is Precise Biometrics' AI-powered anti-tampering and liveness detection software designed to drastically reduce fraud and tampering risks. Easily integrated with any fingerprint sensor in mobile or desktop environments, BioLive requires no additional hardware, minimizing costs and operational impact. Leveraging machine learning technology, it can be tailored to specific sensor technologies, maximizing accuracy in distinguishing real fingerprints from fake ones, regardless of spoofing material, process, or tactic. It is upgradeable, and countermeasures are continually being developed to keep pace with emerging spoof threats. BioLive can operate independently of fingerprint-matching algorithms and integrates seamlessly with user authentication applications. It is also tightly integrated with Precise BioMatch Mobile (BMM), enabling mobile device OEMs to meet emerging security standards in many ecosystems.
  • 10
    Transportation Data Analytics
    Our flexible use cases help traffic and transportation professionals access the right data, analyze it effectively, and share valuable information with their peers and stakeholders. Analyze all of your agency’s traffic counts in a unified platform through robust data visualizations, reports, and automated traffic metrics. Integrate consultant reports, tube counts, speed sensors, computer vision, loops and other data collection sources in one geospatial interface. Measure and manage changes in travel time as they result from traffic projects, construction, and more. Access pre-populated, real-time or historical travel time and speed data and easily interact with data through map-based visualizations and charts. Visualize crash data alongside relevant contextual information to uncover insights without time-consuming manual calculations, mapping, or data cleaning. Measure the performance of safety countermeasures and vision zero policies over time with dynamic reporting.
  • 11
    API Critique

    API Critique

    Entersoft Information Systems

    API critique is penetration testing solution. A major leap in REST API Security has been achieved with our first in the world pentesting tool. With the growing number of attacks targeted towards APIs, we have an extensive checks covered from OWASP and from our experiences in penetration testing services to provide comprehensive test coverage. Our scanner generates the issue severity based on CVSS standard which is widely used among many reputed organizations. Your development and operations teams can now prioritize on the vulnerabilities without any hassle. View all the results of your scans in various reporting formats such as PDF and HTML for your stakeholders and technical teams. We also provide XML & JSON formats for your automation tools to generate customized reports. Development and Operations teams can learn from our exclusive Knowledge Base about the possible attacks and countermeasures with remediation steps to mitigate the risks to your APIs.
    Starting Price: $199 per month
  • 12
    Axion Ray

    Axion Ray

    Axion Ray

    Put AI in the hands of your engineers to automatically detect, investigate, & resolve quality issues, months faster. High-precision AI automatically catches and contextualizes issues as soon as a trend emerges in the hands of your customers. Empower your team to solve complex problems instead of being stuck manually analyzing text and disconnected data. Enable your team to gain visibility and collaborate across geographic regions and departments to understand the full scope of an emerging issue. With automatic issue detection and prioritization, your team can focus on identifying root causes and implementing countermeasures to increase customer satisfaction and profitability.
  • 13
    Trulioo

    Trulioo

    Trulioo

    Protect your company and customers from all types of identity risk. Technology improves, regulations evolve and customers want better service. Choose an identity verification provider that can change with you. GlobalGateway makes it easy to leverage the services that fit your business needs, now and in the future. Leverage our expertise to support cross-border compliance with Anti-Money Laundering (AML) and Counter Terrorism Financing (CTF) regulations.
    Starting Price: $99.00/month
  • 14
    F5 Distributed Cloud Bot Defense
    Shape protects web and mobile applications and API endpoints from these sophisticated automation attacks that would otherwise result in large scale fraud. To websites and mobile applications, attackers appear virtually identical to genuine users by hijacking their devices, simulating human behavior, and leveraging stolen identities. Attackers rapidly evolve tools and methods, making it nearly impossible for apps or even humans alone to tell the difference between real and fake. Shape solutions leverage artificial intelligence and machine learning, among other technologies, to accurately determine in real-time if an application request is from a fraudulent source, and if so, effectively mitigate. As soon as new countermeasures are deployed, 5%-10% of attackers will typically attempt to retool and start a new attack. Shape solutions adapt and maintain full efficacy even as attackers evolve.
  • 15
    NameScan

    NameScan

    MemberCheck

    Complete Pay-As-You-Go risk management solutions for organisations worldwide NameScan help organisations, comply with AML/CTF and Sanctions regulations, and reduce their reputational risk, by providing KYC and KYB screening solutions. NameScan is an integrated all-in-one platform, offering Anti Money Laundering and Counter Terrorism Financing solutions. Helping streamline your AML compliance with NameScan's specialised PEP/Sanction and Adverse Media screening solutions. NameScan can help you comply with AML/CTF regulations by screening against our comprehensive global sanctions data which is delivered and monitored in real time. Coverage includes every major global watchlist such as UN, EU, DFAT, and OFAC, and more.
    Starting Price: $0.51 per scan
  • 16
    Comodo Advanced Endpoint Protection
    As Comodo Advanced Endpoint Protection (AEP) protects your endpoints against malware, the AEP application itself routinely comes under attack by malicious applications trying to circumvent its protection. Fortunately, Comodo AEP includes robust self-protection countermeasures that prevent malicious applications from gaining control or circumventing Comodo AEP services. AEP does this by intercepting system calls that might present a threat to the applications such as Terminate Process or Create Remote Thread are obvious examples of calls that might pose a risk to AEP. Other less obvious but actually more dangerous call would be CreateFile as it can do a lot more than just create a file. Comodo AEP intercepts these calls and only allows them to proceed if they won’t harm the Comodo process. Comodo AEP also contains a kernel mode driver that it uses to prevent attempts to modify the system kernel directly.
  • 17
    Jet Trader Pro
    Customized to trade only the EUR/USD, this software is calibrated to profit from the ebbs and flows, the highs and lows, of this currency pair. While other software may trade a myriad of currency pairs, there is a special characteristic within the EUR/USD that is totally unique and undiscovered in other pairs. Because of this, the software was coded to take advantage of this and as you can see, the results over an extended period of time have been phenomenal! Remember these are proven, documented, 3rd party-verifiable results of what’s possible for you. Jet Trader Pro is customized to not accept unnecessary risk, but to utilize a "dynamic price protection strategy” that makes trading safer and so much more lucrative with built-in reversal countermeasures to accumulate profit even when trades are supposed to lose. With such strictly controlled risk, you have an unfair advantage over nearly everyone else who trades the normal way.
    Starting Price: $347 per year
  • 18
    Dedrone DroneTracker
    Drone technology advances rapidly, and only a software-centric solution can keep up. Dedrone’s DroneTracker software, hosted in the cloud or on-premise, uses our DroneDNA database to recognize and classify RF, WiFi, and non-WiFi drones. DroneTracker also integrates with 3rd-party sensors, and triggers alerts and countermeasures. Dedrone sensors and integrated external video cameras record forensic evidence of drone intrusions. A combination of forensic data is automatically captured by the DroneTracker software, including drone manufacturer, model, time and length of drone activity, and video verification. Summary reports are automatically produced and available on-demand for easy analysis of the most critical airspace security data. Dedrone’s advanced, machine-learning algorithms are built-in to DroneTracker software, enabling the system to reliably detect the difference between drones and other moving objects in the airspace.
  • 19
    Sensato Nightingale

    Sensato Nightingale

    Sensato Cybersecurity Solutions

    Nightingale Compliance Manager (CM) provides organizations with a rapid means of determining maturity as well as managing risk and policy exceptions. Nightingale Detection Manager combines network and host intrusion detection, honeypots, and vulnerability assessments to provide unparalleled protection. Nightingale Response Manager (RM) modernizes incident response by integrating playbooks, rapid response and automated countermeasures. We believe genuinely effective cybersecurity is based on a holistic cybersecurity strategy. To enable this, a single platform is essential—a fully integrated platform out-of-the-box. That platform must incorporate your ability to comply with best practices, detect all attacks, and respond quickly. That platform is Nightingale. Practical approaches and solutions to help you achieve and maintain compliance. Industry-leading tools and practices, based on the real-world critical response, help you not just respond but also contain, fight back and recover.
  • 20
    Leviathan Lotan

    Leviathan Lotan

    Leviathan Security Group

    Lotan™ provides your enterprise with the unique capability to detect attacks earlier, and with greater confidence. The fragility of exploits in the face of modern countermeasures and environment heterogeneity often leads to application crashes. Lotan analyzes these crashes to detect the attack and aid the response. Lotan collects crashes using either a simple registry change on Windows, or a small userland application for Linux. A RESTful API allows you to share evidence and conclusions with your existing Threat Defense and SIEM solutions. The API provides insight into each step of Lotan's workflow, including detailed information required to understand and respond to the threat rapidly. Lotan greatly increases the accuracy, rate, and speed with which threats are detected, and impedes the ability of adversaries to operate undetected within your network.
  • 21
    Appinio Market Research
    Trends and consumer needs are constantly changing. Appinio automates market research and collects thousands of answers from your target group within minutes - giving you representative feedback in real-time. We conduct market research as it should be today: fast, simple, valid. To understand their target group's needs, companies need to validate decisions with consumers continuously. This constant exchange enables companies to become consumer-centric, make better decisions, and build better products. Corporate success is significantly linked to the performance of the employees - no matter whether we talk about a small company or an HR department in a corporate group. HR managers can use targeted surveys to better understand their employees and, for example, determine the reasons for dissatisfaction or absenteeism and initiate countermeasures. It also makes sense to survey target groups that correspond to potential applicants in order to optimize recruiting.
    Starting Price: $1.90 per credit
  • 22
    AML Wizard

    AML Wizard

    ComplyTech Global

    AML Wizard is an advanced Anti-Money Laundering (AML) and Counter Financing of Terrorism (CFT) solution that helps businesses stay compliant and protected from financial crime risks. Our platform offers real-time name screening, international sanctions and PEP checks, transaction monitoring, and AI-driven risk profiling—all powered by Acuris Risk Intelligence. Designed for banks, fintechs, microfinance institutions, and insurance companies, AML Wizard makes compliance simple, fast, and reliable. With its cloud-ready architecture and automated reporting, organizations can reduce false positives, save costs, and confidently meet FATF and global regulatory standards.
    Starting Price: $50/month
  • 23
    AML Accelerate

    AML Accelerate

    Financial Crimes Consulting

    AML Accelerate is a cloud-based counter-terrorism financing and AML risk assessment platform designed by experts and is tailored to over 30 financial and non-financial industry sectors. Money laundering and terrorism financing laws apply to millions of organisations of all sizes across different industry sectors and geographies. Complying with increasing regulations can be complex and costly, AML Accelerate is an easy-to-use platform designed by experts to guide you to compliance, saving you time and money. Tailored to over 30 industry sectors and country-specific laws, it provides peace of mind that mandatory anti money laundering regulations are being met and your AML risk being managed. Complying with increasing anti money laundering risk regulations can be complex and costly, with experts in short supply. Designed by experts, so you don’t need to be one. Meet mandatory regulatory compliance requirements for audits.
  • 24
    SEAP

    SEAP

    XTN Cognitive Security

    SEAP® for Mobile is an SDK integrated into the customer’s app and doesn’t require any special permission. SEAP® for Web is JavaScript based, executed in the web browser application environment and does not require the installation of any agent. SEAP® detects malware activity both in mobile and web apps. Some examples of the malware threats monitored include man-in-the-browser and man-in-the-app-attacks, RAT, web injections, overlay attacks, SMS grabbing, memory tampering, and Injection attacks. SEAP® detects and reports technological threats in the device such as jailbreaking and rooting, reverse engineering attempts, binary tampering, repacking. Countermeasures to some of these device conditions can be activated in the app relying on the dedicated RASP APIs. SEAP® detects fraudulent activity taking control of existing user accounts, relying on behavioral biometrics checks and device identity authentication.
  • 25
    EMSupply

    EMSupply

    Juvare

    Built from the ground up on the Juvare platform for emergency preparedness and response assets. Integrated healthcare supply chain management and public health workflows for management of medical supplies in daily operations, emergency situation response, and Strategic National Stockpile (SNS) and Medical Countermeasures (MCM) operations. EMSupply tightly manages inventory processes including SNS and MCM, from initial procurement through receiving, staging, and storing (RSS), through distribution and consumption. Workflows leverage scenario-specific processes, including tracking HCC, PPE, and MSCC equipment, and CHEMPACK units. EMSupply is IMATS compatible and fully integrates with SNS data standards. EMSupply integrates healthcare supply chain management with other popular Juvare solutions including EMResource, EMTrack, eICS, and Juvare Exchange, or can be deployed as a stand-alone solution. As with all Juvare products, EMSupply is easy to learn for rapid time-to-value.
  • 26
    AMLcheck

    AMLcheck

    Prosegur

    Anti-money laundering and counter terrorist financing software. AMLcheck is an anti-money laundering and counter terrorist financing software. Using a single AML (Anti-Money Laundering) tool, companies can prevent, detect and investigate suspicious activity. AMLcheck makes it possible to perform functions including but not limited to identifying people or assets during the onboarding process, performing the mandatory KYC for customers by establishing a profile or score based on the available information and analyzing transactions applying different control scenarios to detect anomalous behaviors. Our partner in this venture is Dow Jones Risk & Compliance, a global leader in data intelligence for anti-money laundering, corruption and economic sanctions.
  • 27
    TeamXP

    TeamXP

    Conducttr

    Conducttr crisis simulation software delivers a high fidelity, realistic exercising environment to build experience and confidence - anywhere. Situational awareness and strategy are key to effective crisis management. Develop a sense of calm and confidence in your crisis team with realistic rehearsals. A simple tweet can destroy a reputation. Make sure that your team knows how to handle a communications crisis through realistic training. Cyber-attacks, natural disasters, product recalls, broken supply chain… Train your team to keep your business running and recovering even when crisis strikes. Exercise in the digital domain in a high fidelity environment, preparing teams for influence operations, hybrid warfare, countering disinformation and counter-terrorism. Conducttr makes out training more immersive and realistic and that means trainees are better prepared for their jobs.
  • 28
    Payatu

    Payatu

    Payatu

    Eliminate security threats through our innovative and extensive security assessments. Our comprehensive cybersecurity services not only help organizations to assess, build, and manage their cybersecurity capabilities, but also enable them to respond to incidents and crises. Extensive/comprehensive testing of all IoT products. Prevent and combat security vulnerabilities related to hardware, firmware, mobile apps, cloud, and others. Measure how your systems, applications, and security controls can withstand online and offline risks. Get counter measures suitable for all your security needs. Ensure that you save time and effort in security bug fixing and patching cycle. Mitigate potential threats to your products. Completely secure your products. Secure your AI application against esoteric and potentially severe security and privacy threats. Extensive audit techniques sweep every corner of your system to discover potential attack surfaces.
  • 29
    PrintScout

    PrintScout

    Enttry Software

    that helps businesses track activities across multiple printers and MFPs and automatically collect counters. PrintScout is a software / service that allows you to monitor printers and MFPs distributed across multiple clients / locations. In addition to automating the collection of print counters (physical counters / hardware) for billing and closing monthly print volume in a single web administration application. The tool is marketed as a SaaS service (Software as a Service) and does not require print servers. Monitoring can take place with any printer or MFP connected to a local network. You pay a monthly fee per monitored printer according to the chosen version. Ideal solution for companies that rent printers, lending, print outsourcing, MPS (Managed Print Services) or provide support for multiple distributed printers. It can be used by small to large companies that are concerned with the management and control of printing assets.
  • 30
    KELA Cyber Intelligence Platform
    Automatically uncover your attack surface by leveraging attackers’ perspectives for proactive protection. Neutralize risk by monitoring your case objectives and assets so that your teams can get actionable intelligence that prevents crimes. We help companies proactively detect and remediate relevant cyber threats, reducing manual workload and enhancing cybersecurity ROI. Strengthen nation-state defenses. Access targeted, actionable intelligence for countering diverse cyber threats. Utilize rich on-premises data and expert insights to enhance efficiency, reduce false positives, and streamline threat profiling. Discover your attack surface from the attacker’s view. Analyze the adversary’s perspective of your company. This comprehensive understanding allows you to assess the level of risk your organization faces and to prioritize security measures accordingly. Combat digital fraud involving online payments, refunds, bank cards, loyalty programs, and more.
  • 31
    Counter Sales

    Counter Sales

    Insight Works

    Counter Sales is an affordable and easy-to-use industrial counter sales and trade desk solution built right into Dynamics 365 Business Central that allows organizations to quickly and easily add retail capabilities to their system. Counter Sales is packed with all the features you’d expect from a powerful Point of Sale system, but in a simple and cost-effective package. Counter Sales is a point-of-sale solution for professional salespeople at trade desks or sales counters. Benefits: - The simple order entry screen and barcode scanning help speed up checkout, leading to higher customer turnover and increased sales. - By offering advanced product search capabilities and multiple payment options, customers enjoy a seamless and convenient shopping experience. - With the ability to manage deposits for orders, businesses can secure early partial or full payments, improving cash flow. - The automated reconciliation process at the end of the day saves valuable time.
    Starting Price: Visit Webpage
  • 32
    Conducttr

    Conducttr

    Conducttr

    Conducttr crisis simulation software delivers a high fidelity, realistic exercising environment to build experience and confidence, anywhere. Situational awareness and strategy are key to effective crisis management. Develop a sense of calm and confidence in your crisis team with realistic rehearsals. Cyber-attacks, natural disasters, product recalls, broken supply chain. Train your team to keep your business running and recovering even when crisis strikes. A simple tweet can destroy a reputation. Make sure that your team knows how to handle a communications crisis through realistic training. Exercise in the digital domain in a high fidelity environment, preparing teams for influence operations, hybrid warfare, countering disinformation and counter-terrorism. Join one of our online simulation events and take part on your own device. Conducttr makes out training more immersive and realistic.
    Starting Price: $7,881 per year
  • 33
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 34
    GPN DATA Payment Gateway

    GPN DATA Payment Gateway

    GPN Data Group International

    GPN DATA offers full, online Payment Gateway services and provides eCommerce merchants with a vast array of innovative, highly developed and state-of-the-art counter risk tools to ensure their transactions are processed fast and securely. Our constant aim is to secure continuous development and provide a payment solution that is always a step ahead of expectations. The gateway was created in-house, by professionals with over 15 years of experience in the credit card processing industry. The gateway is written in a scalable environment, and transactions are stable, secure and reliable. The gateway is highly efficient and designed to process every transaction with no delays. Multiple and diverse security measures are integrated directly in the application, which guarantees the shortest possible transaction time. We constantly retain and analyze data, which has become an indispensable tool in improving our services and providing intuitive solutions based on evidence and numbers.
  • 35
    RC-Capital Model

    RC-Capital Model

    Risk Control Limited

    RC-Capital Model is a high-specification, portfolio modeling framework, supplying rigorously calculated risk statistics for multi-asset portfolios over different holding periods. RC-Capital Model is suitable for credit VaR calculations, counter-party risk analysis, and multi-asset-class analysis for investment firms and asset managers. The framework supplies VaRs, Expected Shortfall capital measures, and the capital contributions of individual exposures and sub-portfolios over horizons ranging from ten days to thirty years. The model is grid-enabled to permit high-speed risk evaluation with large portfolios and offers close to the instantaneous evaluation of capital for single prospective deals. The software may be operated by groups of individuals working on separate portfolios.
  • 36
    Countik

    Countik

    Countik

    Simply enter your TikTok username to track your live follower count, updated in real-time with 100% accuracy. The live TikTok followers counter is a tool that lets you track any account's follower count and likes in real-time. It continuously updates, allowing you to see live changes as they happen. You can also view the counter in Fullscreen mode for a more immersive experience. If you have 10,645 followers, TikTok will simply display '10k'. Additionally, you'll need to manually refresh to see updates. With Countik, our live counter updates your followers in real-time automatically, just keep the tab open. TikTok counter does not pose any risk on your account, because you don't have to give us anything but your username which is already public. Because it uses publicly available data directly from TikTok, our counter is 100% accurate, so you can be confident that what you see is what you have.
  • 37
    CounterBalance
    CounterBalance is more than a software application CounterBalance is a platform. This platform provides complete control over the way your operation is managed. The system provides Customer Relations Management (CRM), Process Control, Scheduling, Cost Item Tracking (Inventory & Time), Account Financial, and more. CounterBalance allows management personnel to develop a custom system tailored to the specific needs of an operation. Develop custom process flows, payment methods, forms, access control, notification and reporting. The CounterBalance platform is as close as you will get to developing the application yourself. All of this done through common and simple user interfaces within the CounterBalance System. Everything needed to customize and maintain your CounterBalance System can be accomplished by you the end user. CounterBalance not only handles the lead and customer interaction in a well structured and consistent model but also manages the inventory aspects of those sales.
  • 38
    Cokonnect

    Cokonnect

    Vibe iSystems

    Clicker counter, guest list and footfall analysis software for bars, nightclubs and venues. ​The ONLY clicker counter that stores your bar or nightclub footfall data in ONE secure place. ​Tally count at your bar or nightclub by using the volume buttons or on screen buttons, with an instant footfall comparison to the previous weeks footfall. Manage your bar or nightclubs' guest list, which syncs with the footfall from your tally counter and can be updated at any time and from any location. All foot traffic data and guest details are stored in your own personal database. Analyze the behavior and trends of the foot traffic at your bar or nightclub. All tally counters at your bar, nightclub or event venue sync foot traffic data together in real time. Whether you are at your bar, nightclub or across the other side of the globe, you can view your venues foot traffic, guest arrivals and make amendments in real time.
    Starting Price: $25.67 one-time payment
  • 39
    Counter Intelligence

    Counter Intelligence

    Kudos Solutions

    Counter Intelligence retail POS management software does what it says — it effectively collects and collates intelligence on the components of your retail business, that is, your sales, products, inventory, customers, and salespersons. Counter Intelligence Office can run in the Cloud, on the same PC as Counter Intelligence POS, or any of our various business network models. Counter Intelligence Office also features an e-commerce Internet shop module called e-Retailer, which enables retailers to effortlessly create a shop that is online, but is managed just like another physical shop. Data Collected Receipted inventory data is loaded directly into Counter Intelligence Office, while sales, customer, and salesperson data is constantly updated from your Counter Intelligence POS terminal(s) locally by LAN or remotely across the Cloud.
  • 40
    Group-IB Unified Risk Platform
    The Unified Risk Platform strengthens security by identifying the risks your organization faces. The platform automatically configures your Group-IB defenses with the precise insights required to stop attacks by threat actors, thereby making it less likely that an attack will be successful. Group-IB's platform monitors threat actors at all times in order to detect advanced attacks and techniques. The Unified Risk Platform quickly and accurately identifies early warning signs before attacks develop, fraud occurs or your brand is damaged, which reduces the risk of undesirable consequences. The Unified Risk Platform counters threat actors with insight into their modus operandi. The platform leverages a variety of solutions and techniques to stop attacks that target your infrastructure, endpoints, brand and customers, reducing the risk that an attack will cause disruption or recur.
  • 41
    Independent Reserve

    Independent Reserve

    Independent Reserve

    Encrypted, geo-dispersed data centres. Top tier underground vaults used to protect your data and crypto. Advanced order types including stop loss, take profit and limit orders. Trade the world’s most liquid digital assets. Store them all in your wallet. Premium accounts feature Insurance against theft and loss against Independent Reserve's physical security measures. Use KPMG tax estimator to work out your estimated tax obligations. Make large over-the-counter (OTC) trades through our VIP service desk. Your trading account is the single access point for you into the Independent Reserve cryptocurrency markets and to your coins. Such an important access point requires extensive security and Independent Reserve are proud of their excellent track record in account security and the range of security measures available to you.
    Starting Price: 0.02% Fee
  • 42
    FPM AML-CHECK

    FPM AML-CHECK

    FPM AML CHECK®

    Introducing FPM AML CFT Screening Solution, the comprehensive tool designed to enhance your organization's anti-money laundering and counter-terrorism financing efforts. Our solution offers a range of powerful features tailored to meet the stringent requirements of various sectors, including real estate, travel agencies, insurance companies, fintech firms, NBFIs and Modarabas, banks, money exchange, and asset management companies. Key Features: 1. Real-Time Search: Conduct real-time searches to instantly identify potential risks and suspicious activities within your database. 2. Automated Batch Screening: Streamline your screening process with automated batch screening capabilities, saving time and improving efficiency. 3. Largest Domestic and Foreign PEPs Database: Access the largest database of domestic and foreign politically exposed persons (PEPs) to ensure comprehensive screening and compliance with regulatory standards. 4. Enhanced Sanctions Data, etc.
    Starting Price: $100/month
  • 43
    Honeywell People Counter
    People Counter provides the data that enables end-users to better understand their operations and maximize potential revenue opportunities. By counting and reporting the number of people entering and exiting a specific area, managers can better understand their closing ratio and identify opportunities for improvement. People Counter provides the key component to determine your close ratio. Transaction, sales and staffing data can only truly be interpreted by adding traffic information to the equation. Combining traffic data with other operational data provides end-users with the methodology to accurately increase customer service during key selling periods, reduce costs during slow selling periods, and determine the effectiveness of advertising expenses and promotional campaigns. People Counter is an ideal solution to accurately automate the gathering of data relating to people entering and exiting a site that can be used for a variety of purposes.
  • 44
    Conpsoft BatchRename

    Conpsoft BatchRename

    Conpsoft Technology

    Professional file batch renaming tool. Support file name expression, extension expression setting. Support counter, macro definition, find-replace string, case conversion, counter start, step length, bit count settings. Support template function.
  • 45
    iTrak

    iTrak

    Omnigo

    iTrak Incident Reporting and Risk Management is a highly secure solution for security, surveillance, and risk management departments. iTrak was designed as the superior multi-departmental, multi-property solution for Security and Surveillance departments. iTrak delivers quick, accurate analysis with comprehensive graphing and statistics, pinpointing liabilities and controlling losses and insurance costs. Unlike similar alternatives, iTrak has a fully integrated platform so that a multitude of transactions and tasks can be handled via a single desktop environment, enhancing operational efficiencies and effectiveness.
    Starting Price: $100.00/one-time
  • 46
    intuVision Edge
    Intelligent video analytics - with a full suite of events, person/vehicle counters & on-board reporting, flexible licensing packages, and no additional hardware. The intuVision Edge Suite includes five versatile packages depending on project need: Basic, only one event; Plus, any two events; Premium, all events; and People & Vehicle Counters, which allow for counting and generating reports of people and vehicle counts. A perfect match for large & flexible projects, where the final deployment can span multiple different requirements. This application allows for one license and one installer to cover a wide range of different needs, such as is often seen for large smart-city, government, or corporate projects. Available events: Activity, Crowd Density, Dwell Heatmap, Enter/Exit, Left Object, Loitering, Motion Heatmap, Object Taken, People Counter, Random Selector, Speed Detection, Throughput, Wrong Way, Vehicle Counter, and Zone Intrusion.
  • 47
    CounterSocial

    CounterSocial

    CounterSocial

    CounterSocial is serious about countering fake news and propaganda. We're the only network using AI to automagically analyze uploaded content in near real-time to determine deepfake probability. We've teamed up with Botsentinel to further protect our users from foreign influence operations. The optional browser extension offers baked-in visibility of potential 'problematic' migrating accounts. CounterSocial has integrated automatic and one-click on demand identity theft alerts. COSOGuard is checking the open and dark web all day and night. If your identity is caught up in a breach - you'll know! We've also teamed up with Factlayer to integrate realtime inline automatic political bias leaning and fake news awareness via color coded links that let you know a site's veracity BEFORE you click through.
  • 48
    FootfallCam

    FootfallCam

    FootfallCam

    Our people counter software is a ready made module designed with IT and business collaboration in mind. Modularized for rapid results, managers will be able to use its legible data to make informed business decisions. The FootfallCam Analytic Manager is a centralized management system available on FootfallCam cloud server, and a lifetime license is made available for all users free of charge. Enterprise web based control panel designed for customers who are managing a large number of counters. By collecting data from all counters and store them in a centralized server, users can carry out deep analytics by remotely accessing FootfallCam Analytic Manager from anywhere. With a prescriptive dashboard and reports to showcase analysis, users will be able to have better visibility on their store performance level. With access to over 60+ different reports that helps to answer specific business questions, data gets turned into meaningful analyses.
  • 49
    Counter

    Counter

    Counter.dev

    Counter is a simple, open-source, and privacy-friendly web analytics platform designed to help users understand their website traffic without compromising visitor privacy. It provides essential metrics such as daily unique visitors, referrers, and geographic data, focusing only on what matters most. Unlike traditional analytics tools, Counter uses no cookies, IP tracking, or fingerprinting, ensuring complete GDPR compliance. Its minimalist dashboard makes insights clear and accessible for everyone, from developers to small business owners. Users can try the live demo instantly and pay only when ready, making it a flexible solution for all budgets. Fully open-source under the AGPL-v3 license, Counter welcomes collaboration and transparency from its growing community.
  • 50
    4Industry

    4Industry

    4Industry

    4Industry allows your workers and machines to achieve true world-class manufacturing, exponentially improving your OEE. By capturing data with our Continuous Improvement process, your Total Productive Manufacturing (TPM) is guaranteed to become a better version of itself, every day. The 4Industry Suite includes a full manufacturing engagement layer (Anomalies, Deviations, RCFA, Counter Measures, Improvements), automated by smart workflows and offering unlimited expandability thanks to ServiceNow’s platform integration capabilities! 4Industry mission statement is: “Helping our customers achieve world class manufacturing by creating innovative solutions”. This is represented when we look at the 4Industry platform. Mobile focussed, new features that improve operator experience and help our customer achieve higher production with less safety incidents.