[go: up one dir, main page]

Suggested Categories:

P&C Insurance Software
Property and casualty insurance software is designed to streamline the way insurance companies manage risks, process claims, and provide accurate customer service. It typically includes features such as policy management, billing automation, and analytics functions to help companies optimize their operations. The software is an important tool for insurers looking to increase efficiency and improve customer experience.
B2C Marketplaces
B2C marketplaces are online platforms that connect businesses directly with consumers to facilitate the buying and selling of goods and services. These marketplaces provide a centralized space for various businesses to list their products or services, allowing consumers to browse, compare, and make purchases from multiple sellers in one location. B2C marketplaces typically handle transactions, payment processing, and sometimes fulfillment, offering consumers a seamless shopping experience. Examples of B2C marketplaces include ecommerce giants and niche platforms, ranging from general consumer goods to specialized products. These platforms benefit businesses by expanding their reach, while consumers enjoy a broad selection of products, competitive pricing, and convenience.
Voice of the Customer (VoC) Software
Voice of the customer software provides businesses with the ability to capture customer feedback in a number of different formats.
Customer-to-Customer (C2C) Community Marketing Software
Customer-to-customer (C2C) community marketing software is a tool designed to facilitate and manage online platforms where customers can interact and share information about products or services. It provides features such as discussion forums, review systems, and social media integration to enable users to exchange experiences and recommendations. The software often includes moderation and analytics tools to manage content and monitor community engagement. Its purpose is to create a space for authentic customer interactions, helping brands build trust and loyalty through peer-to-peer communication. C2C community marketing software supports the growth of customer-driven communities by enhancing user engagement and connection.
Cyber Supply Chain Risk Management (C-SCRM) Software
Cyber Supply Chain Risk Management (C-SCRM) platforms are software solutions designed to help organizations identify, assess, and mitigate cyber risks within their supply chains. These platforms provide tools to monitor and analyze the cybersecurity posture of suppliers, partners, and third-party vendors, ensuring that all links in the supply chain meet security standards. C-SCRM platforms typically include features like risk assessments, real-time threat monitoring, vendor risk management, and compliance tracking.
Convenience Store Software
Convenience store software allows convenience store and bodega owners to improve the process of managing customers, employees, inventory, ordering, and financial operations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
Order-to-Cash Software
Order-to-cash (O2C) software enables companies to handle all processes related to sales including receiving an order, receiving payment, onboarding the customer, running a credit risk assessment, and more. Order-to-cash software is also known as quote-to-cash or lead-to-cash software.
Yard Management Software
Yard management software is used by manufacturing and logistics companies to monitor, track and manage their yards, containers, loads, trailer movements and availability.
Coaching Software
Coaching software provides tools and platforms that help coaches, trainers, and mentors manage client relationships, schedule sessions, track progress, and deliver personalized coaching programs. It often includes features like goal setting, performance metrics, session notes, video conferencing integration, and automated reminders. The software enables scalable coaching by streamlining administrative tasks and enhancing communication between coaches and clients. Many platforms support multiple coaching niches such as life coaching, executive coaching, fitness coaching, and educational tutoring. Coaching software improves engagement, accountability, and outcomes for both coaches and their clients.
Chemical Software
Chemical software is designed to manage, track, and analyze chemical inventories, processes, and safety data within various industries. It allows users to monitor chemical quantities, storage conditions, hazard classifications, and regulatory compliance in real-time, ensuring safe and efficient handling. With integrated features like Material Safety Data Sheets (MSDS) and automated compliance checks, the software helps organizations meet regulatory standards and reduce risks. It streamlines data entry, automates alerts for stock or safety issues, and supports complex chemical analyses and modeling. Chemical software is essential in fields such as pharmaceuticals, manufacturing, research, and education, where precise chemical management is critical for both safety and operational success.
Insurance Software
Insurance software is software used by insurance carriers, insurance agents, insurance brokerages, and insurance professionals. Insurance software is specifically designed for the insurance industry and can perform a wide variety of tasks and processes including insurance agency management, insurance rating, insurance policy management, and much more.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
CDN Providers
CDN providers offer content delivery network (CDN) services to websites. CDNs are geographically distributed server networks designed to improve website performance, reduce load times and optimize virtual content and media delivery.
PACS Software
PACS (Picture Archiving and Communication System) software that enables medical professionals manage, store, retrieve, and display medical images, such as X-rays, MRIs, and CT scans, in a digital format. It replaces traditional film-based systems, allowing healthcare providers to access and share images quickly and securely across different locations. PACS software typically integrates with other healthcare systems, such as Electronic Health Records (EHR) and Radiology Information Systems (RIS), to provide a comprehensive solution for medical imaging. Key features include secure storage, image viewing, diagnostic tools, and the ability to collaborate with other medical professionals remotely. PACS software plays a crucial role in improving workflow efficiency, reducing costs, and enhancing the quality of care in healthcare settings.
Fund Accounting Software
Fund accounting software allows organizations to manage project funding and spending amounts in order to generate reports that ensure their validity.
HMI Software
HMI software enables machine operators to effectively operate, monitor, and manage a machine or a system of machines. HMI is short for Human Machine Interface. HMI offers both machine-level or supervisory-level functionality, and the operation of HMI software is done by people using a GUI (Graphical User Interface). HMI software is designed to make machine processes less redundant, and more efficient.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
Continuing Education Software
Continuing education software provides a learning management system (LMS) designed for continuous education, and tools to streamline the tracking and management of post-secondary continuing education programs and credits.

107 Products for "soccer c" with 2 filters applied:

  • 1
    c/side

    c/side

    c/side

    cside is the leading client-side intelligence platform. Protecting organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. Leveraging client-side intelligence to provide evidence to fight chargeback fraud cases. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments....
    Leader badge">
    Starting Price: $99 per month
    Partner badge
  • 2
    Quin-C

    Quin-C

    AccessData

    AccessData® is reimagining digital forensics and legal review to help you uncover critical evidence faster, make more meaningful connections across data and build stronger cases. With Quin-C™, a pioneering technology from AccessData, you can empower forensic & legal teams at every skill level to conduct and close more accurate, advanced investigations faster than ever before. Quin-C works seamlessly with the AccessData solutions you already know and trust, to give you maximum control over...
  • 3
    C&W Business DRaaS
    Most Disaster Recovery as a Service products enable companies to restore critical business functions during failures in their information technology solutions. Not C&W’s. Much more than enabling clients to simply restore their technological infrastructure, C&W has developed a series of INTEGRATED SOLUTIONS that enable clients to automate and orchestrate all of their production environments in combination with their disaster recovery. With C&W’s solutions, all the repetitive activities...
  • 4
    C-Prot Endpoint Security
    With a user-friendly interface, cloud or on-premises management options, and a centralized control panel, you can easily manage all your endpoint devices. C-Prot Endpoint Security is a product that provides multi-layered protection against all kinds of potential threats without interrupting the workflows of businesses and institutions, supported by advanced machine learning technology and comprehensive threat intelligence. It provides effective protection against all types of threats, from...
    Starting Price: Free
  • 5
    C-Prot Fraud Prevention
    C-Prot Fraud Prevention is a comprehensive solution that helps organizations detect and prevent fraudulent activities such as financial fraud, phishing and through mobile and web channels. It offers various integration methods, including cloud-based or on-premises, to cater to different needs. With C-Prot Fraud Prevention, businesses can enhance their security measures and safeguard their assets from fraudulent attempts. With powerful algorithms and artificial intelligence technologies, C...
    Starting Price: Free
  • 6
    C-Prot Device Fingerprint
    C-Prot Device Fingerprint is a solution developed to securely identify users and analyze web traffic on websites. This solution aims to provide high-level security and enhance user experience by uniquely identifying users. Combine security and advanced analytics in your industry, identify users with C-Prot Device Fingerprint, analyze their behaviors, and prevent fraud by providing top-level security in your organization. Detect potential identity theft or attempts to modify device identity...
    Starting Price: Free
  • 7
    C-Prot Threat Intelligence Portal
    C-Prot Threat Intelligence Portal is a powerful web service for providing access to information about cyber threats. C-Prot Threat Intelligence Portal offers the possibility to check different types of suspicious threat indicators such as files, file signatures, IP addresses, or web addresses. In this way, institutions are informed about potential threats and can take necessary precautions. Detect advanced threats using our advanced detection technologies, including dynamic, static...
    Starting Price: Free
  • 8
    Aikido Security

    Aikido Security

    Aikido Security

    ... covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Starting Price: Free
  • 9
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows...
    Starting Price: Free trial
  • 10
    EverC

    EverC

    EverC

    EverC is a leading provider of AI-powered risk intelligence solutions designed to secure and enhance the online business ecosystem. Their offerings include MerchantView, an all-in-one merchant onboarding and monitoring solution that efficiently mitigates evolving risks throughout the merchant lifecycle, and MarketView, a fully automated platform that identifies and eliminates hazardous, counterfeit, and recalled products for marketplaces. EverC's technology addresses the significant challenges...
  • 11
    C9Phish

    C9Phish

    C9Lab

    C9Phish by C9Lab is a comprehensive phishing simulation and training platform designed to help organizations identify, measure, and reduce cybersecurity risks related to phishing attacks. By simulating real-world phishing attempts, C9Phish enables companies to test employee awareness, pinpoint vulnerabilities, and strengthen their overall security posture. It allows security teams to create customizable phishing campaigns that mimic various attack vectors, including email, SMS, and social...
  • 12
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    Quick License Manager (QLM) is a license protection framework that creates professional and secure license keys to protect your software against piracy. Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your...
    Leader badge">
    Starting Price: $200 one-time payment
  • 13
    TrustMAPP

    TrustMAPP

    TrustMAPP

    ... on stakeholder perspectives: CISO, C-Suite, and Board. TrustMAPP gives organizations the ability to manage security as a business, quantifying and prioritizing remediation actions and costs.
  • 14
    C2 Password

    C2 Password

    Synology C2

    Store passwords and other sensitive data such as addresses, banking information, and passport details while keeping everything organized through categories, tags, and favorites. Automatically generate and securely store passwords to simplify credential management across all your devices. Check the strength of passwords as you create them or let C2 Password generate complex combinations of letters, numbers, and symbols for you. Always have your credentials on hand when you need them, no matter...
    Starting Price: $4.99 per year
  • 15
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks...
  • 16
    PlatinumCache
    DTS PlatinumCache C4 is a caching system developed by Data Transmission System Incorporation. DTS PlatinumCache C4 is a solution for the storage bottleneck problems. DTS PlatinumCache C4 is basically a caching system supporting Write-Back, Write-Through, Write-Only and Pre-fetching policies. The system uses RAMDISK as its cache. In android we used SD card as our target drive. DTS PlatinumCache C4 reads and writes data to/from SD card to increase throughput. It is designed in such a way...
    Starting Price: $6 one-time payment
  • 17
    C3M Cloud Control
    ... visibility into your cloud to strengthen your cloud defense. C3M strives to create a secure and compliant cloud ecosystem. This mission cannot be achieved unless we share our product road map with our customers and partners, and gain constant inputs on what you want to see in a comprehensive cloud security solution. Help us reinvent ourselves.
  • 18
    Cycode

    Cycode

    Cycode

    A platform for security, governance, and pipeline integrity for all your development tools & infrastructure. Harden your source control management systems (SCM), find secrets, leaks and prevent code tampering. Scan your CI/CD settings and Infrastructure-as-Code (IaC) for security misconfiguration. Identify drift between production systems IaC configurations and prevent source code tampering. Stop developers from inadvertently exposing proprietary code in public repositories, fingerprint code...
  • 19
    PwC Detection and Monitoring Hub
    Detection and Monitoring Hub, a PwC Product, builds on the investments you have already made and identifies compliance insights, such as fraud and corruption, quickly while learning from the results of your monitoring. Target high-risk activities in rapidly changing markets and better allocate your resources accordingly through the application of advanced analytics and machine learning. With established models, rules, and workflows, your teams can make more consistent recommendations across...
  • 20
    C2 Identity

    C2 Identity

    Synology C2

    ... Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 21
    Casbin

    Casbin

    Casbin

    Casbin is an open-source authorization library that supports various access control models, including Access Control Lists (ACL), Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). It is implemented in multiple programming languages such as Golang, Java, C/C++, Node.js, JavaScript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter), and Elixir, providing a consistent API across different platforms. Casbin abstracts...
    Starting Price: Free
  • 22
    iLock Security Services
    Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure....
  • 23
    WatchGuard Passport

    WatchGuard Passport

    WatchGuard Technologies

    ... by detecting and killing malware and threats while containing ransomware and related C&C channels. WatchGuard’s endpoint security platform delivers maximum protection with minimal complexity to take the guesswork out of endpoint security.
  • 24
    Maltiverse

    Maltiverse

    Maltiverse

    ...: Ransomware, C&C centers, malicious IP and URLs, Phishing Attacks, Other feeds.
    Starting Price: $100 per month
  • 25
    Gomboc

    Gomboc

    Gomboc

    Use AI to continuously remediate all your cloud infrastructure vulnerabilities. Close the remediation gap between DevOps and security. Maintain your cloud environment through one platform that continuously ensures compliance and security. Security teams can decide on security policies and Gomboc produces the IaC for DevOps to approve. All manual IaC is reviewed by Gomboc inside the CI/CD pipeline to ensure there is no configuration drift. Never fall out of compliance again. Gomboc does...
  • 26
    EaseFilter

    EaseFilter

    EaseFilter Technologies

    Track file change, control file access in real time, prevent your sensitive data from being accessed by unauthorized users or processes. Secure file sharing with digital rights management(DRM), share files with fully control, grant or revoke the file access at any time. Implement file audit, file access control, file protection and encryption Windows applications with C#,C++ demo source code.
    Starting Price: $1500
  • 27
    RunSafe Security

    RunSafe Security

    RunSafe Security

    RunSafe Security protects embedded software across critical infrastructure, delivering automated vulnerability identification and software hardening from build-time to runtime to defend the software supply chain and critical systems without compromising performance or requiring code rewrites. The RunSafe Security Platform includes the authoritative build-time SBOM generator for embedded systems and C/C++ projects, automated vulnerability identification and risk quantification, patented memory...
  • 28
    Revenera Usage Intelligence
    ... software applications doesn’t just provide a better foundation for Product Management decisions. Technical and environment data gives insights for Development teams trying to plan for infrastructure and support requirements. Usage Intelligence, the first software usage analytics solution designed for distributed C/C++, .NET, Obj-C and native Java applications on Windows, Macintosh, and Linux, provides deep insight into application usage. See which features are used most and least.
  • 29
    Comodo cWatch

    Comodo cWatch

    Comodo Group

    The CSOC provides 24/7 security monitoring by certified security analysts and uses state-of-the-art technology. Analysts at the CSOC identify and analyze threats, provide alerting when appropriate to engage clients in resolution and to assist in mitigation. Comodo cWatch CSOC extends your internal IT team's capacity to protect your applications with advanced security solutions that are easy to implement, fully managed and do not require large upfront investments. It is designed to absorb...
    Starting Price: $9.90
  • 30
    Authsignal

    Authsignal

    Authsignal

    Authsignal is a B2C consumer authentication and identity platform. Built to enable enterprise and mid-market business product and engineering teams the rapid capabilities to deploy omnichannel authentication and verification flows. Engineered to drop into existing architecture, Authsignal delivers the world's fastest path to uplifting and implementing passkeys and risk-based multi-factor authentication (MFA) flows without the need to overhaul your current identity stack, with seamless...
    Starting Price: $349 USD Per Month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next