[go: up one dir, main page]

Suggested Categories:

Debt Collection Software
Debt collection software provides agencies and lenders with the tools to automate processes, ensure compliance, manage billing and invoicing, and collect debt information.
Document Collection Software
Document collection software enables organizations to collect documents from customers and clients. Document collection software streamlines and manages the process of collecting documents.
Data Collection Software
Data collection software is used to collect, organize, and analyze data. It can be used for a variety of purposes including surveys, experiments, and market research. Data collection software typically allows users to create custom forms, manage responses, generate reports, and export results in multiple formats.
Collections Management Software
Collections management software is designed to help organizations maintain accuracy and control over their collections. This type of software provides functionality for cataloging, tracking, managing, preserving, and exhibiting digital and physical collections. It also offers features that allow users to customize reporting functions to suit their specific needs, such as the ability to record detailed information about the items in the collection. Collections management software can be used by museums, galleries, libraries, archives, and other institutions who manage large collections.
Museum Software
Museum software is a type of software used to manage the operations and data associated with museums. It offers functionality such as tracking collections, recording detailed information about artifacts, managing visitor access to the museum premises, and creating various reports. This software can also be integrated with other technologies such as ticketing systems or interactive exhibits. Museum software is designed to help museum staff efficiently manage the data relating to their collections and visitors.
Rent Payment Software
Rent payment software provides tenants with the means to optimize the process of managing and processing payments from their renters.
Electronic Data Capture Software
Electronic data capture (EDC) software is a digital tool used to collect, manage, and store data electronically, commonly in clinical trials, research, and business applications. It replaces traditional paper-based methods, reducing errors, improving efficiency, and ensuring data integrity. EDC systems often include features like real-time data validation, audit trails, and remote access for streamlined collaboration. They integrate with other databases and analytics tools, enabling faster decision-making and compliance with regulatory standards. By automating data collection and processing, EDC software enhances accuracy, security, and scalability across various industries.
Art Gallery Software
Art gallery software allows artists, collectors, art dealers and gallerists to catalog art collections, manage art shows, and oversee sales operations.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Waste Management Software
Waste management software is enables organizations and waste management professionals to efficiently handle the collection, transportation, recycling, disposal, and monitoring of waste materials. These platforms streamline waste tracking, route planning, compliance management, and reporting for waste management companies, municipalities, and businesses that generate significant waste. Key features typically include route optimization, inventory tracking of waste containers, scheduling and dispatching services, billing and invoicing, and real-time monitoring of waste collection progress. Waste management software can also assist with ensuring compliance with environmental regulations and sustainability initiatives by providing data for reporting and tracking recycling efforts.
Data Entry Software
Data entry software is a software tool designed to streamline the process of inputting, organizing, and managing data. It provides users with customizable templates, forms, and automation features to ensure accuracy and efficiency in handling large volumes of information. This software often includes validation checks to minimize errors, supports integration with databases and other systems, and enables easy data retrieval. Many data entry solutions are cloud-based, allowing for real-time collaboration and remote access. It is widely used across industries for tasks like inventory tracking, customer data management, and financial recordkeeping.
Idea Management Software
Idea management software is software designed for organizing ideas and brainstorming solutions. It enables businesses to capture, document, sort, store, search and discuss ideas from anywhere at any time. By allowing for collaboration, idea management software can turn everyday thoughts into actionable projects that can be implemented quickly and effectively. It also allows teams to prioritize ideas so those with the most potential can be identified and acted upon first.
Accounts Receivable Software
Accounts receivable software helps businesses manage incoming payments by automating invoice generation, payment tracking, and collections processes. It streamlines billing workflows, sends payment reminders, and records transactions to improve cash flow and reduce days sales outstanding (DSO). The software often integrates with accounting, ERP, and CRM systems to provide a comprehensive view of customer accounts and payment histories. Features may include dispute management, credit management, reporting, and payment gateway integration. Accounts receivable software is essential for enhancing financial accuracy, accelerating revenue collection, and improving customer relationships.
Feedback Analytics Software
Feedback analytics software is used by companies that want to conduct analysis on the customer feedback they collect.
Union Management Software
Union management software is used by labor organizations, union members and officers to optimize their communications and overall organization.
Rental Property Management Software
Rental property management software helps landlords, property managers, and real estate companies manage their rental properties efficiently. These platforms typically offer features for tracking leases, rent payments, maintenance requests, and tenant communications. Rental property management software often includes tools for marketing vacant properties, screening tenants, and managing financial transactions such as rent collection, late fees, and security deposits. By using this software, property managers can automate administrative tasks, improve tenant satisfaction, and ensure compliance with local regulations, while also gaining insights into the financial performance of their properties.
Innovation Software
Innovation software is a type of technology which helps companies create and manage innovative projects. It facilitates the development of new ideas, enables collaboration between employees, and simplifies the process of launching new products or services into the market. Innovation software provides users with tools such as goal setting capabilities, automated workflows, project monitoring functionality, and analytics dashboards to help track progress. It can be used by small businesses or large corporations to drive their innovation strategies forward and keep up with customer demand.
Audience Response Software
Audience response software allows businesses, educators, and event organizers to collect real-time feedback and engage with their audience during presentations, meetings, or events. These platforms typically include features like live polling, surveys, quizzes, and Q&A sessions, enabling participants to respond via smartphones, tablets, or other devices. Audience response software helps enhance interactivity, measure audience engagement, and gather valuable insights into audience opinions, knowledge retention, or satisfaction levels. By using this software, organizations can foster a more interactive environment, improve decision-making, and tailor presentations to the needs and preferences of their audience.
Customer Feedback Software
Customer feedback software enables businesses to collect, manage, and analyze feedback from customers to improve products, services, and overall customer satisfaction. These platforms offer tools for creating surveys, polls, and questionnaires that can be distributed through various channels such as email, websites, and mobile apps. They also provide analytics and reporting features to help businesses identify trends, measure satisfaction, and pinpoint areas for improvement. Many customer feedback software solutions integrate with customer relationship management (CRM) and support systems to provide a comprehensive view of the customer experience. By gathering insights directly from customers, businesses can make data-driven decisions and enhance customer loyalty.
Log Analysis Software
Log analysis software helps organizations collect, monitor, and analyze log data generated by systems, applications, and network devices to gain insights into system performance, security, and user behavior. These tools aggregate log files from various sources, enabling users to identify issues such as errors, security breaches, and performance bottlenecks. Key features of log analysis software often include real-time log collection, filtering, search capabilities, and advanced analytics to detect anomalies and trends. It is commonly used for IT operations, security monitoring, and troubleshooting, helping businesses maintain system health and comply with security standards.
View more categories (20) for "collections"

50 Products for "collections" with 2 filters applied:

  • 1
    Hyperproof

    Hyperproof

    Hyperproof

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get...
  • 2
    LogGRIFFIN
    LogGRIFFIN is the solution for consolidated log management capable of big data analysis. It provides real-time log collection to prevent audit logs generated by multiple heterogeneous networks and servers from modification or forgery, and analyzes these collected and stored logs to support incident response, audit trail, and/or legal compliance. Adjusting log-collecting speed of log-collecting agents according to CPU workload of log-collecting servers. Support for encrypted communication...
  • 3
    ManageEngine EventLog Analyzer
    ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers...
  • 4
    Insightful

    Insightful

    Insightful

    ... of workforce analytics tools. These include activity and time tracking, data collection, reporting, and easy-to-read dashboards. HR, talent teams, and leadership use these insights to plan smarter and work more efficiently. Designed from the ground up, Insightful is simple, affordable, and flexible. Use it in the cloud or on-premise. It grows with your business, no matter the team size.
    Starting Price: $6.40 per employee per month
  • 5
    ManageEngine Firewall Analyzer
    ... bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.
    Starting Price: $395
  • 6
    NetFlow Analyzer

    NetFlow Analyzer

    ManageEngine

    NetFlow Analyzer is a comprehensive traffic analysis tool that leverages flow technologies to provide real-time visibility into network bandwidth performance. NetFlow Analyzer is primarily a bandwidth monitoring tool, which has optimized thousands of networks globally, offering a holistic view of your network bandwidth and traffic patterns. NetFlow Analyzer is a unified solution that collects, analyzes, and reports on your network's bandwidth usage, and by whom. NetFlow Analyzer is your partner...
    Starting Price: $245
  • 7
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 8
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational...
    Starting Price: Free
  • 9
    CruzLog

    CruzLog

    Dorado Software

    Next-gen log collection, analysis and visualization for improved troubleshooting, managing compliance, and IT security. CruzLog is a set of integrated, and flexible tools for IT administrators and operators to collect, filter, analyze, visualize, and manage network, server and application logs for issue tracking, auditing, and compliance. CruzLog adds comprehensive log collection, data management, and detailed visualization to Cruz Operations Center's (CruzOC) expansive suite of IT resource...
    Starting Price: $1350
  • 10
    Binalyze AIR
    Binalyze AIR is a market-leading Digital Forensics and Incident Response platform that allows enterprise and MSSP security operations teams to collect full forensic evidence at speed and scale. Our incident response investigation capabilities such as triage, timeline and remote shell help to close down DFIR investigations in record time.
  • 11
    Pryv.io
    Personal Data & Privacy Management Software - A ready-to-use solution for personal data and consent management. - Pryv.io is a solid foundation on which you build your own digital health solution, so you can collect, store, share and rightfully use personal data. - Maintained and developed by Pryv. Features - Provides latest Pryv.io core system ready for production - User registration and authentication - Granular consent-based access control rights - Data model made for privacy...
  • 12
    Vector by Datadog
    Collect, transform, and route all your logs and metrics with one simple tool. Built in Rust, Vector is blistering fast, memory efficient, and designed to handle the most demanding workloads. Vector strives to be the only tool you need to get observability data from A to B, deploying as a daemon, sidecar, or aggregator. Vector supports logs and metrics, making it easy to collect and process all your observability data. Vector doesn’t favor any specific vendor platforms and fosters a fair, open...
    Starting Price: Free
  • 13
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    ...-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 14
    LogMan.io

    LogMan.io

    TeskaLabs

    TeskaLabs Logman.io is a modern and effective tool for log management, collection, archiving, and log analysis. Scalable Log Management can be easily upgraded to the full-scale tool TeskaLabs SIEM (security information and event management). Be always one step ahead of all potential threats and achieve a total overview of the security of your IT infrastructure. Thanks to timely and clear threat detection, TeskaLabs LogMan.io protects important data and sensitive information. Teska...
  • 15
    JupiterOne

    JupiterOne

    JupiterOne

    JupiterOne is a cyber asset analysis platform every modern security team needs to collect and transform asset data into actionable insights to secure their attack surface. JupiterOne was created to make security as simple as asking a question and getting the right answer back, with context, to make the right decision. With JupiterOne, organizations are able to see all asset data in a single place, improve confidence in choosing their priorities and optimize the deployment of their existing...
    Starting Price: $2000 per month
  • 16
    Business LOG

    Business LOG

    Enterprise Informatic Solutions

    With over 11,000 installations Business LOG is the most requested tool by companies looking for a flexible and efficient log management suite. Available in “On-Premise” or “SaaS” Versions, with Agent Methods and Log Collection Agent less. Business LOG provides complete log analysis, reports and alerts, a powerful log search engine and a flexible log storage option.
  • 17
    MaxPatrol

    MaxPatrol

    Positive Technologies

    ...-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. Best of all, it sees changes to your IT infrastructure. MaxPatrol doesn't blink as new accounts and hosts appear, or as hardware and software are updated. Information about the state of infrastructure security is quietly collected and processed.
  • 18
    OpenSCAP

    OpenSCAP

    OpenSCAP

    ... of its size. Security Content Automation Protocol (SCAP) is U.S. standard maintained by National Institute of Standards and Technology (NIST). The OpenSCAP project is a collection of open source tools for implementing and enforcing this standard, and has been awarded the SCAP 1.2 certification by NIST in 2014. In the ever-changing world of computer security where new vulnerabilities are being discovered and patched every day, enforcing security compliance must be a continuous process.
  • 19
    REMnux

    REMnux

    REMnux

    REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community. Analysts can use it to investigate malware without having to find, install, and configure the tools. The easiest way to get the REMnux distro is to download the REMnux virtual machine in the OVA format, then import it into your hypervisor. You can also install the distro from scratch on a dedicated host or add it to an existing system...
  • 20
    Fleet

    Fleet

    Fleet Device Management

    Ask questions about your servers, and laptops. Whatever their operating system, wherever they live. Track and segment your enrolled hosts. Search by important details, and zoom in on individual targets. Collect and share useful information for ops teams, security teams, help desk, and more. Fleet is self-hosted and self-managed, and can be run within your own data centers or in the cloud. Write scripts with fleetctl and design scheduled queries to integrate alerts and dashboards across your...
    Starting Price: $4 per host per month
  • 21
    Leviathan Lotan

    Leviathan Lotan

    Leviathan Security Group

    Lotan™ provides your enterprise with the unique capability to detect attacks earlier, and with greater confidence. The fragility of exploits in the face of modern countermeasures and environment heterogeneity often leads to application crashes. Lotan analyzes these crashes to detect the attack and aid the response. Lotan collects crashes using either a simple registry change on Windows, or a small userland application for Linux. A RESTful API allows you to share evidence and conclusions...
  • 22
    AhnLab TMS
    ... are evolving. The need for an integrated threat management platform that comprehensively manages and responds to changes and security threats in these environments is increasing as a single existing solution makes it difficult to respond to them. It provides efficient policy management for the integrated appliances, collection/management of high capacity events, and in-depth analysis.
  • 23
    Legion

    Legion

    Castle Shield

    Our patented IP has been proven to scale for billions of security events from thousands of customers, in real-world security environments. Castle Shield’s solution utilizes a leading-edge log collection engine with robust correlation and analysis as well as a multi-tenant SIEM Platform. Multi-tenancy allows our customers to employ one Security Analyst per 100 customers. Our solution begins the process of a single pane of glass analysis required to monitor and manage numerous environments...
    Starting Price: $1000/month
  • 24
    Sysgem Logfile Concentrator
    Sysgem's Logfile Concentrator is a comprehensive Windows-based tool designed to integrate streams of log file data from multiple sources into a single centralized location. It collects log data from remote multi-platform servers and end devices, storing them in a central database for analysis and regulatory-compliant archiving. Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent...
  • 25
    Grafana Loki
    Grafana Loki is an open source log aggregation system designed to efficiently collect, store, and query logs from various sources. Unlike traditional logging systems, Loki is optimized for cloud-native applications, making it a great fit for modern, containerized environments like Kubernetes. It works seamlessly with Grafana for visualizing log data alongside metrics and traces, providing a unified observability platform. Loki indexes only metadata, such as labels and timestamps, which reduces...
    Starting Price: Free
  • 26
    Security Onion

    Security Onion

    Security Onion

    Security Onion is a comprehensive open source platform for intrusion detection, network security monitoring, and log management. It provides a set of powerful tools to help security professionals detect and respond to potential threats across an organization's network. Security Onion integrates various technologies, including Suricata, Zeek, and Elastic Stack, to collect, analyze, and visualize security data in real-time. Security Onion’s intuitive user interface allows for easy management...
    Starting Price: Free
  • 27
    Cribl Stream
    ...% of log and metric data goes unused – null fields, duplicate data, and fields that offer zero analytical value. With Cribl Stream, you can trim wasted data streams and analyze only what you need. Cribl Stream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the Cribl Stream universal receiver to collect from any machine data source - and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIs
    Starting Price: Free (1TB / Day)
  • 28
    NetVizura NetFlow Analyzer
    ... networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.
  • 29
    Sheetgo

    Sheetgo

    Sheetgo Europe

    Sheetgo is the no-code automation tool for teams. Create custom workflows to collect, manage and share data — all from a spreadsheet. From inventory management and financial forecasting to sales tracking and student attendance monitoring, you can build a tailor-made, automated system for any business process. Sheetgo works with Google Sheets, Excel and CSV files. Say goodbye to manual work and create an automated workflow today at sheetgo.com.
    Starting Price: $20/user/month
  • 30
     Acronis Cyber Protect Cloud
    ...-level backup, disaster recovery, and metadata collection for security forensics. MSP-ready protection management. URL filtering, vulnerability assessments, and patch management for greater control. The traditional stack of endpoint protection products lacks integration and requires much more time for management – maintaining licenses, installing updates and patches, verifying compatibility after updates, and managing multiple policies using a variety of different user interfaces.
  • Previous
  • You're on page 1
  • 2
  • Next