[go: up one dir, main page]

Suggested Categories:

P&C Insurance Software
Property and casualty insurance software is designed to streamline the way insurance companies manage risks, process claims, and provide accurate customer service. It typically includes features such as policy management, billing automation, and analytics functions to help companies optimize their operations. The software is an important tool for insurers looking to increase efficiency and improve customer experience.
B2C Marketplaces
B2C marketplaces are online platforms that connect businesses directly with consumers to facilitate the buying and selling of goods and services. These marketplaces provide a centralized space for various businesses to list their products or services, allowing consumers to browse, compare, and make purchases from multiple sellers in one location. B2C marketplaces typically handle transactions, payment processing, and sometimes fulfillment, offering consumers a seamless shopping experience. Examples of B2C marketplaces include ecommerce giants and niche platforms, ranging from general consumer goods to specialized products. These platforms benefit businesses by expanding their reach, while consumers enjoy a broad selection of products, competitive pricing, and convenience.
Voice of the Customer (VoC) Software
Voice of the customer software provides businesses with the ability to capture customer feedback in a number of different formats.
Customer-to-Customer (C2C) Community Marketing Software
Customer-to-customer (C2C) community marketing software is a tool designed to facilitate and manage online platforms where customers can interact and share information about products or services. It provides features such as discussion forums, review systems, and social media integration to enable users to exchange experiences and recommendations. The software often includes moderation and analytics tools to manage content and monitor community engagement. Its purpose is to create a space for authentic customer interactions, helping brands build trust and loyalty through peer-to-peer communication. C2C community marketing software supports the growth of customer-driven communities by enhancing user engagement and connection.
Cyber Supply Chain Risk Management (C-SCRM) Software
Cyber Supply Chain Risk Management (C-SCRM) platforms are software solutions designed to help organizations identify, assess, and mitigate cyber risks within their supply chains. These platforms provide tools to monitor and analyze the cybersecurity posture of suppliers, partners, and third-party vendors, ensuring that all links in the supply chain meet security standards. C-SCRM platforms typically include features like risk assessments, real-time threat monitoring, vendor risk management, and compliance tracking.
Convenience Store Software
Convenience store software allows convenience store and bodega owners to improve the process of managing customers, employees, inventory, ordering, and financial operations.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
Order-to-Cash Software
Order-to-cash (O2C) software enables companies to handle all processes related to sales including receiving an order, receiving payment, onboarding the customer, running a credit risk assessment, and more. Order-to-cash software is also known as quote-to-cash or lead-to-cash software.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
Coaching Software
Coaching software provides tools and platforms that help coaches, trainers, and mentors manage client relationships, schedule sessions, track progress, and deliver personalized coaching programs. It often includes features like goal setting, performance metrics, session notes, video conferencing integration, and automated reminders. The software enables scalable coaching by streamlining administrative tasks and enhancing communication between coaches and clients. Many platforms support multiple coaching niches such as life coaching, executive coaching, fitness coaching, and educational tutoring. Coaching software improves engagement, accountability, and outcomes for both coaches and their clients.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Chemical Software
Chemical software is designed to manage, track, and analyze chemical inventories, processes, and safety data within various industries. It allows users to monitor chemical quantities, storage conditions, hazard classifications, and regulatory compliance in real-time, ensuring safe and efficient handling. With integrated features like Material Safety Data Sheets (MSDS) and automated compliance checks, the software helps organizations meet regulatory standards and reduce risks. It streamlines data entry, automates alerts for stock or safety issues, and supports complex chemical analyses and modeling. Chemical software is essential in fields such as pharmaceuticals, manufacturing, research, and education, where precise chemical management is critical for both safety and operational success.
Insurance Software
Insurance software is software used by insurance carriers, insurance agents, insurance brokerages, and insurance professionals. Insurance software is specifically designed for the insurance industry and can perform a wide variety of tasks and processes including insurance agency management, insurance rating, insurance policy management, and much more.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
CDN Providers
CDN providers offer content delivery network (CDN) services to websites. CDNs are geographically distributed server networks designed to improve website performance, reduce load times and optimize virtual content and media delivery.
PACS Software
PACS (Picture Archiving and Communication System) software that enables medical professionals manage, store, retrieve, and display medical images, such as X-rays, MRIs, and CT scans, in a digital format. It replaces traditional film-based systems, allowing healthcare providers to access and share images quickly and securely across different locations. PACS software typically integrates with other healthcare systems, such as Electronic Health Records (EHR) and Radiology Information Systems (RIS), to provide a comprehensive solution for medical imaging. Key features include secure storage, image viewing, diagnostic tools, and the ability to collaborate with other medical professionals remotely. PACS software plays a crucial role in improving workflow efficiency, reducing costs, and enhancing the quality of care in healthcare settings.
Fund Accounting Software
Fund accounting software allows organizations to manage project funding and spending amounts in order to generate reports that ensure their validity.
HMI Software
HMI software enables machine operators to effectively operate, monitor, and manage a machine or a system of machines. HMI is short for Human Machine Interface. HMI offers both machine-level or supervisory-level functionality, and the operation of HMI software is done by people using a GUI (Graphical User Interface). HMI software is designed to make machine processes less redundant, and more efficient.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
  • 1
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows...
    Starting Price: Free trial
  • 2
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks...
  • 3
    C3M Cloud Control
    ... visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.
  • 4
    Gomboc

    Gomboc

    Gomboc

    Use AI to continuously remediate all your cloud infrastructure vulnerabilities. Close the remediation gap between DevOps and security. Maintain your cloud environment through one platform that continuously ensures compliance and security. Security teams can decide on security policies and Gomboc produces the IaC for DevOps to approve. All manual IaC is reviewed by Gomboc inside the CI/CD pipeline to ensure there is no configuration drift. Never fall out of compliance again. Gomboc does...
  • 5
    Spyderbat

    Spyderbat

    Spyderbat

    Secure your cloud native runtime environments from external attacks, misconfigurations, and insider threats. By probing eBPF, Spyderbat builds a map of activities from cloud systems and containers with their causal relationships. Using this CausalContext map, Spyderbat fingerprints workload behaviors, enforces security policies, performs signatureless attack prevention, and provides immediate visibility to root cause. Spyderbat’s A3C Engine immediately assembles data into a visual map based...
  • 6
    Sysdig Secure
    ... user across clouds, containers, and hosts. Reduce vulnerability noise by up to 95% using runtime context with Risk Spotlight. Prioritize fixes that remediate the greatest number of security violations using ToDo. Map misconfigurations and excessive permissions in production to infrastructure as code (IaC) manifest. Save time with a guided remediation workflow that opens a pull request directly at the source.
  • 7
    AppTrana

    AppTrana

    Indusface

    Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.
    Starting Price: $99/month
  • 8
    oak9

    oak9

    oak9

    Visualize your IaC architecture and fix security design gaps before deployment. oak9 easily identifies security design gaps by reading Infrastructure as Code (e.g., Terraform) to understand what should be, then monitors for drift and offers actionable advice to quickly remediate. Build security into your application and avoid costly design gaps. Automatically catch and fix design gaps before deployment. Continuously and dynamically monitor infrastructure as code. oak9 lets you tailor security...
  • Previous
  • You're on page 1
  • Next