[go: up one dir, main page]

Suggested Categories:

Recruiting Automation Software
Recruiting automation software is a type of software that allows businesses and recruiters to streamline and automate various aspects of the recruitment process, from sourcing candidates to onboarding new hires. These platforms typically include features such as resume parsing, candidate tracking, job posting distribution, interview scheduling, and automated communication with candidates.
Automated Testing Software
Automated testing software is a type of software tool that is used to test the functionality of other software applications or products. It is typically used to verify that the software works as expected and to identify any bugs or issues that need to be addressed. Automated testing software typically includes a set of scripts that are executed by the program, and results are reported back to the user. This type of testing can be an efficient way to ensure that a software product meets its requirements.
Marketing Automation Software
Marketing automation software is software for businesses to automate and streamline their marketing processes. It allows users to use pre-programmed tasks, such as email campaigns, to reduce the time spent on manual tasks. It can also help companies track customer behavior through analytics and provide insights into how an organization's marketing efforts are performing. By automating these processes, marketers are able to focus more of their energy on strategy and other value-adding activities.
Network Automation Software
Network automation software helps streamline and manage the configuration, operation, and monitoring of computer networks without requiring manual intervention. By automating routine tasks such as device configuration, network monitoring, traffic management, and fault detection, this software reduces human error, increases efficiency, and ensures network reliability. It enables administrators to define policies and protocols that are automatically applied across the network, making it easier to scale and manage complex infrastructure. Many network automation solutions also offer real-time monitoring and troubleshooting tools, helping to optimize network performance and ensure compliance with security standards. This software is commonly used in large enterprises, data centers, and service providers to enhance the scalability and agility of network operations.
Workload Automation Software
Workload automation software helps organizations streamline and manage repetitive tasks, scheduling and automating workflows across various applications and systems. It enables businesses to automate data processing, batch jobs, and other time-sensitive tasks, reducing the need for manual intervention. By centralizing and orchestrating these tasks, workload automation software improves operational efficiency, reduces errors, and ensures timely completion of critical processes. The software often includes monitoring and alerting capabilities, allowing IT teams to identify and resolve issues proactively. Ultimately, workload automation enhances productivity, optimizes resource utilization, and supports compliance with operational standards.
Forms Automation Software
Forms automation software is a type of software used to streamline various organizational processes. It can help automate the creation and distribution of forms, as well as the collection and analysis of data from those forms. It typically includes features such as search capabilities, integration with other systems, automated notifications, and customizable templates. These tools can help organizations save time and money by reducing manual tasks associated with form processing.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
IT Automation Software
IT automation software is software that streamlines and automates various IT tasks and processes, reducing manual intervention and improving efficiency. These platforms typically include features for automating routine tasks such as software deployment, system monitoring, backups, patch management, network configuration, and incident response. IT automation software helps IT teams reduce errors, enhance operational efficiency, and ensure faster response times to incidents. It also enables better scalability by automating repetitive tasks, freeing up IT personnel to focus on more strategic activities.
Cloud Infrastructure Automation Software
Cloud infrastructure automation software helps organizations deploy, configure, and manage cloud resources automatically without manual intervention. It enables teams to define infrastructure as code, ensuring consistency, repeatability, and scalability across cloud environments. These tools streamline provisioning, monitoring, and scaling of compute, storage, and networking resources, reducing human error and operational costs. Many platforms integrate with CI/CD pipelines and support multi-cloud or hybrid deployments for greater flexibility. Ultimately, cloud infrastructure automation software accelerates delivery, improves reliability, and enhances efficiency in managing modern cloud operations.
Test Automation Frameworks
Test automation frameworks are sets of tools, components, and practices that automate the process of testing software applications. These frameworks enable testers to write, execute, and manage test scripts for various types of software testing, including functional, regression, load, and performance testing. They often provide features such as reusable test scripts, integration with continuous integration/continuous deployment (CI/CD) tools, reporting, and test result tracking. Test automation frameworks help improve test efficiency, reduce manual errors, and speed up the overall testing process, especially in large and complex software environments.
Digital Process Automation Software
Digital process automation (DPA) software provides businesses with the tools to automate their tasks and operations in order to optimize their workflows. Digital process automation platforms let organizations build apps and integrations quickly using automated workflows and processes. Most capable digital process automation tools allow non-technical users the ability to create workflows and applications without knowing how to code.
Sales Force Automation Software
Sales force automation (SFA) software is a tool designed to automate and optimize the sales process, helping businesses improve efficiency and close deals faster. It streamlines tasks like lead management, contact tracking, sales forecasting, and opportunity tracking by centralizing data and providing real-time insights. SFA software often integrates with customer relationship management (CRM) systems to provide a comprehensive view of customer interactions. By automating repetitive tasks such as follow-up emails and reporting, it allows sales teams to focus on building relationships and driving revenue. With features like mobile accessibility and analytics, SFA software empowers sales professionals to make data-driven decisions and achieve better results.
Direct Mail Automation Software
Direct mail automation software is software that streamlines the creation, management, and delivery of direct mail campaigns, automating tasks that would traditionally require manual input. These platforms enable businesses to design, personalize, and send physical mail pieces such as postcards, letters, and brochures directly to customers. Key features often include customer segmentation, variable data printing, integration with CRM systems, real-time tracking, and analytics. Direct mail automation software helps businesses improve efficiency, reduce costs, and increase the effectiveness of their direct mail campaigns by providing targeted, personalized communications at scale.
Professional Services Automation Software
Professional services automation (PSA) software is a technology that helps managing the operations of professional service organizations. It provides tools to integrate business processes and automate workflow, allowing for better organization and performance tracking. PSA solutions typically include components such as project budgeting, resource management, time and billing, customer relationship management, and reporting.
Robotic Process Automation (RPA) Software
Robotic process automation (RPA) software provides businesses with the automation tools to optimize their processes and operations in order to improve productivity. RPA tools enable businesses to improve efficiency, reduce errors, and lower operational costs by automating mundane tasks, freeing up human employees for more complex and value-driven work. RPA software can integrate with existing systems and applications, providing a seamless automation experience across different workflows. It is widely used in industries such as finance, healthcare, and customer service for tasks that require high levels of consistency and accuracy.
Automated Checkout Software
Automated checkout software, also known as autonomous checkout, touchless checkout, or autonomous retail software, are software platforms that provide AI-powered autonomous features that enable shoppers to shop, check out, and pay without the need of a human clerk or cashier.
Demo Automation Software
Demo automation software is a tool which helps sales teams to give virtual presentations and product demonstrations. It allows users to create interactive experiences for potential customers, simplifying the process of product or service introduction. The software can be used for in-person or remote demos, giving users the ability to share documents, slides, videos and other materials with their audience. Additionally, demo automation software also collects information from viewers during the presentation and provides feedback on user engagement levels.
Industrial Automation Software
Industrial automation software is a type of computer-controlled system used to automate industrial processes, such as production lines. It is designed to improve efficiency, reduce waste, and increase productivity. It typically involves the use of robotics, sensors, and controllers to manage machines and production processes. Different types of industrial automation software are available depending on the specific needs of an organization or manufacturer.
Task Automation Software
Task automation software is computer software that automates mundane and repetitive tasks, saving time and resources. It can range from basic scripts to more sophisticated algorithms utilizing artificial intelligence (AI). Using AI, task automation software can learn patterns and optimize workflows, making processes more efficient over time. This can be especially useful in business applications where task automation is used to manage complex operations.
AP Automation Software
AP automation software is a useful tool for businesses, streamlining payment processing and employee reimbursements. By automating the processes of invoicing, approval, and payment tracking, it can significantly reduce errors associated with manual data entry. The software has intuitive user interfaces that make it easy to set up and use, and customizable reporting allows users to track payments efficiently. With AP automation software, businesses can save time by simplifying the accounts payable process while improving accuracy.

90 Products for "automated" with 1 filter applied:

  • 1
    Unimus

    Unimus

    NetCore j.s.a. (Unimus)

    Unimus is a powerful, on-premise Network Automation and Configuration Management (NCM) solution designed for fast deployment and ease of use. As one of the most versatile NCM solutions available, it simplifies network management with features such as: 🔹 Disaster Recovery – Automated configuration backups ensure business continuity. 🔹 Change Management – Detect, review, and audit configuration changes with real-time notifications
    Leader badge">
    Starting Price: $6.90 per device per year
  • 2
    NinjaOne

    NinjaOne

    NinjaOne

    ...The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader in the Gartner Magic Quadrant for Endpoint Management Tools. The company is obsessed with customer success and has retained a 98% customer satisfaction score for more than 5 years.
  • 3
    ManageEngine OpManager
    ...Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Leader badge">
    Starting Price: $95.00/one-time
    Partner badge
  • 4
    Opinnate

    Opinnate

    Opinnate

    ...Analyze, optimize, automate & audit your security policies easily. Rule optimization stands as a vital aspect in the maintenance and management of firewalls. Policy change automation becomes necessary when multiple firewalls, each from different vendors, are in place and there is a high volume of policy change requests. In multi-vendor topologies, the firewall policies may not be centrally managed since each vendor has its own management system.
  • 5
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. ...
  • 6
    Scrut Automation
    ...Monitor risks across your infrastructure and application landscape in real-time and continuously stay compliant with 20+ compliance frameworks. Collaborate with team members, auditors, and pen-testers with automated workflows and seamless artifact sharing. Create, assign, and monitor tasks to manage daily compliance with automated alerts and reminders. With the help of 70+ integrations with commonly used applications, make continuous security compliance effortless. Scrut’s intuitive dashboards provide quick overviews and insights.
  • 7
    ConnectWise Automate
    Solve IT problems at the speed of business with ConnectWise Automate. A robust remote monitoring and management (RMM) platform, ConnectWise Automate helps boost the effectiveness of IT teams. It offers teams the ability to discover all devices and users that need to be proactively monitored, remove delivery roadblocks, and support more endpoints without adding headaches or head count.
  • 8
    Red Hat Virtualization
    Red Hat® Virtualization is an enterprise virtualization platform that supports key virtualization workloads including resource-intensive and critical applications, built on Red Hat Enterprise Linux® and KVM and fully supported by Red Hat. Virtualize your resources, processes, and applications with a stable foundation for a cloud-native and containerized future. Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment.
  • 9
    BackBox

    BackBox

    BackBox

    BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance.
  • 10
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 11
    Cyber adAPT

    Cyber adAPT

    Cyber adAPT

    ...Using unique and cutting-edge intellectual property to find, analyze, and identify the latest attacks updating our systems in the field continuously. Easy to deploy, use and maintain. The Cyber adAPT NTD automates the most tedious and time-consuming processes. Cyber adAPT offers access to its cybersecurity professionals through optional consulting services.
  • 12
    Tufin

    Tufin

    Tufin

    ...Existing manual approaches to managing network changes can take weeks and introduce errors resulting in potential security risks. Organizations across the world rely on Tufin’s policy-based automation to automate visibility and provisioning and maximize business agility and security. Maintaining and demonstrating compliance with industry regulations and internal policies is difficult within today’s complex and fragmented networks. Tufin enables enterprises to ensure continuous compliance and maintain audit readiness.
  • 13
    Avast Ultimate Business Security
    Comprehensive cybersecurity and patch automation for growing businesses  Avast Ultimate Business Security includes our award-winning next-gen antivirus with online privacy tools and patch management automation software to help keep your devices, data, and applications updated and secure. Key Benefits: * Remote Management - Manage your devices and security as you scale and grow  * Device Protection - Safeguard your business devices against cyberattacks * Data Protection - Prevent ransomware and data breaches, even from the inside * Online Security and Privacy - Stay away from phishing, sniffers, scams, and other online threats * Patch Management - Save time by automatically patching software vulnerabilities 
    Leader badge">
    Starting Price: $39.99/year/user
  • 14
    Palo Alto Networks Panorama
    ...Gain visibility and actionable insights into network traffic and threats via the Application Command Center (ACC) for comprehensive security management and protection. Leverage the automated correlation engine to reduce data clutter so you can identify compromised hosts and surface malicious behavior more quickly. Manage up to 5,000 Next-Generation Firewalls, or use the Panorama Interconnect plugin to centralize configuration management for tens of thousands of devices. Panorama simplifies security with an intuitive UI that can be used to monitor, configure and automate security management.
  • 15
    SecureTrack+
    Secure your network and cloud environments, and deploy a Zero Trust Architecture with the industry's most powerful security policy automation technology. Achieve end-to-end network security across your hybrid enterprise infrastructure, powered by a single solution designed for both network and cloud security teams. Gain visibility into the security controls across on-premises, hybrid, and multi-cloud environments, and deploy security policy throughout your infrastructure to establish a Zero Trust model - without compromising business agility or developer productivity. ...
  • 16
    AlgoSec

    AlgoSec

    AlgoSec

    Discover, map and migrate business application connectivity to the cloud. Proactively analyze security risk from the business perspective Automate network security policy changes - with zero touch Link cyber-attacks to business processes. Automatically discover, map, and securely provision network connectivity for business applications. Manage on-premise firewalls and cloud security groups in a single pane of glass. Automate the security policy change process – from planning through risk analysis, implementation and validation. ...
  • 17
    DeepSurface

    DeepSurface

    DeepSurface

    DeepSurface helps you make the most of your time so you get the biggest ROI for your activities. Armed with critical knowledge of your as-built digital infrastructure, DeepSurface automates the process of scanning the over 2,000 CVE’s released each month, quickly identifying which vulnerabilities as well as which chains of vulnerabilities pose risk to your environment and which pose no risk – speeding vulnerability analysis so you can focus on what matters most. DeepSurface uses the comprehensive context gathered to create a complete threat model and hacker roadmap that helps you visualize how an attacker would move through your digital infrastructure and where they could cause the most damage. ...
  • 18
    COSGrid NetShield

    COSGrid NetShield

    COSGrid Networks

    ...Advantages: - Real time Traffic Analysis: Continuously analyzes raw network traffic and flow records to generate baseline of normal network behavior. - Threat Detection: Applying ML & other analytical techniques (non-signature) to detect suspicious traffic. - Automated Response: Analyses east/west traffic to detect lateral movements and performs automated response.
    Starting Price: ₹600-1000 per user
  • 19
    ManageEngine Log360
    Detect, investigate, and resolve security incidents and threats using a single, scalable SIEM solution. Log360 provides you with actionable insights and analytics-driven intelligence for real-time security monitoring, advanced threat detection, incident management, and behavioral analytics-based anomaly detection. Built as the bedrock for your SOC, ManageEngine Log360 comes with out-of-the-box correlation and workflow rules, dashboards, reports, and alert profiles to help you address vital...
  • 20
    Syncro

    Syncro

    Syncro

    Syncro offers the first Extended Monitoring and Management (XMM) platform purpose-built for midsized MSPs and internal IT teams. The unified platform integrates RMM (endpoint management), professional services automation (PSA), and Microsoft 365 multi-tenant management to help organizations simplify operations, strengthen security, and scale profitably. Syncro delivers powerful automation, native AI capabilities, deep Microsoft 365 integration, and seamless support for 50+ third-party tools—enabling teams to reduce complexity, cut costs, and uncover new revenue opportunities. ...
    Leader badge">
    Starting Price: $129 per user per month
  • 21
    Trend Cloud One

    Trend Cloud One

    Trend Micro

    ...Cloud-native security delivers new functionalities weekly with no impact on access or experience. Seamlessly complements and integrates with existing AWS, Microsoft® Azure™, VMware®, and Google Cloud™ toolsets. Automate the discovery and protection of public, private, and virtual cloud environments while protecting the network layer. This provides flexibility and simplicity in securing your cloud throughout the migration and expansion process.
  • 22
    Proton VPN

    Proton VPN

    Proton AG

    ...With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure.
    Starting Price: $6.99/user/month
  • 23
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when bandwidth is exceeded, collects, consolidates, and analyzes firewall logs to generate security, bandwidth reports.
    Leader badge">
    Starting Price: $395
  • 24
    SNOK

    SNOK

    SecureNok

    ...SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc. We are cybersecurity experts on industrial automation and control systems. Our skilled advisors and technicians help you secure critical infrastructure and production facilities, train your staff and implement secure practices. Hacking, malware and viruses have attacked IT systems for decades. Recently, cyberattacks has grown into a serious threat to critical industrial infrastructure as well. ...
    Starting Price: $0.01
  • 25
    Forescout

    Forescout

    Forescout Technologies

    Forescout is a comprehensive cybersecurity platform that offers real-time visibility, control, and automation for managing risks across devices and networks. Its solutions enable organizations to monitor and secure a broad range of IT, IoT, and operational technology (OT) assets, providing proactive protection against cyber threats. With Forescout's Zero Trust framework and integrated threat detection capabilities, businesses can enforce device compliance, secure network access, and continuously monitor for vulnerabilities. ...
  • 26
    IronDefense

    IronDefense

    IronNet Cybersecurity

    ...Real-time insights across industry threatscapes, human insights to detect threats, and higher-order analysis of anomalies correlated across groups of peers via IronDome Collective Defense integration. Advanced automation to apply response playbooks built by the nation's top defenders to prioritize detected alerts by risk and supplement limited cyber staff.
  • 27
    Illumio

    Illumio

    Illumio

    Stop ransomware. Isolate cyberattacks. Segment across any cloud, data center, or endpoint in minutes. Accelerate your Zero Trust journey and protect your organization with automated security enforcement, intelligent visibility, and unprecedented scale. Illumio Core stops attacks and ransomware from spreading with intelligent visibility and micro-segmentation. Get a map of workload communications, quickly build policy, and automate enforcement with micro-segmentation that is easy to deploy across any application, cloud, container, data center, and endpoint. ...
  • 28
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
    Starting Price: $1,118 per year
  • 29
    indeni

    indeni

    indeni

    Indeni’s security infrastructure automation platform monitors firewall health and auto-detects issues like misconfigurations or expired licenses before they affect network operations. It automatically prioritizes issues so you only receive the most important alerts. Indeni protects your cloud environment by taking a snapshot of it before it’s built. Our cloud security analysis tool, Cloudrail, reviews your infrastructure-as-code files so you can identify violations earlier in development when they’re easier to fix. ...
  • 30
    LevelBlue USM Anywhere
    ...These integrations also enable you to trigger automated and orchestrated responses effortlessly. Begin your 14-day free trial now and discover how our platform simplifies cybersecurity.
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next