Alternatives to Protector
Compare Protector alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Protector in 2026. Compare features, ratings, user reviews, pricing, and more from Protector competitors and alternatives in order to make an informed decision for your business.
-
1
Kognition
Kognition AI
Kognition AI security stops threats in real-time. Transform legacy security into intelligent protection that pays for itself. Kognition AI integrates seamlessly with existing cameras and access control - no costly rip-and-replace required. Why Security Leaders Choose Us: ✓ 24/7 AI Guardian that never misses threats or calls in sick ✓ Works with Axis, Hanwha, Avigilon, Genetec, Milestone, and other popular platforms and devices. ✓ Real-time alerts deliver actionable intelligence in seconds ✓ Easy to deploy enterprise-grade security Perfect for corporate campuses, schools and universities, office buildings, hospitals, and retailers seeking modern security to reduce risk and improve staff, student, and tenant safety. Transform your security team from reactive responders to proactive guardians with Kognition AI - schedule a demo today! -
2
Endpoint Protector
CoSoSys
Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI. -
3
ZeroEyes
ZeroEyes
ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond. -
4
Simple Malware Protector
Simplestar Software
Simple Malware Protector identifies threats and vulnerabilities on your PC and will neutralize them quickly and easily. It then constantly monitors your PC to ensure you’re protected against future infection. Simple Malware Protector is continuously updated to ensure you’re protected against the latest threats and vulnerabilities. You can schedule Simple Malware Protector to run at startup or any other time of day, ensuring you are in control of your protection. You can also choose a quick, deep, or custom scan depending on your needs and preferences. Simple Malware Protector will scan your PC and identify security threats and vulnerabilities. Simple Malware Protector can quickly and safely remove these threats and prevent them from reoccurring. Protect your computer from malware, spyware, and other security threats. Restore optimum security to your PC.Starting Price: $3.03 per month -
5
Trusted Knight Protector Web
Trusted Knight Corporation
Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Web further protects the web server with enterprise-grade web application security and DDoS protection. Protector Web eliminates website and application vulnerabilities such as cross-site scripting (XSS), SQL Injection, Remote File Inclusion (RFI) and the OWASP Top-10. It prevents attackers from gaining unauthorized access to web systems, compromising sensitive data and defacing websites while minimizing an organization’s dependency on secure development and 3rd party patches. Protector Web is an advanced alternative to a conventional web application firewall (WAF), which addresses the critical WAF deficiencies by using active learning, active content serving and cloud replication. As a result, it dramatically reduces false positives and false negatives, shortens deployment time to hours and eliminates operational complexity. -
6
Safend Protector
Safend
Safend Protector prevents internal/external data leakage by monitoring endpoint devices and data flow. Using granular and customizable security policies and rules, Protector automatically detects, permits and restricts files and encrypts media devices. Very intuitive, Protector has strong reporting and analysis capabilities and already complies with PCI, HIPAA, SOX and EU GDPR. Preventing viruses from entering via removable devices, Protector’s AV SCAN blocks each device as soon as it is inserted, checks for viruses and then permits usage according to rules and policies. AV SCAN interfaces with most anti-virus solutions already used to protect data networks, and permits devices when no viruses are found and fully blocks devices that are contaminated. Selected, restricted or blocked endpoint connectivity without compromising on security. -
7
Systweak Advanced System Protector
Systweak
Advanced System Protector comes with a powerful engine that systematically scans and removes all infections and malicious files to keep your data secure. Advanced System Protector is loaded with features for complete protection. Clean 100% of detected threats for seamless browsing and computing experience. Just click start scan now to detect & remove infections from your PC. Ensure thorough cleaning with quick, deep & custom scan modes. Advanced System Protector not only keeps malware and infections at bay but also protects your personal information from falling into wrong hands. Detects and removes unwanted adware & toolbars to secure your data. Suspicious files are isolated from other files to prevent the further spread of infection. Deletes browser cookies and internet browsing history for privacy. Keep your system protected against malicious threats and PUPs that cause slowdowns to enhance system performance and make it more stable.Starting Price: $39 one-time payment -
8
Trusted Knight Protector Endpoint
Trusted Knight Corporation
Protector Air is focused on protecting individual sessions and the transactions within those sessions. Protector Endpoint further protects internal and external endpoints by actively disabling the keylogging and data-stealing capabilities of the malware, preventing the theft of critical corporate or user credentials and other sensitive information that is used by cybercriminals to commit fraud or gain privileged access to the corporate network. Protector Endpoint was designed to provide a solution-focused on defeating crimeware attacks. Crimeware has become so sophisticated that traditional detect-and-remove strategies of anti-virus are no longer a viable approach and conventional endpoint protection products are often clunky and hard to manage. Instead of attempting to detect and remove crimeware, Protector Endpoint disables crimeware functions to eliminate its ability to collect information. Without browser-entered data, cybercriminals are unable to perpetrate crime. -
9
Netwrix Endpoint Protector
Netwrix
Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information. -
10
OpenText Data Protector
OpenText
OpenText™ Data Protector standardizes and consolidates backups across multiple platforms. It provides secure, comprehensive backup protection for business-critical data and applications whether virtual, physical, or online in the cloud. Data Protector and OpenText™ Data Protector for Cloud Workloads deliver backup and disaster recovery for physical, virtual, cloud and container environments. Native application integrations make application-aware backup and recovery quick and easy. An enhanced interface provides a self-service option to recover single items. Built-in capabilities enable businesses to recover quickly, from granular file restores to automated bare metal recovery. -
11
Trusted Knight Protector Home
Trusted Knight Corporation
The easiest and most effective way to protect your identity, your family’s online presence, and all of your sensitive information. This is an alarming statistic considering each year at least 24 million new malware variants (this is malware that is slightly changed to avoid detection by antivirus software) are found on computers. The truth is, your computer is probably already infected with this type of malware, which is why you need Protector Home - the solution that goes beyond detection, to protect your personal information even if your computer is already infected. Takes only a minute to install and automatically protects your online sessions. Protector Home goes beyond traditional protection to bring you the benefits and security your family needs, even if your computers have already been compromised.Starting Price: $34.95 per user per year -
12
Trusted Knight Protector Air
Trusted Knight Corporation
Injected seamlessly into each web page request, Protector Air disables malware, encrypts data prior to extraction and prevents content manipulation; all with no impact on customer experience. A customer’s web page request routes through Protector Air, is inspected for threats and the site response has a layer of protected Javascript added. The Javascript communicates with Protector Air’s cloud-based service to neutralize malware using integrity verification, behavioral analysis, data encryption and by disabling malicious scripts. Threat data is returned to the website owner for reporting, session management and policy development. Stops customer data theft that costs companies millions of dollars in hard losses, and even more in brand reputation damage and share price falls. Inbound calls from compromised customers, or those persuaded to download agent-based endpoint protection, never materialize. -
13
WebOrion Protector
cloudsineAI
WebOrion Protector is an enterprise-grade web application firewall (WAF) designed to deliver unmatched protection using the OWASP Core Rule Set (CRS). Built on the advice of the global OWASP community's leading experts in web application security, it leverages an intelligent anomaly-scoring, heuristics, and signature-based engine to defend against threats and exploits covered by the OWASP top 10 web application security risks. Rapidly respond to zero-day threats with seamless virtual patching and a powerful user interface built to streamline monitoring, analytics, and fine-tuning, with both entry-level and advanced users in mind. WebOrion Protector also comes equipped with specialized rulesets to protect login pages, WordPress sites, and more. It inspects all incoming and outgoing web traffic for your website with minimal performance impact. -
14
Protector
Equinox Information Systems
Globally, telecom fraud costs companies nearly $40 billion every year. Just one incident of fraudulent international calls can inflict a $50,000 hit on your bottom line. Manual processes are labor-intensive and lack automated interventions to detect and stop fraud quickly. Protector, the most installed fraud management system in the U.S., is a powerful solution built upon years of experience and enhancements. A comprehensive, scalable solution now in its 11th generation, Protector leverages decades of experience mitigating the risk of fraud at hundreds of carriers. With Protector, you have the tools to stop fraud in progress, investigate and resolve cases quickly, and, most importantly, enjoy rapid and significant return on investment. In direct support of rapid ROI, Protector is fully integrated with the PRISM database of IRSF test numbers, which allows you to often block IRSF attacks before they even start. Identify suspicious network activity. -
15
DexProtector
Licel
Instant protection for iOS and Android apps from static and dynamic attacks. A global leader in app and SDK defense with over ten billion installations. DexProtector’s approach to defending your apps is unique. Its Runtime Application Self Protection (RASP) native engine works at a system level deep within the app. From there, it interacts directly with the OS components. This helps it to control key processes and secure the most sensitive parts of your apps and libraries. DexProtector builds layers of protection on top of one another, creating a solid shield around your valuable code and assets. This hardens your apps and prevents real-time attacks. Instant, one-click integration into your CI/CD with no coding required. Protects your apps as well as the communication channel with servers. Provides a secure layer between your app and the operating system. Defends your app against both static and dynamic attacks. -
16
Akamai Enterprise Threat Protector
Akamai Technologies
Enterprise Threat Protector is a cloud-based secure web gateway (SWG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy, appliance-based approaches. Deployed on the globally distributed Akamai Intelligent Edge Platform, Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. This real-time visualization shows the phishing, malware, and command & control threats that Akamai is blocking (for customers) through its Intelligent Platform and its unprecedented insights into DNS and IP traffic. Protect web traffic at every corporate location and for off-network users quickly and without complexity with a cloud-delivered secure web gateway (SWG). -
17
ProfitProtectorPro
ProfitProtectorPro
ProfitProtectorPro is an algorithmic based repricing software tailored for Amazon sellers. Its core objective is to win you the Buy Box and raise your prices in line with predetermined parameters to increase your final selling price and profit margins. This dynamic tool operates seamlessly across various Amazon marketplaces and integrates with BuyBotPro, a deal analyzing tool that adds another layer of sophistication by incorporating real product costs into your calculations. Additionally, ProfitProtectorPro provides sellers with invaluable analytics. These visual aids offer insights into performance trends, enabling data-driven adjustments and informed decision-making. In essence, ProfitProtectorPro amalgamates algorithmic precision to help win you the Buy Box, optimize pricing strategies, and achieve sustainable profit growth. 24/7 support ensures that users can address queries, troubleshoot issues, and make the most of the software's features without unnecessary delays -
18
EyeFly3D
Nanoveu
EyeFly3D™ is the world's first award-winning glasses-free 3D screen protector that delivers distortion-free 2D/3D videos and photos on your mobile devices. We know how much 3D content is available and so we wanted to take things a step further and let you be in control of your 3D experience. Our apps enable you to easily turn your 2D photos and videos into 3D. This is our game changer. Our team of Singapore-based scientists and researchers have taken the most complex information and simplified it to a screen protector and app. That's all it takes to bring immersive 3D to your mobile device. This is a breakthrough in 3D technology. Get on board and start viewing your life by 3DUsing our award-winning EyeFly3D™ screen protector (powered by nanotechnology), with our EyeFly3D Pix app, you will be able to capture and convert photos into 3D. Capture your photos in 3D with one click. Convert your selected 2D photos into 3D with three easy steps.Starting Price: Free -
19
Omnigo
Omnigo
Omnigo is a leading public safety, incident and security management solution. Ideal for law enforcement, education, healthcare and other enterprise markets, Omnigo software ensures safer environments by offering robust tools to manage the entire incident lifecycle. Omnigo's key modules include detection, response, reporting, remediation, and prevention. Our solutions streamline your evidence management process so you can maintain chain of custody and manage property from intake through disposal, on virtually any device. With a team that includes former law enforcement, first responders, and other public safety professionals, we’re uniquely qualified to understand exactly what you need to protect your community. -
20
Intego Privacy Protection
Intego
VPN is the ultimate privacy protector to secure your online identity. Get it now to make your security complete. Browse anonymously with a private IP address and enable strong encryption to protect yourself from your ISP and public Wi-Fi networks. Get instant, secured access to your favorite shows and apps, wherever you are, worry-free. Bypass censorship and unblock sites and content you don’t have access to. Keep your downloads private and experience lightning fast speeds for P2P torrenting. Keep your data safe and private while connecting to any poorly secured network. With Intego Privacy Protection you can block ads, trackers, and malware. Intego Privacy Protection never keeps any records of users’ online activities. You can rest assured knowing you have complete privacy, and nobody knows what you’re doing online. Our app is powered by the latest and most advanced protocols like: Wireguard, PPTP, OpenVPN and L2TP/IPSec.Starting Price: $1.65 per month -
21
Lan-Secure Switch Protector
Lan-Secure
Switch Protector is add-on engine of Switch Center software that provides Network Access Control (NAC) by implementing IEEE-802.1X features on any managed network switch ports and helps to protect networks from potential intruders, unauthorized connections and malicious activities from within the organization. The network access control (NAC) monitoring software is a powerful security engine that combines a variety of access protection rules for intrusion detection and prevention. The real-time protection monitor enables discovery of new network connections or any network changes including suspicious network activities. The software built-in protection rules enable to enforce any network security policy with proactive access control of network nodes that violated the selected security protection rules. The protection engine can be controlled using built-in administration interface or by organization intranet web for managing access permissions of authorized network nodes.Starting Price: $99 per 10 devices -
22
Net Protector
Net Protector
Net Protector defends your office network from all viruses, worm and spyware attacks and keeps your business lifeline, network and PCs, running smoothly and securely. Win10Boost is one of the software from Net Protector Antivirus Lab, which will enhance the performance of your Windows 10 PC. This improves the speed and performance of your Win10 PC and uses very little memory. Detects system model, processor type, processing speed, RAM and disk details, O/S edition and version details. Detects Antivirus related details. Check for the processes and services consuming high CPU utility. It helps to find processes and services which are not useful for users. Significantly increases the speed of the system. It monitors all background applications and detects applications that are in suspended mode. Background applications that are taking high CPU utility and are lowering system performance are monitored. Tunes up the system extensively.Starting Price: $9.33 per year -
23
R&S Cloud Protector
Rohde & Schwarz Cybersecurity
High security & ease of use with 3 predefined protection levels. Reduced total cost of ownership (TCO) with subscription-based usage. Scaling up effectively with your business. High availability and enhanced performance of applications. Actionable insights for optimized user experience. A true SaaS solution that addresses the security issues of the application layer in the cloud. It effectively protects your web applications from the most common cyberattacks without consuming critical internal resources. With easy configuration and management, it provides greater security at a lower lifetime cost (TCO). Hosting is done completely in European data centers, in compliance with European data protection rules like GDPR, not subject to overseas laws. R&S®Cloud Protector is purposefully built to handle the application layer security challenges in the cloud. It effectively protects web applications against the most common cyber attacks without consuming essential internal resources. -
24
WebOrion Protector Plus
cloudsineAI
WebOrion Protector Plus is a GPU-powered GenAI firewall engineered to provide mission-critical protection for generative AI applications. It offers real-time defenses against evolving threats such as prompt injection attacks, sensitive data leakage, and content hallucinations. Key features include prompt injection attack protection, safeguarding intellectual property and personally identifiable information (PII) from exposure, content moderation and validation to ensure accurate and on-topic LLM responses, and user input rate limiting to mitigate risks of security vulnerability exploitation and unbounded consumption. At the core of its capabilities is ShieldPrompt, a multi-layered defense system that utilizes context evaluation through LLM analysis of user prompts, canary checks by embedding fake prompts to detect potential data leaks, pand revention of jailbreaks using Byte Pair Encoding (BPE) tokenization with adaptive dropout. -
25
DDos Protector
Check Point Software Technologies
DDoS Protector Security Appliances and Cloud DDoS Protection Services block destructive DDoS attacks before they cause damage. Blocks a wide range of attacks with customized multi-layered protection. Hardware-based SSL engines inspect the latest SSL/TLS standards. Defense Messaging between devices provides accurate and instant mitigation. DDoS (Distributed Denial of Service) is a category of malicious cyber-attacks that hackers or cybercriminals employ in order to make an online service, network resource or host machine unavailable to its intended users on the Internet. Targets of DDoS attacks are flooded with thousands or millions of superfluous requests, overwhelming the machine and its supporting resources. Modern DDoS attacks use new techniques to exploit areas that traditional security solutions are not equipped to protect. These attacks can cause serious network downtime to businesses who rely on networks and Web services to operate. -
26
UserBase
Encodable
UserBase is a login system, user account manager, and password-protector for your website. It provides user authentication as a simple drop-in web app. UserBase is easy to install if you're a bit tech-savvy, or we can install it for you today. It will run on pretty much any website/server, because it requires only Perl and MySQL, which are present on virtually all servers. Full control over account creation: administrators can add/delete accounts; public sign-up can be enabled; public sign-ups can be set to require admin approval and/or email verification before becoming active. User registration / signup page is customizable with unlimited form fields, to collect whatever user information is appropriate for your site. Users can change their own passwords, and reset them via email if forgotten, without the need for the webmaster's intervention. Can sleep for a specified number of seconds on failed logins for protection against brute-force attacks.Starting Price: $39 one-time payment -
27
Hirsch Velocity Software
Identiv
Identiv’s Hirsch Velocity Software is an integrated security management system that manages access control and security operations in hundreds of different facilities, from single high secure rooms to multi-building, multi-location campuses. What if a person enters a building and is later found to be symptomatic of an illness? Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry level packages. Velocity delivers stringent security compliance, interoperability, and expansion and flexibility options designed to accommodate the evolution of security technology and meet the needs of even the most complex business, personnel, and facility requirements. -
28
DAObox
DAObox
DAObox offers comprehensive services in the design, creation, and post-formation management of DAO legal wrappers across major jurisdictions. Beyond just forming wrappers, DAObox educates DAOs on critical aspects, helping them choose the best jurisdiction and wrapper type to meet their unique goals. The service provides tailored designs to ensure maximum protection for the DAO and its members. One of DAObox's key offerings is post-formation management, where DAObox takes on roles like director, supervisor, or protector within the wrapper. They manage daily operations, corporate actions, reporting, and paperwork, ensuring that the DAO retains ultimate control. This allows DAOs to focus on their core mission while DAObox handles the intricate operations. Also, DAObox offers advisory services on decentralized governance, DAO transitioning, and strategy, including designing on-chain structures and governance procedures to enhance decentralization and address specific challenges. -
29
Ontic
Ontic
Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence. -
30
Wise Care 365
WiseCleaner
Free to clean up disk and fix registry problems on your PC. Protect your privacy and make your PC more secure. Provide a better solution for optimizing and accelerating your computer! Take prompt action once some applications attempt to make modifications without your permission. This protector will identify and stop any processes that try to secretly change the Windows registry. Wise Care 365 is definitely the preferred option for billions of Windows users who want to keep their Windows PC at peak performance. Speed up a slow computer and free up more valuable hard disk space in seconds. Over time, your computer’s hard disk drive and registry will become cluttered. Wise Care 365 can defrag the drive and registry to make them organized, thus making your computer run faster and more stable. You are going to be amazed by its blazing defrag speed. It optimizes PC's performance, defrags disks and the Windows registry, and manages the startup process as well as services.Starting Price: $29.96 one-time payment -
31
Human Presence
Human Presence
Human Presence is the most innovative bot detection & spam protection software in the world. You can stop form spam without impacting your user experience on Shopify and WordPress websites. No coding is required. Get started with your app or plugin today! With our shop protector app on Shopify and Human Presence plugin on WordPress, we make it easy to protect your forms with just a few clicks. No more dealing with recaptcha and those annoying “I’m not a robot” boxes. Human Presence is invisible to your website visitors offering them a frictionless user experience. We pride ourselves on offering top-notch support for all of our apps & plugins. Our friendly support team will be happy to help you address any of your issues via support request or online chat. 40% of all web traffic is coming from bots. While some of these bots are just crawlers for search engines and other software, the majority of bots are malicious. 25% of all web traffic in 2020 came from malicious spam bots.Starting Price: $49 per month -
32
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
33
Bluhell Firewall
Diego Casorran
Get a faster browsing experience by blocking nasty web resources using Bluhell Firewall, the lightweight ad-blocker, and the tracking/privacy protector. All we know is the availability of popular AdBlockers lying around, but frankly, these are too bloated with several features and options which most of us don't use beyond the defaults. So, this extension was made for those of us who don't care about all that stuff but do about just getting rid of all the nasty resources being loaded by websites. This is a lightweight extension (ie, 30KB compared to ~700KB of other popular adblockers), which was made with performance in mind. No configurable options, subscriptions, additional features, etc. You can turn the extension on/off at any time by clicking the toolbar button (Fx Desktop) or touching the menu item entry (Fx for Android). Every time a certain resource wants to be loaded we will have to iterate through a list of seven compiled patterns.Starting Price: Free -
34
ICO Security
ICO Technologies
ICO Security is the most flexible and scalable solution available. The fully-integrated modules cover all the safety requirements within your organization. Inspection Route, personalized template, inspection requests, notice letter, alerts and notifications. Workflow, task management, approval management, stats and dashboards. -
35
SafeVue
Drax 360
SafeVue is a cloud-based fire safety and compliance management platform that gives facilities, estates, and safety teams a real-time, web-accessible dashboard to view and manage fire alarm and life safety system data across single or multiple properties 24/7. It digitally captures fire system test results and compliance records, creates a complete audit trail of key events, highlights non-compliance issues as they occur, and stores all historical test and alarm activity in secure cloud storage that’s accessible on mobile or desktop for inspections, audits, and reporting. It automates scheduling and reminders for weekly, monthly, and annual testing cycles, tracks faults and alerts to support proactive fault resolution, and generates compliance-ready reports in seconds so teams can demonstrate adherence to fire safety standards like BS 5839-1:2025. -
36
Aiculus
Aiculus
Aiculus uses Artificial Intelligence (AI) to detect and respond to API security threats across all your API traffic in real-time. Our insights into the latest API-related threats strengthen your organization’s defense-in-depth strategy even further. So when you partner with us, you’re not just securing your APIs, your customer data, and your reputation, you also gain the confidence to expand and innovate with APIs. It screens each call to determine anomalous patterns and threat indicators, and detect API credential theft, compromised accounts and authentication bypass attacks. API Protector inspects every API call for misuse. It uses AI techniques such as machine learning and deep learning to perform behavioral analytics, and provide adaptive risk assessments in real-time. If the risk is too high, the request is denied, and your systems stay secure. Your Aiculus dashboard shows calls, threats and risk analyses across all your APIs. -
37
Guard1
TimeKeeping Systems
Empower your staff to get more done, document more information in less time with perfect accuracy, and protect from liability. Guard1 is the leader in RFID inmate tracking, cell check and suicide watch documentation, and task management for your officers. The guard tour gold standard for over 30 years, Guard1 and The PIPE are used by companies, governments, and institutions worldwide. Know for sure that your well-being checks for residents and patients are being done – and know instantly if they are late, or missed. Keep your residents safe with Guard1. Document resident services and room checks. Keep track of resident location and elopement. Guard1 gives you real time updates so you can track movement, activities, handouts, and more - all in real time.Starting Price: $495 one-time payment -
38
Matrix Frontier
Matrix Systems
Matrix Frontier Access Control. Matrix Frontier hardware and software solutions have been protecting some of the world’s most challenging enterprise security installations for more than 40 years. We are committed to developing, deploying and servicing open-platform, future-proof software and reliable, sophisticated hardware to keep your enterprise secure. Leading enterprises choose Frontier solutions because they know they can count on us for robust solutions and responsive service. We provide the most appropriate, most effective solution for even the most challenging installations. Many security personnel are inexperienced. Turnover is common. Getting users up to speed quickly is crucial. By choosing Frontier hardware and software, you ensure that everything works properly together right out of the gate. We design our products and installations to grow with our customers. We strive for backward compatibility and easy migration. -
39
Counslr
Counslr
Counslr is a leading provider of confidential, text-based mental health support, making care accessible, affordable, and available 24/7/365. Founded in 2019 and based in New York City, Counslr partners with schools, employers, and communities nationwide to help people prioritize their mental well-being. Users can access unlimited, live 45-minute texting sessions with licensed counselors on-demand or by appointment, with an average response time under two minutes. Counslr also offers a self-guided Wellness Toolkit with expert-curated resources to support relaxation, nutrition, sleep, and more. By eliminating barriers like cost, stigma, and access, Counslr empowers individuals to address challenges early and effectively — all in a secure, HIPAA-compliant, and private environment. -
40
KraitosX
Auvoria Prime
KraitosX is an automated gold trading bot for MetaTrader 5, designed for long-term performance with intelligent risk controls. It offers 10+ years of successful backtesting and is ideal for traders seeking automation with precision. Features include: ● Free one-on-one Zoom to set up software and answer questions ● Free VPS for 24/5 active trading with active account ● Trades Gold, XAUUSD ● Trend filter ● Moving averages ● RSI ● Stochastic ● Elastic scaling ● Pip spacing ● Buy/sell at the same time ● Chill-Out Mode ● Equity Protector ● Quantum Zone ● Smart Money Mode ● ADR-based or fixed TP/SL ● Hedging ● Automated lot sizing ● Includes plug-and-play set files and open settings or advanced users 📈 You can see the verified results for yourself on MyFXBook; look up auvoriaprimeinc Schedule a Free Demo and Trial on the company websiteStarting Price: $5000 -
41
WhoFi
WhoFi
Running a library is a lot of work. WhoFi makes it easier by automating tasks that take your time and attention away from patrons. Libraries and other community hubs are more than just the buildings they occupy. They are centers of learning, professional development, safe spaces, remote working spaces, and protectors of community connections. Keeping the WiFi funded and fast is a top goal of modern community centers. Accurate numbers around WiFi usage are needed for board reporting, grant proposals, improving patron experiences, and more. Quantify and qualify WiFi information to improve your community space. Insights such as patron dwell time, session counts, and new vs. return rates are being used in strategic planning, day-to-day decision-making, advocacy communications, and programming enhancements. All of these insights are provided while still respecting and maintaining patron privacy and adhering to all privacy laws. -
42
Qognify
Qognify
Qognify helps organizations minimize the impact of incidents with its innovative portfolio of video management software and enterprise incident management solutions. With thousands of deployments in banks, utility companies, airports, seaports, city centers, and transportation agencies, Qognify helps agencies all over the world keep people and assets safe. Qognify places a premium on operational and physical security strategies because safety is priceless. Qognify solutions help organizations capture, analyze, and leverage big data to anticipate, manage, and mitigate security and safety risks, maintain business continuity, and streamline operations. The Qognify offerings provide valuable insights that enable enterprises and security-conscious organizations to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends. -
43
Milestone XProtect
Milestone
Milestone XProtect® video management software (VMS) brings all the puzzle pieces for video surveillance together in a perfect combination to create a solution that keeps people and property safe today, and tomorrow. When you invest in a video surveillance system, you invest in much more than hardware and software. You invest in safety for your home, business, people and assets, so you can protect what matters the most. Choosing XProtect as your foundation means choosing a VMS developed by innovative surveillance experts who work to solve the challenges you have today and in the future. With 20+ years on the market, XProtect has proven to be the right answer for more than 500,000 installations worldwide, from flower shops to universities, stadiums and cities. XProtect Professional+ is IP video management software (VMS) designed for mid-sized businesses, supporting an unrestricted number of cameras, devices and servers. -
44
Scylla
Scylla
At Scylla, our mission is to create the best possible AI tech for video surveillance. As a technology-first company, we are committed to leveraging our expertise to deliver unparalleled precision and reliability in our solutions. We not only prioritize safety but also develop highly precise and sensitive AI solutions for video surveillance and security at large. We believe that through innovation and technology, we can provide our clients with the tools they need to protect what matters most and improve productivity of their businesses. -
45
Super Display Touchscreen Security
Black Creek Integrated Systems
Black Creek's touchscreen-based Super Display® Security System is the flagship of Black Creek's security technologies. The system provides agencies with a modern solution that incorporates all aspects of correctional facility physical security into a single, fully integrated package. The Super Display® System is ideal for either new construction or retrofits and is the most cost-effective, long-term solution available. The Super Display® System leverages brilliant, large-format LCD touchscreen monitors, speedy Intel® processors and Black Creek's easy-to-use user interface software to produce fast and intuitive security management for corrections. The Black Creek Super Display® Touchscreen Security System is an open architecture construct - utilizing only high-quality, non-proprietary system components. This assures a high level of system availability and makes maintenance a breeze by using only in-house personnel. -
46
Genetec
Genetec
Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday. -
47
PureActiv
PureTech Systems
Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors. -
48
ePortPass
ePortation
ePortPass™ is a cloud-based mobile solution that allows security personnel to control and restrict access to all points of a facility in an easy to use, common sense, way. Though we offer a full range of access control solutions we don’t just stop at the gate. Surveillance, alert sensors, security rounds, and reports are just a few items on the long list of security personnel duties. ePortPass™ provides the ability to efficiently manage security operations with real-time visibility. The resulting COP (common operating picture) of activity and incidents across a single or multiple locations is crucial in today’s heightened security environment. We provide live-camera feeds, geo-location mapping services, and real-time messaging from both sensor technology and security personnel on the ground, enabling quality information to be dispersed amongst a security group. -
49
DrPatrol
Dr Integrated Systems
Guard tour system plays a critical role in managing your security guard patrol operations in Singapore. Over the years, we have seen the widening roles of security guard officers to include facilities assessment and inspection-related task in addition to their traditional security patrols functions. This increasing demand on the security services companies coupled with the recent trend of manpower shortage in the industry meant that security patrol operations need to be managed more efficiently with a limited team of security officers. We offer a broad range of electronic guard tour systems base on a broad range of geotagging technologies, such as iButton Touch Memory, RFID, GPS, GPRS. Monitor your security officer activities in real-time for unsurpassed situational awareness. Customizable patrol management software to meet your unique security needs. Fast turnaround time with software modules for patrol monitoring, activity reporting, tour route planning and guard scheduling. -
50
Vireo
Vireo
Hand-built to make managing your security or investigation company a breeze! We will brand and register our iPhone, Android & Windows apps in the app stores for your company. Be the envy of your competitors and impress your clients with your own company mobile apps. The system comprises of a management portal, employee portal, and client portal. You can manage your full business, clients, contracts, and employees and each user type has its own login area! The System was developed with GDPR and data protection at the heart. From data subject access requests to automated data destruction, Vireo is above and beyond what is required. Manage your company from anywhere in the world. Change the look and feel at the click of a button. With encryption and 2FA we ensure your data is secure. Integrated confidential messaging system. Our system is integrated with the SIA for one-click license checks, and with PayPal and World Pay for client payments.Starting Price: $5,584 one -time payment