Alternatives to Defendry

Compare Defendry alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Defendry in 2026. Compare features, ratings, user reviews, pricing, and more from Defendry competitors and alternatives in order to make an informed decision for your business.

  • 1
    Kognition

    Kognition

    Kognition AI

    Kognition AI security stops threats in real-time. Transform legacy security into intelligent protection that pays for itself. Kognition AI integrates seamlessly with existing cameras and access control - no costly rip-and-replace required. Why Security Leaders Choose Us: ✓ 24/7 AI Guardian that never misses threats or calls in sick ✓ Works with Axis, Hanwha, Avigilon, Genetec, Milestone, and other popular platforms and devices. ✓ Real-time alerts deliver actionable intelligence in seconds ✓ Easy to deploy enterprise-grade security Perfect for corporate campuses, schools and universities, office buildings, hospitals, and retailers seeking modern security to reduce risk and improve staff, student, and tenant safety. Transform your security team from reactive responders to proactive guardians with Kognition AI - schedule a demo today!
    Partner badge
    Compare vs. Defendry View Software
    Visit Website
  • 2
    A10 Defend Threat Control
    A10 Defend Threat Control, a SaaS component of the A10 Defend suite, offers a real-time DDoS attack map and proactive, detailed list of DDoS weapons. Unlike other tools available today that provide convenience at the cost of false positives and false negatives, A10 Defend Threat Control provides hands-on insights into attackers, victims, analytics, vectors, trends, and other characteristics, helping organizations establish a more robust security posture by delivering actionable insights to block malicious IPs that can launch or amplify DDoS attacks.
    Compare vs. Defendry View Software
    Visit Website
  • 3
    Omnilert

    Omnilert

    Omnilert

    Save lives through early threat detection and rapid response with visual gun detection. Our AI-powered Gun Detect software brings reliable, 24x7 monitoring to security cameras, creating a widely deployable early gun detection solution. Our Emergency Communications and Automation Platform shares needed intelligence through automatic activation of emergency response plans and safety systems. No matter the threat, from guns to severe weather, we help you maximize every critical second and keep your people from harm's way. Safeguard your people, facilities and operations from all of the threats you face today.
    Compare vs. Defendry View Software
    Visit Website
  • 4
    ZeroEyes

    ZeroEyes

    ZeroEyes

    ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond.
  • 5
    Verkada

    Verkada

    Verkada

    Verkada brings the ease of use that consumer security solutions provide, to the levels of scale and protection that businesses and organizations require. By building high-end hardware on an intuitive, cloud-based software platform, modern enterprises are able to run safer, smarter buildings across all of their locations. PoE cameras are online and fully operational in minutes. No NVRs or DVRs. Store up to 365 days of footage locally. Stay ahead of emerging threats with ongoing feature and security updates. Cameras send encrypted thumbnails to the cloud and stream only when actively viewed. Store clips in the cloud indefinitely and easily share archived events with key stakeholders. Bring footage across sites into one dashboard and grant secure access to your entire team. Cameras act as sensors, leveraging the latest in AI and edge computing to uncover actionable insights in real-time. Overcome common challenges associated with physical security management.
  • 6
    Rhombus

    Rhombus

    Rhombus

    Protecting your organization has never been easier. With Rhombus, you can make your spaces safer and smarter with a platform that’s intuitive to use for your entire team. Rhombus delivers an enterprise physical security platform that combines smart security cameras, IoT sensors, and integrations with 3rd party solutions all under one unified console. Rhombus' cloud-based platform eliminates bulky hardware, is secure by default, and has built-in AI analytics so you can see, manage, and respond to threats in real-time. Built by cybersecurity experts, Rhombus simplifies security operations and is trusted by school districts, commercial real estate, healthcare facilities, Fortune 500 companies, and more.
  • 7
    Evolv Express

    Evolv Express

    Evolv Technology

    The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. Visitors want to move quickly through security checkpoints at a seamless pace, knowing they’re well-protected everywhere inside your venue—while your security teams want the assurance that they can reliably pinpoint and stop threats. The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. The new outdoor Evolv Express system has a ruggedized design making it easier to move over rough and sloped surfaces. Customers also have the option to order a retrofit kit for their existing outdoor systems.
  • 8
    Athena Security

    Athena Security

    Athena Security Concealed Weapons Detection System

    Athena Security is a physical security technology company that specializes in AI-powered threat detection and entryway management. Founded in 2018 and headquartered in Austin, Texas, Jacksonville Florida and SF. The company focuses on replacing outdated security hardware with AI based software and hardware solutions designed for high-traffic environments like hospitals, schools, and casinos. Key Product Ecosystem: Weapons Detection System (Apollo 500): A high-throughput walk-through detector that uses AI to distinguish between metal weapons (firearms, knives) and everyday metal objects like keys or phones, allowing people to pass through without emptying their pockets. AI-Assisted X-Ray: Software and or hardware that integrates with baggage scanners to automatically highlight threats and stop the conveyor belt if a weapon or prohibited item is detected. Hospital Visitor Management System (VMS) for healthcare facilities that automates visitor check-in with EPIC
  • 9
    Alibi Security

    Alibi Security

    Alibi Security

    Our security solutions and gun detection analytics work with educational institutions of all types to provide their communities with improved security and peace of mind. Our gun detection technology turns any existing security camera into an intruder and gun-detecting smart camera, enabling instant, real-time responses to trespassing and brandished weapons. The system increases school administrations’ ability to react to threats without adding a visible layer of security, providing a safer and more secure campus. AI technology and machine learning are used to recognize weapons from hundreds of thousands of images in a proprietary data set. The solution recognizes the instances guns are brandished, not fired, providing notifications and real-time alerts. The solution detects weapons as soon as they are visible on camera, flagging threats before shots are fired. This provides building security and law enforcement with precious seconds to address the situation.
  • 10
    SafePointe

    SafePointe

    SoundThinking

    ​SafePointe by SoundThinking is an AI-based concealed weapons detection system designed for high-throughput facilities. Each lane comprises two discreet metal bollards positioned 8–10 feet apart, equipped with an advanced 3D camera and an NVIDIA-powered edge processor running a state-of-the-art AI model. As individuals pass through, the system utilizes magnetic moment technology to identify digital signatures of magnetically conductive objects, analyzing motion data to determine direction, speed, and movement. If a potential threat is detected, information is reviewed by human analysts within 10 seconds to filter out non-threats, such as armed security personnel. Verified threats prompt digital alerts sent to the facility's security team via the SafePointe app, including images and short video clips identifying the individual. It supports unmanned screening, reducing operational costs, and is safe for individuals with medical devices due to its passive screening technologies.
  • 11
    Coram AI

    Coram AI

    Coram AI

    Coram AI is a modern video security platform that integrates advanced artificial intelligence to enhance physical security operations. Compatible with any IP camera, Coram AI offers seamless integration, allowing businesses to utilize their existing surveillance infrastructure without the need for extensive replacements. It delivers instant alerts for critical events, such as slip-and-fall incidents and weapon detection, powered by cutting-edge AI technology. Users can quickly locate specific footage using natural language search capabilities, simplifying the process of finding relevant video clips. Additionally, Coram AI provides tools to optimize operations by tracking productivity, identifying inefficiencies, and supporting data-driven decision-making. The system is designed for scalability, accommodating setups ranging from a few cameras to thousands, and offers a variety of IP cameras that are NDAA and ONVIF compliant, ensuring high-quality video surveillance.
    Starting Price: Free
  • 12
    Xtract One

    Xtract One

    Xtract One

    Xtract One is the future of entry and perimeter security, offering industry-leading AI-powered software and hardware solutions designed to protect people more effectively and efficiently, without sacrificing their sense of well-being or privacy. SafeGateway is an accurate, fast, and unobtrusive solution to the seamlessly secure patron and employee entrances. This innovative solution automatically scans entrants for concealed weapons such as guns, knives, and IED components more efficiently and accurately than conventional security measures like metal detectors. This technology reduces or eliminates long lineups, uncomfortable pat downs, and invasive searches. SafeGateway is the ideal choice for stadiums, arenas, live entertainment venues, theaters, casinos, nightclubs, art galleries, and other attractions that require effective security screening, without detracting from the guest experience. Offers a covert security system that alerts to potential threats without disturbing alarms.
  • 13
    IntelliSee

    IntelliSee

    IntelliSee

    IntelliSee is a real-time artificial intelligence (AI) risk mitigation platform working 24/7/365 to detect and mitigate threats before an incident occurs. IntelliSee turns your existing passive surveillance cameras into proactive risk-mitigation tools so you can protect your people, reputation, and financial well-being. Most surveillance today is unmonitored and used only for post-incident documentation. Even when cameras are monitored, overtaxed security staff are performing an error-prone and tedious task on an unmanageable number of screens. IntelliSee offers a reliable, proactive solution by overlaying and continuously scanning your live surveillance feeds for potential threats. When a threat is detected, IntelliSee instantly alerts designated contacts and systems to the nature and location of the threat so you can act.
  • 14
    DragonFly IoT Active Shooter Sensors
    An outdoor wireless gunshot sensor performing energy capture, waveform analysis, and transmitting resultant data to the Emergency Automatic Gunshot Detection & Lockdown (EAGL) system, a Gunshot Detection System (GDS). Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy waveform algorithms. Sensor contained within resonance chamber allowing flat wall, corner, or pole mounting capability while providing an optimum spherical detection coverage area. Threat validation data is wirelessly transmitted by sensor to the EAGL System Server via internal Quectel. Sensor data received by the EAGL System Server is processed further while initiating the appropriate pre-programmed automatic and autonomous adaptive response feature and process. Sensor also receives calibration data from the EAGL Server using similar communication processes and methods.
  • 15
    Actuate

    Actuate

    Actuate

    Join the 1,000+ companies and schools that use Actuate's AI technology to detect threats and reduce false positives. Instantly detect visibly brandished guns. Detect unpermitted people and vehicles. Identify the formation of large groups of people. Low-cost, cloud-based integration. No new hardware is required. Instant detections are followed by informative alerts within seconds. Built to eliminate bias and respect privacy. Collects no personally identifiable information. Actuate helps organizations be more secure, in the face of high risk, budget limitations, and privacy concerns. Actuate enables moveable construction cameras to automatically detect threats to safety and security. Actuate’s AI software enables central station operators to do more with less. Alerts staff to threats at offices, shopping malls, and other commercial buildings. Detects threats instantly in hospitals and clinics, keeping staff and patients safe.
  • 16
    FireFly Indoor Gunshot Detector
    The FireFly® Indoor Gunshot Detector is wireless and designed to work in Indoor environments. Installation basically entails attaching each sensor using only two fasteners. Sensor placement determines detection area coverage, unobstructed spherical range can be as much as 31,415 sqft. Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy level and waveform analysis algorithms. The sensor is mounted to horizontal ceiling substrates providing a spherical detection coverage area of ~31,415 FT2. Sensors can be attached to vertical columns presenting a decreased coverage area. Threat validation data is wirelessly transmitted by the sensor to the EAGL System Server via the EAGL Gateway. Data received by the EAGL System Server is processed further initiating the appropriate pre-programmed automatic and autonomous Adaptive Response feature and process.
  • 17
    Scylla

    Scylla

    Scylla

    At Scylla, our mission is to create the best possible AI tech for video surveillance. As a technology-first company, we are committed to leveraging our expertise to deliver unparalleled precision and reliability in our solutions. We not only prioritize safety but also develop highly precise and sensitive AI solutions for video surveillance and security at large. We believe that through innovation and technology, we can provide our clients with the tools they need to protect what matters most and improve productivity of their businesses.
  • 18
    Exigent-GR

    Exigent-GR

    Arcarithm

    Applying Artificial Intelligence to identify guns as early as possible to save lives. The Exigent®-GR gun detection capability is based on AI technology developed by Arcarithm for the US Army. The technology was originally developed to detect both drones and guns, based on the concept that a larger operational space allows more reaction time. Current security camera systems require a human to identify gun threats. Even dedicated security professionals using the best camera system cannot provide 100% real-time observation. An effective, proactive solution is needed to identify guns before they enter the building and shots are fired. Autonomously detects people with guns as early as possible, before shots are fired. Instantly analyzes imagery using AI algorithms to determine the type of gun (long gun vs. pistol). Automatically notifies security officials via text message or email showing the person with the gun, their location and type of gun.
  • 19
    acre Intrusion

    acre Intrusion

    acre security

    Acre’s acre Intrusion systems provide advanced solutions for protecting businesses and properties by detecting and responding to unauthorized access or suspicious activity. These systems integrate cutting-edge technology to offer real-time monitoring, alarm notifications, and automated responses to potential security threats. Acre’s intrusion detection solutions are designed to seamlessly connect with other security systems, such as access control and video surveillance, creating a comprehensive security network. The system’s flexibility allows businesses to customize alerts and responses based on the severity and type of threat. It also offers easy-to-use interfaces for managing and controlling the system, providing users with complete visibility into security events. Acre’s intrusion detection solutions are built with advanced analytics to reduce false alarms, improving the accuracy and reliability of the system.
  • 20
    Ontic

    Ontic

    Ontic

    Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence.
  • 21
    SafetySmart Platform
    ​The SafetySmart Platform by SoundThinking integrates AI-based software solutions and objective data to assist security teams in ensuring the safety of staff and patrons. Trusted by over 250 agencies across the U.S., the platform offers discreet, unmanned weapons detection systems like SafePointe, which do not interfere with medical devices and enhance visitor experiences in hospitals, corporate locations, hospitality venues, and higher education campuses. It is HIPAA and SOC 2 compliant, emphasizing its commitment to privacy and security standards. Additionally, SafetySmart integrates with existing systems to maximize technology for safety and security.​ SoundThinking prioritizes privacy and has structured our technology, processes, and policies to comply with generally recognized safety and security requirements while safeguarding personal information.
  • 22
    Mobile Communications America (MCA)
    MCA can customize video surveillance solutions to fit your specific needs. Our team of professionals assesses your property and designs a solution for you, from installing cameras on your property to setting you up with a security command center to manage it all. Industries ranging from education to manufacturing rely on video surveillance solutions from MCA to protect their property and everyone on it. Trust MCA to do the same for you. And as your security systems integrator, we can integrate a video surveillance system that works with your existing security systems. The best commercial security cameras provide video surveillance that helps businesses and organizations protect their assets and even improve their productivity. At MCA, we partner with leading manufacturers of business security cameras to secure a range of businesses and organizations. Trust MCA’s video surveillance expert technicians to provide cloud video storage you’ll need to keep your property and everyone secure.
  • 23
    Tutelare Corporation

    Tutelare Corporation

    Tutelare Corporation

    We are committed to maximizing the protection of people using innovative and proprietary technologies. Our founders bring over 20 years of experience and proven track records for designing and building high-level electronics, sensors, and mechanical devices for space, defense, and security industries under UNI EN 9100:2009 Certification. The Tutelare Corporation is a USA-based company that combines new technology development capabilities, industrial design, system integration, and access to financial programs and has a network of top-level international contacts. The Tutelare Corporation expects to offer complete and highly competitive products, solutions, and services. The wearable WFWDs provide mobile threat detection perfect for bodyguards, security guards, and law enforcement. The fixed WFWDs can help secure events and buildings such as churches, airports, synagogues, schools, malls, sports stadiums, public events and crowded areas.
  • 24
    AmberBox

    AmberBox

    AmberBox

    AmberBox is an indoor gunshot detection and response system designed to automatically sense firearm discharge, alert responders, and provide detailed real-time situational data. Its detectors use a patented “tri-factor authentication” method, combining percussion sensing (muzzle blast and shockwave), infrared detection (muzzle flash), and a machine-learning audio analysis that matches shots against thousands of firearm signatures, to reliably detect gunshots without needing a line of sight. Detection happens in as little as 3.6 seconds, with location accuracy accurate to roughly 60 feet, enabling instant alerts to 911 and on-site security through its cloud-based AmberBox Response Platform. Once a shot is detected, it delivers precise information, including the time, number of shots fired, approximate location, and shooter movement; it can integrate with existing security infrastructure (cameras, access control, mass-notification, lockdown systems).
  • 25
    Hakimo

    Hakimo

    Hakimo

    Our remote guarding solution uses AI to monitor surveillance cameras and enables communication through speakers to deter unwanted visitors, providing more effective, lower-cost security than an on-site guard. Unauthorized access is a problem for every enterprise, but it can be tough to cut through the noise. Hakimo clears time-consuming nuisance alarms so that your team can focus on real threats that need action, including tailgating through doors and vehicle gates. Malfunctioning cameras and door hardware could potentially lead to a missed incident. Our software continuously monitors the health of your system hardware to identify any issues so they can be quickly resolved. When time and resources are limited, standing up for your own security operation doesn’t make a lot of sense. Regardless, security should be as effective and efficient as possible. This is where artificial intelligence-powered remote guarding comes in. You've got a business to run, so leave security to the experts.
  • 26
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 27
    HiveWatch

    HiveWatch

    HiveWatch

    HiveWatch is an AI-driven physical security platform that unifies disparate security systems, such as access control, video surveillance, and guard operations, into a single, cloud-based command center that transforms security from reactive to strategic. It features a rules engine for customizing incoming alarms by criteria like time, location, or repeatability, and embedded standard operating procedures to guide operator response. HiveWatch reduces false alarms through machine learning, escalates genuine threats to human supervisors via its AI Operator module, and automates tailgating detection. It also supports multi-site orchestration, device health monitoring, case management of incidents, and performance metrics (e.g., time to resolve, incident counts) for executive reporting. Field teams receive real-time incident data and site snapshots, can initiate manual incidents with photographic data, execute guard tours, and maintain coordination.
    Starting Price: Free
  • 28
    Kiana Secure
    Real-time location services provide situational awareness and assist with safety and security measures in emergency situations. Knowing real-time occupant location and profile is invaluable in decision making. Understanding occupant foot traffic while on premise provides important insights into crime investigations. Remote awareness is also instrumental to effectively managing employees, contractors & maintenance staff. Presence analytics can also aide in meeting compliance standards and in reducing insurance premiums. Kiana Secure revolutionizes existing video surveillance capabilities with Wi-Fi based location awareness. Video surveillance systems don’t provide 100% premise coverage and low light or poor camera resolution is challenging. Kiana’s Image-to-Device association provides valuable insights into situational awareness. Kiana’s forensic analytics tools, which combine images & video data with location analytics, provides rich information in crime investigations.
  • 29
    SeeTrue Autonomous AI Detection
    Automatic Threat Detection with Artificial Intelligence. SeeTrue revolutionizes the current security screening process, addressing the challenges of passenger throughputs, experience, security, and cost with a new Artificial Intelligence approach. SeeTrue’s Autonomous AI™ Detection, provides automatic threat detection and alarm resolution for X-ray and CT systems. This novel approach operates beyond human sight – enabling passengers to leave items in bags, reduce manual procedure and increase throughput while maximizing safety to provide a seamless passenger experience. Why Us? High Accuracy: Despite their best efforts and training, human agents have limitations. SeeTrue’s autonomous screening technology detects threats and contraband beyond current capabilities, regardless of the angle, size and occlusions - providing accurate recognition for proactive agent alerts. Greater Operational Efficiency: SeeTrue minimizes labor costs while maximizing safety.
  • 30
    PureActiv

    PureActiv

    PureTech Systems

    Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. ​ Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors.
  • 31
    Wangsu Network Situational Awareness
    Based on threat intelligence, big data mining and analysis, machine learning, visualization and other technologies, Wangsu situational awareness realizes the “visible, manageable, and controllable” network security situation, helping regulatory agencies, governments, enterprises and institutions improve discovery, identification, understanding, analysis, the ability to respond to potential threats, and help companies understand the operating status of online businesses in real time, and achieve a closed-loop business linkage of monitoring, early warning and emergency response. Supported by massive and continuous user access trajectory data, it effectively integrates and analyzes all threat intelligence, security incidents, etc., assesses the security of intrusion threats from a macro perspective, and helps companies effectively respond to unexpected new attacks. Real-time grasp of the latest security situation of the entire network and customer business.
  • 32
    CrowdStrike Charlotte AI
    CrowdStrike Charlotte AI is an advanced, AI-driven cybersecurity solution designed to enhance threat detection and response by leveraging machine learning and behavioral analysis. It continuously monitors network activity, endpoints, and cloud environments to identify patterns and anomalies that could indicate malicious behavior or potential cyber threats. By using advanced algorithms, Charlotte AI can predict and detect sophisticated attacks in real-time, reducing response times and improving overall threat prevention. Its ability to analyze vast amounts of data and provide actionable insights allows security teams to proactively address vulnerabilities and prevent incidents before they occur. Charlotte AI is part of CrowdStrike's broader suite of cybersecurity tools, helping organizations stay ahead of emerging threats with cutting-edge, automated defense capabilities.
  • 33
    OWASP Threat Dragon
    OWASP Threat Dragon is a modeling tool used to create threat model diagrams as part of a secure development lifecycle. Threat Dragon follows the values and principles of the threat modeling manifesto. It can be used to record possible threats and decide on their mitigations, as well as giving a visual indication of the threat model components and threat surfaces. Threat Dragon runs either as a web application or a desktop application. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
  • 34
    Nexkey

    Nexkey

    Nexkey

    Don’t worry anymore about forgetting your key card or fob at home. No more fumbling around looking for the right key. Unlock any door with your phone or Apple Watch. Grant and revoke keys instantly and schedule access for all your doors through one platform. Secure your business from easily copied key cards and pin codes that never change. Remotely let people in your space. Know when they enter your space in the Nexkey app. Be notified when someone enters the building during off hours. Streamline your business operations by understanding how people use your space through dashboards. Flag users not active in the space helping to reduce turnover and eliminate security threats. Communicate with everyone who has access to your space. Having an event after work hours or is something in the space not working properly? Let everyone know through Nexkey. Integrate Nexkey’s access control system with the apps you already use and love.
  • 35
    Genetec Security Center
    With the increasing amount of new security technologies and sensors available, an open approach to security is crucial. But over time, integration falls short. APIs and interfaces built for a single purpose reach their limits - and your system stops keeping up with your needs. Security Center is a different type of platform. It's built from the ground up to unify all of your data so that you can manage security policies, monitor events, and run investigations. Its extensive ecosystem lets you expand your system with the technology you need to face emerging threats. And since it’s not focused on one narrow set of tasks, it accommodates new data types seamlessly in one interface. Security Center allows you to monitor events and configure your system in one place. With a single interface to master, your team spends less time in training. And since it was designed to unify your entire security environment, it provides a familiar experience even as your system grows.
  • 36
    Omnipresence 3D
    Omnipresence 3D (O3D) is an advanced Security Management Software solution. It eliminates many inefficiencies faced by large security organizations, such as excessive reliance on memorization, concentration and judgement calls based on incomplete information; labor-intensive manual reporting and manual compliance oversight. You can adapt it to your organization’s threats, procedures and regulations, so you can manage everyday tasks and rare incidents more easily, better and faster. Omnipresence 3D can improve ten-fold your situational awareness and your ability to manage complex incidents by eliminating up to 90% of the mouse clicks and manual steps experienced in competing solutions. This is achieved through dozens of time-saving features including an Immersive 3D technology protected by 3 patents filed in 46 countries.
  • 37
    Viso Suite

    Viso Suite

    Viso Suite

    Viso Suite is the world’s only end-to-end platform for computer vision. It enables teams to rapidly train, create, deploy and manage computer vision applications – without writing code from scratch. Use Viso Suite to deliver industry-leading computer vision and real-time deep learning systems with low-code and automated software infrastructure. The use of traditional development methods, fragmented software tools, and the lack of experienced engineers are costing organizations lots of time and leading to inefficient, low-performing, and expensive computer vision systems. Build and deploy better computer vision applications faster by abstracting and automating the entire lifecycle with Viso Suite, the all-in-one enterprise vision platform.​ Collect data for computer vision annotation with Viso Suite. Use automated collection capabilities to gather high-quality training data. Control and secure all data collection. Enable continuous data collection to further improve your AI models.
  • 38
    Oloid

    Oloid

    Oloid

    Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees can choose contactless biometrics or mobile credentials to gain physical access. Make the workplace frictionless and secure for Smartphone and non-smartphone users alike. Use computer vision to keep an accurate count of people entering & exiting doors and enforce occupancy limits at the points of entry with Oloid’s rule-based access control. Leverage existing security cameras or install off-the-shelf IP cameras.
  • 39
    Interplay

    Interplay

    Iterate.ai

    Interplay Platform is a patented low-code platform with 475 pre-built connectors (enterprise, AI, IoT, Startup Technologies). It's used as middleware and as a rapid app building platform by big companies like Circle K, Ulta Beauty, and many others. As middleware, it operates Pay-by-Plate (frictionless payments at the gas pump) in Europe, Weapons Detection (to predict robberies), AI-based Chat, online personalization tools, low price guarantee tools, computer vision applications such as damage estimation, and much more. It also helps companies to go to market with their digital solutions 10X to 17X faster than in old ways.
  • 40
    Genetec

    Genetec

    Genetec

    Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday.
  • 41
    Patrol Points

    Patrol Points

    Condo Control

    Patrol Points is a cutting-edge security guard tour system solution from Condo Control designed to improve and streamline the patrol guard checkpoint experience using cloud-based NFC technology from the convenience of a smartphone or tablet. Security guards can create routes and interactive checkpoints around the premises, lodge incident reports on the spot, schedule and notify security staff of upcoming patrols, sync patrol reports directly to the security dashboard in real-time, and more. Our cloud-based technology is dependable and simple to use, with off-line accessibility if there isn’t a network connection, and remote access to organize and monitor security on the go.
  • 42
    Trinity Cyber

    Trinity Cyber

    Trinity Cyber

    Cyber risk is increasing and today's attacks, whether ransomware or malware, are more sophisticated and succeed with alarming success. These attacks often go undetected with traditional Intrusion Prevention Systems (IPS), Secure Web Gateways (SWG) and other security products. For the threats these products do detect, false positives and significant incident response workloads strain Security Operations Center (SOC) resources. In addition, many cyber attacks begin with a compromised or corrupted file. Considering the tremendous number of files with which an organization interacts in a given day, it is an enormous challenge to protect the organization from these kinds of threats. Tremendous speed and accuracy are mandatory for any potential solution so as not to disrupt or hinder organizational operations and performance. Running suspicious files through sandboxing is too expensive and too slow to address these types of threats at speed and scale.
  • 43
    YourSixOS

    YourSixOS

    YourSix

    Say goodbye to outdated, on-premise security systems. YourSixOS offers a modern approach to security with our serverless, direct-to-cloud solution. No more cumbersome hardware, no more outdated software – just secure, simple, and flexible security at your fingertips. For operational intelligence and physical security you can trust, the answer is YourSixOS. Our cloud native platform provides unparalleled scalability, uncompromising data security, and unprecedented visibility into your business. Eliminate the blind spots in your business and leverage your visual intelligence to ensure there’s nothing about your business you can’t see. Visual intelligence is more than just protecting against liabilities like threats to physical property or loss of goods. It’s the power to improve customer experiences, increase productivity, and drive operational improvements. It’s a live feed of every risk attacking your profitability.
  • 44
    Wazuh

    Wazuh

    Wazuh

    Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. Wazuh is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis. Wazuh addresses the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility, with the insights to help security analysts discover, investigate and response to threats and attack campaigns across multiple endpoints.
  • 45
    AlertEnterprise

    AlertEnterprise

    AlertEnterprise

    AlertEnterprise delivers a unified cyber-physical security convergence platform by linking IT, OT and Physical Security for risk prevention, detection and mitigation. We help you eliminate security silos, to deliver the most complete view of threats and vulnerabilities while enhancing workforce safety, data privacy and experience. As the only SaaS provider to connect physical security, IT, OT and HR systems, we can help you empower your workforce and unlock new levels of business with a zero-trust, cyber-physical platform for identity, access governance and security. P.S. No coding required. If you work in compliance or investigations, trade the logs and manual checks for self-service, built-in checks, defined rules, workflow processes and more. And if you’re a facility owner, pull reporting, view required training and access an automatic audit trail — whenever you need to.
  • 46
    ShotSpotter

    ShotSpotter

    SoundThinking

    Precision policing solutions that help save lives, deter crime, and make communities safer. Detect gunshots for consistent, rapid, precise police response. Detect highest crime risk areas for directed patrols to maximum crime deterrence. Protect your officers with enhanced situational awareness. Protect your community by disrupting crime cycles with data-driven solutions that limit bias. Connect with your community and build trust. Connect to data and insights to drive impactful and measurable outcomes. With law enforcement agencies across the U.S. grappling with budget cuts, reduced staffing and nationwide scrutiny, there’s perhaps never been a more challenging time to work in policing. On top of all of this, many departments are also facing the ramifications of siloed data and aging technology. At a time when expediency and efficiency are more important than ever before, many agencies lack the software they need to keep up with the pace of change.
  • 47
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous events. Seamlessly synthesizing information from access control, video and other sensors, the OnGuard system delivers complete line-of-sight to all aspects of security and facilitates intelligent responses and outcomes. The OnGuard system integrates seamlessly with a wide range of existing business systems. The OnGuard system can bi-directionally exchange cardholder data with many HR platforms and/or ERP systems, coordinate alarm/event data with emergency response systems, and more.
  • 48
    Proofpoint Threat Response
    Security teams face many challenges when responding to threats that are targeting people in their organization. Those challenges are staff shortages, an overwhelming number of alerts and attempting to reduce the time it takes to respond and remediate threats. Proofpoint Threat Response is a leading security orchestration, automation and response (SOAR) solution that enables security teams to respond faster and more efficiently to the everchanging threat landscape. Threat Response orchestrates several key phases of the incident response process. It can ingest any alert from any source and automatically enrich and group them into incidents in a matter of seconds. Security teams receive rich and vital context from leveraging Proofpoint Threat Intelligence as well as third-party threat intelligences to help understand the "who, what and where" of attacks, prioritize and quickly triage incoming events.
  • 49
    VIPRE Email Security

    VIPRE Email Security

    VIPRE Security Group

    VIPRE Email Security protects your email users and business network from the latest, most sophisticated malware, weaponized attachments, and phishing threats that bypass traditional detection methods. As a secure email gateway, it analyzes inbound and outbound emails in real-time for threats. Powerful visual analytics provide visibility into ongoing attacks, enabling quick and precise response to threats. With a simple integration into Microsoft 365, VIPRE can remove malicious or suspicious emails from a user’s inbox even after delivery. Available in two versions: VIPRE Email Security Cloud provides strong core protection, while VIPRE Email Advanced Threat Protection offers advanced, AI-driven techniques for file attachment and link analysis.
    Starting Price: $30/seat/year
  • 50
    NESCOUT Cyber Threat Horizon
    NETSCOUT Cyber Threat Horizon is a real-time threat intelligence platform designed to provide visibility into the global cyber threat landscape, including DDoS attack activity. Leveraging data from NETSCOUT's ATLAS (Active Threat Level Analysis System), it offers insights into traffic anomalies, attack trends, and malicious activities observed across the internet. The platform empowers organizations to detect potential threats early by providing interactive visualizations, historical data analysis, and geolocation-based attack mapping. With its ability to track emerging threats and DDoS events as they unfold, NETSCOUT Cyber Threat Horizon is an invaluable tool for network administrators and security professionals seeking to enhance situational awareness and preemptively address risks.