Alternatives to Wing Security

Compare Wing Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Wing Security in 2026. Compare features, ratings, user reviews, pricing, and more from Wing Security competitors and alternatives in order to make an informed decision for your business.

  • 1
    FrameworkLTC

    FrameworkLTC

    SoftWriters

    From order intake through delivery, the FrameworkLTC and the SoftWriters suite of fully integrated and scalable solutions automates manual tasks so Long-Term Care (LTC) pharmacies can focus on what matters most: improving patient lives. Expand your business footprint while maximizing margin by replacing manual tasks with powerful automation. Strengthen partner relationships by delivering services designed to meet each facility’s unique needs. Provide concierge-level service by catering to the needs of every unique facility, wing and patient with our facility-centric software. Enable facilities to check their drug prices, print bills, check on order statuses and process returns in accordance to your pre-defined rules. Help your facilities by supplying reports relevant for daily operations and surveys. Don’t touch refill and reorder prescriptions until they hit the production floor by automating order input for refills and reorders.
    Compare vs. Wing Security View Software
    Visit Website
  • 2
    Cynet All-in-One Cybersecurity Platform
    Cynet empowers MSPs and MSSPs with a comprehensive, fully managed cybersecurity platform that consolidates essential security functions into a single, easy-to-use solution. Cynet simplifies cybersecurity management, reduces operational overhead, and lowers costs by eliminating the need for multiple vendors and complex integrations. The platform provides multi-layered breach protection, offering robust security for endpoints, networks, and SaaS/Cloud environments. Cynet’s advanced automation streamlines incident response, ensuring rapid detection, prevention, and resolution of threats. Additionally, the platform is backed by Cynet’s 24/7 Security Operations Center (SOC), where the expert CyOps team delivers around-the-clock monitoring and support to safeguard all client environments. By partnering with Cynet, You can offer your clients advanced, proactive cybersecurity services while optimizing efficiency. Discover how Cynet can transform your security offerings today.
  • 3
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 4
    Apiiro

    Apiiro

    Apiiro

    Complete risk visibility with every change, from design to code to cloud. Industry-first Code Risk Platform™ A 360° view of security & compliance risks across applications, infrastructure, developers’ knowledge & business impact. Data-driven decisions are better decisions. Understand your security & compliance risks with a real-time inventory of apps & infra code behavior, devs knowledge, 3rd-party security alerts & business impact. From design to code to cloud. Security architects don’t have time to review every change & investigate every alert. Make the most of their expertise by analyzing context across developers, code & cloud to identify risky material changes & automatically build an actionable workplan. No one likes manual risk questionnaires, security & compliance reviews - they’re tedious, inaccurate & not synced with the code. When the code is the design, we must do better - trigger contextual & automatic workflows.
  • 5
    OX Security

    OX Security

    OX Security

    Automatically block risks introduced into the pipeline and ensure the integrity of each workload, all from a single location. Full visibility and end to end traceability over your software pipeline security from cloud to code. Manage your findings, orchestrate DevSecOps activities, prevent risks and maintain software pipeline integrity from a single location. Remediate risks based on prioritization and business context. Automatically block vulnerabilities introduced into your pipeline. Immediately identify the “right person” to take action on any security exposure. Avoid known security risks like Log4j and Codecov. Prevent new attack types based on proprietary research and threat intel. Detect anomalies like GitBleed. Ensure the security and integrity of all cloud artifacts. Undertake security gap analysis and identify any blind spots. Auto-discovery and mapping of all applications.
    Starting Price: $25 per month
  • 6
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code assets and proactively identify exposure on public sites. Inventory assets, enforce security policies, and easily demonstrate compliance across all your DevOps tools and infrastructure, both in the cloud and on-premises. Scan IaC for security misconfigurations and ensure compliance between defined IaC configurations and production infrastructure. Scan every commit or pull/merge request for hard-coded secrets and prevent them from reaching the master branch across all SCMs and programming languages.
  • 7
    Traced Security

    Traced Security

    Traced Security

    SaaS platforms are increasingly targeted by cybercriminals, resulting in severe data breaches. Understanding and mitigating these threats is essential for maintaining security. Complex SaaS environments obscure security threats. Achieving full visibility is crucial for identifying and addressing potential vulnerabilities effectively. Inadequate SaaS security can lead to non-compliance with regulations. Ensuring compliance is vital to avoid penalties and maintain trust. Weak data governance in SaaS can result in unauthorized access and data loss. Robust data protection measures are necessary to secure sensitive information. Achieve comprehensive insights, user behavior, data exposure, SaaS risks, and compliance with Cybenta AI. Enhance your SaaS security by prioritizing and addressing vulnerabilities with AI-driven analytics and automated remediation. Streamline the management and governance of apps and identities through automation and orchestration.
  • 8
    Wings 3D

    Wings 3D

    Wings 3D

    Wings 3D is an advanced subdivision modeler that is both powerful and easy to use. Originally inspired by Nendo and Mirai from Izware, Wings 3D has been developed since 2001, when Björn Gustavsson (bjorng) and Dan Gudmundsson (dgud) first started the project. Richard Jones (optigon) maintained Wings and coded many new features between 2006 and 2012. Wings 3D is currently maintained by Dan with the help of the great community. Wings 3D offers a wide range of modeling tools, a customizable interface, support for lights and materials, and a built-in AutoUV mapping facility. Wings 3D is written in Erlang, an open-source, functional programming language distributed by Ericsson. Wings 3D gets its name from the Winged Edge Data Structure (WEDS). This is the data structure used to store the adjacency relationships between edges, faces, and vertices in a Wings 3D model. Wings 3D is open source and completely free for use in both personal and commercial projects.
  • 9
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 10
    WoodWing Studio

    WoodWing Studio

    WoodWing Software

    Creating amazing content in the most efficient way is essential to compete in the online world. Allow your team to go from idea to publication in the fastest possible time, minimizing frustrations and streamlining the whole process from beginning to end. WoodWing Studio (previously known as Enterprise Aurora) benefits an array of organizations and teams. From universities through to media companies, and book publishers to corporate brands; any team involved in content creation will benefit from WoodWing Studio’s smart solutions. With workflow features, automation and team collaboration, WoodWing Studio is driving the future of content creation. Mundane and repetitive tasks are a thing of the past with a sophisticated workflow system that streamlines the content creation process. Increase your efficiency while producing the best quality.
  • 11
    Koi

    Koi

    Koi Security

    Koi is a software supply chain security platform that helps organizations track, govern, and control installations across every endpoint. From browser extensions to IDE plug-ins, CI/CD tools, and AI models, Koi secures the blind spots where attackers often gain entry. Its Wings™ technology goes beyond surface scans by analyzing actual code for secrets, vulnerabilities, and malware while continuously updating risk scores. Koi combines marketplace scanning, publisher reputation intelligence, and dynamic code analysis to deliver real-time visibility and control. With features like automated approvals, preventive policies, and detailed risk reports, teams can block unsafe installs without slowing down adoption of safe tools. By making every install transparent and governable, Koi ensures enterprises can safely harness the full power of their software ecosystem.
  • 12
    Wings Books

    Wings Books

    Wingsinfo

    GST-compliant accounting management software that helps small to medium businesses with bookkeeping, purchasing, budgeting and more. Enterprise-grade Tools and Utilities for great control. Improve efficiencies and productivity. Minimize leakages and pilferages. Drive your business hands-free. Wings Books is the most complete, fully GST-ready, accounting and inventory software for small and medium businesses today. Extremely easy to learn and use, Wings Books takes care of every requirement for accounting and inventory management. The complete functionality is packed with great features and utilities to make accounting easy for you. Wings features complete financial accounting. It captures all finance transactions and generates all the books and records you need. In addition, it takes care of Post-Dated Cheques and Bank Reconciliation. Wings generates all reports, analyzes and books you will need from your accounts.
  • 13
    Wing

    Wing

    Wing Assistant

    Wing is more than your average virtual assistant service. We offer unparalleled benefits to our customers. With Workflows, you can create incredibly complex tasks by simply dragging & dropping. Set them to run as often as you want, or ask Wing to run them ad-hoc. Your assistants are based all over the world - they are college-educated, speak English, and undergo a rigorous 3 month training & testing program. They are also supervised by talented operations managers. Our assistants are compensated at higher-than-market salaries, and further incentivized by your happiness! Wing is primarily located in San Francisco, though has a global presence with employees across the world. We strive to hire the best people, and are not confined by borders.
    Starting Price: $599 per month
  • 14
    Wing Python IDE
    Wing Python IDE was designed from the ground up for Python, to bring you a more productive development experience. Type less and let Wing worry about the details. Get immediate feedback by writing your Python code interactively in the live runtime. Easily navigate code and documentation. Avoid common errors and find problems early with assistance from Wing's deep Python code analysis. Keep code clean with smart refactoring and code quality inspection. Debug any Python code. Inspect debug data and try out bug fixes interactively without restarting your app. Work locally or on a remote host, VM, or container. Wingware's 21 years of Python IDE experience bring you a more Pythonic development environment. Wing was designed from the ground up for Python, written in Python, and is extensible with Python. So you can be more productive.
  • 15
    SalesWings

    SalesWings

    SalesWings

    SalesWings is a powerful buyer intelligence and sales enablement platform designed to help marketing, sales, and agentic teams deeply understand customer intent. It captures behavioral data and converts it into actionable insights that identify the hottest leads and most promising accounts. By integrating seamlessly with tools like Salesforce, Braze, Segment, and Slack, SalesWings delivers real-time scoring and engagement alerts directly where teams work. Its AI-driven Sales Copilot empowers sales reps with personalized next-best actions to close deals faster. Marketing teams benefit from intent data that aligns campaigns with genuine buyer interests, ensuring every message resonates. With SalesWings, teams move beyond guesswork and operate with a shared understanding of how to win buyer trust.
  • 16
    AssetLink

    AssetLink

    Chain AMS

    AssetLink is cloud-based solution for managing surplus assets across global manufacturing organizations, it provides a scalable and adaptable process that typically encompasses three key stages: + Capture & Value + Redeploy Internally + Remarketing Externally (Sell Securely) With in-built notifications, redeployment and wing-to-wing disposition project support, AssetLink enables a transparent process, simplifying the merchandising, specification and compliance of high-tech / unique asset dispositions AssetLink is used by a number of Fortune 500 organizations to embody and enable a consistent and transparent surplus asset management program, support by Chain AMS' portfolio of services including proven processes and expert people.
  • 17
    Adaptive Shield

    Adaptive Shield

    Adaptive Shield

    Adaptive Shield is the SaaS Security Posture Management (SSPM) platform of choice to regain control over the company’s SaaS stack security. Adaptive Shield equips CISOs and IT security teams with a solution that integrates with all the business-critical SaaS apps, interprets every security setting misconfiguration, and gives full visibility and control in a single pane of glass. The core of the solution is the detailed and granular security checks being continuously performed across the SaaS stack. As a SaaS app that integrates with any SaaS app, Adaptive Shield can be live within minutes, delivering clear visibility into the whole SaaS ecosystem with a posture score per app. Continuously monitor and remediate SaaS misconfigurations automatically. While the native security controls of SaaS apps are often robust, it falls on the responsibility of the organization to ensure that all configurations are properly set, from global settings to every user role and privilege.
  • 18
    Wing FTP Server
    Wing FTP Server is an easy-to-use, powerful, and free FTP server software for Windows, Linux, Mac OS, and Solaris. It supports multiple file transfer protocols, including FTP, FTPS, HTTP, HTTPS, and SFTP, giving your clients flexibility in how they connect to the server. And it provides admins with a web-based interface to administrate the server from anywhere. You can also monitor server performance and online sessions and even receive email notifications about various events taking place on the server. Just with a web browser, you can administrate the server anytime, anywhere. Use the event manager to execute Lua script, send an email notification or run 3rd party program. Wing FTP can be clustered by Wing Gateway to deploy a simple load balancing solution. All the FTP transactions will be captured into a database, you can analyze it and generate reports in real-time. Allows you to map virtual directories to physical directories.
    Starting Price: $199 one time payment
  • 19
    Obsidian Security

    Obsidian Security

    Obsidian Security

    Protect your SaaS applications against breaches, threats, and data exposure. Start in minutes and secure Workday, Salesforce, Office 365, G Suite, GitHub, Zoom and other critical SaaS applications with data-driven insights, monitoring, and remediation. Companies are moving their critical business systems to SaaS. Security teams lack the unified visibility they need to detect and respond to threats quickly. They are not able to answer basic questions: Who can access SaaS apps? Who are the privileged users? Which accounts are compromised? Who is sharing files externally? Are applications configured according to best practices? It is time to level up security for SaaS. Obsidian delivers a simple yet powerful security solution for SaaS applications built around unified visibility, continuous monitoring, and security analytics. With Obsidian, security teams are able to protect against breaches, detect threats, and respond to incidents in their SaaS applications.
  • 20
    Waxwing

    Waxwing

    WaxWing AI

    WaxWing is ideal for product marketing and growth teams, managers, growth hackers, heads and c-level executives for intelligent AI-assisted lifecycle management of growth campaigns and initiatives. WaxWing scans your website, digital platforms, and connected MarTech stack from our partners to gather, analyze and report comprehensive business intelligence about our business. Streamline projects and foster teamwork with intuitive management tools, ensuring seamless execution and collaboration. Empower your content with AI, leveraging a vast prompt library and tailored recommendations for dynamic marketing messages. Gain an edge with real-time insights and AI-powered business profiling, turning data into your most valuable asset.
    Starting Price: $19 per month
  • 21
    Xygeni

    Xygeni

    Xygeni Security

    Xygeni All-In-One AppSec Platform protects software from code to cloud with a unified solution built for Application Security Posture Management (ASPM). It gives CISOs, CIOs, and DevSecOps teams full visibility and control across the software supply chain, without slowing delivery. Xygeni secures every SDLC stage, code, dependencies, secrets, builds, IaC, containers, and CI/CD systems, detecting vulnerabilities, misconfigurations, and malware in real time. Powered by advanced AI, Xygeni prioritizes exploitable risks, cuts 90% of alert noise, and drives automated remediation through AI SAST, Auto-Fix, and Xygeni Bot. Developers scan and fix issues directly in their IDE, keeping code secure from the start. Early Malware Warning blocks zero-day supply-chain threats at publication, while smart dependency analysis prevents breaking updates. Seamless integration with GitHub, GitLab, Bitbucket, Jenkins, and Azure DevOps ensures a frictionless experience.
  • 22
    TracingFlight
    Store all your documents for your fixed-wing aircraft and helicopters. Our digital safe guarantees the highest level of security and provides aircraft owners and operating partners with a secure access to consult their documents. Automated OCR processing of your technical documents. A forecasting tool to manage/track/optimise your maintenance operations. Whether for any type of fixed-wing aircraft, helicopters or workshops, you will be able to manage all your tasks, optimise your current resources and decrease ground time. From the time of writing your maintenance programmes to the moment the work is under way, TracingNav© will make tracking your airworthiness management easy. With its numerous indicators, you will increase your aircraft fleet availability. TracingFlight© won the award for best customer experience and service quality. This certification is part of a global strategy to offer digital services.
  • 23
    Exabeam

    Exabeam

    Exabeam

    Exabeam helps security teams outsmart the odds by adding intelligence to their existing security tools – including SIEMs, XDRs, cloud data lakes, and hundreds of other business and security products. Out-of-the-box use case coverage repeatedly delivers successful outcomes. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find. New-Scale Fusion combines New-Scale SIEM and New-Scale Analytics to form the cloud-native New-Scale Security Operations Platform. Fusion applies AI and automation to security operations workflows to deliver the industry’s premier platform for threat detection, investigation and response (TDIR).
  • 24
    WingRiders

    WingRiders

    WingRiders

    WingRiders self-servicing automated smart contract launchpad offers users a chance to participate in new projects by supporting their Cardano Native Tokens in the early stages to develop their projects and enter the market. WingRiders Launchpad is: Non-custodial: No one else has access or control over your and project tokens in any phase of a Launch. Smart-contract-based fully automated: Powered by seven Plutarch Smart Contracts and six minting policies on Cardano. Decentralized: The participating projects set their parameters and launch for the community to support. The overall flow of the steps of the launchpad is decentralized. Permissionless: Any project can Launch its token in this decentralized permissionless fashion (fully open UI for launchpad creation will be enabled after initial launches are successful). Secure: You will be able to participate with all 11 supported wallets, the WalletConnect, and of course the most secure path via two hardware wallets.
  • 25
    WoodWing Assets

    WoodWing Assets

    WoodWing Software

    WoodWing Assets (previously called Elvis DAM) is a flexible and scalable digital asset management system, helping publishers, creative agencies, and marketing departments to reach their goals for quality, cost-efficiency, and faster time-to-market. It supports business and operational processes in storing, organizing, accessing, sharing, and managing rights and permissions of rich-media assets. Offers a best-in-class Adobe InDesign integration. Available as a cloud and on-premise solution.
  • 26
    Quora

    Quora

    Quora

    Quora’s mission is to share and grow the world’s knowledge. A vast amount of the knowledge that would be valuable to many people is currently only available to a few — either locked in people’s heads, or only accessible to select groups. We want to connect the people who have knowledge to the people who need it, to bring together people with different perspectives so they can understand each other better, and to empower everyone to share their knowledge for the benefit of the rest of the world. The heart of Quora is questions — questions that affect the world, questions that explain recent world events, questions that guide important life decisions, and questions that provide insights into why other people think differently. Quora is a place where you can ask questions you care about and get answers that are amazing. Quora has only one version of each question. It doesn’t have a left wing version, a right wing version, a western version, and an eastern version.
  • 27
    SalonWings

    SalonWings

    SalonWings

    SalonWings is the most powerful hair and beauty salon software available in India. All-in-one software that is simple to use and includes appointment booking, billing, SMS, inventory management, employee commission and enquiry for beauty salons, barbershops, hair salons, luxury salons, nail salons, and beauty parlors.
  • 28
    IntelleWings

    IntelleWings

    IntelleWings

    IntelleWings is a fully featured AML/CFT suite that allows for Customer Risk Profiling, Customer Screening, Transaction Screening and Transaction monitoring. The USP of the product is a proprietary PEP and Adverse Media database, developed using Deep Tech. The database is highly expandable and checks patterns on Money Laundering, Terrorism, Smuggling, Drug Trafficking, Fraud and other user defined patterns. The suite is also built to scans transactions of banks, life insurance, General Insurance, E-Commerce on patterns of transaction laundering. An AI based anomaly detector goes beyond fixed ruled conditions to predict outliers. IntelleWings’ eye, a data visualization module, provides a simplified but powerful view to show all relationship of transactions with related customers/entities and third parties to help in speeding up the decision making. Along with all the features, our users like our solution for its flexibility, ease of use and automation of routine tasks.
    Starting Price: $75 per license
  • 29
    VABS

    VABS

    AnalySwift

    VABS is a popular general-purpose cross-sectional analysis tool for quickly and easily computing beam properties and recovering 3D fields of composite beams, including helicopter and wind turbine blades. It is the only tool capable of rigorously decoupling an original 3D slender solid with complex microstructure into a simple engineering beam model. AnalySwift’s roots are in the aerospace industry, where its tools have been used for composite beams (helicopter rotor blades, propellers, high aspect ratio wings, wing section design), plates/shells, and 3D structures. Used for several years in the wind turbine industry, VABS delivers rapid, rigorous results when modeling wind turbine blades. SwiftComp provides additional solutions for plates/shells, and 3D structures manufactured from composites. As the automobile industry adopts a higher use of composites, opportunities increase to leverage SwiftComp and VABS to model a wide variety of structures, including beams, plates, shells, etc.
  • 30
    Securonix UEBA
    Today, many attacks are specifically built to evade traditional signature-based defenses, such as file hash matching and malicious domain lists. They use low and slow tactics, such as dormant or time triggered malware, to infiltrate their targets. The market is flooded with security products that claim to use advanced analytics or machine learning for better detection and response. The truth is that all analytics are not created equal. Securonix UEBA leverages sophisticated machine learning and behavior analytics to analyze and correlate interactions between users, systems, applications, IP addresses, and data. Light, nimble, and quick to deploy, Securonix UEBA detects advanced insider threats, cyber threats, fraud, cloud data compromise, and non-compliance. Built-in automated response playbooks and customizable case management workflows allow your security team to respond to threats quickly, accurately, and efficiently.
  • 31
    Saasment

    Saasment

    Saasment

    Saasment solves security risks to prevent human error across your digital assets. We automate security programs to make sure your company information is protected. Fraud prevention, full coverage against emerging threats targeting online stores like Shopify and Wix. Automated cloud CISO, letting you focus on growing your business securely and win big logos. Identify your risks to understand what are the security vectors you exposed across cloud and saas applications. Build a security strategy that fits the business needs based on the risk we found in your environment. Implement the strategy and solutions, getting your business to best-in-class security with our saas security platform. Continuously monitor and ensure your business is free of vulnerabilities and risks. We help organizations to detect and prevent misconfigurations across 40+ applications and maintain continuous compliance tracking.
    Starting Price: $89 per month
  • 32
    Jolt

    Jolt

    Jolt

    Jolt is an operations execution software available on smartphones and tablets that helps restaurants, retail, hospitality, and other businesses achieve team accountability, digital food safety compliance, and boost employee performance. Jolt is used by companies like Smoothie King, Jimmy John’s, Buffalo Wild Wings, Legoland, Marriott, Chevron, Cinemark, and thousands of other global brands.
  • 33
    Wing

    Wing

    Wing

    The first logistics service dedicated to e-retailers and fast-growing DNVBs. Wing seamlessly integrates all major eCommerce platforms and marketplaces. Our implementation team sets you up for success with everything from configuring your shipping options, to syncing your online store. Request a collection, manage your stock, ship your orders, track your parcels, manage your returns, contact customer service, and consult your invoices... The first logistics platform designed and thought for growing e-merchants to optimize your time and develop your business. Whether it's from their stores or from one of our fulfillment center, our mission is to provide our customers with the best logistics services, so they can focus more on what matter to them, growing their sales and delivering a remarkable customer experience. In 5 years, Wing has grown from a tiny apartment in Paris to hundreds of square meters of warehouses across France and more than 2 million parcels shipped.
  • 34
    Honeycommb

    Honeycommb

    Honeycommb

    Connect your people. Launch a beautiful social network you own and control in no time and no code. Yes, "For real." Used by Lady Gaga, University of Michigan, Red Wing Shoes, and hundreds more. From storage and security to the more than 20 unique services we use to run your feature-rich community, we handle every last "byte." Native iOS, Android, and web applications, beautifully designed & built, continuously improved & maintained 24/7/365.
    Starting Price: $300 per month
  • 35
    inDefend

    inDefend

    Data Resolve Technologies Private Limited

    inDefend helps you monitor every employee of the organization, regardless of the organizational size. Gain industry compliance suiting your company's needs and protect the company's data from being compromised. Better control over employee's on notice period and complete transparency over their activities. Generate full-fidelity profiles of all the employees and track their productivity and behavior on digital assets. Worry less about the productivity of remote employees, roaming workforce or employees working from home. Manage access permissions for huge groups of scattered employees with a cleverly orchestrated policy through our unique data flow analysis. Maintain screenshots of specific employee crimes who are responsible for damaging the company's reputation.
  • 36
    Veriato Workforce Behavior Analytics
    Monitor productivity, run investigations, and protect against insider risk with one platform. Our powerful workforce behavior analytics allow you to regain visibility into your remote or hybrid employee activity. Veriato workforce behavior analytics go beyond passive monitoring to proactively analyze productivity, monitor for insider risk and much more. Powerful, easy-to-use tools to keep your remote, hybrid and office teams productive. Veriato’s AI-powered algorithm analyzes user behavior patterns and automatically alerts you to any abnormal or suspicious activity. Assign productivity scores to websites, programs, and applications. Select between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered. Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.
    Starting Price: $25 per user per month
  • 37
    AppOmni

    AppOmni

    AppOmni

    To properly secure and manage the use of critical SaaS applications Security, Compliance, and IT teams need a comprehensive solution that enables immediate visibility, proactive posture monitoring, normalized event streams, and effective compliance tooling. AppOmni is the only SaaS Security Posture Management solution that gives teams all the tools they need to be successful – from posture management to monitoring and detection to continuous compliance. Instant detection of misconfigurations that weaken the security posture of your most critical SaaS applications. Total visibility into your SaaS environments, normalized and delivered to your existing security tooling. Spreadsheets? Manual access reviews? No thanks. Rest easy knowing you meet your compliance requirements. Each SaaS application has hundreds of settings, thousands of API calls, and a data access model that is completely custom to that application.
  • 38
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • 39
    FortiInsight
    30 percent of data breaches involve organization insiders acting negligently or maliciously. Insiders pose a unique threat to organizations because they have access to proprietary systems and often are able to bypass security measures, creating a security blind spot to the risk and security teams. Fortinet’s User and Entity Behavior Analytics (UEBA) technology protects organizations from insider threats by continuously monitoring users and endpoints with automated detection and response capabilities. Leveraging machine learning and advanced analytics, FortiInsight automatically identifies non-compliant, suspicious, or anomalous behavior and rapidly alerts any compromised user accounts. This proactive approach to threat detection delivers an additional layer of protection and visibility, whether users are on or off the corporate network.
  • 40
    WINGS

    WINGS

    Crocodile Solutions

    Wings Legal Disability Case Management software in the cloud is a nationally recognized secure cloud-based software that is a platform for law firms of all sizes to store, manage and protect their clients’ disability case files and offers unparalleled automation for the practice of law, especially in the areas of social security disability, veterans law, workers' compensation and personal injury. Crocodile Solutions was founded by a law firm practice manager with a decade of experience. In an effort to help his firm grow without adding administrative staffing and expense, he designed one of the first legal practice management software offerings ever developed. Thirty years later, he has developed multiple software products, now combined into one robust platform, and evolved to serve attorneys and firms of all sizes across the country. Process tracking to keep things moving without missing deadlines.
    Starting Price: $65 per month
  • 41
    Hivemind

    Hivemind

    Shield AI

    We’re building Hivemind, our AI pilot, to enable swarms of drones and aircraft to operate autonomously without GPS, communications, or a pilot. Our mission is to protect service members and civilians with intelligent systems. More than just preset behaviors & waypoints. Like a human pilot, Hivemind reads and reacts to the battlefield, and does not require GPS, waypoints, or prior knowledge to make decisions. It is the first and only fully autonomous AI pilot deployed in combat since 2018. From indoor building clearance with quadcopters to integrated air defense breach with fixed-wing drones, and F-16 dogfights, Hivemind™ learns and autonomously executes missions. A new generation of aircraft flown by Hivemind to provide persistent aerial dominance across sea, air, and land, on the tactical edge.
  • 42
    INTRACK

    INTRACK

    Inen Solutions

    The Global Positioning System (GPS) is a global navigation satellite system (GNSS) developed by the United States Department of Defense and managed by the United States Air Force 50th Space Wing. It is the only fully functional GNSS in the world, can be used freely by anyone, anywhere, and is often used by civilians for navigation purposes. It uses a constellation of between 24 and 32 medium Earth orbit satellites that transmit precise radiowave signals, which allow GPS receivers to determine their current location, the time, and their velocity. Its official name is NAVSTAR GPS. Since it became fully operational on April 27, 1995, GPS has become a widely used aid to navigation worldwide, and a useful tool for map-making, land surveying, commerce, scientific uses, tracking and surveillance, and hobbies such as geocaching.
    Starting Price: $15 per month
  • 43
    FlightPro

    FlightPro

    Ocean Software

    FlightPRO® makes it easier to plan, schedule, execute, communicate, monitor, report and analyse your flight training and operations. Customise FlightPRO® to suit your unique operating environment, connect with other Ocean products and other on-base systems. Read more about our range of modules and services below. With 25 years’ experience serving air forces globally, FlightPRO® proven solution with an exciting future. Pre and post flight administrations tasks including authorisations, logbooks, and workflow management. Command, wing, and unit level administration, controlled by role type and security. Our development team utilise the OWASP Software Assurance Maturity Model and the OWASP Zed attack proxy tool for continuous security testing throughout development.
  • 44
    Hermez

    Hermez

    Hermez

    Hermez is an open-source ZK-Rollup optimized for secure, low-cost and usable token transfers on the wings of Ethereum. Hermez seamlessly integrates into the fabric of the Ethereum ecosystem and enables low-cost token transfers for an inclusive economy. Cost-efficient token transfers and swaps with high throughput. Decentralized and open-source architecture. Computational integrity for secure transactions. By using zero-knowledge technology, transfer costs are significantly reduced, allowing more accessible financial services for mainstream adoption. Computational integrity and on-chain data availability are guaranteed by zero-knowledge-proof technology while preserving the public blockchain properties of Ethereum. Hermez's mission is to create an inclusive, resilient and highly efficient payment network for the next generation of digital currencies to ensure everyone has the freedom to transact.
  • 45
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 46
    ProxyWing

    ProxyWing

    ProxyWing

    ProxyWing is a private proxy network for teams and solo users who need stable connectivity and clean IP reputation. Choose Residential (pay-as-you-go traffic with country targeting), ISP Static (dedicated ISP IPs for long sessions), or Datacenter (high-speed HTTP/SOCKS5 for automation and data collection). Features: simple dashboard, user/password authentication, easy integration with browsers, scrapers and API clients, and 24/7 support. Common use cases include web scraping, price monitoring, QA/testing, ad verification, SEO, and security research. Global coverage: 190+ locations. Flexible plans starting from $2.5/GB (Residential), $1.8/IP (ISP) and $0.87/IP (Datacenter).
  • 47
    WoodWing Cloud
    Some of the world’s largest publishers, agencies and brands use our Digital Asset Management and Multichannel Publishing software to reduce complexity, increase productivity, and cut costs and time-to-market. Our WoodWing Cloud platform makes these solutions more convenient, scalable and affordable than ever. Let us look after hosting, system maintenance, backup and recovery, so you can focus on delivering your best work. • Scalable solution that will adapt to your business needs. • Easy and remote access, regardless users' operating system. • Automated backups and data recovery – all taken care of for you. • Flexible to adapt or integrate with, for a seamless experience.
  • 48
    Vexcel

    Vexcel

    Vexcel

    Vexcel’s data platform offers high-accuracy aerial imagery, 3D models, elevation data, and AI-derived insights designed for use in 40+ countries; it delivers oblique imagery at ~7.5 cm resolution, orthomosaic imagery for both urban and wide-area coverage, digital surface and terrain models (DSM/DTM), multispectral imagery for vegetation and land-use analysis, and a photorealistic “3D Cities” mesh product, all accessible via APIs, image services for platforms such as ArcGIS, a viewer, and SDKs. It uses a dedicated fleet of fixed-wing aircraft equipped with advanced sensors and aligns every collection with ground control for mapping-grade accuracy. Its Elements AI product further processes imagery to extract more than 80 attributes for buildings, properties, and roadways. Vexcel’s imagery and data feed workflows across industries such as government (transportation, urban planning, public safety), telecom, utilities, insurance, energy, AEC, and smart-cities initiatives.
  • 49
    OpenText Core Behavioral Signals
    OpenText™ Core Behavioral Signals is an advanced threat detection solution that leverages user entity behavior analytics (UEBA) and 100% online, unsupervised machine learning to identify behavioral anomalies within an organization. It enables security teams to detect insider risks, novel attacks, and advanced persistent threats without relying on predefined rules or manual updates. The platform continuously adapts to evolving organizational behaviors, improving threat hunter effectiveness and reducing false positives. Analysts can transform billions of events into a manageable number of actionable threat leads, enhancing efficiency. It also features dynamic dashboards and detailed anomaly timelines to provide clear insights into risk over time. Integration with existing security systems and APIs supports streamlined threat hunting and response.
  • 50
    RevealSecurity

    RevealSecurity

    RevealSecurity

    Reveal Security ITDR detects identity threats in and across SaaS applications and cloud services – post authentication. The solution uses a patented unsupervised machine learning algorithm to continuously monitor and validate the behavior of human and machine identities to quickly and accurately alert on suspicious activity. Organizations can protect against account takeover attacks, insider threats, and third party/supply chain risk, after the point of login, without the need for creating rules which are noisy, expensive and also require you to know what you are looking for.