Alternatives to Shield AI
Compare Shield AI alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Shield AI in 2026. Compare features, ratings, user reviews, pricing, and more from Shield AI competitors and alternatives in order to make an informed decision for your business.
-
1
Trident 1
Trident 1
We are a veteran owned business with over 70% veteran workforce, owned and run by former Navy SEALS. We are also a proud Official Partner of the Navy SEAL Foundation and an Executive Sponsor of the SEAL Legacy Foundation. Are you looking for a new point of sale system for your gun store? Trident 1 is the premier provider of the first all-in-one FFL software designed specifically for the firearms retail industry. Created to replace multiple outdated software systems with one universally integrated solution, Trident 1 streamlines and consolidates ALL systems into a single solution to save you time and money. You can access Trident 1 from anywhere on any device, so you’re always in control of your retail operations. We specialize in retail sales, range management, compliance, industry leading integrations, secure payment processing, and excellent, US based customer service. -
2
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. -
3
Tresorit
Tresorit
End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shieldStarting Price: $10.42/month -
4
SHIELD
SHIELD
Device-First Fraud Prevention with Real-Time Identification & Intelligence. SHIELD's Device Intelligence persistently identifies devices, users, and accounts you can trust — and those you can't. Don't let fraudsters fool you. Make precise decisions about device trustworthiness with the global standard for device identification — SHIELD Device ID. Get the most comprehensive view of every user with real-time actionable device signals and continuous risk profiling. Eliminate risk blind spots, provide superior user experiences, and accelerate growth. Instant insights. No additional codes needed. Gain intelligence without giving PII data. Self-configurable risk thresholds. We return all data, and more. Get the full picture with transparent intelligence. Stay ahead of new and emerging fraud attacks. Real-time attack pattern syncing worldwide. -
5
Hivemind
Shield AI
We’re building Hivemind, our AI pilot, to enable swarms of drones and aircraft to operate autonomously without GPS, communications, or a pilot. Our mission is to protect service members and civilians with intelligent systems. More than just preset behaviors & waypoints. Like a human pilot, Hivemind reads and reacts to the battlefield, and does not require GPS, waypoints, or prior knowledge to make decisions. It is the first and only fully autonomous AI pilot deployed in combat since 2018. From indoor building clearance with quadcopters to integrated air defense breach with fixed-wing drones, and F-16 dogfights, Hivemind™ learns and autonomously executes missions. A new generation of aircraft flown by Hivemind to provide persistent aerial dominance across sea, air, and land, on the tactical edge. -
6
ForceShield
ForceShield
We are the dynamic application guardian for Web, Mobile, and IoT. ForceShield was established in 2016 by a group of security experts with the goal of changing the game rules in the cybersecurity world. The founders believe that the traditional signature-based security technologies were failing in the face of ever more frequent and sophisticated automated attacks. They developed a proprietary security technology – Dynamic Transformation – that shifted the security approach from reactive to proactive protection while increasing complexity and cost for attackers. ForceShield foresaw that the rapid growth of automated attacks targeting the Internet of Things presented an unprecedented security challenge that their technology and engineering experience could solve. ForceShield creates a complete network defense layer by protecting Web/Mobile applications and IoT devices against bot attacks. -
7
CleanINTERNET
Centripetal
While traditional cybersecurity solutions remediate threats as they emerge, CleanINTERNET® shields against threats proactively, preventing them from reaching your network in the first place. The largest collection of high-confidence, high-fidelity commercial threat intelligence in the world, is operationalized so your defenses adapt and defend in parallel with the threat landscape. Applying over 100 billion indicators of compromise from real-time intelligence feeds, updated every 15 minutes, to protect your network. The fastest packet filtering technology on the planet is integrated at your network’s edge with no latency, enabling the use of billions of threat indicators so malicious threats are dynamically blocked from entering your network. Highly skilled analysts augmented by AI technology monitor your network, providing automated shielding based on real-time intelligence, and validated by human expertise. -
8
RidgeShield
Ridge Security
RidgeShield cloud workload protection, is your first line of defense, providing zero-trust micro-segmentation technology to protect cloud workloads, regardless of whether they are deployed on-premises, in hybrid cloud, or multi-cloud environments. With RidgeShield, organizations can ensure the security posture of their network against sophisticated security threats. As an innovative host based micro-segmentation platform, RidgeShield supports a wide range of operating systems and workloads, continuously monitoring traffic across workloads and enforcing unified security policies across any environment. -
9
Project Shield
Project Shield
Project Shield, created by Google Cloud and Jigsaw and powered by Google Cloud Armor, provides free unlimited protection against DDoS attacks, a type of digital attack used to censor information by taking websites offline. Project Shield filters out malicious traffic using Google's infrastructure and DDoS tools. If your website is targeted by a DDoS attack, our servers will block attacking traffic to keep your website up and running. Project Shield can be configured to fetch content from your website's servers once and serve a cached copy on subsequent requests. This reduces traffic to your servers and absorbs potential DDoS attacks. Project Shield caches content to strengthen DDoS defenses, improve site performance, and save bandwidth to sites. Users have the ability to invalidate caches for their site's needs. Project Shield provides controls such as JavaScript cookies and IP denylists for increased site protection. -
10
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
11
T-Mobile Visual Voicemail
T-Mobile
T-Mobile Voicemail keeps getting better and better! The latest Visual Voicemail release provides UI enhancements for Voice-To-Text and the new Scam Shield™ bundle, along with continued stability and performance improvements. T-Mobile Scam Shield™ allows users to identify, block, and report likely scam calls. With Visual Voicemail you can listen to messages in any order, respond in one click, update your contacts, and easily manage your inbox without ever dialing into your voicemail.Starting Price: Free -
12
AviPLAN
Transoft Solutions
With renowned market-leading technology at its core, AviPLAN delivers a unique feature-set tailored to meet the specific challenges faced by today’s airside planning, design and operations professionals. AviPLAN delivers a unique feature-set tailored to meet the specific challenges faced by today’s airside planning, design and operations professionals. Working with AviPLAN's comprehensive, highly accurate specifications library of aircraft, ground support vehicles and passenger boarding bridges means less time sourcing information and more time producing results. AviPLAN’s powerful features allow users to define and adjust aircraft maneuver and stand planning parameters "on the fly" - ensuring that tasks that previously took days or weeks can now be done in hours or even minutes. -
13
Shield34
Shield34
Shield34 is the ONLY web automation framework that: Is 100% Selenium compatible! Continue working with your existing Selenium scripts. Create new scripts using Selenium API. Addresses the Selenium flaky tests issues by using self healing, smart defenses, error recovery mechanisms and dynamic element locators. Provides AI based anomaly detection and root cause analysis to quickly analyze failed tests and see what changed and what caused the failure. Eliminate Flaky Tests. Flaky tests are a huge pain! Shield34 adds defense-and-recovery AI algorithms to every Selenium command, including dynamic element locator, eliminating false positive results, driving self-healing and maintenance-free testing. Get Real-time Root Cause Analysis Using AI algorithms, Shield34 is automatically pinpointing the root cause of every test failure – reducing the overhead of debugging and reproducing failed tests. Enjoy a ‘Smarter Selenium’. Integrate automatically with your -
14
AWS Shield
Amazon
AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced. All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks. -
15
Shield
KingsBridge
KingsBridge's Shield is a web-based business continuity planning platform that provides companies with disaster recovery and contingency plans. Shield provides users with over 250 pages of optimized content that adapts easily to their business needs. Shield's customization feature allows users to delete, add, and rename teams to suit their company structure. With Shield's integrated threat risk assessment (TRA), users can recognize threats that could have negative effects on their businesses.Starting Price: $500.00/month -
16
ShieldApps PC Privacy Shield
ShieldApps
PC Privacy Shield will wipe out your online digital footprint, including your browsing history and tracking records. PC Privacy Shield will also provide you with an advanced file encryption mechanism to protect your personal and sensitive files. PC Privacy Shield is used to both defend one’s information from phishing and to cover his/her tracks when needed. PC Privacy Shield will let you encrypt or delete login credentials and alert in real time when those are being logged by the browsers. PC Privacy Shield includes an easy-to-use ad blocker that blocks annoying and sometimes abusive banner advertisements.Starting Price: $39.99 one-time payment -
17
NoSky
NoSky
NoSky: The Mighty Data Guardian! Our superhero software protects your data towers, battling hackers, viruses, corruption, and ransomware." In a world where data faces constant threats from nefarious villains like hackers, viruses, corruption, and ransomware, NoSky emerges as the ultimate superhero to protect your valuable information. With its superpowers fueled by cutting-edge technology, NoSky stands tall as the guardian of your data towers and castles, ensuring they remain impervious to the forces of evil. Highlighted Features: Shield of Security: NoSky's impenetrable shield shields your data from relentless hackers, leaving them powerless against its robust defenses. Virus-Vanquishing Abilities: Armed with the latest antivirus capabilities, NoSky annihilates viruses and keeps your data fortress free from any malicious intrusions.Starting Price: $2.43 -
18
IRI CellShield
IRI
IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.Starting Price: $35 one-time payment -
19
ShieldApps VPN
ShieldApps
ShieldApps VPN secures the connection between your device, the WiFi hotspot that you have connected to, and the world wide web. ShieldApps VPN is used to protect your online browsing from tracking, information snooping, ip-logging and more, providing you complete anonymity and privacy. ShieldApps VPN uses strong encryption algorithms to mask and falsify your location so you can browse the internet freely, without geographical limitation, censorship or any other restriction. Watch any content, from anywhere. ShieldApps VPN servers are distributed in multiple locations, allowing you to mask your location and use any remote server location you may want from a wide list of options, thus opening unlimited streaming opportunities. Use ShieldApps VPN on your desktop, laptop and android devices. ShieldApps VPN is compatible with multiple operating systems and devices, assuring your privacy wherever and whenever you choose to use it.Starting Price: $79.98 per year -
20
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
21
Shield Antivirus
ShieldApps
Shield antivirus offers protection from all to-date viruses, malware, ransomware, trojans, and spyware for personal desktop and laptop computers. Shield antivirus utilizes active protection mechanisms to protect your computer from all threats and is set to monitor, block, and alert whenever a threat is detected. Shield Antivirus features an easy installation process, vast monitoring and alert capabilities, as well as email protection by blocking and quarantining any threats located in incoming emails. Shield antivirus offers full protection from internet/browsing threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Shield Antivirus will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer protected and operating at peak performance.Starting Price: $69.99 one-time payment -
22
Digivault
Digivault
Safeguard your digital assets with an industry-accredited solution, engineered by security and technology experts. Defense-grade security to protect digital assets from security threats. Built by security and defense experts, industry-accredited, FCA-registered, and Nasdaq-listed. Digivault provides industry-accredited custody solutions for investors, family offices, trust and fund managers, corporate treasuries, law enforcement agencies, and governments. Customizable solutions and white-glove services adhere to stringent institutional and regulatory standards. Former nuclear bunkers and bank-grade vaults deliver the highest grade of physical protection to protect client assets, private keys, and IT systems. The Digisafe policy engine shields against internal collusion, is fully configurable and tailored to exceed the highest risk tolerance, and automates governance around the clock. -
23
MCP Shield
MCP Insight
MCP Insight’s bespoke Fraud Detection and Fraud Blocking Solution MCP Shield provides real-time fraud detection and blocking with an intuitive analytics portal and a simple implementation process. The tool operates by detecting unexpected changes and actions on your service landing or payment page. It determines whether a payment request is legitimate or fraudulent by monitoring the activity of the alleged consumer and by logging whether the consent is bot or human in a transaction assessment. MCP Shield provides the information you need to decide whether or not to block a service. MCP Shield Dashboard Monitors 100+ variables grouped into fraud categories Provides statistics on APK and Browsing fraud on your services Provides transactional detail and statistics Request real-time transaction assessment results You decide when and what to block MCP Shield Implementation Fill out a simple form to add your services to the MCP Shield dashboard Add a snippet of code to youStarting Price: $500 -
24
Google Shielded VMs
Google
Shielded VMs are virtual machines (VMs) on Google Cloud hardened by a set of security controls that help defend against rootkits and bootkits. Using Shielded VMs helps protect enterprise workloads from threats like remote attacks, privilege escalation, and malicious insiders. Shielded VMs leverage advanced platform security capabilities such as secure and measured boot, a virtual trusted platform module (vTPM), UEFI firmware, and integrity monitoring. Quickly protect VMs against advanced threats: In just a few clicks, you can enable Shielded VMs to help protect against threats such as malicious project insiders, malicious guest firmware, and kernel- or user-mode vulnerabilities. & more -
25
CCIS Church Management Software
CCIS Church Management Software
CCIS Shield™ is the latest system church management system developed by CCIS Church Management Software. CCIS Shield™ is fully web enabled so access from anywhere with an Internet connection is possible. While CCIS Shield is accessible from any device, the user experience is best with a desktop/laptop computer or a tablet as a mobile device. CCIS Shield™ web application offers you a convenient and comprehensive membership financial management system that you can tailor to fit your church's needs. This program is flexible enough that you can choose what's important to you, but powerful enough that you can expand the depth of your data at any time. Keep secure notes on individuals, chart individual and family relationships, track contributions and giving with the greatest of ease, and devise activities and attendance records. Execute reports, retrieve data and enhance how you view your church. Improve your church's administration today using CCIS Shield Web Church Membership Management.Starting Price: $29.99/month -
26
SHIELD
Plectrum
SHIELD is a weapons and armory management system that is designed and customized to fit the specific needs of organizations handling weapons. It is a secure, quick, and efficient system for authenticating users and their assigned weapons, it is a system that keeps track of all weapons and their handlers using RFID and GPS technology to guarantee accountability and responsibility at all times, a single interface connected to all armory locations for quick reliable retrieval of weapon inventory and location information. SHIELD is also used as a critical asset management solution, not just a weapons management solution, that allows for accurate inventories and authenticated transfer of weapon ownership. As an enterprise software system for the management of arms and ammunition. SHIELD consists of various modules that will make the armorer’s administrative operations easier and less tedious. SHIELD comes with a bundle of benefits to the armorer and the services at large. -
27
BroShield
BroShield
If you want to free your system with unwanted snoop ware then BroShield should be your 1st choice as this provides you a great anti snooping and detection of harmful viruses from your computer. Protect your computer with BroShield protection. BroShield helps you to get full authority over the internet. You can keep an eye on what kind of content your kid is exposed to. Restriction of adult websites and harmful content is in your hand. Allows you to control the internet access time. There are a lot of illegal websites that still run on the internet. We need to restrict our kids from getting exposed to sites like porn, gambling, and inappropriate sites. Visiting such sites may bring in viruses and other unwanted things with it. BroShield runs 24/7 to look for viruses and threats and keep the computer in full monitoring, to block the potential threats. The smart feature of BroShield fail-safe is designed to look for all the remote snooping activities to prevent getting compromised.Starting Price: $49.95 per year -
28
Nexium Defence Cloud
Thales
Nexium Defence Cloud is a comprehensive, modular private cloud infrastructure tailored to meet the stringent security and operational demands of military forces. It enables armed forces to swiftly adapt their Communications and Information Systems (CIS) to dynamic operational scenarios, facilitating rapid deployment of services and communities of interest through mission-oriented, automated management tools. By integrating civil cloud technologies into military environments, Nexium Defence Cloud enhances operational efficiency, accelerates maneuvers, and empowers joint force commanders to prepare missions in days, deploy in hours, and adapt in minutes, all with minimal expertise. The solution offers a distributed cloud node architecture, providing local storage and computing capabilities to avoid single points of failure, with form factors ranging from rackable nodes for headquarters to rugged edge servers for hostile environments. -
29
SoftwareShield
Yummy Interactive
SoftwareShield™ Professional Edition is our mid-level product designed to combine advanced protection features with an easy-to-use interface and a powerful HTML/Javascript end-user interface ("nag screens"). Professional edition goes beyond simple licensing by providing the tools you need to maximize your revenue through advanced up-sell and marketing techniques. SoftwareShield™ Professional Edition provides the features you need to maximize revenue. SoftwareShield™ has the superior flexibility to meet the demands of any license model you want to deploy. Try-Before-You-Buy, buy-and-download (e.g. ESD), pay- per-level, micro-transactions, etc. can all be realized with SoftwareShield™. And non-monetized initiatives such as demos, media previews, and betas are also supported. -
30
Promon SHIELD
Promon
Achieving application security doesn’t have to be difficult or time-consuming. With Promon SHIELD™, your developer team can implement protection to any desktop application, in minutes, without affecting the end-users. Promon SHIELD™ is designed to secure code integrity, data protection, intellectual property and ultimately brand and revenue against targeted malware. With security protections that are infused directly into your application, Promon SHIELD™ protects your desktop apps from both static and dynamic attacks. Since security is embedded into the application, protection is not invasive to the end user’s computer or network, nor does it rely on external libraries or hardware for its protection. Promon SHIELD™ is a security technology that offers multi-layered app protection beyond what the operating system can offer, and beyond what can be achieved by normal best practice and programming by app developers. -
31
vShield
vShield
vShield is a secure and reliable hosting provider offering a range of server solutions including Virtual Dedicated Servers (VDS), web hosting, and dedicated servers. With a focus on high performance, security, and 99.9% uptime, vShield ensures businesses have the infrastructure to scale efficiently. The platform supports instant server activation and provides a user-friendly control panel, making it ideal for companies looking for flexible and customizable hosting solutions. With a strong emphasis on data protection, vShield guarantees a safe environment for hosting sensitive business data.Starting Price: $12.99/month -
32
RapidPath
Invarion
RapidPath tests vehicle movements for road and site projects, ensuring your planned layout can safely accommodate any expected vehicle manoeuvres. Simulate forward and reverse vehicle turn manoeuvres quickly and easily. Perform intricate, two-dimensional vehicle movements with complete confidence that your results are reliable and precise. Prepare your vehicle simulation and maneuver outline directly onto aerial imagery and mapping integrated into the software. Mapping from external sources, such as GIS systems or online mapping services, can also be imported. RapidPath comes pre-loaded with national standard vehicle design dimensions for multiple countries. Libraries are updated regularly, ensuring you are working with the latest vehicles. RapidPath provides extensive vehicle customization options, enabling you to adjust various vehicle dimensions or even create your own custom vehicles.Starting Price: $45 per month -
33
ShieldForce
ShieldForce
ShieldForce.io is a comprehensive, AI-powered cybersecurity platform that enables organizations to detect, prevent, and respond to cyber threats in real-time. Designed to strengthen overall security posture, ShieldForce leverages machine learning and behavioral analytics to identify malicious activities and anomalies across networks, endpoints, and cloud environments. It offers advanced threat detection, automated response, and continuous monitoring, providing businesses with the tools needed to stay ahead of evolving cyber threats. With intelligent alerting and detailed incident reports, ShieldForce gives security teams actionable insights to quickly mitigate risks and prevent data breaches. Its user-friendly dashboard consolidates threat intelligence and system health data into one centralized hub, making it easy to track and manage security incidents efficiently. ShieldForce also integrates seamlessly with existing security stacks, including SIEM and SOAR platforms. -
34
Comodo Dome Shield
Comodo Dome Shield
DNS based security solution providing easiest way to block malicious domains and apply company web filtering policy. Simple, yet extremely effective. Create location and agent-based security rules for blocking malware, phishing, botnet, fraud sites and enforce company policies using 70 different URL Categories covering more than 15 million domains. Dome Shield helps you to get full visibility of everything happening on your Dome Shield-connected perimeter. Comodo Dome Shield provides comprehensive domain filtering and granular policies that cover security and category based rules. It provides the easiest way to block malicious and risky web access and apply company web browsing policy to stop threats including ransomware. Simple yet extremely effective DNS based security for your company. Click below to compare Comodo Dome Shield against competing offerings. -
35
GameShield
Alibaba Cloud
GameShield is a customizable network security solution, which has been designed for the game industry. GameShield allows you to efficiently defend against TCP CC attacks that typically occur in the game industry and to prevent Tb-level DDoS attacks. In addition, GameShield can help you reduce the costs of security protection. Multi-level disaster recovery architecture and risk management system to block malicious users and prevent DDoS and CC attacks. Supports visual management and multiple built-in features in the console, allowing you to simply scale the architecture. Supports SDK-based query dispatching within several seconds and eight-ISP-based BGP acceleration to guarantee the optimum gaming experience. Supports customization to meet different business demands and save costs. GameShield provides SDKs for multiple platforms, such as Windows, Android, and iOS.Starting Price: $1.65 per month -
36
InstallShield
Revenera
Create native MSIX packages, build clean installs, and build installations in the cloud with InstallShield from Revenera. Consistent and reliable installs. Every time. With InstallShield, you’ll adapt to industry changes quickly, get to market faster and deliver an engaging customer experience. Revenera InstallShield (formerly Flexera InstallShield) is the fastest easiest way to build Windows installers and MSIX packages and create installations directly within Microsoft Visual Studio. Configure install conditions to specifically target Windows 11 and Windows Server 2022. Install files to native ARM locations on Windows 10 running on ARM machines. Easily move your build infrastructure to the cloud by connecting to Revenera’s Cloud License Server. Build one-click installers that are more modern than ever and refreshingly simple. Configure pre-requisites to install third-party packages from Microsoft’s Windows Package Manager.Starting Price: $4,498 per 3 years -
37
IBM Cloud™ Data Shield enables users to run containerized applications in a secure enclave on an IBM Cloud Kubernetes Service host, providing data-in-use protection. IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. IBM Cloud Data Shield can run containerized applications in secure enclaves on the IBM Cloud Kubernetes Service.
-
38
Box Shield
Box
Shield lets you classify content your way, both manually and automatically. We're excited to announce our powerful, native capability that identifies PII and custom terms within files, and automatically classifies them based on your policies — helping you protect your data at scale. Placing controls close to your content helps prevent leaks in real time, while powering a frictionless end-user experience. Configure access policies within minutes to keep your data secure while letting people do their mission-critical work. Using machine learning, Shield brings you timely, accurate alerts on insider threats, account compromise, and malware attacks. Quickly evaluate alerts in Shield, or send them to your existing tools for further analysis. Shield works with the best-of-breed security tools you already have in place. Alerts containing more insights than ever before can be integrated with your SIEM and CASB for a unified view.Starting Price: $130 per month -
39
Forcepoint WebShield
Forcepoint WebShield
Secures HTTP traffic throughout the enterprise and provides access to web-based resources on less sensitive networks. Forcepoint WebShield, a Commercial-Off-The-Shelf (COTS) data guard, provides secure Web search and browse-down capabilities from high-side networks to lower-level networks. WebShield supports the missions of the largest number of cross domain transfer users as a secure mechanism for complete information browsing and discovery. WebShield provides transparent protection of the entire network and allows users to carry out their missions with increased protection. Users surfing lower-level networks can be restricted to specific server and file types as defined by security policies. All requests, responses and transfers go through security controls, such as dirty word search, virus scan and malicious content checks. Forcepoint WebShield is an approved cross domain transfer solution on the Unified Cross Domain Services Management Office (UCDSMO) Cross Domain Baseline. -
40
RedShield
RedShield
RedShield has partnered with the no.1 cloud provider AWS to create a next-generation architecture that offers unparalleled DDoS protection as part of RedShield’s service. In a world where the odds are stacked against you, with 50 new vulnerabilities published each day, it can feel like a near-impossible task to stay ahead of cybercriminals. RedShield uses a best-practice operational model with cybersecurity experts, tools, and AI-supported processes to allow our customers to minimize their risk and maximize their cybersecurity resilience. Not only is the cybersecurity battle complex and dynamic, coupled with the high demand & short supply of security & development professionals, but it can also soon become a costly distraction away from core business. RedShield’s service not only solves the people's problem but does so at approx. 10% of the cost of building & running your own in-house web app security team, offering a compelling return on mitigation investment. -
41
ShieldApps Webcam Blocker
ShieldApps
ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds another layer of protection to your computer and a proactive privacy approach. Upon selecting the options any external or internal attempt to access the webcam will be denied.Starting Price: $29.99 one-time payment -
42
HostShield
HostShield
HostShield, a UK-based hosting authority, excels in VPS Hosting and Dedicated Servers, primarily serving the Netherlands. With instant VPS activation and top-tier Dedicated Servers, we combine our UK headquarters with Dutch data centers for exceptional online performance. HostShield LTD is your go-to choice for hosting excellence, where the UK meets the Netherlands seamlessly. Our commitment to customer satisfaction, coupled with our dedication to cutting-edge technology, ensures that your online presence remains secure, robust, and highly responsive. Join the HostShield LTD family and experience hosting solutions that set the standard for excellence.Starting Price: $64.99 -
43
iolo System Shield
iolo
Eradicate stubborn PC pests and block future infections without system slowdown. System Shield is more than an antivirus system, it provides certified protection while maintaining maximum PC performance, so you can shop, bank, and socialize online without the threat of spyware, viruses, and other threats. Antivirus shield finds and removes stubborn and dangerous PC infections, and permanently protects your system from all future attacks. Protects without unnecessary add-ons or background activities—and nearly zero resource consumption. Finds and exterminates computer pests and parasites, restoring system stability and freeing up resources. Uses revolutionary technology to ensure real-time threat protection without interruptions. provides an invisible suit of armor for your PC that instantly nullifies external attacks in real-time.Starting Price: $31.95 one-time payment -
44
Marketplace Co-Founder Match
Everything Marketplaces
Everything Marketplaces' Marketplace Co-Founder Match is a private space within the Everything Marketplaces community designed to connect solo founders, existing teams, and technical talent seeking co-founder opportunities in early-stage marketplace startups. After successfully facilitating over 20 co-founder relationships, this platform offers a structured approach to finding compatible partners. Users can post introductions in the co-founder match space using a provided question format, allowing others to search these introductions and connect based on relevant data points. This process enables direct communication with potential co-founders who align with their startup goals. It caters to individuals at various stages, from initial idea development to post-revenue phases, and includes members backed by Y Combinator, OnDeck, and team leads from top companies seeking to join founding teams. -
45
VIPRE Internet Shield VPN
VIPRE Security Group
VIPRE Internet Shield VPN is a virtual private network (VPN) service designed to enhance online security and privacy by encrypting internet connections and masking IP addresses. With VIPRE Internet Shield VPN, users can browse securely on public Wi-Fi, keeping their data protected from hackers, trackers, and potential cyber threats. It allows users to select from multiple server locations worldwide, granting access to restricted content and improving anonymity online. The VPN operates with high-speed connections and maintains reliable performance, ensuring smooth streaming and browsing experiences. VIPRE Internet Shield VPN is an ideal solution for anyone looking to protect their online identity, secure their internet activities, and enjoy unrestricted access to global content. -
46
VIPRE Privacy Shield
VIPRE Security Group
VIPRE Privacy Shield is a privacy-focused tool designed to help users protect their personal data and online identity from prying eyes. It offers powerful features like data file shredding, which permanently deletes sensitive files to prevent recovery, and a history cleaner that removes browsing history, cookies, and other digital footprints. VIPRE Privacy Shield also includes webcam and microphone blockers, ensuring that unauthorized apps or malware can’t access these devices without permission. With easy-to-use controls and customizable settings, VIPRE Privacy Shield empowers users to take charge of their digital privacy, protecting against identity theft and data exposure risks across all online activities. -
47
GAT Labs
GAT Labs
Control your cloud environment as if it were on your own LAN with GAT’s powerful management and reporting capabilities! View all user files as if they were on a single Drive and all user Emails as if they were on a single server. Remove file shares or emails with the click of a button. Starting with GAT+ (our core tool) which gives you deeper domain understanding from data that’s otherwise overlooked — Enjoy outstanding data analysis covering all aspects of team operations and collaboration. GAT Shield not only ensures a 360° protective shield for your domain, its rich dashboard also displays every Chrome interaction in one place. Admins can also use GAT Shield to monitor almost every aspect of user behaviour while the user is online. -
48
T.One
Vanrise Solutions
T.One Wholesale Suite is a web-based platform whose modules enable encompassing management across all facets of wholesale carriers’ operations. The solution functions as a unified platform that brings cohesion and delivers exceptional results across NOC, technical, billing, routing, account management and top management teams, allowing them to focus on strategic business maneuvers and smart decisions. -
49
Shield Docs
Shield Docs
KPMG Shield Docs helps you achieve an equilibrium between security and freedom, providing a trusted online environment allowing you to share and collaborate on confidential information with confidence. KPMG Shield Docs is an innovative cloud-based solution that combines secure file sharing, collaboration, virtual data room functionality, document management and data protection in a single package. It offers an intuitive and customizable mix of functions to share, edit, store and utilize critical files and data sets with complete end-to-end visibility and efficiency, giving your business peace of mind that sensitive information will remain secure from unauthorized access. This module delivers the core security functionality of the KPMG Shield Docs platform. It includes features such as granular user access control, digital fingerprinting, remote document termination, information rights management and two-factor authentication amongst others.Starting Price: $49.95 per month -
50
BrandShield
BrandShield
BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution. From proactive detection to the removal of online phishing and elimination of their social distribution. Monitor marketplaces and websites to remove counterfeits and increase your revenues and reputation. Protect your brand from TM infringements, counterfeit sales and brand abuse. BrandShield is a brand-oriented digital risk protection company, that specializes in monitoring, detection, and removal of digital threats such as phishing attempts, executive impersonation, counterfeit products, trademark infringements, and more. BrandShield was established to revolutionize the way companies can protect their digital assets outside their security perimeter. Ever since the launch, we have introduced groundbreaking innovative features and services to provide the most automated and relevant solutions for the 21st century, such as Patterns detection, built-in enforcement case management, etc.