Alternatives to Curtain e-locker

Compare Curtain e-locker alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Curtain e-locker in 2026. Compare features, ratings, user reviews, pricing, and more from Curtain e-locker competitors and alternatives in order to make an informed decision for your business.

  • 1
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have questions or need help understanding how best to protect your data please contact us and we will gladly answer your questions. Protect your business with a device and data protection platform that keeps all devices safe with a single solution and Dashboard. Keep your Workstations, MacBooks, iPads, Smartphones, Tablets, Laptops safe, secure, and organized.
    Partner badge
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 2
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at ThreatLocker has been developing cybersecurity tools for decades, including programs to enhance email and content security, and this is our most innovative and ambitious cybersecurity solution yet. We developed this unique cybersecurity system because we believe that organizations should have complete control of their networks and should not have to live in fear of the next malware attack. To learn more, visit ThreatLocker.com.
    Leader badge
    Partner badge
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 3
    Safetica

    Safetica

    Safetica

    Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data. ✔️ Data Protection: Classify, monitor and control sensitive data across devices and clouds in real time. ✔️ Insider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity. ✔️ Compliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest. ✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data.
    Leader badge
    Partner badge
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 4
    ManageEngine Log360
    Detect, investigate, and resolve security incidents and threats using a single, scalable SIEM solution. Log360 provides you with actionable insights and analytics-driven intelligence for real-time security monitoring, advanced threat detection, incident management, and behavioral analytics-based anomaly detection. Built as the bedrock for your SOC, ManageEngine Log360 comes with out-of-the-box correlation and workflow rules, dashboards, reports, and alert profiles to help you address vital security issues with little manual intervention.
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 5
    Curtain LogTrace File Activity Monitoring
    Curtain LogTrace File Activity Monitoring is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities. Key features: - File log (create & delete file) - File log (copy & move file) - File log (print & rename file) - App log (save, open & close file) - Support MySQL & MS SQL - Watermark for printout - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software Licensing: Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 6
    Curtain MonGuard Screen Watermark
    Curtain MonGuard Screen Watermark is an enterprise solution that displays watermarks on users' screens, showing information like PC name, and username. It captures user attention and serves as a reminder before taking screenshots to share sensitive information. Key features: - On-screen watermark - Full screen-watermark - Application screen-watermark - Supports over 500 Applications - Self-defined content of watermark - Screen-watermark by condition - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software Licensing: Curtain MonGuard is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to display [username] and [IP address] in screen watermark and some advanced features, you need to activate the software to paid version.
    Compare vs. Curtain e-locker View Software
    Visit Website
  • 7
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 8
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 9
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 10
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity.
  • 11
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Starting Price: $38 per user per year
  • 12
    Jazz

    Jazz

    Jazz

    Jazz is an AI-native Data Loss Prevention (DLP) platform designed to help organizations understand and prevent sensitive data exposure by analyzing the full context of how information moves across their systems. Unlike traditional DLP tools that rely on rigid rules and pattern matching, Jazz uses artificial intelligence to learn how a company operates and interpret the intent and context behind data activity. This allows the system to determine whether a detected event represents a real security risk or a harmless action, reducing the volume of false alerts that security teams typically face. It captures activity across applications, users, and data flows throughout an organization’s environment, providing comprehensive visibility into how information is accessed, shared, and transferred. Instead of generating large numbers of raw alerts, Jazz focuses on producing clear explanations and prioritized insights that help security teams quickly understand what happened.
  • 13
    Your e-Locker

    Your e-Locker

    Webbell Solutions

    Your e-Locker is a Unique Cloud based Ultra Modern Documents Management Software with Features like Pre-defined Structure, Financial Year wise Sorting, Expiry Alert, Users Management and much more. Your e-Locker is one stop solution for all documents related problems. It helps to store and manage all your personal and professional important documents under one safe and secure platform. It provides features like: Predefine Structure - This structure will help you to save your valuable time by uploading the documents in a well organized structure. Easy Upload - Upload any documents in One click or easily drag and drop. Staff Role Management / User Management - Add users and give specific permissions and Roles to users. Multi-layered Security Covered - Multiple security features for safe & secure environment. Alerts - You will not forget important deadlines Taxation - Dedicated component to deal with government tax departments and easy to manage all your legal documents.
    Starting Price: ₹899 per month
  • 14
    BlackBerry Cyber Suite
    Secure and protect your users and devices, even BYOD laptops and smartphones, with a solution that’s focused on earning trust across any endpoint and continuously validating that trust at every event or transaction. Is your organization equipped with the tools to empower your employees, no matter where they’re working? In a situation where employees may be unable to report to the office, it’s essential that they still have secure access to the data and apps they need, whether they use corporate or personal owned devices. The BlackBerry® Cyber Suite provides complete security, effectively preventing breaches and safeguarding against sophisticated threats with advanced AI. It provides a total Zero Trust solution with coverage across the full spectrum of devices, ownership models, network, apps and people. It continuously authenticates users and dynamically adapts security policies to deliver a Zero Touch experience that improves security with no user interruption.
  • 15
    Spectral

    Spectral

    Check Point

    Spectral is a lightning-fast, developer-first cybersecurity solution that acts as a control-plane over source code and other developer assets. It finds and protects against harmful security errors in code, configurations and other artifacts. Spectral employs the first hybrid scanning engine, combining AI and hundreds of detectors, ensuring developers can code with confidence while protecting companies from high-cost mistakes. Map and monitor hidden sensitive assets such as codebases, logs, and other sensitive intellectual property that belong to your organization, but were left exposed in public facing repositories. Leverage SpectralOps’ advanced AI backed technology with over 2000 detectors to get extensive coverage, detect issues and keep your organization safe.
  • 16
    ORION

    ORION

    ORION

    ORION prevents data loss by analyzing data in motion with context-aware, proprietary AI agents, significantly reducing operational overhead and false positives while drastically increasing the number of real incidents detected and prevented. Our specialized agents understand the context behind every data trace in real-time, from classification, lineage, identity, environment, to external relations, analyze it for data loss indicators, detecting and preventing exfiltration.
  • 17
    MinerEye DataTracker
    MinerEye’s DataTracker enables organizations to overcome the information governance and protection challenge. It automatically scans, indexes, analyzes, virtually labels and categorizes every piece of unstructured and dark data contained in the organization’s data repositories. With proprietary Interpretive AI™, machine learning, and computer vision, the solution locates relevant files out of the billions that are stored, accurately evaluates them, qualifies them by significance and purpose, and automatically sends alerts with next best action recommendations in cases of conflicts, duplications, or potential violations. This way, data protection is profoundly enhanced while risk and operational costs are reduced.
    Starting Price: $2000/1TB/month
  • 18
    Heropayments

    Heropayments

    Heropayments

    Heropayments is a multi-purpose cryptocurrency payment gateway. Its scope of use exceeds that of an online merchant for purchases in crypto. It provides a simple flow for complicated transactions: they help you process deposits and withdrawals in more than a hundred cryptocurrencies. Heropayments targets high-risk online businesses such as gambling and betting, and adult platforms. Nevertheless, their processing solution will fit most types of online businesses. The flow of using Heropayments is intuitively clear. As a merchant, you install their widget or API on your site and manage it in your dashboard. As a client, you pick crypto to deposit or withdraw and follow the instructions. Most of the complicated stuff is left behind the curtains but if need be, the team will explain how it works down to the fine detail.
  • 19
    Fasoo AI-R DLP
    Fasoo AI-R DLP is an advanced data protection solution that safeguards sensitive information from being exposed through generative AI platforms. Built to meet the growing challenges of AI adoption in the workplace, it monitors user interactions in real time and blocks attempts to share confidential data through AI prompts. This solution uses intelligent pattern recognition and policy-based controls to enforce security across departments, user roles, and devices. It gives organizations the flexibility to customize policies and restrict risky AI use while still enabling productivity. With support for Remote Browser Isolation (RBI), Fasoo AI-R DLP creates a secure environment for AI interactions, ensuring sensitive content stays protected within corporate boundaries. Ideal for companies adopting generative AI tools at scale, Fasoo AI-R DLP provides deep visibility into user activity with detailed logs and alerting mechanisms.
  • 20
    Microsoft Purview Data Loss Prevention
    Get intelligent detection and control of sensitive information across Office 365, OneDrive, SharePoint, Microsoft Teams, and on the endpoint. Our data landscape has evolved and data loss prevention (DLP) solutions need to evolve too. Learn about the common deployment states, migration challenges, and best practices including the benefits of adopting a cloud-native DLP solution. Help prevent unauthorized sharing, use, or transfer of sensitive information across apps, services, and devices with Microsoft Purview Data Loss Prevention. Create, manage, and enforce data loss prevention policies from the Microsoft Purview compliance portal. DLP is integrated with information protection classification and labeling capabilities, including out-of-the-box, customer, or advanced SITs and trainable classifiers. Configure, triage, and track alerts through the Data Loss Prevention (DLP) alerts page. Extend DLP alerts to the Microsoft Defender XDR portal and Microsoft Sentinel.
    Starting Price: $12 per month
  • 21
    Touchcast

    Touchcast

    Touchcast

    Touchcast is the world’s leading Virtual Experience company. A pioneer in the use of Mixed Reality and AI, Touchcast offers an integrated solution that helps enterprises communicate and collaborate effectively and move employees, partners and customers to take action. Transform presentations into immersive experiences with multi-camera virtual sets that place the speaker in different environments – without a professional studio, lighting assistants or stylists. An immersive, dynamic event doesn't need to be complicated. Touchcast allows your speakers to share impactful presentations, engage in panel discussions, and deliver knockout keynotes without ever stepping foot in a studio. Raise the curtain on the best show in town...yours. Create a "wow" experience for your audience, connect attendees, and let speakers take center stage, from wherever they're presenting.
  • 22
    Outlaw Practice

    Outlaw Practice

    Outlaw Practice

    Outlaw Practice is business and practice management software, made specifically for the challenges facing solos and small firms. Larger firms can afford whole departments to handle human resources, accounts receivable, business strategy and sales and marketing. If you are a solo or have a small firm, you are all of those things and more! Most software for attorneys is case management software: glorified time tracking and invoicing software with some contact management built in. This is certainly needed by every lawyer, as your time is money in a literal sense! Our mission is to make you profitable. We start off by assuming that you are already an excellent attorney, and need help running a business. Because that’s what you are doing, whether you realize it or not. The founders of this business are experienced attorneys and an entrepreneur with deep experience in sales. Together we built a system that will help you master your business and rapidly increase your profits.
    Starting Price: $50 per user per month
  • 23
    Bonfy

    Bonfy

    Bonfy

    Adaptive Content Security™ (Bonfy ACS™) is a next-generation data protection tool built for the Generative AI era that detects and prevents sensitive data leaks, misinformation, IP misuse, toxic content, and other risks in AI and human content before they damage trust or reputation, applying policy-aware intelligence where traditional data loss prevention tools fail. It integrates deeply with Microsoft 365 (Mail, SharePoint, Entra, Purview, Copilot) and connects to SaaS tools like Salesforce, HubSpot, Google Workspace, Slack, and SMTP flows to protect data at rest, in motion, and in use while maintaining real-time governance. Bonfy ACS uses advanced AI, business context, entity-aware analysis, and adaptive business logic to reduce false positives, surface high-impact risk incidents, automate contextual data labeling and remediation actions, and provide detailed, interactive dashboards with risk scoring, customizable views, and compliance reporting.
  • 24
    Cyberhaven

    Cyberhaven

    Cyberhaven

    Cyberhaven’s Dynamic Data Tracing technology is a transformative approach to preventing IP theft and other insider threats. Automatically track and analyze the entire journey of your data from its creation through every user interaction. Continuous risk assessment proactively finds unsafe behaviors and practices before they lead to a breach. Full-context data tracing makes policies simpler and more effective with far fewer false positives and user disruptions. In-context user education and coaching drives better behavior and adherence to security best practices. Whether due to malicious actions or a moment of carelessness, data loss can have devastating financial and reputational impacts. Automatically classify sensitive data based on data origin, its creator, and content. Find data even if you didn’t know where to look. Proactively find and mitigate risks whether due to malicious insiders, unsafe behavior, or simple user mistakes.
  • 25
    Zecurion DLP
    Minimize your corporate data leakage risks with Zecurion Data Loss Prevention. The easiest to implement enterprise DLP. You can deploy it yourself using our detailed step-by-step instructions. Policy templates for quick deployment right out of the box. Dedicated account manager speaking your language. Deployment and configuration support at no extra charge. 24x7 technical support via phone, email or messenger. Deployment within 2 business days. The most technologically advanced DLP system. More than 10 technologies, used together, minimize errors and false positives. Investigate any incidents easily with Zecurion DLP. А DLP system intuitively understandable without documentation. Use an early threat detection with user behavior analytics (UBA) module. Ready-made templates for compliance with legal requirements. Convenient dashboard and preset visual reports. Calculates more than 10 different characteristics for each user.
  • 26
    HeyEditor

    HeyEditor

    HeyEditor

    HeyEditor is an online face editor application that uses artificial intelligence algorithms to create a unique content. You may choose a photo or image, GIF or video by finding it available within respective Pre-sets catalogue or you may also upload a photo or image, GIF or video from your mobile device for further face-editing processing, and then upload a photo with faces from your mobile device in the supported format and file size. After that, You can click the generating button or any other similar option. Our artificial intelligence algorithms scan either a GIF or a video or a chosen image, find the faces and instantly swap them into a new object. Please note that some functions above may be limited if you are not a paid subscriber.
    Starting Price: $19.99 per month
  • 27
    Xenioo

    Xenioo

    Matelab

    Thanks to a sleek and intuitive interface you can quickly and efficiently design your chatbot just like you’d design a mental map. Move, drag and drop and zoom in and out to design your chatbot. Working on even the most complex chatbots has never been easier. Build every chat interaction imaginable, just choose from the many actions and operations available: inputs, cards, carousels, images and much more. Xenioo allows you to set variables, tags and conditional switches to define the path of your chatbot. Through a powerful preview feature, you can test how your chatbot is working and makes changes live before publishing it. The Execution Diagram makes it possible to know what happens behind the curtains of any chatbot, so finding issues and fixing errors is much easier. Xenioo uses a draft-and-publish approach for every chatbot.
    Starting Price: $19.99 per user per month
  • 28
    Direct Freight

    Direct Freight

    Direct Freight

    The Direct Freight Driver app lets truck drivers search more than 300K loads daily from reputable brokers & shippers on the Direct Freight network. Users sign in with a current Direct Freight Services username and password to start searching for loads. Enjoy unlimited searches with the Direct Freight Driver app. Search for loads by your favorite preferences: Origin, radius of origin, destination, ship date, size: full or partial, trailer type (dry van, flatbed, reefer, step deck /single drop, double drop, van + vented, curtain van). Easily post your truck, review broker and shipper credit scores, days to pay and reviews and call them directly from the app.
    Starting Price: $34.95 per month
  • 29
    E-Lock

    E-Lock

    E-Lock

    E-Lock offers legally compliant, easy to use digital and electronic signature solutions. E-Lock solutions comprise of desktop, server and web-based signing solutions. Our solutions can seamlessly integrate with any new or existing applications to enable signing and encryption of documents. It has now entered into Authentication space with it's adaptive multi-factor authentication solution AdaptAuth.
  • 30
    Behavox

    Behavox

    Behavox

    Behavox is an insights company that uses behavioral AI and machine learning to protect enterprises from corporate crises and company-ending events. Behavox provides solutions that help global enterprises generate valuable insights from internal communications like email, instant messaging, social media, and voice. While technology has enabled us to work from anywhere, it has also made it easier to hide behind the digital curtain. Communication and collaboration channels have multiplied, increasing compliance risks. Learn more about how Behavox Compliance delivers actionable insights that enable firms to identify risk quickly and accurately, and prevent illegal, immoral, or malicious acts in the new workplace. We uncover risk and catch bad actors quickly and accurately, before they bring down your business. Behavox covers a wide range of misconduct across applications in multiple languages.
  • 31
    SearchInform DLP

    SearchInform DLP

    SearchInform

    The solution helps you know your data and put controls just right where you need them to protect a company from confidential information leakage. SearchInform DLP monitors all popular data transfer channels, analyzes information, detects and prevents violations, provides reports to a person in charge. SEARCHINFORM DLP HELPS BUSINESSES IN MANY WAYS: •Protects confidential information from leakage during use and transfer •Takes control of remote access and virtualization tools (TeamViewer, RAdmin, RDP) •Encrypts data to prevent it from being used outside the company •Reports irregular events within the network, such as copying data to removable storage devices or deleting a large number of files
  • 32
    Publisher Rocket

    Publisher Rocket

    Publisher Rocket

    From romance to non-fiction, sci-fi to children’s books, gain the unfair advantage to dominate any category. Get instant access to real data on exactly what buyers type into Amazon and just how many people search for these things every month. Publisher Rocket is the ultimate tool for authors to optimize their book listings and dominate the Amazon marketplace. Uncover high-performing Amazon keywords to optimize your book listings and boost visibility. Dive deep into Amazon’s 19,000+ categories to find the perfect fit for your book and maximize sales potential. Gain valuable insights into your rivals’ sales, rankings, and marketing strategies to stay ahead of the competition. Quickly generate hundreds of high-converting keywords for your AMS campaigns and skyrocket your book’s visibility. Uncover hidden gems and profitable keywords to maximize your book’s visibility. Peek behind the curtain and discover your rivals’ sales, rankings, and strategies.
    Starting Price: $199 one-time payment
  • 33
    ONTAP

    ONTAP

    NetApp

    ONTAP: The industry-leading enterprise data management software. You need a solid foundation for your seamless hybrid cloud. NetApp® ONTAP® data management software gives you every advantage possible—everywhere. Looks like you just won the data management lottery. Seamlessly manage your data as it flows to and from wherever you need it most. We get it—you have more than one “#1 priority” right now…Help your business grow. Reliably support your current applications. Anticipate and prepare for the future. Plus, do it all without additional IT budget. With ONTAP, you don’t need to compromise to achieve these priorities. Quickly respond to new business challenges, simplify your day-to-day activities, and impress your team. Sound like your cup of tea? Whatever your data management needs—on your premises and in the cloud—ONTAP has you covered.
  • 34
    OpenFaceTracker

    OpenFaceTracker

    OpenFaceTracker

    OpenFaceTracker is a facial recognition program capable to detect one or several faces on a picture or a video, and to identify them via a database. OpenFaceTracker needs OpenCV3.2 and QT4 installed on your machine, you’ve got two options, if you love compiling libraries by hand, please follow build_oft, and installing Opencv and QT using your favorite packaging tool. You can compile OFT as a library or you can compile it as a standalone binary file. You can then open the file and execute the detection and recognition module. You can show help and exit, show the list of all available cameras, you can test the XML DB, read from the OFT config, and check the environment. OpenFaceTrackerLib uses Opencv 3.2. This latter has introduced many new algorithms and features comparing to version 2.4. Some modules have been rewritten, some have been reorganized. Although most of the algorithms from 2.4 are still present, the interfaces can differ.
  • 35
    SuperControl

    SuperControl

    SuperControl

    Designed by self-caterers for self-caterers, SuperControl’s built-in flexibility and dynamic management tools enable you to take control of your business. If you pull back the curtain and take a sneak peek into the inner workings of SuperControl, you will find a team of like-minded individuals with a blazing passion for the self-catering industry. That same blazing passion is where our journey began when company founders Robert and Melinda Kennedy launched SuperControl in 2007. Our founders are self-caterers by trade and self-catering advocates by nature. They’ve walked a mile in your shoes, and their experiences have shaped SuperControl as we know it. We offer more than property management software. We’re a community, travelling the road to remarkable as one with support from trusted industry partners and associates along the way.
    Starting Price: $37 per month
  • 36
    eVo

    eVo

    Evolution Agency Management

    Evolution is designed by agents, for agents, and is available at a much lower cost. No matter which products your customers need, you need a revolutionary agency management system that can help you run your entire business. You’ll get a powerful client app with quoting, claims and payment options, so your clients can access their policies whenever and wherever they want to. eVo is a comprehensive and affordable agency management system offering many innovative features. If you’re ready to step up your management with eVo, or would like more information, contact us. You continue to remain our top priority in these unprecedented circumstances, and we are here to answer any of your questions. Please do not hesitate to contact us with any concerns you may have. Secured hierarchical Structure. DocuSign Integration. Microsoft Outlook Integration. Client-facing Mobile App. In-Platform Texting Capability.
    Starting Price: $200 per month
  • 37
    Panda Fusion 360

    Panda Fusion 360

    WatchGuard Technologies

    Fusion 360 combines our Systems Management and Adaptive Defense 360 solutions to unify RMM with EPP and EDR capabilities. This holistic solution combines the best of two worlds to provide advanced endpoint security, centralized IT management, monitoring and remote support capabilities. Fusion 360 ensures the classification of 100% of the running processes on all your endpoints with our Zero-Trust and Threat Hunting services. Cloud-based centralized management for devices and systems, with real-time monitoring, inventory and remote support. Advanced prevention, detection and response technologies against breaches.
  • 38
    ManageEngine Endpoint DLP Plus
    ManageEngine's Endpoint DLP Plus is an enterprise solution that leverages advanced data loss prevention strategies to protect sensitive information contained within endpoint devices. The solution prevents the unauthorized transfer of important or classified data out side an organization, through the different communicative channels. This includes print or clipboard operations concerning sensitive files, upload of sensitive data to major Cloud platforms like Google Drive and Dropbox, offloading classified data on to removable storage devices and much more. Endpoint DLP Plus enables IT admins to create and deploy DLP policies for an organization's network from a centralized console and even offers ready-to-use templates to better meet compliance requirements of major regulatory bodies such as HIPAA & GDPR.
    Starting Price: $795/100 Workstations
  • 39
    Active Cypher

    Active Cypher

    Active Cypher

    Active Cypher simplifies data protection without end-users knowing and ensures hackers can’t read files even when stolen. Active Cypher integrates with Identity and Access Management solutions to provide access and privilege, secure your data, and doesn’t require extra administrative effort. Active Cypher’s Data First solutions: • Encrypts files in the background transparently to the end-user. • Allows users to share files, even outside your enterprise, and maintain control over how they’re used. • Document sharing can be revoked at any time. • Documents are controlled no matter where you store them, no matter where you send them. We turn data breaches from catastrophes to inconveniences. Regulatory reporting is reduced because data has not been compromised, even if your files are stolen.
  • 40
    DataPatrol

    DataPatrol

    DataPatrol

    DataPatrol provides you with appropriate solutions that can ensure business continuity and prevent data loss or corruption. Specialized in providing Security and Privacy of company's data and information in an evolved way. Data security is our topmost concern, therefore Datapatrol provides innovative and user-friendly solutions to secure sensitive and confidential data from unauthorized disclosure. We provide you with a full set of features to help you protect your data and sensitive information. All secured communication between agent/administrator and server side. All administration tasks are done through the web interface (GUI). By applying digital watermarks on the screens, you make a statement that any data belongs to the company only. Having permanent watermarks on the screens, you assure and alert all insiders that these data are confidential, and any exfiltration will be tracked.
  • 41
    Proofpoint Enterprise Data Loss Prevention (DLP)
    Proofpoint’s Data Loss Prevention solution enables organizations to prevent and manage the risk of sensitive data exposure across email, cloud applications, and endpoints through a unified, cloud-native architecture designed for people-centric protection. It combines advanced content detection (including AI-powered classifiers and optical character recognition), user-behavior analytics, and threat telemetry to identify negligent, compromised, or malicious users and determine intent behind alerts. The platform features a single console that enables triage, investigation, and response across channels; streamlined alert workflows; a lightweight endpoint agent; and support for dynamic policy enforcement, data lineage visualization, and remediation of excess privileges. With this solution, you can detect sensitive file manipulations, uploads to unauthorized destinations, misuse of generative-AI tools, data exfiltration, and abnormal user behaviors while also scaling rapidly.
  • 42
    Netwrix Endpoint Protector
    Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
  • 43
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 44
    Clearswift Endpoint Data Loss Prevention
    As a vital piece of your IT security strategy, Clearswift Endpoint Data Loss Protection (DLP) solution allows organizations to detect, inspect and secure critical data on endpoints. In one solution, it provides context-aware Data in Use (DIU) policies to control which devices can connect to a corporate network and what information can be transferred. It also executes scheduled Data at Rest (DAR) scans on file systems to audit and manage critical data residing on the network or in the cloud. A lightweight agent, Clearswift Endpoint DLP works behind the scenes to enforce your security and compliance policies and provides continuity even when users are not connected to the network. Flexible and context-aware DIU policies allow organizations to apply rules that either prevent documents containing critical data from being copied to removable media, shared on the network or uploaded to the cloud, or automatically encrypt them before they are transferred.
  • 45
    Plurilock AI Cloud DLP

    Plurilock AI Cloud DLP

    Plurilock Security

    Plurilock AI Cloud DLP is a cloud-native yet endpoint-capable data loss prevention (DLP) solution that also provides passwordless SSO and CASB. It is designed specifically for cloud-centric companies relying on an army of SaaS applications to succeed. With Plurilock AI Cloud DLP, companies without the resources to configure and manage (much less pay for) the "default" incumbent DLP solutions can still gain the benefits of full-featured DLP, but at a level of simplicity and cost-effectiveness that makes DLP accessible to companies that don't specialize in IT. Plurilock AI Cloud DLP is part of the Plurilock AI platform, which grows as companies do, with an expansion path to true continuous, real-time authentication and user/entity behavior analytics (UEBA) for real-time biometric identity threat detection and response (ITDR). Plurilock AI is rated top in the industry in customer satisfaction by Info-Tech, based on the feedback of actual customers.
    Starting Price: $36/user/year
  • 46
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 47
    SecureIdentity DLP
    SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and the cloud), which prevents the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types, by blocking sensitive data across structured and unstructured data repositories. Our SecureIdentity DLP platform provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. With increasing integrations with other parts of the security market, DLP has become essential for protecting organizations when newer technologies are to be adopted. Our DLP solutions are unique from competitors as we address threats from trusted and un-trusted users, through unique intellectual algorithms and fingerprinting features. SecureIdentity DLP conducts real-time inspection of all protocols, even ones that are unknown, and has the ability to stop data loss immediately.
  • 48
    Simple E-Commerce
    Simple E-Commerce let you sell blinds, shutters, curtain, doors and windows online. Expand beyond geographic boundaries and Offer your customers a real authentic shopping experience online. Simple E-Commerce let your customer tailor build their next interior order online. Our smart feature control lets your customers select size, material, color, orientation, panels, hinges and all other features with a simple click and drag. Furthermore, your customer can see their selection in real time online, the smart swatch automatically applies material and color to the product image to provide a real authentic preview of the product. The simple E-Commerce product management module is a blind expert, the build-in control enforces all the manufacturing and fitting conditions when providing options to the website visitor, for example, product module can enforce the minimum width required for a certain number of panels shutter, it will only offer the option when the conditions are satisfied.
  • 49
    JetPrint

    JetPrint

    JetPrint

    There’re over 200+ custom products/variants such shoes, watches, t-shirts, hoodies, sweatshirts, bags, tapestries, shower curtains, and more. Select your requested products and start to design. Freely upload your branded designs, and use our advanced mockup generator to customize your selected product template, and various variants and options selectable. After adjusting the size and position, you can preview the designed mockup in different angles/scenes. Once you confirm the custom design, click “submit” to the next step, and edit the product info, retail price, and compare at price, then you can publish the print on demand products to your store. JetPrint now supports integrations to Shopify & WooCommerce, easier and faster to promote and sell to more E-commerce retailers with less time. Since there have been various print on demand products with your branded designs, you’re free to set sample orders to check printing effect and product quality.
  • 50
    CI Track

    CI Track

    CI Solutions

    CI Track is an attendance tracking software. Please contact us if you have questions or concerns regarding our CI Track software. As we move into the New Year, our goal is to focus on the future of card technology and how we can deliver stronger services, support, and verification tools. Our team will have the resources and time to enhance our verification tools and offer more robust card systems. If you have any concerns about your CI Track license or service agreement, please do not hesitate to call or email us. CI Solutions, Card Integrators Corporation, was founded in 1994 and provides card printing, card technology, and identity software solutions in any market a card is required.