Alternatives to LeaksID

Compare LeaksID alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LeaksID in 2026. Compare features, ratings, user reviews, pricing, and more from LeaksID competitors and alternatives in order to make an informed decision for your business.

  • 1
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 2
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 3
    EchoMark

    EchoMark

    EchoMark

    Collaboration and communication, meet privacy and security. While other companies attempt to prevent data exfiltration by limiting the flow of information, we use invisible personalized watermarks in documents and email messages to allow for seamless sharing that's also easily traceable. Whether information is shared via email, printout, or photo, EchoMark provides an invisible solution to find the source within minutes. Advanced features like natural language versioning and computer vision detection help further ensure tracking success. Once deployed, EchoMark will automatically watermark documents and emails according to your established parameters. If you suspect a leak has occurred or spotted a document online, upload the original document to your EchoMark dashboard. EchoMark will use computer vision to compare the leaked fragment with each marked copy of the document shared.
    Starting Price: $ 19 per month
  • 4
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 5
    GlobaLeaks

    GlobaLeaks

    GlobaLeaks

    Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customizable to your needs and protects the whistleblower's privacy and submissions by default. GlobaLeaks targets many use cases and therefore it has been designed as a framework. Designed with flexibility in mind, GlobaLeaks has been adopted worldwide by more than 2000 projects. Our vast range of adopters include independent media, activists, public agencies, corporations and more. GlobaLeaks is free and open source whistleblowing software, under the AGPL License. It is supported by an open community of users, volunteers and contributors who work together to constantly improve the software and documentation. If you see a problem, create an issue on our ticketing system and help us improve transparency worldwide! GlobaLeaks was motivated to create an opportunity for concerned individuals to confidently report within their local context.
  • 6
    Humming Heads

    Humming Heads

    Humming Heads

    Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.
  • 7
    Deleaker

    Deleaker

    Softanics

    Deleaker 🛠️ is a powerful memory leak detection tool for C++, .NET, and Delphi developers. It seamlessly integrates with Visual Studio, RAD Studio, and works as a standalone app. Deleaker helps identify and fix memory leaks, GDI leaks, and handle leaks 🔍 in real time. With an intuitive UI, detailed reports, and precise stack traces, it makes debugging easier ⚡. Whether you're working on a large project or a small app, Deleaker ensures your software stays efficient and leak-free 🚀.
    Starting Price: $149
  • 8
    Synamedia ContentArmor
    ContentArmor is a forensic watermarking software solution that protects content investments, identifies malicious users, and prevents piracy. Identify leaking accounts and protect your content against piracy. Content-aware forensic watermarking, technology with perfect fidelity, and market-leading robustness against video manipulation. Reduce deployment costs with unique bitstream watermarking of compressed content. Safeguard your content investments in premium entertainment and live sports by quickly identifying leaks and taking action to disrupt pirate streams. Identify malicious users illegally sharing your dailies, localized pre-release versions, and screeners. Discover which platforms have been compromised and where to focus your anti-piracy efforts with your affiliates and business partners. Incorporate audio watermarks in your music to protect exclusive tracks and pinpoint the source of piracy to take remedial actions.
  • 9
    Risk Monitor

    Risk Monitor

    SearchInform

    SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices.
  • 10
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
  • 11
    MINDely
    MIND is the first-ever data security platform that puts data loss prevention (DLP) and insider risk management (IRM) programs on autopilot, so you can automatically identify, detect, and prevent data leaks at machine speed. Continuously find your sensitive data in files spread across your IT environments whether at rest, in motion, or in use. MIND continuously exposes blindspots of sensitive data across your IT environments including SaaS, AI apps, endpoints, on-premise file shares, and emails. MIND monitors and analyzes billions of data security events in real time, enriches each incident with context, and remediates autonomously. MIND automatically blocks sensitive data in real-time from escaping your control, or collaborates with users to remediate risks and educate on your policies. MIND continuously exposes blindspots of sensitive data at rest, in motion, and in use by integrating with data sources across your IT workloads, e.g. SaaS, AI apps, on-premises, endpoints, and emails.
  • 12
    Foretrace

    Foretrace

    Foretrace

    Find exposed data before your adversaries do. Foretrace’s patent-pending Total Recon™ engine detects data exposure and alerts you before it results in costly breaches. Credentials can be exposed in data breaches, from leaks or publicly shared sources such as code repositories. Exposed account names and passwords are used by hackers to identify and target accounts. Exposed internal documents and collaboration suites can leak sensitive data. Adversaries can use this data to blackmail organizations or damage their reputations. Metadata is exposed in almost any document or file that is created and is rarely removed before sharing files. This metadata is used by attackers for targeted phishing and malware attacks. Discovered or stolen corporate data and credentials are sold and exchanged on criminal and dark web forums, resulting in easy access for attackers and potential damage to an organization’s reputation.
  • 13
    ZeroLeaks

    ZeroLeaks

    ZeroLeaks

    ZeroLeaks is an AI prompt security platform that helps organizations identify and fix exposed system prompts, internal tools, and logic vulnerabilities that could allow prompt injection, prompt extraction, or other forms of leakage that expose internal instructions or intellectual property to unauthorized actors. It provides an interactive dashboard where users can scan system prompts manually or automate scanning via CI/CD integration to catch leaks and injection vectors before code is deployed, and it uses an AI-powered red-team-style analysis engine to assess prompt surfaces for logic flaws, extraction risks, and potential misuse with evidence, scoring, and remediation recommendations. ZeroLeaks targets enterprise-grade security for large-language-model-based products by offering vulnerability assessments that highlight prompt exposure depth, prioritized risks, proof, and access paths for issues found, and suggested fixes such as prompt restructuring, tool gating, etc.
    Starting Price: $499 per month
  • 14
    GAT

    GAT

    GAT InfoSec

    Information security solutions to manage threats in technologies, people and processes. Manage your Security Program and reduce the risk of attacks, ransomware, data leaks and third-party risks. Integrated solutions to help create and maintain an SGSI (Information Security Management System) with prioritization and focus on the business context. Automatically identify vulnerabilities in cloud environments and reduce the risk of ransomware, data leaks, intrusions and cyber attacks. Mapping of the exhibition surface itself and that of third parties. Risk score and vision of leaks, risks and vulnerabilities in applications, networks and infrastructure. Collaborative processes, reports and dashboards that deliver data with clarity, creating and facilitating the sharing of information across all sectors of the company.
  • 15
    Lightserve

    Lightserve

    Lightserve

    We support all major file formats, which are converted and securely streamed to allow you to control access, set permissions and protect information. Mitigate and avoid document leaks with watermarks. Track data room activity through audit event pages, email notifications and helpful alerts. We make it easy for you to conduct transactions through separate datasites. We provide a full storage solution for your documents, which allows for easy uploads, sharing, distribution and archiving. Work with your team in a secure documentation workspace. Our pricing plans are affordable, with fixed rates applied to unlimited users, usage and storage. You'll save a substantial amount on setup costs and management fees with our pricing models. Your office documents are converted to a secure streaming format, so you can control access and perform file exchanges while avoiding document leaks.
    Starting Price: $49 per month
  • 16
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition
  • 17
    HeapHero

    HeapHero

    Tier1app

    Due to inefficient programming, modern applications waste 30% to 70% of memory. HeapHero is the industry's first tool to detect the amount of wasted memory. It reports what lines of source code originating the memory wastage and solutions to fix them. A Memory leak is a type of resource drain that occurs when an application allocates memory and does not release after finish using it. This allocated memory can not be used for any other purpose and it remains wasted. As a consequence, Java applications will exhibit one or more of these non-desirable behaviors: poor response time, long JVM pauses, application hang, or even crash. Android mobile applications can also suffer from memory leaks, which can be attributed to poor programming practices. Memory leaks in mobile apps bare direct consumer impact and dissatisfaction. Memory leak slows down the application's responsiveness, makes it hang or crashes the application entirely. It will leave an unpleasant and negative user experience.
  • 18
    VPNLY

    VPNLY

    VPNLY

    VPNLY is a free virtual private network service that works without registration, restrictions, or logging. It allows users to browse, stream, or download with no time, speed, or bandwidth limits. The service provides around 20 fast, secure servers spread across four global locations. It features end-to-end encryption, DNS and IP leak protection, as well as WebRTC leak prevention to protect user privacy. VPNLY claims to follow a strict no-logs policy, meaning it does not collect personal or usage data. The service is operated under Swiss jurisdiction. The interface is simple and privacy-focused, with universal compatibility across devices, 24/7 support, and an ad-free experience. All traffic is routed through encrypted servers to protect against DNS/IP leaks; users do not need to register or provide personal information to use it.
  • 19
    LeakRadar

    LeakRadar

    LeakRadar.io

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.
    Starting Price: €9.99/month
  • 20
    KD Pro

    KD Pro

    GinnyPix

    Experience photography with a disposable camera. Beautiful effects. KD Pro is the closest you come to grabbing a 90 tied disposable camera with the excitement of photos to develop. Capture photos just as they were taken with a real disposable camera. Every detail on the camera mimics a real disposable camera. Photos get random light leaks just like the real disposable cameras. If you however want the original photo you can get that too in the app. If you want to turn on/off any effect we have a setting for that. Preview the photos in the film if you like or get surprised with manual development time. Now featuring manual and automatic winding of the film. Choose the color of the camera to suite your personality.
    Starting Price: Free
  • 21
    Afterlight

    Afterlight

    Afterlight Collective

    Mix together multiple tools and features for even more unique variations (tap again to randomize!). Our Film Presets are created through real film emulation & include a variety of auto-randomized Light Leaks, Dusty Textures, Grain, and color grading. The Fusion Li­brary is a cu­rat­ed list of Fu­sion Fil­ters free to down­load, cre­at­ed by us at Af­terlight and our good friends! New filters are added every Saturday! Add finishing touches to your photos with genuine Light Leaks made with real 35mm film, natural Dust textures, and film emulation techniques like shifting RBG channels with our Color Shift tool, the Chroma tool inspired by the effects of disposable film, and Double Exposure. Subscribe now for full access to all features and future content within Afterlight. Subscriptions are billed monthly or yearly with a 7-day free trial. Once the trial period is over, your Apple ID account will be charged the annual subscription fee.
  • 22
    Breachsense

    Breachsense

    Breachsense

    Protect your organization & staff from data breaches. Breachsense monitors the dark web, private hacker forums, and criminal marketplaces to detect data breaches in real-time enabling you to prevent cyber threats before they happen. Uncover your company’s breached data and malware-infected devices. Track open, deep, and dark web sources such as Tor websites, private ransomware IRC and Telegram channels, criminal forums, and cybercrime marketplaces. Continuous monitoring enables your team to uncover data breaches related to your VIPs, executive team members, employees as well as clients. Find exposed user & employee credentials, ransomware leaks as well as exposed company data being sold or traded on criminal marketplaces and private ransomware forums. Breachsense continuously monitors the internet for sensitive company information such as account credentials, employee details, leaked company data, session tokens, 3rd party data leaks, and more.
  • 23
    MyWorkDrive

    MyWorkDrive

    MyWorkDrive, LLC

    MyWorkDrive is a software-only solution for secure remote access to in-house file servers from anywhere for any device. Users gain access in minutes without Sync, VPN, RDP or migrating data. IT leaders looking for a cloud-like file sharing solution can rely on ransomware protection and data leak protection (DLP), data governance compliance (FIPS, HIPAA, FINRA, GDPR), enhanced Office 365 real-time online collaboration, with a lower total cost of ownership in comparison to other solutions. MyWorkDrive allows users to edit and collaborate on documents within a browser using Office Online while keeping files stored on their own file servers. Prevent data breaches, data theft, ransomware, malware, and other cyber threats with built-in Data Leak Prevention (DLP) and Device Management features. Meet security requirements and compliance standards such as FIPS, FINRA, HIPAA and the EU Data Protection Directive GDPR.
  • 24
    Alert Labs

    Alert Labs

    Alert Labs

    Alert Labs offers an enterprise AI-powered water intelligence platform and commercial leak detection software called AlertAQ that delivers real-time visibility into water use, leak detection, environmental conditions, and abnormal water consumption for buildings and portfolios. It analyzes data from scalable IoT water sensors to detect surges, continuous leaks, and deviations from normal usage patterns, sends 24/7 alerts by phone, SMS, email, or app when issues occur, and automatically logs event details like location, time, duration, and priority for rapid action. AlertAQ centralizes control of water monitoring across all properties on one dashboard, provides interactive floor plans and automated reports to track performance over time, and includes features like remote and scheduled water shut-off controls to stop leaks quickly. It uses a secure standalone cellular connection and battery-backed sensors that do not rely on Wi-Fi.
  • 25
    NordStellar

    NordStellar

    Nord Security

    NordStellar enables you to detect and respond to cyber threats targeting your company, before they escalate. Give your security teams visibility into how threat actors work and what they do with compromised data. Cut down on data leak detection times, save resources with automated monitoring, and minimize risk to your organization. Businesses are often unaware of data leaks until it’s too late. This calls for modern threat exposure management solutions that help your security team spot data leaks — before they become a problem. Reduce the risk of ransomware, ATO, session hijacking, and other cyber attacks that lead to financial losses.
  • 26
    USB Block

    USB Block

    NewSoftwares

    Prevent data leaks by restricting USB drives, external devices, network computers, and ports on your PC. Whitelist your own portable drives and block all others. USB Block prevents data leaks through devices like USB drives, phones, tablets, and other devices that are attached to your PC. It even prevents certain ports and partitions from accessing. You can whitelist trusted devices. This way you can copy data to your own USB, External drives, your iPhone or Android phone but block other such devices from accessing your PC. This feature helps you check whether someone has tried to hack into USB Block by using incorrect passwords All incorrect passwords will be logged to monitor any suspicious activity. Lock and password protect your data from unwanted access and visibility by blocking access to the files, folders, drives, and programs. Windows kernel-level locking and filter driver makes it possible to lock files and folders in Windows.
    Starting Price: Free
  • 27
    KeepCart

    KeepCart

    KeepCart

    Protect your checkout from more extensions than any other tool out there. Including Honey, Rakuten, Coupert, RetailMeNot, Karma, and more! Block coupon extension pop ups at checkout and improve margins, use protected discount links, and avoid marketing attribution headaches. Block coupon pop up. Remove coupon pop up. KeepCart solves coupon leaks by tracking what sites your codes have leaked to. Get analytics on the top coupon sites and stay on top of revenue losses. Code security! CleanCart alternative.
  • 28
    Augmeta

    Augmeta

    Augmeta

    Augmeta prevents revenue leaks by triaging KPI anomalies in hours instead of weeks. Imagine checkout completions at an eCommerce retailer dipping due to a latent iOS bug - each day of delay leaks revenue. Today, enterprises lose millions because anomaly triage is bottlenecked by noise, limited capacity, and fragmented tools. Our AI surfaces the why, recommends next steps, and delivers decision-grade answers.
  • 29
    StegAI

    StegAI

    StegAI

    StegAI watermarks protect your digital library from misuse. Stay ahead of deepfakes, leakers, and piracy. StegAI's API keeps your unlaunched products & corporate knowledge secret. Trace leaks back to individuals and organizations. Provenance for authenticity, history, & copyright. Watermark AI-generated content that will remain intact - even when edited. A scalable solution for digital images, videos, & documents.
    Starting Price: $90 per month
  • 30
    Astrill VPN

    Astrill VPN

    Astrill VPN

    Imagine conquering the internet on your terms, free from geo-blocks and threats. With Astrill VPN as your trusted ally, you gain the power to access any content, anywhere, through ultra-fast servers in 56 countries. Whether you’re streaming, working, or exploring, Astrill VPN makes it seamless and secure. Equipped with best-in-class encryption and leak-proof technology, you stay invisible to hackers and spies—even on public Wi-Fi. Proprietary StealthVPN and OpenWeb protocols help you bypass restrictions effortlessly, ensuring nothing stands between you and your goals. Astrill VPN works across all your devices—laptops, phones, routers—giving you ultimate freedom with up to five simultaneous connections. Wherever your journey takes you, Astrill VPN protects your data, empowers your adventures, and unlocks the full potential of the internet. With Astrill VPN, you’re not just online; you’re unstoppable. The internet is yours to explore, and Astrill VPN makes it extraordinary.
    Starting Price: $12.50/month
  • 31
    RAMRush

    RAMRush

    FCleaner

    RAMRush is a free memory management and optimization tool. It can efficiently optimize the memory usage of your Windows system, free up physical RAM and make your system work better. RAMRush uses an intelligent way to manage the physical memory and lets the RAM work with a better performance. It will help you to prevent system crashes, and memory leaks and keep your computer running more efficiently. RAMRush is easy and powerful to use for both beginners and experts. No experience or computer skills are necessary! RAMRush is freeware, you could download and use it free of charge. 100% clean! No spyware or adware! Increase system performance. Increase the amount of memory available. Defragment system physical memory. Recover memory from Windows applications. Remove memory leaks. Prevent system crashes caused by memory problems. Display the real-time usages data of CPU and RAM.
    Starting Price: Free
  • 32
    Parameter

    Parameter

    Parameter

    Parameter is a comprehensive monitoring tool built to help mission-critical facilities detect, analyze, and act on environmental, leak, and equipment health issues before they cause failures. It integrates data from RLE leak detection systems, battery monitoring (Cellwatch), and environmental monitoring into a unified system that feeds real-time information to building management systems (BMS) using native protocols like SNMP, BACnet, and Modbus. It supports scalable monitoring from single racks to hyperscale operations, offering precise detection of fluid leaks with location mapping, continuous tracking of temperature, humidity, airflow, CO2, and power conditions, and advanced battery health insights for UPS and backup systems. Parameter’s solutions provide real-time alerts and actionable data through web interfaces accessible from any browser or device, enabling rapid response and preemptive maintenance to maximize uptime.
  • 33
    Pentester

    Pentester

    Pentester

    The Pentester dashboard allows non-technical staff to review findings related to the company technology and data leaks such as passwords. Technical users have a separate dashboard that provides detailed results, and instructions on how to mitigate items found. Within 5 minutes see which website vulnerabilities are publicly known, and see a sample of breached passwords and leaks associated to your company. Based on your needs select a plan that makes the most sense for your company. Paid plans offer advanced scanning and a full report of breaches.
    Starting Price: $19 per month
  • 34
    Kaspersky Password Manager
    Automatically fills out login fields. Plus auto-completes online forms with info like email addresses and bank card details. Stores your documents, medical records and photos in an encrypted vault only you can unlock. Enables you to generate super-strong and unique passwords for all your various online accounts. Lets you create passwords when you register new accounts - or replace weak passwords in existing ones. Alerts you if you’re using weak or duplicate passwords and prompts you to generate new ones. Warns if your passwords have been leaked online so you can take the appropriate action. Your vault is secured with AES-256 encryption. This means it would take longer than the universe has existed for a hacker to unlock it. Your vault is only accessible with a main password created by you. Or via fingerprint and face ID on your mobile devices. Rest assured that neither Kaspersky, as the app developer, or anybody else, knows a single thing about your data.
    Starting Price: $14.99 per user per year
  • 35
    SecureTower

    SecureTower

    falcongaze

    Our DLP system helps companies protect against leaks of confidential information, as well as monitor the work of employees. Leaks of confidential information. Fraud schemes within the company. Insider activity, ineffective employees, control, actions on employees’ computers. Efficiency and loyalty of staff, employee communications, data channels, blocking, malicious actions of employees. Access to web resources (including by category), launching applications (including by category), saving data to the clipboard, connecting USB devices. Analysis, content of uploaded files (text, images, audio), employee efficiency, risk activity of employees. Statistical indicators of employee performance, investigation, information security incidents. Causes of safety violations, the reasons for the ineffective work of employees, fraud schemes within the company.
  • 36
    QSafe

    QSafe

    C9Lab

    QSafe is an AI-powered Digital Risk Protection Platform designed to help businesses detect, monitor, and respond to external cyber threats in real time. The platform identifies brand impersonation, phishing domains, fake social media accounts, leaked credentials, dark web exposure, and emerging attack vectors. QSafe provides continuous monitoring across domains, social media, mobile apps, and underground sources, enabling security teams to take rapid action before threats escalate into incidents. It is built for enterprises, BFSI, startups, and growing organizations that need visibility beyond traditional perimeter security.
  • 37
    BestCrypt
    Massive data breaches are now spreading at an alarming rate. Confidential information and personal records are getting leaked, lost, and stolen. Use data encryption to protect your data from both physical and virtual threats. No information security strategy is complete unless data is properly protected at the source where it is stored. Data encryption secures the confidentiality of sensitive data to address the risks of data leaks and data theft, while also ensuring regulatory compliance. BestCrypt volume encryption 5 provides increased resilience against brute-force attacks, which are one of the simplest and most effective ways for a hacker to breach your system. Now users are able to customize the parameters of the scrypt key derivation algorithm, offering extra security against these password-iterating attacks. Data shelter, our new utility, also provides an additional layer of protection to data-in-use, which helps secure files when you are viewing or modifying them.
  • 38
    BlockSurvey

    BlockSurvey

    BlockSurvey

    End-to-end encrypted forms and surveys Did you know? Surveys and forms that you fill out today may not be as secure as you think. Leaked records include millions of customer and personal records. Data breaches and data leaks are not stopping. Imagine collecting data on your mental health, sexual health and activism. There is no privacy or security. It is alarming, we know. BlockSurvey is a secure, end-to-end encrypted alternative for Google Forms, Typeform and SurveyMonkey. We can help you run sensitive surveys.
    Starting Price: $25/month
  • 39
    PROMT

    PROMT

    PROMT

    With PROMT solution you can read any texts and documents in English or German, no matter how complex they are, translate business letters, instant messages, presentations, entire web-pages or selected fragments. And all of this right in your PC-environment – without switching between applications, and with no limit on volume. Using PROMT Master NMT to translate private or sensitive information, you can be sure of complete confidentiality and security. None of your data, even accidentally, leaks out or becomes vulnerable. Remember that when using free online translation services you are not safe from leaks, and online translator owners or their partners may use any of the translated content. You can reduce translation costs if the translation department of your company also uses PROMT Master NMT. Translation made by AI-based solution is very accurate, it needs very little post-editing.
  • 40
    Preton

    Preton

    Preton

    Preton offers a range of enterprise solutions that have been adopted by businesses worldwide for almost two decades. Preton Print Security scans and archives every print job to help customers protect their information and adhere to regulations such as HIPAA and GDPR. PretonSaver™ optimizes toner and ink usage, lowering consumable bills by 35% - 50%, managing print activities and enabling significant cost savings for its customers. With 27% of data leaks originating from paper, Preton Print Security plays a crucial role in safeguarding sensitive printed information and ensuring regulatory compliance.
  • 41
    Kotzilla

    Kotzilla

    Kotzilla

    Visualize and resolve thread performance issues, memory leaks, and structural app issues, during development or in production. Koin’s container captures only essential app behavior data, ensuring minimal overhead. Understand and debug the lifecycle of component instances and scopes, their loading times, and execution among different threads. This ensures proper management and resource allocation while identifying and preventing errors such as memory leaks, performance issues, and ANRs. Analyze dependencies to understand relationships between different components. Optimize the dependency injection process, simplifying development and debugging efforts. This proactive analysis ensures reliability and scalability by detecting and addressing potential issues early. Gain granular traceability of components and lifecycles with Kotzilla’s dedicated API. Visualize identified issues and application crashes to get comprehensive insights into your app’s performance and stability.
    Starting Price: $49 per month
  • 42
    Byteplant Email Validator
    Stop Wasting Time on Bad Email Data. Real-Time Email Validation - Cut Bounce Rates, Eliminate Disposables and Plug Funnel Leaks.
  • 43
    Armorblox

    Armorblox

    Armorblox

    Armorblox uses natural language understanding, deep learning, and statistical techniques to protect all enterprise communications from inbound threats and outbound data loss. The Armorblox platform leverages a broad spectrum of data sources, signals, and detection techniques. Stop business email compromise, account takeover, executive impersonation, and other targeted threats. Study detailed attack analysis that’s built for human eyes. Automatically delete, quarantine, or label emails based on preconfigured policies. Detect PII/PCI violations and passwords disclosed through emails. Block outbound emails containing confidential information. Prevent lateral data leaks across email, messaging, and file-sharing solutions. Auto-remediate all reported false positives. Remove similar suspicious emails across user mailboxes with one click. Leverage dynamic policies to stop similar attacks in the future.
  • 44
    Infisical

    Infisical

    Infisical

    Compare secrets across environments and see what's different or missing. Set personal values for secrets – either during local development or for sensitive secrets. Easily inherit other secrets to establish a single source of truth. Automatically identify and prevent secret leaks to git using Infisical's continuous monitoring and pre-commit checks – support over 140 secret types.
    Starting Price: $6 per month
  • 45
    MemOptimizer

    MemOptimizer

    CapturePointStone

    The Problem: Almost 100% of software programs contain "memory leaks". Over time these leaks cause less and less memory to be available on your PC. Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! In addition, memory is often locked in pages so if your program needed 100 bytes of memory, it's actually locking up 2,048 bytes (a page of memory)! Until now, The only way to free up this "locked" memory was to reboot your computer. Not anymore, with MemOptimizer™! MemOptimizer frees memory from the in-memory cache that accumulates with every file or application read from hard-disk.
    Starting Price: $14.99 one-time payment
  • 46
    VirtlX

    VirtlX

    VirtlX

    VirtlX is an AI-enabled B2B, SaaS platform that spots hidden profit leaks before they hit your bottom line. Stop Leaking Profit Through People and Process Gaps AI-driven cycle analyses multiple data sources & identifies issues Perceive customer signals → Reflect on employee feedback → Enrich with instant training - No L&D Team Required! All in one platform VirtlX is a fully customizable solution for multi-industry business performance, designed to assist businesses of all sizes. VirtlX delivers a strong ROI with quantifiable deliverables & insights to assist in decision-making towards a people-centric, successful business. Simple approach to customer and employee sentiment as well as in-house training. Cost-effective, scalable subscription model with flexible commitment terms. Understanding customer engagement, feedback, experience and loyalty patterns are key fundamentals necessary for a company’s marketing efforts to be successful.
    Starting Price: $9.00 per month
  • 47
    xSecuritas

    xSecuritas

    xSecuritas, Inc

    xSecuritas offers a robust screen watermark solution designed to prevent data leakage and protect sensitive information. With features like invisible watermarks, screen capture prevention, and webcam watermarks, it ensures secure handling of digital content. The platform supports both visible and invisible watermarks that can include metadata such as user ID, IP address, and Microsoft sensitivity labels. xSecuritas is designed to work with virtual desktop infrastructure (VDI), video conferencing platforms, and remote work environments, ensuring comprehensive protection across all devices and channels. Additionally, it offers flexible policy management through a cloud or on-premises policy server, providing businesses with the tools they need to enforce data security policies effectively.
    Starting Price: $39
  • 48
    Kaspersky Security Cloud
    Get our best apps & features under one account. 6 premium products & apps for Windows, macOS, Android & iOS – all in one place & packed with 100s of features. Includes antivirus, anti-ransomware, mobile security, password management, VPN* & parental controls. Plus privacy tools, data leak detection, Home Wi-Fi security & payment protection – all easy to manage remotely. Find out if your private accounts data is leaked & get advice on what to do next. Get notified in real time if an unknown app attempts to connect to your webcam or mic*. Plus get personalized alerts & warnings sent straight to your devices to keep you safe. Take advantage of cloud-based security that keeps your devices fast and easy to use. Predict & fix issues with your hard drive by viewing metrics that report on its health. Manage storage space and battery life on your Android devices with specially built tools.
    Starting Price: $53.99 per year
  • 49
    Smartvatten

    Smartvatten

    Smartvatten

    Smartvatten is a cloud-based water management and analytics platform that helps real estate owners, property managers, and water utilities monitor, measure, analyze, and visualize water consumption data in real time to improve efficiency, prevent leaks, and support sustainability goals. It aggregates water usage from all types of meters, whether main or sub-metering, into a unified digital dashboard called Smartvatten Hub, providing accurate minute-level data, automated reporting, and actionable insights that make it easier to understand consumption patterns, detect anomalies like leaks before they become costly problems, and optimize water use across entire portfolios. It uses machine learning and advanced analytics to interpret data from disparate sources without complex installations, enabling proactive operations, reduced manual workload, and enhanced decision-making for maintenance and resource planning.
  • 50
    Roosens Anti-Piracy
    Roosens Anti-Piracy is a modern PC game protection focused on stopping early leaks and day-one cracks without hurting performance. It works at the executable level with seamless background activation and offline play support after first launch. Protection is applied only where it matters and once a contract ends, the protection is removed so players truly own their copy.
    Starting Price: ÂŁ2,500 + ÂŁ0.10 / unique player