Alternatives to Deleaker

Compare Deleaker alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Deleaker in 2026. Compare features, ratings, user reviews, pricing, and more from Deleaker competitors and alternatives in order to make an informed decision for your business.

  • 1
    Scout Monitoring

    Scout Monitoring

    Scout Monitoring

    Scout Monitoring is Application Performance Monitoring (APM) that finds what you can't see in charts. Scout APM is application performance monitoring that streamlines troubleshooting by helping developers find and fix performance issues before customers ever see them. With real-time alerting, a developer-centric UI, and tracing logic that ties bottlenecks directly to source code, Scout APM helps you spend less time debugging and more time building a great product. Quickly identify, prioritize, and resolve performance problems – memory bloat, N+1 queries, slow database queries, and more – with an agent that instruments the dependencies you need at a fraction of the overhead. Scout APM is built for developers, by developers, and monitors Ruby, PHP, Python, Node.js, and Elixir applications.
  • 2
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 3
    SmartBear AQTime Pro
    Debugging should be simple. AQTime Pro synthesizes complex memory and performance information into digestible, actionable insights so you can quickly find bugs and their root cause. Finding and squashing highly differentiated bugs is tedious and complicated, but AQTime Pro makes it easy. With over a dozen profilers, you can find memory leaks, performance bottlenecks, code coverage gaps and more in just a few clicks. AQTime Pro enables you to squash all bugs with one tool and get back to making high quality code. Don’t let code profilers box you in with a single codebase or framework and prevent you from finding performance bottlenecks, memory leaks, code coverage gaps unique to your project. AQTime Pro is the one tool to use across multiple codebases and frameworks in a project. It has broad language support for C/C++, Delphi, .NET, Java and more.
    Starting Price: $719 one-time payment
  • 4
    Kotzilla

    Kotzilla

    Kotzilla

    Visualize and resolve thread performance issues, memory leaks, and structural app issues, during development or in production. Koin’s container captures only essential app behavior data, ensuring minimal overhead. Understand and debug the lifecycle of component instances and scopes, their loading times, and execution among different threads. This ensures proper management and resource allocation while identifying and preventing errors such as memory leaks, performance issues, and ANRs. Analyze dependencies to understand relationships between different components. Optimize the dependency injection process, simplifying development and debugging efforts. This proactive analysis ensures reliability and scalability by detecting and addressing potential issues early. Gain granular traceability of components and lifecycles with Kotzilla’s dedicated API. Visualize identified issues and application crashes to get comprehensive insights into your app’s performance and stability.
    Starting Price: $49 per month
  • 5
    HeapHero

    HeapHero

    Tier1app

    Due to inefficient programming, modern applications waste 30% to 70% of memory. HeapHero is the industry's first tool to detect the amount of wasted memory. It reports what lines of source code originating the memory wastage and solutions to fix them. A Memory leak is a type of resource drain that occurs when an application allocates memory and does not release after finish using it. This allocated memory can not be used for any other purpose and it remains wasted. As a consequence, Java applications will exhibit one or more of these non-desirable behaviors: poor response time, long JVM pauses, application hang, or even crash. Android mobile applications can also suffer from memory leaks, which can be attributed to poor programming practices. Memory leaks in mobile apps bare direct consumer impact and dissatisfaction. Memory leak slows down the application's responsiveness, makes it hang or crashes the application entirely. It will leave an unpleasant and negative user experience.
  • 6
    Arm DDT
    Arm DDT is the number one server and HPC debugger in research, industry, and academia for software engineers and scientists developing C++, C, Fortran parallel and threaded applications on CPUs, GPUs, Intel, and Arm. Arm DDT is trusted as a powerful tool for the automatic detection of memory bugs and divergent behavior to achieve lightning-fast performance at all scales. Cross-platform for multiple servers and HPC architectures. Native parallel debugging of Python applications. Has market-leading memory debugging. Outstanding C++ debugging support. Complete Fortran debugging support. Has an offline mode for debugging non-interactively. Handles and visualizes huge data sets. Arm DDT is a powerful parallel debugger, available standalone or as part of the Arm Forge debug and profile suite. Its intuitive graphical interface provides automatic detection of memory bugs and divergent behavior at all scales.
  • 7
    LeakRadar

    LeakRadar

    LeakRadar.io

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.
    Starting Price: €9.99/month
  • 8
    RAMRush

    RAMRush

    FCleaner

    RAMRush is a free memory management and optimization tool. It can efficiently optimize the memory usage of your Windows system, free up physical RAM and make your system work better. RAMRush uses an intelligent way to manage the physical memory and lets the RAM work with a better performance. It will help you to prevent system crashes, and memory leaks and keep your computer running more efficiently. RAMRush is easy and powerful to use for both beginners and experts. No experience or computer skills are necessary! RAMRush is freeware, you could download and use it free of charge. 100% clean! No spyware or adware! Increase system performance. Increase the amount of memory available. Defragment system physical memory. Recover memory from Windows applications. Remove memory leaks. Prevent system crashes caused by memory problems. Display the real-time usages data of CPU and RAM.
    Starting Price: Free
  • 9
    Alert Labs

    Alert Labs

    Alert Labs

    Alert Labs offers an enterprise AI-powered water intelligence platform and commercial leak detection software called AlertAQ that delivers real-time visibility into water use, leak detection, environmental conditions, and abnormal water consumption for buildings and portfolios. It analyzes data from scalable IoT water sensors to detect surges, continuous leaks, and deviations from normal usage patterns, sends 24/7 alerts by phone, SMS, email, or app when issues occur, and automatically logs event details like location, time, duration, and priority for rapid action. AlertAQ centralizes control of water monitoring across all properties on one dashboard, provides interactive floor plans and automated reports to track performance over time, and includes features like remote and scheduled water shut-off controls to stop leaks quickly. It uses a secure standalone cellular connection and battery-backed sensors that do not rely on Wi-Fi.
  • 10
    MemOptimizer

    MemOptimizer

    CapturePointStone

    The Problem: Almost 100% of software programs contain "memory leaks". Over time these leaks cause less and less memory to be available on your PC. Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! In addition, memory is often locked in pages so if your program needed 100 bytes of memory, it's actually locking up 2,048 bytes (a page of memory)! Until now, The only way to free up this "locked" memory was to reboot your computer. Not anymore, with MemOptimizer™! MemOptimizer frees memory from the in-memory cache that accumulates with every file or application read from hard-disk.
    Starting Price: $14.99 one-time payment
  • 11
    LeaksID
    Protect most sensitive documents with an invisible fingerprint against being leaked in public during printing, taking snapshots or photos. Track leak source in no time. LeaksID is a cloud-based tool that is built upon a unique proprietary algorithm. It allows adding an invisible markup to document copy once you want to share it securely with third parties. If the print out, a snapshot or a photo of a confidential document ever disclosed in public, you'd be able to identify who exactly is responsible for it. You could never guess who leaked your personal documents or data, when sharing them with someone, especially if they are your closest friends or relatives. Even if you've set enough user permissions or use password-protected PDFs, someone could simply take a photo of your friend's screen while passing by. With LeaksID, you continue to work as before, while taking more control of the document workflow and being able to identify the leak source in minutes with high accuracy.
  • 12
    GlobaLeaks

    GlobaLeaks

    GlobaLeaks

    Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customizable to your needs and protects the whistleblower's privacy and submissions by default. GlobaLeaks targets many use cases and therefore it has been designed as a framework. Designed with flexibility in mind, GlobaLeaks has been adopted worldwide by more than 2000 projects. Our vast range of adopters include independent media, activists, public agencies, corporations and more. GlobaLeaks is free and open source whistleblowing software, under the AGPL License. It is supported by an open community of users, volunteers and contributors who work together to constantly improve the software and documentation. If you see a problem, create an issue on our ticketing system and help us improve transparency worldwide! GlobaLeaks was motivated to create an opportunity for concerned individuals to confidently report within their local context.
  • 13
    NordStellar

    NordStellar

    Nord Security

    NordStellar enables you to detect and respond to cyber threats targeting your company, before they escalate. Give your security teams visibility into how threat actors work and what they do with compromised data. Cut down on data leak detection times, save resources with automated monitoring, and minimize risk to your organization. Businesses are often unaware of data leaks until it’s too late. This calls for modern threat exposure management solutions that help your security team spot data leaks — before they become a problem. Reduce the risk of ransomware, ATO, session hijacking, and other cyber attacks that lead to financial losses.
  • 14
    RAM Booster .Net

    RAM Booster .Net

    RAM Booster .Net

    RAM Booster allows you to instantly free up memory when your system slows down. Let RAM Booster .Net free up your memory, and boost your PC’s speed now! Increasing the amount of Memory available. Let's you run large applications simultaneously without slowing down your system! Displays real-time graph of available physical and virtual memory. RAM Booster .Net works in the system tray near the clock. Recovers Memory leaks from unstable programs. Easy and powerful for both beginners and experts.
    Starting Price: Free
  • 15
    Parameter

    Parameter

    Parameter

    Parameter is a comprehensive monitoring tool built to help mission-critical facilities detect, analyze, and act on environmental, leak, and equipment health issues before they cause failures. It integrates data from RLE leak detection systems, battery monitoring (Cellwatch), and environmental monitoring into a unified system that feeds real-time information to building management systems (BMS) using native protocols like SNMP, BACnet, and Modbus. It supports scalable monitoring from single racks to hyperscale operations, offering precise detection of fluid leaks with location mapping, continuous tracking of temperature, humidity, airflow, CO2, and power conditions, and advanced battery health insights for UPS and backup systems. Parameter’s solutions provide real-time alerts and actionable data through web interfaces accessible from any browser or device, enabling rapid response and preemptive maintenance to maximize uptime.
  • 16
    GAT

    GAT

    GAT InfoSec

    Information security solutions to manage threats in technologies, people and processes. Manage your Security Program and reduce the risk of attacks, ransomware, data leaks and third-party risks. Integrated solutions to help create and maintain an SGSI (Information Security Management System) with prioritization and focus on the business context. Automatically identify vulnerabilities in cloud environments and reduce the risk of ransomware, data leaks, intrusions and cyber attacks. Mapping of the exhibition surface itself and that of third parties. Risk score and vision of leaks, risks and vulnerabilities in applications, networks and infrastructure. Collaborative processes, reports and dashboards that deliver data with clarity, creating and facilitating the sharing of information across all sectors of the company.
  • 17
    osquery

    osquery

    osquery

    osquery is an operating system instrumentation framework for Windows, OS X (macOS), and Linux. The tools make low-level operating system analytics and monitoring both performant and intuitive. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process. Our build infrastructure ensures that newly introduced code is benchmarked and tested. We perform continuous testing for memory leaks, thread safety, and binary reproducibility on all supported platforms.
    Starting Price: Free
  • 18
    ZeroLeaks

    ZeroLeaks

    ZeroLeaks

    ZeroLeaks is an AI prompt security platform that helps organizations identify and fix exposed system prompts, internal tools, and logic vulnerabilities that could allow prompt injection, prompt extraction, or other forms of leakage that expose internal instructions or intellectual property to unauthorized actors. It provides an interactive dashboard where users can scan system prompts manually or automate scanning via CI/CD integration to catch leaks and injection vectors before code is deployed, and it uses an AI-powered red-team-style analysis engine to assess prompt surfaces for logic flaws, extraction risks, and potential misuse with evidence, scoring, and remediation recommendations. ZeroLeaks targets enterprise-grade security for large-language-model-based products by offering vulnerability assessments that highlight prompt exposure depth, prioritized risks, proof, and access paths for issues found, and suggested fixes such as prompt restructuring, tool gating, etc.
    Starting Price: $499 per month
  • 19
    MULTI IDE

    MULTI IDE

    Green Hills Software

    After more than three decades of customer use and continuous enhancement, the MULTI Integrated Development Environment (IDE) is unmatched in the embedded software industry. Developers know they can rely on MULTI to help them produce high-quality code and get their devices to market faster. Whether pinpointing a hard-to-find bug, resolving a memory leak, or maximizing system performance, MULTI consistently works. Every feature of our revolutionary Debugger is designed to quickly solve problems that stump traditional tools. It often takes weeks or months to track down problems like inter-task corruptions, missed real-time requirements, and external hardware events. Green Hills' TimeMachine tool suite helps you solve the same problems in hours or even minutes. The TimeMachine tool suite automatically captures program execution data, combining the MULTI Debugger interface with innovative replay debugging capabilities.
  • 20
    SourceDebug

    SourceDebug

    SourceDebug

    SourceDebug is a fast powerful project-oriented programming editor, code browser, and debugger that helps you understand code while you work and plan. SourceDebug has built-in dynamic analysis for C/C++, Objective-C, and more. SourceDebug can debug application with source code in different locations. SourceDebug integrates editing, browsing, compiling and debugging functions for local and remote projects. It can be used to learn an existing code base quickly, and get up to speed on new projects. SourceDebug parses your whole project and lets you navigate and edit code like a breeze. It can jump easily to variables, functions or include files. Smart Bookmark can record the browsing location and play back when needed. Supports GDB or LLDB-MI debug over SSH, ADB, Telnet , Rlogin and Local Cygwin. GDB server debug is also supported. Show Quickwatch, Watches, Callstack, Variables, Memory, Breakpoint List, Disassemble and Thread List as needed. Sftp, Ftp and Local drives are supported.
    Starting Price: $49/user
  • 21
    Arm Forge
    Build reliable and optimized code for the right results on multiple Server and HPC architectures, from the latest compilers and C++ standards to Intel, 64-bit Arm, AMD, OpenPOWER, and Nvidia GPU hardware. Arm Forge combines Arm DDT, the leading debugger for time-saving high-performance application debugging, Arm MAP, the trusted performance profiler for invaluable optimization advice across native and Python HPC codes, and Arm Performance Reports for advanced reporting capabilities. Arm DDT and Arm MAP are also available as standalone products. Efficient application development for Linux Server and HPC with Full technical support from Arm experts. Arm DDT is the debugger of choice for developing of C++, C, or Fortran parallel, and threaded applications on CPUs, and GPUs. Its powerful intuitive graphical interface helps you easily detect memory bugs and divergent behavior at all scales, making Arm DDT the number one debugger in research, industry, and academia.
  • 22
    Breachsense

    Breachsense

    Breachsense

    Protect your organization & staff from data breaches. Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data breaches in real-time enabling you to prevent cyber threats before they happen. Uncover your company’s breached data and malware-infected devices. Track open, deep, and dark web sources such as Tor websites, private ransomware IRC and Telegram channels, criminal forums, and cybercrime marketplaces. Continuous monitoring enables your team to uncover data breaches related to your VIPs, executive team members, employees as well as clients. Find exposed user & employee credentials, ransomware leaks as well as exposed company data being sold or traded on criminal marketplaces and private ransomware forums. Breachsense continuously monitors the internet for sensitive company information such as account credentials, employee details, leaked company data, session tokens, 3rd party data leaks, and more.
  • 23
    Smartvatten

    Smartvatten

    Smartvatten

    Smartvatten is a cloud-based water management and analytics platform that helps real estate owners, property managers, and water utilities monitor, measure, analyze, and visualize water consumption data in real time to improve efficiency, prevent leaks, and support sustainability goals. It aggregates water usage from all types of meters, whether main or sub-metering, into a unified digital dashboard called Smartvatten Hub, providing accurate minute-level data, automated reporting, and actionable insights that make it easier to understand consumption patterns, detect anomalies like leaks before they become costly problems, and optimize water use across entire portfolios. It uses machine learning and advanced analytics to interpret data from disparate sources without complex installations, enabling proactive operations, reduced manual workload, and enhanced decision-making for maintenance and resource planning.
  • 24
    VPNLY

    VPNLY

    VPNLY

    VPNLY is a free virtual private network service that works without registration, restrictions, or logging. It allows users to browse, stream, or download with no time, speed, or bandwidth limits. The service provides around 20 fast, secure servers spread across four global locations. It features end-to-end encryption, DNS and IP leak protection, as well as WebRTC leak prevention to protect user privacy. VPNLY claims to follow a strict no-logs policy, meaning it does not collect personal or usage data. The service is operated under Swiss jurisdiction. The interface is simple and privacy-focused, with universal compatibility across devices, 24/7 support, and an ad-free experience. All traffic is routed through encrypted servers to protect against DNS/IP leaks; users do not need to register or provide personal information to use it.
  • 25
    Cronboard

    Cronboard

    Cronboard

    Cronboard is a powerful tool designed to give Laravel developers complete control over their scheduled tasks. It allows users to import or create schedules, monitor job performance, and receive real-time notifications for failures or issues such as memory leaks or scheduling conflicts. The platform offers a live dashboard that provides an overview of cron job history, results, and analytics, with the ability to start, stop, or update tasks without redeploying the project. Users can also adjust task schedules directly from the dashboard and configure parameters for more precise control. Cronboard's advanced issue detection notifies users when tasks fail or exhibit unusual behavior, ensuring tasks run smoothly. With detailed performance metrics, memory usage, and execution history, users can troubleshoot and optimize tasks efficiently. The tool is currently free in its private beta, with a full set of premium features.
    Starting Price: Free
  • 26
    TotalView

    TotalView

    Perforce

    TotalView debugging software provides the specialized tools you need to quickly debug, analyze, and scale high-performance computing (HPC) applications. This includes highly dynamic, parallel, and multicore applications that run on diverse hardware — from desktops to supercomputers. Improve HPC development efficiency, code quality, and time-to-market with TotalView’s powerful tools for faster fault isolation, improved memory optimization, and dynamic visualization. Simultaneously debug thousands of threads and processes. Purpose-built for multicore and parallel computing, TotalView delivers a set of tools providing unprecedented control over processes and thread execution, along with deep visibility into program states and data.
  • 27
    Mz RAM Booster

    Mz RAM Booster

    Mz Ultimate Tools

    Mz RAM Booster is a program created to improve the performance of your computer by auto-recovering RAM and fine-tuning some Windows system settings! It uses minimal resources and almost no CPU time. Speed up your computer, stop memory leaks and increase free RAM. Supported operating systems are Windows XP/2003/Vista/7 (full Windows x64 support).
    Starting Price: Free
  • 28
    Pentester

    Pentester

    Pentester

    The Pentester dashboard allows non-technical staff to review findings related to the company technology and data leaks such as passwords. Technical users have a separate dashboard that provides detailed results, and instructions on how to mitigate items found. Within 5 minutes see which website vulnerabilities are publicly known, and see a sample of breached passwords and leaks associated to your company. Based on your needs select a plan that makes the most sense for your company. Paid plans offer advanced scanning and a full report of breaches.
    Starting Price: $19 per month
  • 29
    Augmeta

    Augmeta

    Augmeta

    Augmeta prevents revenue leaks by triaging KPI anomalies in hours instead of weeks. Imagine checkout completions at an eCommerce retailer dipping due to a latent iOS bug - each day of delay leaks revenue. Today, enterprises lose millions because anomaly triage is bottlenecked by noise, limited capacity, and fragmented tools. Our AI surfaces the why, recommends next steps, and delivers decision-grade answers.
  • 30
    KeepCart

    KeepCart

    KeepCart

    Protect your checkout from more extensions than any other tool out there. Including Honey, Rakuten, Coupert, RetailMeNot, Karma, and more! Block coupon extension pop ups at checkout and improve margins, use protected discount links, and avoid marketing attribution headaches. Block coupon pop up. Remove coupon pop up. KeepCart solves coupon leaks by tracking what sites your codes have leaked to. Get analytics on the top coupon sites and stay on top of revenue losses. Code security! CleanCart alternative.
  • 31
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition
  • 32
    Lysto

    Lysto

    Lysto

    Lysto is an all-in-one playtesting workspace designed for game studios and user researchers, offering precision-matched players, a secure collaborative environment, and AI-powered insights. Users can access a private, secure workspace to design playtests, manage data, invite key collaborators, and seamlessly transform feedback into actionable insights. It ensures enterprise-grade security by maintaining complete control over game builds with precise access permissions, NDAs, secure distribution, and a kill switch to revoke access, eliminating the risk of leaks. Lysto enables the analysis of player feedback at scale, turning player feedback into clear insights, tracking gamer behavior, predicting drop-offs, and refining games with speed and accuracy, without the hassle of juggling multiple tools or losing data. Its intelligent playtest analysis instantly analyzes hours of gameplay footage, delivering sharp, actionable insights, allowing teams to focus on making smarter decisions.
  • 33
    StegAI

    StegAI

    StegAI

    StegAI watermarks protect your digital library from misuse. Stay ahead of deepfakes, leakers, and piracy. StegAI's API keeps your unlaunched products & corporate knowledge secret. Trace leaks back to individuals and organizations. Provenance for authenticity, history, & copyright. Watermark AI-generated content that will remain intact - even when edited. A scalable solution for digital images, videos, & documents.
    Starting Price: $90 per month
  • 34
    Traclea

    Traclea

    Traclea

    Traclea is a real-time credential monitoring platform that tracks both data breaches and infostealer malware. We monitor 2,000+ breaches and 50+ malware families, providing instant alerts when passwords or usernames leak anywhere online. Unlike traditional breach checkers that only show corporate leaks, we detect malware stolen credentials (infostealer) sold on dark web marketplaces within 48 hours. Our platform offers username monitoring for gaming and crypto accounts, platform-specific alerts, and API access. We help individuals, families, and businesses prevent account compromise by detecting credential theft immediately not months later. Available as a free forever plan with premium options from $1.99/month.
    Starting Price: $1.99/month
  • 35
    BlockSurvey

    BlockSurvey

    BlockSurvey

    End-to-end encrypted forms and surveys Did you know? Surveys and forms that you fill out today may not be as secure as you think. Leaked records include millions of customer and personal records. Data breaches and data leaks are not stopping. Imagine collecting data on your mental health, sexual health and activism. There is no privacy or security. It is alarming, we know. BlockSurvey is a secure, end-to-end encrypted alternative for Google Forms, Typeform and SurveyMonkey. We can help you run sensitive surveys.
    Starting Price: $25/month
  • 36
    UpGuard

    UpGuard

    UpGuard

    The new standard in third-party risk and attack surface management. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day. Continuously monitor your vendors, automate security questionnaires, and reduce third and fourth-party risk. Monitor your attack surface, prevent data breaches, discover leaked credentials, and protect customer data. Scale your third-party risk program with UpGuard analysts, and let us monitor your organization and vendors for data leaks. UpGuard builds the most powerful and flexible tools for cybersecurity. Whether you’re looking to prevent third-party data breaches, continuously monitor your vendors, or understand your attack surface, UpGuard’s meticulously designed platform, and unmatched functionality helps you protect your most sensitive data. Hundreds of the world’s most data-conscious companies are scaling faster and more securely.
    Starting Price: $5,249 per year
  • 37
    Foretrace

    Foretrace

    Foretrace

    Find exposed data before your adversaries do. Foretrace’s patent-pending Total Recon™ engine detects data exposure and alerts you before it results in costly breaches. Credentials can be exposed in data breaches, from leaks or publicly shared sources such as code repositories. Exposed account names and passwords are used by hackers to identify and target accounts. Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 38
    Inspector

    Inspector

    Inspector.dev

    Inspector is a Code Execution Monitoring tool that helps software developers automatically identify errors and bottlenecks. It traces your application at any scale, enabling you to fix issues before customers experience them while keeping debugging costs predictable and low.
    Starting Price: €15/month
  • 39
    EchoMark

    EchoMark

    EchoMark

    Collaboration and communication, meet privacy and security. While other companies attempt to prevent data exfiltration by limiting the flow of information, we use invisible personalized watermarks in documents and email messages to allow for seamless sharing that's also easily traceable. Whether information is shared via email, printout, or photo, EchoMark provides an invisible solution to find the source within minutes. Advanced features like natural language versioning and computer vision detection help further ensure tracking success. Once deployed, EchoMark will automatically watermark documents and emails according to your established parameters. If you suspect a leak has occurred or spotted a document online, upload the original document to your EchoMark dashboard. EchoMark will use computer vision to compare the leaked fragment with each marked copy of the document shared.
    Starting Price: $ 19 per month
  • 40
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 41
    Byteplant Email Validator
    Stop Wasting Time on Bad Email Data. Real-Time Email Validation - Cut Bounce Rates, Eliminate Disposables and Plug Funnel Leaks.
  • 42
    CppDepend

    CppDepend

    CoderGears

    CppDepend is a comprehensive code analysis tool for C and C++ languages, tailored to assist developers in maintaining complex code bases. It offers a broad spectrum of features for ensuring code quality, including static code analysis, which is pivotal in identifying potential code issues such as memory leaks, inefficient algorithms, and deviations from coding standards. A key aspect of CppDepend is its support for widely recognized coding standards like Misra, CWE, CERT, and Autosar. These standards are crucial in various industries, particularly in developing reliable and safe software for automotive, embedded, and high-reliability systems. By aligning with these standards, CppDepend helps in ensuring that the code complies with industry-specific safety and reliability requirements. The tool's integration with popular development environments and its compatibility with continuous integration workflows make it an invaluable asset in agile development.
  • 43
    SecureTower

    SecureTower

    falcongaze

    Our DLP system helps companies protect against leaks of confidential information, as well as monitor the work of employees. Leaks of confidential information. Fraud schemes within the company. Insider activity, ineffective employees, control, actions on employees’ computers. Efficiency and loyalty of staff, employee communications, data channels, blocking, malicious actions of employees. Access to web resources (including by category), launching applications (including by category), saving data to the clipboard, connecting USB devices. Analysis, content of uploaded files (text, images, audio), employee efficiency, risk activity of employees. Statistical indicators of employee performance, investigation, information security incidents. Causes of safety violations, the reasons for the ineffective work of employees, fraud schemes within the company.
  • 44
    Sentry

    Sentry

    Sentry

    From error tracking to performance monitoring, developers can see what actually matters, solve quicker, and learn continuously about their applications - from the frontend to the backend. With Sentry’s performance monitoring you can trace performance issues to poor-performing api calls and slow database queries. Source code, error filters, stack locals — Sentry enhances application performance monitoring with stack traces. Quickly identify performance issues before they become downtime. View the entire end-to-end distributed trace to see the exact, poor-performing API call and surface any related errors. Breadcrumbs make application development a little easier by showing you the trails of events that lead to the error(s).
    Starting Price: $26 per month
  • 45
    IDA Pro

    IDA Pro

    Hex-Rays

    IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation (assembly language). Advanced techniques have been implemented into IDA Pro so that it can generate assembly language source code from machine-executable code and make this complex code more human-readable. The debugging feature augmented IDA with the dynamic analysis. It supports multiple debugging targets and can handle remote applications. Its cross-platform debugging capability enables instant debugging, easy connection to both local and remote processes and support for 64-bit systems and new connection possibilities. IDA Pro allows the human analyst to override its decisions or to provide hints so that the analyst can work seamlessly and quickly with the disassembler and analyze binary code more intuitively.
  • 46
    Amazon SageMaker Debugger
    Optimize ML models by capturing training metrics in real-time and sending alerts when anomalies are detected. Automatically stop training processes when the desired accuracy is achieved to reduce the time and cost of training ML models. Automatically profile and monitor system resource utilization and send alerts when resource bottlenecks are identified to continuously improve resource utilization. Amazon SageMaker Debugger can reduce troubleshooting during training from days to minutes by automatically detecting and alerting you to remediate common training errors such as gradient values becoming too large or too small. Alerts can be viewed in Amazon SageMaker Studio or configured through Amazon CloudWatch. Additionally, the SageMaker Debugger SDK enables you to automatically detect new classes of model-specific errors such as data sampling, hyperparameter values, and out-of-bound values.
  • 47
    Synamedia ContentArmor
    ContentArmor is a forensic watermarking software solution that protects content investments, identifies malicious users, and prevents piracy. Identify leaking accounts and protect your content against piracy. Content-aware forensic watermarking, technology with perfect fidelity, and market-leading robustness against video manipulation. Reduce deployment costs with unique bitstream watermarking of compressed content. Safeguard your content investments in premium entertainment and live sports by quickly identifying leaks and taking action to disrupt pirate streams. Identify malicious users illegally sharing your dailies, localized pre-release versions, and screeners. Discover which platforms have been compromised and where to focus your anti-piracy efforts with your affiliates and business partners. Incorporate audio watermarks in your music to protect exclusive tracks and pinpoint the source of piracy to take remedial actions.
  • 48
    SnappKit

    SnappKit

    SnappKit

    SnappKit is a screenshot API built for developers who need reliable image generation without managing browser infrastructure. The problem: Setting up Puppeteer or Playwright means managing browser clusters, handling memory leaks, debugging timeout errors, and scaling infrastructure. It's weeks of work before you capture your first screenshot. The solution: One API call. Screenshots in under 2 seconds. 99.9% uptime. Key features: - URL to screenshot — Capture any webpage with full CSS rendering - HTML to image — Render raw HTML directly (perfect for dynamic OG images) - Multiple formats — PNG, JPEG, WebP output - Full customization — Viewport size, device emulation, full-page capture - Fast and reliable — Sub-2s response times, 99.9% uptime SLA Use cases: - Dynamic Open Graph image generation - Website thumbnails and link previews - Visual regression testing - PDF and report generation - Social media card automation
    Starting Price: $9/month
  • 49
    Smartlockr

    Smartlockr

    Smartlockr

    Smartlockr is a people-centric data security platform to easily enable secure email and file sharing for an entire organization. Smartlockr prevents data leaks by keeping user-friendliness in mind with everything we do. By eliminating the human error, we ensure your workforce is your strongest asset in preventing data leaks. Smartlockr can be customized for each organization, so that every employee can continue to work with the (email) systems they are used to. Smartlockr can be used with almost every operating system and device. It is available as a plug-in for Microsoft 365 (Outlook), it can be integrated into existing systems and an SMTP relay service can be used too. Even a combination is possible if required. Smartlockr can also be used to securely send and receive large files of up to 5 TB. Smartlockr is compliant with all privacy regulations and security standards like GDPR, ISO, NTA 7516.
    Starting Price: €0.42 / month / user
  • 50
    Lightrun

    Lightrun

    Lightrun

    Add logs, metrics and traces to production and staging, directly from your IDE or CLI, in real-time and on-demand. Boost productivity and gain 100% code-level observability with Lightrun. Insert logs and metrics in real-time even while the service is running. Debug monolith microservices, Kubernetes, Docker Swarm, ECS, Big Data workers, serverless, and more. Quickly add a missing logline, instrument a metric, or place a snapshot to be taken on demand. No need to replicate the production environment or re-deploy. Once the instrumentation is invoked, the data is printed to the log analysis tool, your IDE, or to an APM of your choice. Analyze code behavior to find bottlenecks and errors without stopping the running process. Easily add large amounts of logs, snapshots, counters, timers, function durations, and more. You won’t stop or break the system. Spend less time debugging and more time coding. No more restarting, redeploying and reproducing when debugging.