Alternatives to Evolv Express

Compare Evolv Express alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Evolv Express in 2026. Compare features, ratings, user reviews, pricing, and more from Evolv Express competitors and alternatives in order to make an informed decision for your business.

  • 1
    Athena Security

    Athena Security

    Athena Security Concealed Weapons Detection System

    Athena Security is a physical security technology company that specializes in AI-powered threat detection and entryway management. Founded in 2018 and headquartered in Austin, Texas, Jacksonville Florida and SF. The company focuses on replacing outdated security hardware with AI based software and hardware solutions designed for high-traffic environments like hospitals, schools, and casinos. Key Product Ecosystem: Weapons Detection System (Apollo 500): A high-throughput walk-through detector that uses AI to distinguish between metal weapons (firearms, knives) and everyday metal objects like keys or phones, allowing people to pass through without emptying their pockets. AI-Assisted X-Ray: Software and or hardware that integrates with baggage scanners to automatically highlight threats and stop the conveyor belt if a weapon or prohibited item is detected. Hospital Visitor Management System (VMS) for healthcare facilities that automates visitor check-in with EPIC
    Compare vs. Evolv Express View Software
    Visit Website
  • 2
    Omnilert

    Omnilert

    Omnilert

    Save lives through early threat detection and rapid response with visual gun detection. Our AI-powered Gun Detect software brings reliable, 24x7 monitoring to security cameras, creating a widely deployable early gun detection solution. Our Emergency Communications and Automation Platform shares needed intelligence through automatic activation of emergency response plans and safety systems. No matter the threat, from guns to severe weather, we help you maximize every critical second and keep your people from harm's way. Safeguard your people, facilities and operations from all of the threats you face today.
    Compare vs. Evolv Express View Software
    Visit Website
  • 3
    ZeroEyes

    ZeroEyes

    ZeroEyes

    ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond.
  • 4
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 5
    Alibi Security

    Alibi Security

    Alibi Security

    Our security solutions and gun detection analytics work with educational institutions of all types to provide their communities with improved security and peace of mind. Our gun detection technology turns any existing security camera into an intruder and gun-detecting smart camera, enabling instant, real-time responses to trespassing and brandished weapons. The system increases school administrations’ ability to react to threats without adding a visible layer of security, providing a safer and more secure campus. AI technology and machine learning are used to recognize weapons from hundreds of thousands of images in a proprietary data set. The solution recognizes the instances guns are brandished, not fired, providing notifications and real-time alerts. The solution detects weapons as soon as they are visible on camera, flagging threats before shots are fired. This provides building security and law enforcement with precious seconds to address the situation.
  • 6
    DragonFly IoT Active Shooter Sensors
    An outdoor wireless gunshot sensor performing energy capture, waveform analysis, and transmitting resultant data to the Emergency Automatic Gunshot Detection & Lockdown (EAGL) system, a Gunshot Detection System (GDS). Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy waveform algorithms. Sensor contained within resonance chamber allowing flat wall, corner, or pole mounting capability while providing an optimum spherical detection coverage area. Threat validation data is wirelessly transmitted by sensor to the EAGL System Server via internal Quectel. Sensor data received by the EAGL System Server is processed further while initiating the appropriate pre-programmed automatic and autonomous adaptive response feature and process. Sensor also receives calibration data from the EAGL Server using similar communication processes and methods.
  • 7
    Xtract One

    Xtract One

    Xtract One

    Xtract One is the future of entry and perimeter security, offering industry-leading AI-powered software and hardware solutions designed to protect people more effectively and efficiently, without sacrificing their sense of well-being or privacy. SafeGateway is an accurate, fast, and unobtrusive solution to the seamlessly secure patron and employee entrances. This innovative solution automatically scans entrants for concealed weapons such as guns, knives, and IED components more efficiently and accurately than conventional security measures like metal detectors. This technology reduces or eliminates long lineups, uncomfortable pat downs, and invasive searches. SafeGateway is the ideal choice for stadiums, arenas, live entertainment venues, theaters, casinos, nightclubs, art galleries, and other attractions that require effective security screening, without detracting from the guest experience. Offers a covert security system that alerts to potential threats without disturbing alarms.
  • 8
    SafetySmart Platform
    ​The SafetySmart Platform by SoundThinking integrates AI-based software solutions and objective data to assist security teams in ensuring the safety of staff and patrons. Trusted by over 250 agencies across the U.S., the platform offers discreet, unmanned weapons detection systems like SafePointe, which do not interfere with medical devices and enhance visitor experiences in hospitals, corporate locations, hospitality venues, and higher education campuses. It is HIPAA and SOC 2 compliant, emphasizing its commitment to privacy and security standards. Additionally, SafetySmart integrates with existing systems to maximize technology for safety and security.​ SoundThinking prioritizes privacy and has structured our technology, processes, and policies to comply with generally recognized safety and security requirements while safeguarding personal information.
  • 9
    SafePointe

    SafePointe

    SoundThinking

    ​SafePointe by SoundThinking is an AI-based concealed weapons detection system designed for high-throughput facilities. Each lane comprises two discreet metal bollards positioned 8–10 feet apart, equipped with an advanced 3D camera and an NVIDIA-powered edge processor running a state-of-the-art AI model. As individuals pass through, the system utilizes magnetic moment technology to identify digital signatures of magnetically conductive objects, analyzing motion data to determine direction, speed, and movement. If a potential threat is detected, information is reviewed by human analysts within 10 seconds to filter out non-threats, such as armed security personnel. Verified threats prompt digital alerts sent to the facility's security team via the SafePointe app, including images and short video clips identifying the individual. It supports unmanned screening, reducing operational costs, and is safe for individuals with medical devices due to its passive screening technologies.
  • 10
    Defendry

    Defendry

    Defendry

    The Defendry Security Suite is a powerful, automated set of components designed to work seamlessly together whether you only need one or two components or the entire suite. The Defendry SeeSay mobile app is the perfect way to get started! It is fast and easy to deploy, and quickly makes everyone part of your security solution. SeeSay empowers anyone with a smartphone to send texts, alerts, and videos of potential threats directly to your security staff. SeeSay can exponentially speed intelligence and communication as a potential threat situation emerges. The smartphone instantly turns into a security camera. Secure direct messaging with security staff. Everyone is part of your security solution. IoTalk gives operations teams the ability to pre-plan every detail of automatic threat response by creating customized, pre-programmed workflows, to speed a well-coordinated response to any type of threat. Defendry can auto-detect hundreds of different kinds of guns and weapons.
  • 11
    FireFly Indoor Gunshot Detector
    The FireFly® Indoor Gunshot Detector is wireless and designed to work in Indoor environments. Installation basically entails attaching each sensor using only two fasteners. Sensor placement determines detection area coverage, unobstructed spherical range can be as much as 31,415 sqft. Compact, wireless, self-contained, battery-operated gunshot sensor executing threat versus non-threat validation analysis using energy level and waveform analysis algorithms. The sensor is mounted to horizontal ceiling substrates providing a spherical detection coverage area of ~31,415 FT2. Sensors can be attached to vertical columns presenting a decreased coverage area. Threat validation data is wirelessly transmitted by the sensor to the EAGL System Server via the EAGL Gateway. Data received by the EAGL System Server is processed further initiating the appropriate pre-programmed automatic and autonomous Adaptive Response feature and process.
  • 12
    Tutelare Corporation

    Tutelare Corporation

    Tutelare Corporation

    We are committed to maximizing the protection of people using innovative and proprietary technologies. Our founders bring over 20 years of experience and proven track records for designing and building high-level electronics, sensors, and mechanical devices for space, defense, and security industries under UNI EN 9100:2009 Certification. The Tutelare Corporation is a USA-based company that combines new technology development capabilities, industrial design, system integration, and access to financial programs and has a network of top-level international contacts. The Tutelare Corporation expects to offer complete and highly competitive products, solutions, and services. The wearable WFWDs provide mobile threat detection perfect for bodyguards, security guards, and law enforcement. The fixed WFWDs can help secure events and buildings such as churches, airports, synagogues, schools, malls, sports stadiums, public events and crowded areas.
  • 13
    IntelliSee

    IntelliSee

    IntelliSee

    IntelliSee is a real-time artificial intelligence (AI) risk mitigation platform working 24/7/365 to detect and mitigate threats before an incident occurs. IntelliSee turns your existing passive surveillance cameras into proactive risk-mitigation tools so you can protect your people, reputation, and financial well-being. Most surveillance today is unmonitored and used only for post-incident documentation. Even when cameras are monitored, overtaxed security staff are performing an error-prone and tedious task on an unmanageable number of screens. IntelliSee offers a reliable, proactive solution by overlaying and continuously scanning your live surveillance feeds for potential threats. When a threat is detected, IntelliSee instantly alerts designated contacts and systems to the nature and location of the threat so you can act.
  • 14
    Coram AI

    Coram AI

    Coram AI

    Coram AI is a modern video security platform that integrates advanced artificial intelligence to enhance physical security operations. Compatible with any IP camera, Coram AI offers seamless integration, allowing businesses to utilize their existing surveillance infrastructure without the need for extensive replacements. It delivers instant alerts for critical events, such as slip-and-fall incidents and weapon detection, powered by cutting-edge AI technology. Users can quickly locate specific footage using natural language search capabilities, simplifying the process of finding relevant video clips. Additionally, Coram AI provides tools to optimize operations by tracking productivity, identifying inefficiencies, and supporting data-driven decision-making. The system is designed for scalability, accommodating setups ranging from a few cameras to thousands, and offers a variety of IP cameras that are NDAA and ONVIF compliant, ensuring high-quality video surveillance.
  • 15
    Exigent-GR

    Exigent-GR

    Arcarithm

    Applying Artificial Intelligence to identify guns as early as possible to save lives. The Exigent®-GR gun detection capability is based on AI technology developed by Arcarithm for the US Army. The technology was originally developed to detect both drones and guns, based on the concept that a larger operational space allows more reaction time. Current security camera systems require a human to identify gun threats. Even dedicated security professionals using the best camera system cannot provide 100% real-time observation. An effective, proactive solution is needed to identify guns before they enter the building and shots are fired. Autonomously detects people with guns as early as possible, before shots are fired. Instantly analyzes imagery using AI algorithms to determine the type of gun (long gun vs. pistol). Automatically notifies security officials via text message or email showing the person with the gun, their location and type of gun.
  • 16
    Actuate

    Actuate

    Actuate

    Join the 1,000+ companies and schools that use Actuate's AI technology to detect threats and reduce false positives. Instantly detect visibly brandished guns. Detect unpermitted people and vehicles. Identify the formation of large groups of people. Low-cost, cloud-based integration. No new hardware is required. Instant detections are followed by informative alerts within seconds. Built to eliminate bias and respect privacy. Collects no personally identifiable information. Actuate helps organizations be more secure, in the face of high risk, budget limitations, and privacy concerns. Actuate enables moveable construction cameras to automatically detect threats to safety and security. Actuate’s AI software enables central station operators to do more with less. Alerts staff to threats at offices, shopping malls, and other commercial buildings. Detects threats instantly in hospitals and clinics, keeping staff and patients safe.
  • 17
    PureActiv

    PureActiv

    PureTech Systems

    Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. ​ Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors.
  • 18
    Interplay

    Interplay

    Iterate.ai

    Interplay Platform is a patented low-code platform with 475 pre-built connectors (enterprise, AI, IoT, Startup Technologies). It's used as middleware and as a rapid app building platform by big companies like Circle K, Ulta Beauty, and many others. As middleware, it operates Pay-by-Plate (frictionless payments at the gas pump) in Europe, Weapons Detection (to predict robberies), AI-based Chat, online personalization tools, low price guarantee tools, computer vision applications such as damage estimation, and much more. It also helps companies to go to market with their digital solutions 10X to 17X faster than in old ways.
  • 19
    Silent Archer
    SRC’s Silent Archer technology delivers end-to-end counter-UAS capabilities to defeat hostile drones, whether a lone target or a UAS swarm. Detects, tracks, classifies, identifies, and engages hostile UAS threats. Electronically disrupts groups 1-5 UAS, including UAS swarms. Complements kinetic weapon systems for layered defense. Solution of choice for VIP protection and events, and by the U.S. Army and Air Force for force protection. The open architecture and sensor-agnostic design of Silent Archer technologies allow for integration with virtually any command and control system, kinetic weapon system, or additional sensor platforms for added functionality. The Silent Archer system can leverage a variety of proven SRC systems while remaining flexible enough to integrate with almost any existing solution. The Silent Archer system is available in multiple configurations to support any mission.
  • 20
    AmberBox

    AmberBox

    AmberBox

    AmberBox is an indoor gunshot detection and response system designed to automatically sense firearm discharge, alert responders, and provide detailed real-time situational data. Its detectors use a patented “tri-factor authentication” method, combining percussion sensing (muzzle blast and shockwave), infrared detection (muzzle flash), and a machine-learning audio analysis that matches shots against thousands of firearm signatures, to reliably detect gunshots without needing a line of sight. Detection happens in as little as 3.6 seconds, with location accuracy accurate to roughly 60 feet, enabling instant alerts to 911 and on-site security through its cloud-based AmberBox Response Platform. Once a shot is detected, it delivers precise information, including the time, number of shots fired, approximate location, and shooter movement; it can integrate with existing security infrastructure (cameras, access control, mass-notification, lockdown systems).
  • 21
    Netwrix Threat Manager
    Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed. IT infrastructures are getting more complex and the volume of sensitive information stored there is skyrocketing. At the same time, the threat landscape is evolving rapidly, with attacks becoming more sophisticated and more costly. Improve your threat management processes and know about anything suspicious happening in your network, whether it’s an external attack or an insider threat, with real-time alerts delivered via email or mobile notifications. Maximize the value of your investments and enhance security across the IT ecosystem by sharing data between Netwrix Threat Manager and your SIEM and other security solutions. Respond immediately upon threat detection by taking advantage of the extensive catalog of preconfigured response actions, or by integrating Netwrix Threat Manager with your own business processes using PowerShell or webhook facilities.
  • 22
    ShotSpotter

    ShotSpotter

    SoundThinking

    Precision policing solutions that help save lives, deter crime, and make communities safer. Detect gunshots for consistent, rapid, precise police response. Detect highest crime risk areas for directed patrols to maximum crime deterrence. Protect your officers with enhanced situational awareness. Protect your community by disrupting crime cycles with data-driven solutions that limit bias. Connect with your community and build trust. Connect to data and insights to drive impactful and measurable outcomes. With law enforcement agencies across the U.S. grappling with budget cuts, reduced staffing and nationwide scrutiny, there’s perhaps never been a more challenging time to work in policing. On top of all of this, many departments are also facing the ramifications of siloed data and aging technology. At a time when expediency and efficiency are more important than ever before, many agencies lack the software they need to keep up with the pace of change.
  • 23
    Cyberstanc Scrutiny
    Scrutiny is designed to fill the gaps in protection left by traditional security solutions. By utilizing cutting-edge self-learning algorithms, Scrutiny can provide continuous, real-time detection and mitigation of known and advanced persistent threats, ensuring your organization's security posture stays ahead of the ever-evolving threat landscape. Its unique feature set and architecture is able to detect and block even the most advanced threats, including those that target EDR/MDR solutions. Additionally, Scrutiny offers features such as proactive threat hunting, incident response, and forensic capability to allow organizations to get a full picture of the attack and take necessary actions. This way, organizations can have peace of mind that their assets are well-protected and their security operations team can focus on taking action rather than searching for the needle in the haystack.
  • 24
    Guardian Indoor Active Shooter Detection System
    Acoustic and Infrared validation for ZERO false alerts when every second counts. All gunshot data processed within the sensor, having no “human in the loop” reduces the risk of errors and associated delays. Sub-one-second alerting with shot detection location for an immediate, informed response. Floor plan map of the facility with audible and visual shot location information. Instant SMS and e-mail notifications to select recipients. Flush mounted in wallboard or ceiling tile, surface mount box for concrete/brick structures, color matching options. Manufactured in the U.S.A. with strict testing and quality control processes. Built-in self-test, regular heartbeat messages, instant maintenance alerts, and a patented handheld testing device. Simulate shots and initiate integrated actions in active shooter drills. Guardian simultaneously detects gunfire and immediately relays this information via floor plan map with shot location, text, e-mail, and other notification pathways.
  • 25
    CUJO AI

    CUJO AI

    CUJO AI

    CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses. CUJO AI brings to fixed network, mobile and public Wi-Fi operators around the world a complete portfolio of products to provide end users with a seamlessly integrated suite of Digital Life Protection services while improving their own network monitoring, intelligence and protection capabilities. Leveraging artificial intelligence and advanced data access technologies, unprecedented visibility and actionable insight are provided for end-user networks by inventorying connected devices, analyzing applications and services in use, and detecting security and privacy threats. Artificial intelligence and real-time network data combine, working together to create smarter and safer environments for people and all their connected devices.
  • 26
    Intelligent Security Systems (ISS)
    ISS (Intelligent Security Systems) delivers AI-powered video intelligence that helps cities and critical infrastructure prevent incidents before they happen. Our Intellisection® suite and SecurOS® solutions transform ordinary cameras into smart sensors that detect risks in real time, turning video into decisions that save lives and keep people moving safely.​ From intersections and crosswalks to stadiums and secure checkpoints, ISS technology is already helping agencies reduce crashes, protect pedestrians, and streamline vehicle screening. Intellisection® GridSync, Flow, Soteria and AIDE give traffic and safety teams the insights they need to optimize signals, understand near‑misses, and design safer streets, while SecurOS® Soffit and UVSS add an extra protective layer for vulnerable road users and high‑risk sites.​​ ISS uses advanced, scalable video analytics to turn pilots into real deployments, helping cities and operators build safer, smarter spaces.
  • 27
    VIPRE ThreatIQ

    VIPRE ThreatIQ

    VIPRE Security Group

    VIPRE ThreatIQ provides up-to-date threat intelligence from our global network of sensors, which detect millions of malicious files, URLs, and domains daily. With interactive APIs and bulk data downloads, you can tailor threat feeds to your needs. ThreatIQ integrates with various security solutions to enhance protection. Unlike many threat feeds, VIPRE’s ThreatIQ offers unique, verified data not available from other vendors. Independent testing confirms its accuracy, and it’s carefully curated to minimize false positives and ensure data is accurate and up to date. If your current threat feed misses new threats or generates too much noise, ThreatIQ delivers precision and reliability, helping you stay ahead of evolving cyber risks.
    Starting Price: $12,000/y for 1000q/month
  • 28
    SaferWatch

    SaferWatch

    SaferWatch

    SaferWatch is revolutionizing the way people report crime, suspicious activity, and online threats. SaferWatch was built to provide a higher level of safety for individuals and enhance security for organizations including schools, corporations, public venues, neighborhoods, and communities. SaferWatch empowers users to easily report incidents as they see them happening or submit a tip at a later time. SaferWatch provides real-time two-way communication during emergency and non-emergency situations. Citizens, students, parents, teachers, administrators, security personnel, and law enforcement can now seamlessly communicate on the same secure network. SaferWatch alerts provide detailed safety instructions based on the incident and the ability for users to contribute information. SaferWatch is also key for corporations to provide a duty of care to their employees and customers and help mitigate risk.
  • 29
    Cyware

    Cyware

    Cyware

    Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally. Cyware offers a full-stack of innovative cyber fusion solutions for all-source strategic, tactical, technical and operational threat intelligence sharing & threat response automation. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. Cyware solutions are pushing the boundaries of current security paradigms by utilizing advances in Machine Learning, Artificial Intelligence, Security Automation & Orchestration technologies to empower enterprises in adapting to the evolving threat landscape.
  • 30
    Silent Push

    Silent Push

    Silent Push

    Silent Push reveals adversary infrastructure, campaigns, and security problems by searching across the most timely, accurate and complete Threat Intelligence dataset available. Defenders can focus on stopping threats before they cause a problem and significantly improve their security operations across the entire attack chain whilst simultaneously reducing operational complexity. The Silent Push platform exposes Indicators of Future Attack (IOFA) by applying unique behavioral fingerprints to attacker activity and searching our dataset. Security teams can identify new impending attacks, rather than relying upon out-of-date IOCs delivered by legacy threat intelligence. Our solutions include: Proactive Threat Hunting - Identify and track malicious infrastructure before it’s weaponized. Brand & Impersonation - Protect your brand from phishing, malvertisement, and spoofing attacks. IOFA Early Detection Feeds - Monitor global threat activity with proactive intelligence.
  • 31
    AdaptiveMobile Security

    AdaptiveMobile Security

    AdaptiveMobile Security

    Security and business intelligence services enabled by continuous supervized machine learning and security expertise providing managed threat detection, response, analysis and insight. Monitoring and assessment of evolving suspicious activity within our global deployments across every continent, 24 hours a day, every day. Our mobile and security skills form the foundation of our capabilities, ensuring the security of mobile services today and in the future. Providing continuous real-time security enforcement, using distributed artificial intelligence and machine learning policy decision engines. Enabling frictionless security from attack for all subscribers. Advanced threat detection and mitigation methods through industry-first research and collaboration. First to market in the telecoms industry for innovative security defenses, threat discovery and managed cyber & telecom security offerings.
  • 32
    DarkIQ

    DarkIQ

    Searchlight Cyber

    Spot cyberattacks. Earlier. Monitor, pre-empt, and prevent costly security incidents–against your brand, suppliers, and people with actionable dark web alerts. Think of us like your automated analyst. DarkIQ is your secret weapon, continuously monitoring the dark web for cybercriminal activity. It detects, categorizes, and alerts you to imminent threats so that you can take action against cybercriminals before they strike. See what threat actors are planning. Spot the early warning signs of attack including insider threat, executive threat, and supply chain compromise before they impact your business.
  • 33
    VIPRE Email Security

    VIPRE Email Security

    VIPRE Security Group

    VIPRE Email Security protects your email users and business network from the latest, most sophisticated malware, weaponized attachments, and phishing threats that bypass traditional detection methods. As a secure email gateway, it analyzes inbound and outbound emails in real-time for threats. Powerful visual analytics provide visibility into ongoing attacks, enabling quick and precise response to threats. With a simple integration into Microsoft 365, VIPRE can remove malicious or suspicious emails from a user’s inbox even after delivery. Available in two versions: VIPRE Email Security Cloud provides strong core protection, while VIPRE Email Advanced Threat Protection offers advanced, AI-driven techniques for file attachment and link analysis.
    Starting Price: $30/seat/year
  • 34
    Spotipo

    Spotipo

    Spotipo

    Spotipo transforms ordinary guest WiFi into a powerful marketing engine—capturing emails, running ads, and turning every login into a lead. It's the secret weapon venues use to monetize their network while guests just think they're getting free internet.
    Starting Price: $49/month
  • 35
    Darwin Attack

    Darwin Attack

    Evolve Security

    Evolve Security’s Darwin Attack® platform is designed to help maximize the utilization and collaboration of security information, to enable your organization to perform proactive security actions, improving your security and compliance, while reducing risk. Attackers continue to get better at identifying vulnerabilities, then developing exploits and weaponizing them in tools and exploit kits. If you want a chance at keeping up with these attackers you also need to become better at identifying and fixing vulnerabilities, and doing so before attackers are taking advantage of them in your environment. Evolve Security’s Darwin Attack® platform is a combination data repository, collaboration platform, communication platform, management platform, and reporting platform. This combination of client-focused services improves your capability to manage security threats and reduce risks to your environment.
  • 36
    Booz Allen MDR

    Booz Allen MDR

    Booz Allen Hamilton

    Protect your network with complete visibility and layered detection. Our customized managed detection and response (MDR) service gives you advanced threat detection, investigation, and response delivered via out-of-band network sensors which provide full visibility to network communications. We focus on malicious activity happening inside and around your environment to protect you from known and unknown threats. Receive instant detection using full packet capture, blended detection tools, SSL decryption, and the advantages of Booz Allen’s Cyber Threat Intelligence service. Industry-leading threat analysts will investigate and contain your network’s security events, giving you more accurate and applicable intelligence. The Booz Allen team provides threat investigation services, contextual intelligence, reverse engineering, and the ability to write rules and custom signatures to stop attacks in real time.
  • 37
    IBM Safer Payments
    IBM Safer Payments helps you create custom, user-friendly decision models so you can adapt to emerging threats faster and detect fraud with greater speed and accuracy, all without vendor or data scientist dependencies. IBM Safer Payments significantly accelerates modeling optimization by providing the analytics and simulation tools needed to continuously monitor business performance and adapt to emerging and modified fraud patterns. Clients report high detection at ultra-low false-positive rates after deploying our solution. Build, test, validate, and deploy machine-learning models in days versus months without reliance on vendors. Monitor thousands of payments per second. The enterprise-grade solution delivers 99.999% availability and high throughput. With an open platform, import detection models, model components, and IP while using a rich interface to build new models. Enables you to use any data science, machine learning, or artificial intelligence technique.
  • 38
    SeeTrue Autonomous AI Detection
    Automatic Threat Detection with Artificial Intelligence. SeeTrue revolutionizes the current security screening process, addressing the challenges of passenger throughputs, experience, security, and cost with a new Artificial Intelligence approach. SeeTrue’s Autonomous AI™ Detection, provides automatic threat detection and alarm resolution for X-ray and CT systems. This novel approach operates beyond human sight – enabling passengers to leave items in bags, reduce manual procedure and increase throughput while maximizing safety to provide a seamless passenger experience. Why Us? High Accuracy: Despite their best efforts and training, human agents have limitations. SeeTrue’s autonomous screening technology detects threats and contraband beyond current capabilities, regardless of the angle, size and occlusions - providing accurate recognition for proactive agent alerts. Greater Operational Efficiency: SeeTrue minimizes labor costs while maximizing safety.
  • 39
    IronDome

    IronDome

    IronNet Cybersecurity

    IronDome: Your window to the threat landscape. IronDome is the first automated cyber Collective Defense solution that delivers threat knowledge and intelligence across industries at machine speed. With IronDome, your organization can collaborate with others across industries and sectors to stay ahead of evolving threats through real-time threat sharing. Cyber threats are evolving exponentially. Attacks are evolving faster than most organizations can manage alone. We founded IronNet to change the way organizations think about security, building a broad coalition that can collaboratively work together to stay ahead of threats and threat actors. The IronDome solution facilitates Collective Defense to deliver the unique ability to automate real-time knowledge sharing and collaboration between and beyond sectors for faster threat detection. Now, you can build a stronger cyber defense that can scale over time by anonymously collaborating with others in real time.
  • 40
    Union POS
    Union is the only guest-led POS engagement platform built for high volume bars & venues to reward guests, increase service speed and make bars and bartenders more money. Our badass tech is moving hospitality forward so that everyone wins. At Union, we believe hospitality is more than just a happy customer; it's a happy bartender, happy venue, and happy alc/bev partners.
    Starting Price: $49 per month
  • 41
    Netcraft

    Netcraft

    Netcraft

    Netcraft is a global leader in brand impersonation detection, disruption, and takedown solutions. Its Digital Risk Protection (DRP) platform provides a comprehensive, automated defense across the entire external threat landscape. By combining decades of internet infrastructure expertise with cutting-edge artificial intelligence, Netcraft ensures brands are protected with unmatched speed, accuracy, and scale. Netcraft's online brand protection capabilities extend across detection, monitoring, disruption, and enforcement, delivering operational value at scale. Capabilities include: - Detection 100+ categories of digital threats, including phishing, brand impersonation, and fake social media profiles. - Takedown processes supported by automation and established infrastructure relationships. - Advanced brand monitoring and reporting that integrate seamlessly into enterprise workflows. - Proven ability to reduce the availability of active threats and preserve customer trust.
  • 42
    Sequretek Percept XDR
    Cloud-based enterprise security platform offering automated threat detection and response using AI and big data across cloud and on-premise enterprise environments. Percept XDR ensures end-to-end security, threat detection and response while allowing enterprises to focus on their core business growth without the fear of compromise. Percept XDR helps to protect against phishing, ransomware, malware, vulnerability exploits, insider threats, web attacks and many more advanced attacks. Percept XDR has an ability to ingest data from various sources, uses AI and Big Data to detect threats. Its ability to ingest sensor telemetry, logs, and global threat intelligence feeds allows the AI detection engine to identify new use cases and anomalies, thereby detecting new and unknown threats. Percept XDR features SOAR-based automated response in line with the MITRE ATT&CK® framework.
  • 43
    LimaCharlie

    LimaCharlie

    LimaCharlie

    Whether you’re looking for endpoint security, an observability pipeline, detection and response rules, or other underlying security capabilities, LimaCharlie’s SecOps Cloud Platform helps you build a flexible and scalable security program that can evolve as fast as threat actors. LimaCharlie’s SecOps Cloud Platform provides you with comprehensive enterprise protection that brings together critical cybersecurity capabilities and eliminates integration challenges and security gaps for more effective protection against today’s threats. The SecOps Cloud Platform offers a unified platform where you can build customized solutions effortlessly. With open APIs, centralized telemetry, and automated detection and response mechanisms, it’s time cybersecurity moves into the modern era.
  • 44
    Sangfor Athena NGFW

    Sangfor Athena NGFW

    Sangfor Technologies

    Sangfor Athena NGFW is a next-generation firewall that provides comprehensive protection for network perimeters using AI-powered threat detection. It blocks over 99% of external threats in real time through cloud-delivered AI and integrates network and web application security into a single appliance. The firewall includes a built-in SOC Lite module for rapid threat assessment and incident response. Sangfor’s solution connects with a holistic security ecosystem, including endpoint protection, secure web gateways, and extended detection and response tools. Recognized for its proven security effectiveness, Athena NGFW holds top ratings in independent cybersecurity tests. It is trusted by enterprises across industries to safeguard valuable data and maintain stable network performance.
  • 45
    OpenText Core Behavioral Signals
    OpenText™ Core Behavioral Signals is an advanced threat detection solution that leverages user entity behavior analytics (UEBA) and 100% online, unsupervised machine learning to identify behavioral anomalies within an organization. It enables security teams to detect insider risks, novel attacks, and advanced persistent threats without relying on predefined rules or manual updates. The platform continuously adapts to evolving organizational behaviors, improving threat hunter effectiveness and reducing false positives. Analysts can transform billions of events into a manageable number of actionable threat leads, enhancing efficiency. It also features dynamic dashboards and detailed anomaly timelines to provide clear insights into risk over time. Integration with existing security systems and APIs supports streamlined threat hunting and response.
  • 46
    Mobile Communications America (MCA)
    MCA can customize video surveillance solutions to fit your specific needs. Our team of professionals assesses your property and designs a solution for you, from installing cameras on your property to setting you up with a security command center to manage it all. Industries ranging from education to manufacturing rely on video surveillance solutions from MCA to protect their property and everyone on it. Trust MCA to do the same for you. And as your security systems integrator, we can integrate a video surveillance system that works with your existing security systems. The best commercial security cameras provide video surveillance that helps businesses and organizations protect their assets and even improve their productivity. At MCA, we partner with leading manufacturers of business security cameras to secure a range of businesses and organizations. Trust MCA’s video surveillance expert technicians to provide cloud video storage you’ll need to keep your property and everyone secure.
  • 47
    COBRA

    COBRA

    Dynamis

    A suite of digital emergency management tools to support preparedness and resilience. Threat, venue, and event monitoring tools enabling unity of effort in command, communications, collaboration, decision support, and emergency management, response & recovery. Common picture and integrated tool kit that enable users to see, understand, and act first, in daily operations and major events, from local incidents to national response. Prepare, plan, mitigate, respond, and recover to all hazards using emergency management tools tailored to your environment, events, venues, organizations, businesses, and unique requirements. Open architecture and flexible hosting; certified, high-level of security. COBRA will provide your organization with the emergency management tools to prepare for then effectively manage any crisis at the tactical, command and strategic level. COBRA can help with situational awareness, rapid alerting, mapping with live sensor & drone integration, multi-user logs, etc.
  • 48
    Cyren

    Cyren

    Cyren

    Cyren Inbox Security is an innovative solution that turns the tables on the phishers and safeguards each and every Office 365 mailbox in your organization against evasive phishing, business email compromise (BEC) and fraud. Continuous monitoring and detection provide early exposure of evasive attack indicators and anomalies. Automated response and remediation for individual mailboxes and across all mailboxes in the organization will take care of the heavy lifting. Our unique crowd-sourced user detection closes the feedback loop on alerts, reinforcing your security training and providing valuable threat intelligence. Comprehensive, multi-dimensional presentation of critical threat characteristics to help analysts understand the evolving threat landscape. Improved threat detection for existing security products such as SIEM and SOAR solutions.
  • 49
    Spotlight Secure Threat Intelligence Platform
    As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many next-generation firewalls (NGFWs) include integrated capabilities, such as intrusion prevention system (IPS), antivirus signatures, and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers, specific to their industry. Spotlight Secure Threat Intelligence Platform addresses these challenges and constraints by aggregating threat feeds from multiple sources to deliver open, consolidated, actionable intelligence to SRX Series Services Gateways across the organization.
  • 50
    ZeroHack TRACE
    ZeroHack TRACE is a cyber threat intelligence framework using decoy technology and multiple sensors to generate and analyze threat data. It offers customizable, dynamic intelligent shifting sensors, easy reconfiguration, and self-healing. With a specialized DPI engine, TRACE captures real-time data for user analysis. Processed honeynet data enhances visualization and correlation, empowering analysts to secure networks comprehensively. ZeroHack TRACE’s Dynamic Intelligent Shifting Sensors (DISS) enhance security by periodically changing sensor positions to avoid detection by attackers. ZeroHack TRACE uses domain-specific honeynets designed for specific IT environments. ZeroHack TRACE sensors self-heal from attacks and auto-update, minimizing maintenance for customers. Each ZeroHack TRACE sensor features a deep packet inspection engine for real-time data capture, enabling detailed network monitoring and swift threat identification.