[go: up one dir, main page]

Suggested Categories:

Debt Collection Software
Debt collection software provides agencies and lenders with the tools to automate processes, ensure compliance, manage billing and invoicing, and collect debt information.
Document Collection Software
Document collection software enables organizations to collect documents from customers and clients. Document collection software streamlines and manages the process of collecting documents.
Data Collection Software
Data collection software is used to collect, organize, and analyze data. It can be used for a variety of purposes including surveys, experiments, and market research. Data collection software typically allows users to create custom forms, manage responses, generate reports, and export results in multiple formats.
Collections Management Software
Collections management software is designed to help organizations maintain accuracy and control over their collections. This type of software provides functionality for cataloging, tracking, managing, preserving, and exhibiting digital and physical collections. It also offers features that allow users to customize reporting functions to suit their specific needs, such as the ability to record detailed information about the items in the collection. Collections management software can be used by museums, galleries, libraries, archives, and other institutions who manage large collections.
Museum Software
Museum software is a type of software used to manage the operations and data associated with museums. It offers functionality such as tracking collections, recording detailed information about artifacts, managing visitor access to the museum premises, and creating various reports. This software can also be integrated with other technologies such as ticketing systems or interactive exhibits. Museum software is designed to help museum staff efficiently manage the data relating to their collections and visitors.
Rent Payment Software
Rent payment software provides tenants with the means to optimize the process of managing and processing payments from their renters.
Electronic Data Capture Software
Electronic data capture (EDC) software is a digital tool used to collect, manage, and store data electronically, commonly in clinical trials, research, and business applications. It replaces traditional paper-based methods, reducing errors, improving efficiency, and ensuring data integrity. EDC systems often include features like real-time data validation, audit trails, and remote access for streamlined collaboration. They integrate with other databases and analytics tools, enabling faster decision-making and compliance with regulatory standards. By automating data collection and processing, EDC software enhances accuracy, security, and scalability across various industries.
Art Gallery Software
Art gallery software allows artists, collectors, art dealers and gallerists to catalog art collections, manage art shows, and oversee sales operations.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.
Data Entry Software
Data entry software is a software tool designed to streamline the process of inputting, organizing, and managing data. It provides users with customizable templates, forms, and automation features to ensure accuracy and efficiency in handling large volumes of information. This software often includes validation checks to minimize errors, supports integration with databases and other systems, and enables easy data retrieval. Many data entry solutions are cloud-based, allowing for real-time collaboration and remote access. It is widely used across industries for tasks like inventory tracking, customer data management, and financial recordkeeping.
Idea Management Software
Idea management software is software designed for organizing ideas and brainstorming solutions. It enables businesses to capture, document, sort, store, search and discuss ideas from anywhere at any time. By allowing for collaboration, idea management software can turn everyday thoughts into actionable projects that can be implemented quickly and effectively. It also allows teams to prioritize ideas so those with the most potential can be identified and acted upon first.
Accounts Receivable Software
Accounts receivable software helps businesses manage incoming payments by automating invoice generation, payment tracking, and collections processes. It streamlines billing workflows, sends payment reminders, and records transactions to improve cash flow and reduce days sales outstanding (DSO). The software often integrates with accounting, ERP, and CRM systems to provide a comprehensive view of customer accounts and payment histories. Features may include dispute management, credit management, reporting, and payment gateway integration. Accounts receivable software is essential for enhancing financial accuracy, accelerating revenue collection, and improving customer relationships.
Feedback Analytics Software
Feedback analytics software is used by companies that want to conduct analysis on the customer feedback they collect.
Union Management Software
Union management software is used by labor organizations, union members and officers to optimize their communications and overall organization.
Innovation Software
Innovation software is a type of technology which helps companies create and manage innovative projects. It facilitates the development of new ideas, enables collaboration between employees, and simplifies the process of launching new products or services into the market. Innovation software provides users with tools such as goal setting capabilities, automated workflows, project monitoring functionality, and analytics dashboards to help track progress. It can be used by small businesses or large corporations to drive their innovation strategies forward and keep up with customer demand.
NFT Platforms
NFT platforms facilitate the creation, buying, and selling of non-fungible tokens (NFTs). NFT platforms enable artist and creators to mint NFTs, and sell them on an NFT marketplace or NFT storefront to buyers who want to own a non-fungible token on the blockchain.
Rental Property Management Software
Rental property management software helps landlords, property managers, and real estate companies manage their rental properties efficiently. These platforms typically offer features for tracking leases, rent payments, maintenance requests, and tenant communications. Rental property management software often includes tools for marketing vacant properties, screening tenants, and managing financial transactions such as rent collection, late fees, and security deposits. By using this software, property managers can automate administrative tasks, improve tenant satisfaction, and ensure compliance with local regulations, while also gaining insights into the financial performance of their properties.
Customer Feedback Software
Customer feedback software enables businesses to collect, manage, and analyze feedback from customers to improve products, services, and overall customer satisfaction. These platforms offer tools for creating surveys, polls, and questionnaires that can be distributed through various channels such as email, websites, and mobile apps. They also provide analytics and reporting features to help businesses identify trends, measure satisfaction, and pinpoint areas for improvement. Many customer feedback software solutions integrate with customer relationship management (CRM) and support systems to provide a comprehensive view of the customer experience. By gathering insights directly from customers, businesses can make data-driven decisions and enhance customer loyalty.
IPFS Pinning Services
IPFS pinning services, also known as IPFS hosting services, are services that offer IPFS nodes that pin content, data, and apps to IPFS (InterPlanetary File System). IPFS is a decentralized network of storage comprised of nodes across the globe that host, store, and share data as a distributed system. IPFS pinning services streamline the process of pinning and tracking pins.
Gun Store POS Software
Gun store POS systems are point of sale systems designed specifically for gun stores.
View more categories (20) for "collections"

340 Products for "collections" with 2 filters applied:

  • 1
    DNS Shield

    DNS Shield

    AReTori Solutions Ltd.

    ... - Minimise or completely eliminate, in some cases, the amount of harmful sites contacted by your device. - Works System wide (not only in the browser). - Extensive In-App Help system. - We don't collect any data and we don't track your activities. - Automatic updates of the DNS providers collection.
    Starting Price: $1.99
  • 2
    LogGRIFFIN
    LogGRIFFIN is the solution for consolidated log management capable of big data analysis. It provides real-time log collection to prevent audit logs generated by multiple heterogeneous networks and servers from modification or forgery, and analyzes these collected and stored logs to support incident response, audit trail, and/or legal compliance. Adjusting log-collecting speed of log-collecting agents according to CPU workload of log-collecting servers. ...
  • 3
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
  • 4
    D&B Finance Analytics

    D&B Finance Analytics

    Dun & Bradstreet

    AI-driven credit-to-cash solutions powered by Dun & Bradstreet’s industry-leading global data and analytics. D&B Finance Analytics provides AI-driven solutions powered by the Dun & Bradstreet Data Cloud. Intelligent, flexible, and easy to use, D&B Finance Analytics helps finance teams manage risk, increase operational efficiency, reduce cost, and improve the customer experience. Manage credit and receivables risk to help minimize bad debt, reduce DSO, and improve cash flow. Help automate...
  • 5
    IronNet Collective Defense Platform
    ...By collaborating in real-time, companies and organizations across sectors can defend industries better, together, by seeing and fighting the same threats. When organizations collaborate to detect, share intelligence, and stop threats together in real time, they form a collective defense community. Discover how IronNet's Collective Defense platform, built on our IronDome and IronDefense products, enables organizations to realize the full benefits of this approach.
  • 6
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics.
  • 7
    Lalicat

    Lalicat

    Lalicat

    ...Lalicat anti-detect browser offers the option to configure all the collectible data and customize these data to make up your unique fingerprint, so that any third-party website cannot collect your data and you can generate as many profiles as you want. Through revising chromium core to create physically isolated fingerprint in each virtual profile.
    Starting Price: $59 per month
  • 8
    Carbide

    Carbide

    Carbide

    ...With Carbide, you can benefit from continuous cloud monitoring and the educational resources of Carbide Academy. Our platform supports over 100 technical integrations, enabling efficient evidence collection and meeting of security framework controls necessary for passing audits.
    Starting Price: $7,500 annually
    Partner badge
  • 9
    Velociraptor
    At the press of a (few) buttons, perform targeted collection of digital forensic evidence simultaneously across your endpoints, with speed and precision. Continuously collect endpoint events such as event logs, file modifications and process execution. Centrally store events indefinitely for historical review and analysis. Actively search for suspicious activities using our library of forensic artifacts, then customize to your specific threat-hunting needs.
  • 10
    CruzLog

    CruzLog

    Dorado Software

    Next-gen log collection, analysis and visualization for improved troubleshooting, managing compliance, and IT security. CruzLog is a set of integrated, and flexible tools for IT administrators and operators to collect, filter, analyze, visualize, and manage network, server and application logs for issue tracking, auditing, and compliance. CruzLog adds comprehensive log collection, data management, and detailed visualization to Cruz Operations Center's (CruzOC) expansive suite of IT resource management features. ...
    Starting Price: $1350
  • 11
    SpiderFoot

    SpiderFoot

    SpiderFoot

    No matter your use case, SpiderFoot will save you time by automating the collection and surfacing of interesting OSINT. Found a suspicious IP address or other indicators in your logs that you need to investigate? Maybe you want to dig deeper into the e-mail address used, or the links referenced in a recent phishing campaign your organization faced? With over 200 modules for data collection and analysis, you can be confident that with SpiderFoot you’ll be gaining the most comprehensive view into the Internet-facing attack surface of your organization. ...
  • 12
    Tencent Cloud Log Service
    ...The powerful query engine can search hundreds of millions of files within a second, allowing vast quantity of log data to be analyzed and processed. CLS offers a variety of log aggregation methods, including the LogListener agent, API and SDK, enabling the easy collection and centralized management of logs. Initial deployment can be completed in just five minutes.
  • 13
    Skopenow

    Skopenow

    Skopenow

    Skopenow instantly builds comprehensive, court-ready, digital reports on businesses and people, collecting and analyzing publicly available information from data sources including social media, the dark web, associated vehicles, court records, and contact data. Establish the digital footprint of your subject by collecting and collating relevant information and metadata into an automated report, enabling you to start your investigation as soon as your report is loaded. ...
  • 14
    Snowplow Analytics

    Snowplow Analytics

    Snowplow Analytics

    Snowplow is a best-in-class data collection platform built for Data Teams. With Snowplow you can collect rich, high-quality event data from all your platforms and products. Your data is available in real-time and is delivered to your data warehouse of choice where it can easily be joined with other data sets and used to power BI tools, custom reports or machine learning models.
  • 15
    Netwrix Enterprise Auditor
    Netwrix Enterprise Auditor automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses.
    Starting Price: $10.00/one-time/user
  • 16
    Resolver

    Resolver

    Resolver

    ...Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.
    Starting Price: $10,000/year
  • 17
    Seagence

    Seagence

    Seagence Technologies

    ...Fix your code without needing any debugging. Attach a lightweight runtime java agent when you start your application. As your users access the application, Seagence agent collects data about how requests are being processed. So give Seagence 24 hours to collect enough sample for analysis. The collected data is fed to Seagence's analytics engine in realtime which finds defects when they occur and alerts. Know that Seagence unearths all defects in your application including unknown. With Seagence provided defect and root cause in hand, you fix your broken code. ...
    Starting Price: $52 per month
  • 18
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. ...
    Starting Price: Free
  • 19
    Data443 Global Privacy Manager
    ...Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. ...
    Starting Price: $225 per month
  • 20
    Alibaba Log Service
    Log Service is a complete real-time data logging service that has been developed by Alibaba Group. Log Service supports collection, consumption, shipping, search, and analysis of logs, and improves the capacity of processing and analyzing large amounts of logs. Completes data collections from more than 30 data sources within five minutes. Deploys reliable high-availability service nodes in data centers around the world. Fully supports real-time and offline computing, and seamlessly connects to Alibaba Cloud software, open-source software, and commercial software. ...
  • 21
    Assuria ALM-FIM
    ...ALM FIM can store the old and new contents of changed text files and registry keys to identify and assess the exact changes that have occurred and reverse them if required. ALM-FIM collects and stores metadata about files, folders, and registry keys to provide monitoring services. Metadata collected includes details such as check-sum of the contents, size, permissions, change time, links, and other details.
  • 22
    Darkfeed

    Darkfeed

    Cybersixgill

    Unleash cyber security performance, supercharge your security stack and maximize analysts’ performance with the ultimate underground threat intelligence collection available. Darkfeed is a feed of malicious indicators of compromise, including domains, URLs, hashes, and IP addresses. It relies on Cybersixgill’s vast collection of deep and dark web sources and provides unique and advanced warnings about new cyberthreats. It is automated, meaning that IOCs are extracted and delivered in real-time, and it is actionable, meaning that its consumers will be able to receive and block items that threaten their organizations. ...
  • 23
    Cybersixgill

    Cybersixgill

    Cybersixgill

    ...Level-up vulnerability assessment, enhance incident response, and provide stronger brand protection with exclusive access to the most comprehensive, fully automated collection available from the deep and dark web that includes closed access forums, instant messaging apps, paste sites, and more. Unique threat intelligence that results in unique products: powered by extraordinary data collection and innovative methodologies. Designed to deliver business and technological value for business leaders and their security teams. ...
  • 24
    SearchInform SIEM

    SearchInform SIEM

    SearchInform

    SearchInform SIEM is a system for collecting and analyzing real-time security events, identifying information security incidents and responding to them. The system accumulates information from various sources, analyzes it, records incidents and alerts the designated staff. How the system works: •Collects events from various software and hardware sources: network equipment, third-party software, security tools, OS.
  • 25
    IronDome

    IronDome

    IronNet Cybersecurity

    IronDome: Your window to the threat landscape. IronDome is the first automated cyber Collective Defense solution that delivers threat knowledge and intelligence across industries at machine speed. With IronDome, your organization can collaborate with others across industries and sectors to stay ahead of evolving threats through real-time threat sharing. Cyber threats are evolving exponentially. Attacks are evolving faster than most organizations can manage alone.
  • 26
    Axis Intelligence
    AXIS Intelligence Feeds: Telemetry collected from attacker infrastructure. Our flagship offering, AXIS INTELLIGENCE GLOBAL, is an aggregate of our Industry, geographic and threat feeds that refresh every 24 hours. We have confirmed victim evidence of compromise or EOCs, that’s 100% signal and 0% noise. Feeds are available in JSON format. Use SFTP to securely access and ingest our feeds from AWS S3 bucket, these data feeds refresh daily.
  • 27
    Sangfor Platform-X

    Sangfor Platform-X

    Sangfor Technologies

    ...As a result, security policy setup and security log analytics have become increasingly complex, requiring threat intelligence to identify and prevent advanced threats. Sangfor Platform-X is a cloud-based security management platform, equipped to manage all Sangfor security products in the cloud by collecting, analyzing, and displaying all security logs. Through integration with Sangfor's cloud-based security solution, Neural-X, Platform-X enables comprehensive security and detection by alerting administrators to attacks or threats in real-time, thus vastly simplifying security operations. Platform-X provides unified hardware status monitoring, firmware upgrade, policy synchronization, and remote login without password.
  • 28
    ThreatStream
    Anomali ThreatStream is a Threat Intelligence Platform that aggregates threat intelligence from diverse sources, provides an integrated set of tools for fast, efficient investigations, and delivers operationalized threat intelligence to your security controls at machine speed. ThreatStream automates and accelerates the process of collecting all relevant global threat data, giving you the enhanced visibility that comes with diversified, specialized intelligence sources, without increasing administrative load. Automates threat data collection from hundreds of sources into a single, high fidelity set of threat intelligence. Improve your security posture by diversifying intelligence sources without generating administrative overhead. ...
  • 29
    CA Mainframe Security Insights Platform
    ...And, CA Security Insights output integrates with additional in-house tools such as SOC and SIEMs to provide a single, enterprise-wide view of your security posture. Collect, aggregate, and analyze security data to help remediate mainframe security risk. Eliminate manual, resource intensive, and time consuming data collection. Automate the heavy lifting.
  • 30
    ThreatSync

    ThreatSync

    WatchGuard

    Collects and correlates threat event data from the Firebox and Host Sensor.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next