Alternatives to acre Intrusion

Compare acre Intrusion alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to acre Intrusion in 2026. Compare features, ratings, user reviews, pricing, and more from acre Intrusion competitors and alternatives in order to make an informed decision for your business.

  • 1
    ZeroEyes

    ZeroEyes

    ZeroEyes

    ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond.
  • 2
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 3
    EcoStruxure Security Expert
    Protect your building occupants and assets with EcoStruxure Security Expert. An integrated, role-based physical access control and intrusion detection solution that unifies your building’s security infrastructure and building management systems. With the need to protect more people and data it is easy to understand why physical access control plays a vital role in the overall security of a building. EcoStruxure Security Expert integrates role-based physical access control and intrusion detection to unify the building security infrastructure and building management systems into an easy to manage, single platform that enables faster, more efficient, and potentially life-saving decision making. Unifies access control and building management solutions reducing complexity and the time spent managing multiple systems. Turns large quantities of information into secure, customizable analysis. Backward compatibility ensures the latest offer will support prior version features and integrations.
  • 4
    Trinity Cyber

    Trinity Cyber

    Trinity Cyber

    Cyber risk is increasing and today's attacks, whether ransomware or malware, are more sophisticated and succeed with alarming success. These attacks often go undetected with traditional Intrusion Prevention Systems (IPS), Secure Web Gateways (SWG) and other security products. For the threats these products do detect, false positives and significant incident response workloads strain Security Operations Center (SOC) resources. In addition, many cyber attacks begin with a compromised or corrupted file. Considering the tremendous number of files with which an organization interacts in a given day, it is an enormous challenge to protect the organization from these kinds of threats. Tremendous speed and accuracy are mandatory for any potential solution so as not to disrupt or hinder organizational operations and performance. Running suspicious files through sandboxing is too expensive and too slow to address these types of threats at speed and scale.
  • 5
    HiveWatch

    HiveWatch

    HiveWatch

    HiveWatch is an AI-driven physical security platform that unifies disparate security systems, such as access control, video surveillance, and guard operations, into a single, cloud-based command center that transforms security from reactive to strategic. It features a rules engine for customizing incoming alarms by criteria like time, location, or repeatability, and embedded standard operating procedures to guide operator response. HiveWatch reduces false alarms through machine learning, escalates genuine threats to human supervisors via its AI Operator module, and automates tailgating detection. It also supports multi-site orchestration, device health monitoring, case management of incidents, and performance metrics (e.g., time to resolve, incident counts) for executive reporting. Field teams receive real-time incident data and site snapshots, can initiate manual incidents with photographic data, execute guard tours, and maintain coordination.
  • 6
    Innovative Security Manager

    Innovative Security Manager

    Innovative Business Software

    Innovative Security Manager™ (ISM) is a comprehensive platform that includes everything you need in one complete solution, providing a complete overview of your resources. Improve your security performance and achieve a much more cost-effective organization. Receive and handle any kind of alarm, such as fire alarms, burglar alarms, intrusion alarms, elevator alarms etc. in one single platform. With Innovative Security Manager™, you can receive alarms through a wide range of interfaces such as IP, SMS, ADSL, PSTN and GPRS. Create, schedule and assign tasks to personnel via Android™ app – either manually or automatically. Assign tasks based on various parameters, such as current work shift, time since last task, physical distance to task and time left on work shift.
  • 7
    Honeywell WIN-PAK
    Honeywell’s WIN-PAK 4.8 software solution provides a cost-effective way to integrate and manage access control, video surveillance, and intrusion detection through a single interface. Building upon WIN-PAK’s legendary and robust workstation-based management system, WIN-PAK 4.8 provides an intuitive browser-based interface allowing users to perform everyday access control actions from virtually anywhere. WIN-PAK 4.8 can be easily scaled from a single site to a multi-region, enterprise-level solution without restrictions on the number of users or sites being managed. WIN-PAK 4.8 supports third-party integrations such as HID's Mobile Access®, BioConnect® Suprema®, Morpho biometrics, point-of-sale systems, visitor management, and HR applications. Using the included WIN-PAK API, your software developers can create custom integrations to meet your integration needs. Integrated access, video, intrusion, and fire systems through one interface.
  • 8
    WZSysGuard

    WZSysGuard

    WZIS Software Pty Ltd

    It's for Linux/AIX/Solaris/MacOS/FreeBSD, has the more reliable FIM function, and more effective Intrusion Detection, plus commands execution protection against software-based key-stealing attacks. WZSysGuard is a robust UNIX/Linux intrusion detection and file integrity verification software that offers advanced protection for your system. Unlike other tools, it reduces false alarms and ensures complete coverage of security-sensitive files. WZSysGuard uses a SHA 384-bit checksum algorithm to detect file changes, even those made through non-filesystem interfaces, such as during maintenance when the system is booted from a DVD or network. It not only detects critical file changes but also identifies new filesystem mounts, network services, and kernel module loads. With a web-based security trap detection interface, WZSysGuard provides a comprehensive security solution that works with minimal overhead and maximum accuracy.
  • 9
    PureActiv

    PureActiv

    PureTech Systems

    Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. ​ Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors.
  • 10
    IntrusionTrace
    The Xtralis IntrusionTrace application, by Honeywell, provides high-performance intrusion detection using video analytics specifically designed for 24/365 outdoor operation. Optimized using footage from thousands of hours of video covering a range of environmental, seasonal and time-of-day variations, the analytics achieve low false alarm rates while maintaining high detection probability and reliability. With simple “region of interest” configuration for the majority of scenes, it can be adapted to a wide range of applications. Whether monitoring a yard, providing remote access control to a site, or creating a virtual fence around a supply depot, IntrusionTrace delivers performance where it is needed. IntrusionTrace is now available for server platforms and edge devices. Supporting up to 32 channels on ADPRO® devices and up to 8 channels on HeiTel devices, IntrusionTrace complements the powerful recording, transmission, alarm handling and flexible licensing capabilities.
  • 11
    VIEWSCAPE Core

    VIEWSCAPE Core

    Veracity Solutions

    The fully integrated command and control platform. For users of complex security and BMS environments with multiple integration needs. VIEWSCAPE Core is a sophisticated open-architecture platform upon which bespoke PSIM (Physical Security Information Management) and integrated CCTV systems are created. Developed by Visual Management Systems Limited a UK-based specialist provider of complete, bespoke PSIM and integrated CCTV systems. The VIEWSCAPE Core platform has been deployed in many environments including retail, military and defense, border security, police, cell complexes, prisons, transport, ports, airports, energy, oil & gas, nuclear, utilities, national grid, urban centers, museums and galleries, universities and colleges and hospitals over the past ten years. VIEWSCAPE Core integrates multiple disparate security systems including video surveillance, access control, perimeter intrusion detection, fire and safety, public address, and building management.
  • 12
    Orbit Intrusion Detection System

    Orbit Intrusion Detection System

    Professional Computer Solutions

    Orbit™ Intrusion Detection is a hardened Intrusion Detection System that will assist you in seeing what traffic is going on inside or outside your network. It was developed in response to the lack of visibility into what is happening on our client’s networks. Without this visibility, security threats can persist on the network for months or longer and potentially leading to costly downtime and recovery. Traditional IDS systems are extremely expensive, requiring dedicated personnel to monitor, maintain and respond to the system. By utilizing commodity hardware and open source software, we provide a system that is able to work as a “smoke detector” on the network at a cost that does not require the “all-in” commitment of a full-fledged IDS system. Our offering fills the gap and makes this technology accessible by small to midsize businesses.
  • 13
    Telesoft CERNE
    With the rise in the global datasphere only set to accelerate with the advances in IoT and 5G technology, the cyber threat landscape will also continue to grow. Our intrusion detection system, the CERNE, helps protect, secure and guard our customers from attack. The CERNE provides real-time monitoring and historical intrusion detection capabilities helping security analysts detect intrusions, identify suspicious activity and monitor network security by storing IDS alert traffic while reducing unnecessary storage. The Telesoft CERNE combines a high rate 100Gbps IDS engine with an automated record of relevant network traffic for real-time and historical threat investigation and digital forensics. CERNE continuously scans and captures network packets and only stores traffic associated with an IDS alert, discarding all other traffic, giving an analyst rapid access to critical packets up to 2.4 seconds before an event.
  • 14
    Hakimo

    Hakimo

    Hakimo

    Our remote guarding solution uses AI to monitor surveillance cameras and enables communication through speakers to deter unwanted visitors, providing more effective, lower-cost security than an on-site guard. Unauthorized access is a problem for every enterprise, but it can be tough to cut through the noise. Hakimo clears time-consuming nuisance alarms so that your team can focus on real threats that need action, including tailgating through doors and vehicle gates. Malfunctioning cameras and door hardware could potentially lead to a missed incident. Our software continuously monitors the health of your system hardware to identify any issues so they can be quickly resolved. When time and resources are limited, standing up for your own security operation doesn’t make a lot of sense. Regardless, security should be as effective and efficient as possible. This is where artificial intelligence-powered remote guarding comes in. You've got a business to run, so leave security to the experts.
  • 15
    SeeTrue Autonomous AI Detection
    Automatic Threat Detection with Artificial Intelligence. SeeTrue revolutionizes the current security screening process, addressing the challenges of passenger throughputs, experience, security, and cost with a new Artificial Intelligence approach. SeeTrue’s Autonomous AI™ Detection, provides automatic threat detection and alarm resolution for X-ray and CT systems. This novel approach operates beyond human sight – enabling passengers to leave items in bags, reduce manual procedure and increase throughput while maximizing safety to provide a seamless passenger experience. Why Us? High Accuracy: Despite their best efforts and training, human agents have limitations. SeeTrue’s autonomous screening technology detects threats and contraband beyond current capabilities, regardless of the angle, size and occlusions - providing accurate recognition for proactive agent alerts. Greater Operational Efficiency: SeeTrue minimizes labor costs while maximizing safety.
  • 16
    Alarm Center

    Alarm Center

    Security Information Systems

    Alarm Center by Security Information Systems, is advanced alarm monitoring and integration software designed for the security industry that provides central alarm and data management with modular options for single user, peer-to-peer, enterprise, and global enterprise system configurations. It serves as a central point for processing alarm signals, unifying disparate physical and digital security systems, sensors, and legacy technologies into one software platform. It supports integration with more than 85 types of receivers through its Universal Data Integration System (UDIS), which standardizes data into a uniform XML output to streamline monitoring, dispatching, and response management, improving operational efficiency and reducing response times. Alarm Center’s scalable architecture accommodates growth and varied deployment sizes while offering ease of use and intuitive interfaces across modules.
  • 17
    CredoID

    CredoID

    Midpoint Security

    CredoID: the open platform access control software. Midpoint Security develops integrated solutions for access control and security projects. CredoID access control software is the cornerstone of these solutions. The core of every solution is our access control software CredoID, which is easily expandable by additional modules for time & attendance, video surveillance, burglar alarm, vehicle and elevator control, ID card design & printing, maps and scripts. CredoID provides an easy way to install security systems of any size. Our open platform solution supports full range of HID EVO Edge, VertX Evo & Aero and Mercury LP EP Series controllers and extension modules, wireless Aperio locks. CredoID also supports integration with DigiFort VMS, alarm panels from ASB security and DigiFort LPR. CredoID software integrates the functions of access control, alarm monitoring and time & attendance in one package.
  • 18
    Protegus

    Protegus

    TRIKDIS

    With PROTEGUS you will always know what is happening at your home or office with real-time notifications and remote control. PROTEGUS platform offers you an easy way to control any existing or new alarm system from a smartphone or using WEB. Get control of your alarm system! Save money and time, no need to change the existing alarm system, only upgrade it. Monitor your security system. Arm or disarm the system remotely. Be informed about each event with push notifications. Take action if an alarm occurs. Control automation devices remotely (open gates, turn on/off heating and etc.) TRIKDIS communicators that work with PROTEGUS app are compatible with any alarm panel. Communicators are directly compatible with Paradox, DSC, Interlogix (Caddx), and Texecom panels by connecting to the panel's serial or data port. They work with any other alarm panel by connecting to alarm control panels landline communicator (TIP RING contacts).
  • 19
    Falco

    Falco

    Sysdig

    Falco is the open source standard for runtime security for hosts, containers, Kubernetes and the cloud. Get real-time visibility into unexpected behaviors, config changes, intrusions, and data theft. Secure containerized applications, no matter what scale, using the power of eBPF. Protect your applications in real time wherever they run, whether bare metal or VMs. Falco is Kubernetes-compatible, helping you instantly detect suspicious activity across the control plane. Detect intrusions in real time across your cloud, from AWS, GCP or Azure, to Okta, Github and beyond. Falco detects threats across containers, Kubernetes, hosts and cloud services. Falco provides streaming detection of unexpected behavior, configuration changes, and attacks. A multi-vendor and broadly supported standard that you can rely on.
  • 20
    Proximex Surveillint
    Proximex Surveillint is a power Physical Security Information Management (PSIM) solution providing integration to video, access control, intrusion, fire and other systems into one common interface. Available in two versions, Essentials and Enterprise, Surveillint can accommodate a wide range of integration needs for small-to-medium and medium-to-large scale environments. All Surveillint PSIM solutions provide greater situational awareness, decreased incident response time, and simplified event reconstruction and reporting. Proximex has formed a partnership agreement with Cruatech to provide PSIM migrations services for Proximex Surveillint customers who are moving to a new PSIM platform. Under the agreement starting June 2020, Cruatech will also provide software support for Proximex Surveillint 8.0 and 8.1 until at least May 31, 2023 for customers with a valid Software Support Agreement (SSA).
  • 21
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous events. Seamlessly synthesizing information from access control, video and other sensors, the OnGuard system delivers complete line-of-sight to all aspects of security and facilitates intelligent responses and outcomes. The OnGuard system integrates seamlessly with a wide range of existing business systems. The OnGuard system can bi-directionally exchange cardholder data with many HR platforms and/or ERP systems, coordinate alarm/event data with emergency response systems, and more.
  • 22
    Wazuh

    Wazuh

    Wazuh

    Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. Wazuh is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis. Wazuh addresses the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility, with the insights to help security analysts discover, investigate and response to threats and attack campaigns across multiple endpoints.
  • 23
    CloudJacketXi
    CloudJacketXi, a Flexible Managed Security-as-a-Service Platform. Our service offerings can be personalized to your organization’s needs whether you are an established enterprise or a start-up SMB. We specialized in a flexible cybersecurity and compliance offering. Our services; serve clients in many verticals such as education, legal, medical, hospitality, government, and manufacturing. Here is a quick overview of the different layers of protection that can be customized to suit your organizations needs. Flexible Layers: Our flexible security-as-a-service platform allows for a layered approach where you can choose exactly what your organization needs. Intrusion Prevention System; Intrusion Detection System; Security Information and Event Management; Internal Threat Detection; Lateral Threat Detection; Vulnerability Management; Data Loss Prevention. All Monitored and Managed by SOC.
  • 24
    Monas MS

    Monas MS

    TRIKDIS

    Alarm monitoring software Monas MS is designed to display, process, store and react to messages received in the centralized monitoring stations. Additional modules provide advanced features for alarm monitoring and response. All in one – alarm monitoring, management and control of rapid response teams, remote access for technical personnel. We can convert the current monitoring software database to Monas MS software database, keeping all existing records.
  • 25
    Kerio Control

    Kerio Control

    GFI Software

    Detect threats, block viruses and secure VPN with the firewall built for SMB. Configure your firewall with easy-to-use traffic rules, controlling in- and outbound communications by URL, application, traffic type and more. Intrusion detection and prevention using the Snort system constantly monitors inbound and outbound network communications for suspicious activity. Log or block the communications depending on the severity. Prevent viruses, worms, Trojans and spyware from entering your network. Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.
    Starting Price: $270 per year
  • 26
    Sentinel IPS

    Sentinel IPS

    Sentinel IPS

    An affordable suite of network security services, including a Managed Network Detection and Response team, our unique Network Cloaking™ methodology, and CINS Active Threat Intelligence. Comprehensive managed security. Designed to support lean IT teams, and get them back to their other projects. Working with you to deflect outside intrusions, detect malicious threats, and respond quickly to critical events. Autonomous Threat Defense and Active Threat Intelligence beyond the firewall. Another set of eyes on traffic inside the network. Sentinel Outpost provides advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall.
  • 27
    Senstar

    Senstar

    Senstar

    With intelligent video management, video analytics, access control and innovative perimeter intrusion detection systems, Senstar offers a comprehensive suite of proven, integrated technologies. A modular solution for security management and data intelligence, as well as an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. Senstar’s product portfolio is the industry’s best. By selling what we manufacture, Senstar can service, customize and adjust for any project. Where multiple layers of security are needed, Senstar products can work together for complete facility-level solutions.
  • 28
    Alarm.com

    Alarm.com

    Alarm.com

    Get best-in-class security, plus smart home automation the whole family will love. Protect your business with security that keeps you aware and in control – from anywhere. With over a decade of experience and over 6 million active users, Alarm.com continues to be a technology leader. Join the Alarm.com family and become a Service Provider today. Alarm.com uses a tamper-resistant cellular connection, dedicated solely to your security system. Have peace of mind knowing your system will continue to communicate even if the phone or cable line is cut, power is out or the Internet is down. Easily create and disable user codes. Give each user a unique code, then see who has armed or disarmed the system, and when. You can disable codes within minutes from your computer or tablet. With over a decade of experience and over 6 million active users, Alarm.com continues to be a technology leader. Join the Alarm.com family and become a Service Provider today.
  • 29
    VMware vDefend ATP
    Get complete network traffic inspection with the industry’s highest fidelity insights into advanced threats with VMware vDefend Advanced Threat Prevention (formerly known as NSX Advanced Threat Prevention). Detect known threats and new, evolving threats that have never been seen before. Identify malware specifically designed to evade standard security tools. Get complete visibility into both north-south and east-west traffic, including a comprehensive overview of abnormal behavior across the network. Combine multiple related alerts, across many different assets and hops, into a single intrusion, enabling your security team to quickly understand the scope of the threat and prioritize its response. Eliminate blind spots and inspect all network traffic to detect and prevent known threats from gaining access to critical systems and data. Accelerate threat remediation by baselining network behavior using ML algorithms.
  • 30
    Security Onion

    Security Onion

    Security Onion

    Security Onion is a comprehensive open source platform for intrusion detection, network security monitoring, and log management. It provides a set of powerful tools to help security professionals detect and respond to potential threats across an organization's network. Security Onion integrates various technologies, including Suricata, Zeek, and Elastic Stack, to collect, analyze, and visualize security data in real-time. Security Onion’s intuitive user interface allows for easy management and analysis of network traffic, security alerts, and system logs. It also includes built-in tools for threat hunting, alert triage, and forensic analysis, helping users identify potential security incidents quickly. Security Onion is designed for scalability, making it suitable for environments of all sizes, from small businesses to large enterprises.
  • 31
    Digifort

    Digifort

    Digifort

    Intelligent video monitoring software utilizing the highest levels of available technology and providing best performance to suit any requirement. Complete IP video management platform with advanced alarm management, events, occurrences and automation of environments through a single system, reliable, intuitive with easy configuration and operation. Automated license plate reader solution fully integrated with our video management system, automation alerts, alarms and pre-configured actions, statistical graphs and integration with third party systems. Capture, remote control and recording of Windows based computer screens. Ideal for Call Centers, Headless Server Controls and third party software management. Live Applied intelligence without video monitoring, providing proactive actions for programmed behavioral situations with automatic event and alarm generation in addition to valuable statistical information for business intelligence application.
  • 32
    Cisco Secure Firewall Management Center
    Centralize and simplify your firewall admin and intrusion prevention. With visibility across ever-changing and global networks, you can manage modern applications and malware outbreaks in real-time. Easily switch between managing hundreds of firewalls, controlling applications, and blocking intrusion attempts and the spread of malware. Write a policy and scale its enforcement across multiple security controls within your network. Enjoy unified management and control over firewalls, applications, intrusion prevention, and file and malware protection. Comprehensibly manage your firewalls using our on-premises hardware or from any virtual environment of your choice. Flexibly deploy the same manager on your public cloud infrastructure, or boost productivity one step further with our cloud-delivered solution. Detect the most sophisticated threats sooner across all vectors and prioritize by impact for faster responses.
  • 33
    ACSIA

    ACSIA

    DKSU4Securitas Ltd

    ACSIA it is a ‘post-perimeter’ security tool which complements a traditional perimeter security model. It resides at the Application or Data layer. It monitors and protects the the platforms (physical/ VM/ Cloud/ Container platforms) where the data is stored which are the ultimate target of every attacker. Most companies secure their enterprise to ward off cyber adversaries by using perimeter defenses and blocking known adversary indicators of compromise (IOC). Adversary pre-compromise activities are largely executed outside the enterprise’s field of view, making them more difficult to detect. ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection
    Starting Price: Depends on number of servers
  • 34
    GajShield

    GajShield

    GajShield

    GajShield is a comprehensive cybersecurity solution designed to provide in-depth protection against various attacks by tightly integrating key security functions and securely connecting remote offices and partners. It combines ICSA Certified Firewall appliances, Data Leak Prevention (DLP), Cloud Security, Intrusion Prevention System (IPS), Virtual Private Network (VPN), URL Filtering, Virus Screening, and Bandwidth Management into a single appliance to deliver layered network security. GajShield's Contextual Intelligence Engine enables advanced visibility of data transactions by breaking down data packets into multiple small data contexts, allowing for granular policy enforcement and efficient threat detection. The DLP solution acts as an enforcer of data security policies, detecting and preventing unauthorized transmission of confidential information through deep content inspection and contextual security analysis.
  • 35
    FortiGuard IPS Service
    The AI/ML-powered FortiGuard IPS Service provides near-real-time intelligence with thousands of intrusion prevention rules to detect and block known and suspicious threats before they ever reach your devices. Natively integrated across the Fortinet Security Fabric, the FortiGuard IPS Service delivers industry-leading IPS performance and efficiency while creating a coordinated network response across your broader Fortinet infrastructure. The FortiGuard IPS Service provides rich IPS capabilities like deep packet inspection (DPI) and virtual patching to detect and block malicious traffic entering your network. In both standalone IPS and converged next-generation firewall deployments, the innovative FortiGuard IPS Service is based on a modern, efficient architecture, making performance in even the largest data centers reliably consistent. With FortiGuard IPS Service deployed as part of your broader security infrastructure, Fortinet is able to deploy new intrusion prevention signatures.
  • 36
    Luchismart

    Luchismart

    Luchismart

    Luchismart is a cutting-edge technology company specializing in cloud-based access control systems with advanced features such as time and attendance management, video surveillance, and time tracking capabilities. With a focus on providing secure and efficient solutions, Luchismart aims to revolutionize the way businesses manage their access control and monitoring processes. One of the key features of Luchismart's system is its access control functionality. Using cloud-based technology, the system allows businesses to control and monitor access to their premises in real-time. It offers a comprehensive set of tools to manage and customize access permissions for employees, visitors, and contractors, ensuring that only authorized individuals can enter restricted areas. In addition to access control, Luchismart offers robust time and attendance management features. The system enables accurate tracking of employee attendance, including clock-in and clock-out times.
  • 37
    Sophos Firewall
    The world's best visibility, protection, and response. Superior visibility into risky activity, suspicious traffic, and advanced threats helps you regain control of your network. Powerful next-gen protection technologies like deep learning and intrusion prevention keep your organization secure. Automatic threat response instantly identifies and isolates compromised systems on your network to stop threats from spreading. XG Firewall makes it easy to extend your secure network to employees anywhere. Sophos Connect provides an intuitive VPN connection client that’s easy to deploy and configure. Give your remote workers secure access to resources on the corporate network from Windows and macOS devices. Our small, ultra-affordable XG 86(w) and SD-RED devices provide the ultimate in SOHO protection with always-on dedicated or split-tunnel VPN that’s easy to deploy and manage with a variety of flexible options.
  • 38
    Evolv Express

    Evolv Express

    Evolv Technology

    The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. Visitors want to move quickly through security checkpoints at a seamless pace, knowing they’re well-protected everywhere inside your venue—while your security teams want the assurance that they can reliably pinpoint and stop threats. The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. The new outdoor Evolv Express system has a ruggedized design making it easier to move over rough and sloped surfaces. Customers also have the option to order a retrofit kit for their existing outdoor systems.
  • 39
    Defendry

    Defendry

    Defendry

    The Defendry Security Suite is a powerful, automated set of components designed to work seamlessly together whether you only need one or two components or the entire suite. The Defendry SeeSay mobile app is the perfect way to get started! It is fast and easy to deploy, and quickly makes everyone part of your security solution. SeeSay empowers anyone with a smartphone to send texts, alerts, and videos of potential threats directly to your security staff. SeeSay can exponentially speed intelligence and communication as a potential threat situation emerges. The smartphone instantly turns into a security camera. Secure direct messaging with security staff. Everyone is part of your security solution. IoTalk gives operations teams the ability to pre-plan every detail of automatic threat response by creating customized, pre-programmed workflows, to speed a well-coordinated response to any type of threat. Defendry can auto-detect hundreds of different kinds of guns and weapons.
  • 40
    Coram AI

    Coram AI

    Coram AI

    Coram AI is a modern video security platform that integrates advanced artificial intelligence to enhance physical security operations. Compatible with any IP camera, Coram AI offers seamless integration, allowing businesses to utilize their existing surveillance infrastructure without the need for extensive replacements. It delivers instant alerts for critical events, such as slip-and-fall incidents and weapon detection, powered by cutting-edge AI technology. Users can quickly locate specific footage using natural language search capabilities, simplifying the process of finding relevant video clips. Additionally, Coram AI provides tools to optimize operations by tracking productivity, identifying inefficiencies, and supporting data-driven decision-making. The system is designed for scalability, accommodating setups ranging from a few cameras to thousands, and offers a variety of IP cameras that are NDAA and ONVIF compliant, ensuring high-quality video surveillance.
  • 41
    Bold Gemini

    Bold Gemini

    Bold Communications

    Bold supplies Gemini, monitoring software for intruder, fire, holdup alarms, CCTV, audio, asset tracking, access control, telecare and lone worker. Gemini is easy to operate and is used in government, retail, banking, police, military, utilities, sea ports, education and hospitals control rooms as well as leading commercial alarm receiving centers. Gemini software supports BS and EN monitoring control room standards, all industry standard alarm panels and commonly used CCTV systems including - Hikvision, Dahua, Milestone, Axis, Avigilon, Davantis, Xtralis, March, Bosch, DM, Samsung and RSI Videofied. Bold offer the leading European technical team for 24/7 control room support.
    Starting Price: $5000 one-time fee
  • 42
    AI Bot Eye

    AI Bot Eye

    Rao Information Technology

    AI Bot Eye is an innovative security platform designed to elevate traditional surveillance systems through the integration of cutting-edge artificial intelligence. By transforming standard CCTV setups into intelligent monitoring systems, AI Bot Eye enhances security, efficiency, and adaptability across various environments. This detailed examination of AI Bot Eye’s functionalities highlights its transformative impact on modern security practices. Key Modes of AI Bot Eye are as follows:- Intrusion Detection System Automatic Number Plate Recognition (ANPR) System Fire & Smoke Detection Face Recognition System Custom Object Tracking PPE Detection Shoplifting Detection By enhancing traditional CCTV systems with intelligent features such as real-time monitoring, precise identification, and detailed reporting, AI Bot Eye sets a new standard in security technology.
    Starting Price: $15/camera/month
  • 43
    Analyst1

    Analyst1

    Analyst1

    Analyst1 offers organizations a more efficient method of gathering and enriching threat intelligence - Inundated with various security tools, analysts rarely have time to investigate and remediate all threats. Analyst1 eliminates labor-intensive tasks required to understand which threats matter most. Built by analysts for the enterprise, Analyst1 allows the ability to author, test and deploy effective countermeasures across multiple intrusion detection and prevention systems.
  • 44
    Spotlight Secure Threat Intelligence Platform
    As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many next-generation firewalls (NGFWs) include integrated capabilities, such as intrusion prevention system (IPS), antivirus signatures, and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers, specific to their industry. Spotlight Secure Threat Intelligence Platform addresses these challenges and constraints by aggregating threat feeds from multiple sources to deliver open, consolidated, actionable intelligence to SRX Series Services Gateways across the organization.
  • 45
    Atomicorp Enterprise OSSEC
    Atomic Enterprise OSSEC is the commercially enhanced version of the OSSEC Intrusion Detection System brought to you by the sponsors of the OSSEC project. OSSEC is the world’s most popular open source host-based intrusion detection system (HIDS) used by tens of thousands of organizations. Atomicorp extends OSSEC with a management console (OSSEC GUI), advanced file integrity management (FIM), PCI compliance auditing and reporting, expert support and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. More info on Atomic Enterprise OSSEC is available at: https://www.atomicorp.com/atomic-enterprise-ossec/
  • 46
    Trellix Intrusion Prevention System
    Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist. Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics. Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products. Find stealthy botnets, worms, and reconnaissance attacks hiding across the network landscape. Collect flow data from switches and routers and integrate with Network Threat Behavior Analysis to correlate unusual network behavior. Discover and block advanced threats on-premises, in virtual environments, software-defined data centers, and private and public clouds. Gain east-west network visibility and threat protection across virtualized infrastructure and data centers.
  • 47
    SafeVue

    SafeVue

    Drax 360

    SafeVue is a cloud-based fire safety and compliance management platform that gives facilities, estates, and safety teams a real-time, web-accessible dashboard to view and manage fire alarm and life safety system data across single or multiple properties 24/7. It digitally captures fire system test results and compliance records, creates a complete audit trail of key events, highlights non-compliance issues as they occur, and stores all historical test and alarm activity in secure cloud storage that’s accessible on mobile or desktop for inspections, audits, and reporting. It automates scheduling and reminders for weekly, monthly, and annual testing cycles, tracks faults and alerts to support proactive fault resolution, and generates compliance-ready reports in seconds so teams can demonstrate adherence to fire safety standards like BS 5839-1:2025.
  • 48
    SLA Track

    SLA Track

    Indus Aviation Systems

    SLA Track is a solution developed by Indus Aviation Systems LLP which focuses on proactive quality and compliance to service level agreements security monitoring ,facilities management ensuring quality.The solution is a no hassle non intrusive for any Societies, Companies and Institutes ensuring smooth functioning of periodic tasks. Guard Tour Monitoring System: Allows you to track patrolling of your guards around your premises resulting your into enhance security for your assets. Facilities management will allows you to track your facility services on daily basis, a real time reports helps you to meet all compliances up to benchmark. Bin tracking system allows you to track industrial bins location on real time basis reducing all the losses due to missed bins. Ensures all compliances according to service level agreement. Increased productivity of force deployed, possibility of SLA's driven model arise. All type of activity reports on Daily, Weekly & Monthly basis.
    Starting Price: $10 per user, per month
  • 49
    Genetec

    Genetec

    Genetec

    Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday.
  • 50
    HireSafe

    HireSafe

    HireSafe

    Company and potential hire information protected against unauthorized access with multi-factor authentication, sufficient firewalls and intrusion detection. System is available consistently with 99.95% uptime and continuous performance monitoring. Information about your company or your potential employee stays confidential through encryption, access controls and permissions, firewalls and information policies and procedures. Once you sign up, we will verify your business within 24 business hours and contact you with a secure login. You can then access the HireSafe dashboard from the secure link on our front page. There you can manage all of your employee background investigations and drug tests.
    Starting Price: $24 per screening