Suggested Categories:

IP Geolocation Tools
IP geolocation tools enables companies to match a user's IP address to a geographic location. IP geolocation APIs and IP geolocation software are IP address databases that correspond with the physical geographic location of the user and IP address.
Business VoIP Providers
Business VoIP providers are companies that offer Voice over Internet Protocol (VoIP) phone systems for businesses. These systems allow businesses to make and receive phone calls over the Internet, reducing monthly phone bills and providing additional features such as voicemail, automated attendants, and call forwarding. VoIP providers typically offer a variety of plans, making it easy for businesses to find a cost-effective solution that meets their needs.
IP Scanners
IP scanners are software tools used to identify and assess a range of devices connected to a network. Scanners query all connected devices, gathering information such as IP addresses and device manufacturers. The gathered data can then be analyzed in order to detect any potential threats or faults within the network.
IP Address Intelligence Tools
IP address intelligence tools are software tools designed to gather and analyze information related to internet protocol (IP) addresses. These tools allow users to identify the geographical location, network provider, and other details associated with an IP address, providing valuable insights for businesses and organizations. They also offer features such as real-time data tracking, threat detection, and risk assessment that can help prevent cyber attacks or unauthorized access. With the increasing use of IP-based communications, these tools have become essential for companies looking to improve their online security and make informed decisions based on IP-related data. Overall, these tools provide a comprehensive view of internet traffic and assist in optimizing network performance and maintaining a secure online environment.
VoIP Monitoring Software
VoIP monitoring software is software to monitor and analyze Voice over Internet Protocol (VoIP) communications to ensure optimal performance, security, and quality of service. These tools provide real-time monitoring of VoIP calls, network traffic, and endpoints to identify issues such as jitter, latency, packet loss, and call drops. VoIP monitoring software typically includes features like call quality metrics, performance analytics, network diagnostics, and troubleshooting tools to help administrators quickly resolve issues and maintain service reliability. It is commonly used in businesses to ensure high-quality voice communication for internal and external calls and to prevent disruptions in services.
IP Address Management (IPAM) Software
IP address management (IPAM) software tools enable organizations to track, manage, and monitor IP addresses of devices and applications on their network. IPAM software tools can also provide wider DDI software solutions including DNS and DHCP management.
White Label VoIP Providers
White label VoIP providers, also known as VoIP resellers, offer Voice over Internet Protocol services that can be rebranded and resold by other businesses under their own brand names. These providers supply the technical infrastructure and support, enabling resellers to offer VoIP solutions without the need to develop or maintain the underlying technology. By partnering with white label VoIP providers, businesses can quickly and cost-effectively enter the telecommunications market and expand their service offerings. The white label model allows resellers to set their own pricing, branding, and customer service policies, tailoring the services to their target markets. This approach is especially beneficial for IT companies, internet service providers, and entrepreneurs seeking to diversify their services and generate new revenue streams.
Intellectual Property Management Software
Intellectual property management software helps organizations track, protect, and monetize their intellectual assets such as patents, trademarks, copyrights, and trade secrets. It streamlines the management of IP portfolios by automating tasks like application tracking, renewal reminders, document storage, and legal compliance. The software provides centralized dashboards for visibility into IP status, deadlines, licensing agreements, and litigation. Integration with contract management and finance systems supports revenue tracking and risk management. Intellectual property management software is essential for businesses, law firms, and research institutions aiming to safeguard innovations and maximize IP value.
Docketing Software
Docketing software helps legal professionals, such as lawyers and paralegals, manage and track deadlines, court dates, and other important events related to legal cases. These platforms typically include features for case tracking, calendar management, automated reminders, and document organization, ensuring that legal teams stay organized and compliant with legal timelines. Docketing software often integrates with case management systems and calendaring tools, providing a centralized platform for all scheduling and time-sensitive tasks. By using this software, legal professionals can avoid missed deadlines, improve case management efficiency, and enhance overall workflow.
DNS Servers
DNS servers, short for Domain Name System servers, are public servers that provide a protocol that connects domain names to IP addresses so that web browsers and users are able to navigate to a website using a domain name instead of an IP address. Different free and public DNS servers offer varying degrees of speed and performance. Switching from an ISP's default DNS server to a public DNS server can provide enhanced page load speed and security.
Video Surveillance Software
Video surveillance software allows businesses, organizations, and individuals to monitor and manage video footage from security cameras in real-time or through recorded playback. These platforms typically offer features like motion detection, facial recognition, remote access, and alert notifications for suspicious activity. Video surveillance software can integrate with a variety of cameras and security systems, enabling centralized monitoring and efficient video storage management. By using this software, users can enhance security, improve incident response times, and ensure compliance with regulations, while maintaining a high level of surveillance control.
Video Analytics Software
Video analytics software uses advanced algorithms and artificial intelligence (AI) to analyze and extract meaningful insights from video footage. These platforms can process real-time video streams or recorded content to identify patterns, detect anomalies, and provide actionable information. Features often include object recognition, motion detection, facial recognition, people counting, behavior analysis, and event detection. Video analytics software is commonly used in security surveillance, retail for customer behavior analysis, traffic management, and industrial applications for monitoring processes. It helps businesses improve operational efficiency, enhance security, and make data-driven decisions based on visual content.
Fax Server Software
Fax server software is a solution that allows businesses to send and receive faxes electronically through a network, rather than relying on traditional fax machines. It integrates with existing IT infrastructure, enabling users to send faxes from their computers, email, or other digital devices. Fax server software typically supports features such as document routing, storage, and forwarding, along with features like fax-to-email or email-to-fax capabilities. It helps streamline communication, reduce paper usage, and improve fax management by allowing organizations to centralize and automate fax workflows. Additionally, fax server software can ensure compliance with regulations like HIPAA, where secure transmission of sensitive information is required.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Indoor Positioning Systems
Indoor positioning systems (IPS) use sensors, beacons, Wi-Fi, Bluetooth, or other technologies to determine the real-time location of people or assets inside buildings. They provide precise navigation and tracking in environments where GPS signals are weak or unavailable. Many IPS platforms support location-based alerts, mapping, analytics, and geofencing to improve safety, efficiency, and workflow optimization. These systems are commonly used in hospitals, warehouses, airports, retail stores, and large campuses to guide visitors, track equipment, or monitor staff movements. Overall, indoor positioning systems enhance visibility, streamline operations, and enable smarter, data-driven indoor environments.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    ManageEngine OpManager
    ...Ensure all devices operate at peak health, performance, and availability. The extensive network monitoring capabilities lets you track performance of switches, routers, LANs, WLCs, IP addresses, and firewalls. Monitor the finer aspects of your network: Hardware monitoring enables CPU, memory, and disk monitoring, for efficient. performance of all devices. Perform seamless faults and alerts management with real-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. ...
    Leader badge
    Starting Price: $95.00/one-time
    Partner badge
    View Software
    Visit Website
  • 2
    Site24x7

    Site24x7

    ManageEngine

    ManageEngine Site24x7 is a comprehensive observability and monitoring solution designed to help organizations effectively manage their IT environments. It offers monitoring for back-end IT infrastructure deployed on-premises, in the cloud, in containers, and on virtual machines. It ensures a superior digital experience for end users by tracking application performance and providing synthetic and real user insights. It also analyzes network performance, traffic flow, and configuration...
    Leader badge
    Starting Price: $9.00/month
    View Software
    Visit Website
  • 3
    Diplomat Managed File Transfer
    ...With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. It features robust capabilities such as PGP encryption, multi-factor authentication, IP-based access rules, and built-in threat intelligence. If you're still relying on manual scripts or outdated FTP tools and you're concerned about audit failures, security gaps, or compliance risks, Diplomat MFT offers a scalable, secure solution you can trust. Start your free trial today.
    Starting Price: $1,149/year
    Partner badge
    View Software
    Visit Website
  • 4
    Simply5 CloudLAN
    CloudLAN is a secure virtual office for a distributed teams. CloudLAN helps bring all the user computers into a single virtual network & accessible to each other through private IP's from anywhere. TeamVPN IP gives a roaming Static IP that is no longer tied to a physical locations internet connection. Addon features like service casting & Host connect makes remote work accessible to even companies without inhouse technical team.
    Starting Price: $19
  • 5
    CrowdSec

    CrowdSec

    CrowdSec

    ...Leverage the community’s IP blocklist and automate your security. CrowdSec is designed to run seamlessly on virtual machines, bare-metal servers, containers or to be called directly from your code with our API. Our strength comes from our cybersecurity community that is burning cybercriminals’ anonymity. By sharing IP addresses that aggressed you, you help us curate and redistribute a qualified IP blocklist to protect everyone.
  • 6
    HookProbe

    HookProbe

    HookProbe

    HookProbe is an open-source AI-native intrusion detection system (IDS/IPS) that runs on Raspberry Pi and edge devices. It combines eBPF/XDP kernel-level packet filtering with machine learning threat classification to deliver autonomous network security with zero cloud dependency. The stack includes NAPSE (AI packet inspection), HYDRA (threat intelligence pipeline), SENTINEL (ML classification engine), and AEGIS (autonomous defense orchestrator).
    Starting Price: $9/month
  • 7
    NetVizura NetFlow Analyzer
    ...This way, companies can optimise networks and applications, plan network expansion, minimize time spent on troubleshooting and diagnostics, and improve security. NetVizura allows you to define custom traffic to be monitored based on IP subnets and traffic characteristics like protocol and service used. Monitor specific traffic for each organisational unit in your network such as departments, remote sites and collections of regional offices by identifying them with IP subnets.
  • 8
    PureDome

    PureDome

    PureDome

    ...Businesses can rely on PureDome's exceptional customer support, available 24/7 via live chat and ticket support, to address any concerns or inquiries promptly and effectively. Main Features: Secure Remote Access Dedicated IPs for Individual Customers User & Device Management Network Segmentation Centralized Management Plan Customization
    Starting Price: $8.45 per user per month
  • 9
    alphaMountain Threat Intelligence APIs and Feeds
    alphaMountain’s domain and IP threat intelligence powers many of the world’s leading cybersecurity solutions. High-fidelity threat feeds are updated hourly with fresh URL classification, threat ratings and actionable intelligence on over 2 billion hosts including domains and IP addresses. KEY BENEFITS: Get high-fidelity URL classification and threat ratings for any URL from 1.00 to 10.0.
    Starting Price: $300/month
  • 10
    Cloudbrink

    Cloudbrink

    Cloudbrink

    ...Built as a software-only service, Cloudbrink delivers sub-20ms latency and 1Gbps+ speeds per user using dynamically deployed FAST edges and a proprietary protocol that recovers packet loss before it impacts the app. Security isn’t bolted on—it’s built in. With mutual TLS 1.3, short-lived certs, and no exposed IPs, Cloudbrink provides real zero trust without making users suffer through poor connections or overloaded POPs. If you’ve been burned by “next-gen” solutions that still feel like 2008, it might be time for something new.
  • 11
    Enginsight

    Enginsight

    Enginsight

    ...Permanently scan your IT environment for existing devices and create a live image of your IT infrastructure. Automatic detection and unlimited IP inventory of all network devices, as well as their classification. Enginsight provides a comprehensive solution for monitoring and securing your Windows servers, Linux servers and end devices such as Windows PCs or Linux . Start your 15 day free trial now.
    Starting Price: $12.99 per month
  • 12
    Suricata

    Suricata

    Suricata

    The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. ...
  • 13
    NeSSi2

    NeSSi2

    NeSSi2

    In contemporary communication infrastructures, IP-based computer networks play a prominent role. The deployment of these networks is progressing at an exponential rate as different kinds of participants such as corporations, public authorities and individuals rely on sophisticated and complex services and communication systems. With regard to information security, this leads to new challenges as large amounts of data, which may hold malicious content such as worms, viruses, or Trojans, are transferred over open networks. ...
  • 14
    TrueFort

    TrueFort

    TrueFort

    ...Insulate your environment against spreading compromise by enforcing a positive security model that curbs lateral movement. TrueFort gives security teams the scalable workload protection platform they need to secure hybrid environments. Next-gen firewalls and IP address-based controls are completely ineffective in modern infrastructure. Whether your workloads execute in the cloud, in virtual infrastructure, or on physical servers, TrueFort protects against advanced attacks with workload hardening, integrity monitoring, detection and response, and identity-based segmentation. Only TrueFort combines environment-wide security observability with real-time response, service account behavior analytics, file integrity monitoring, and CIS-certified hardening and file integrity monitoring that highlights differences between file and binary versions.
  • 15
    OSE

    OSE

    Open Seas

    Once hacked, compromised organizations face huge barriers to rebuilding customer trust and brand reputation. OSE detects & alerts to attacks on your critical systems as they occur so you can stop them before damage is done to your organization's IP, brand and reputation with the ensuing loss of customer trust. OSE provides an audit of an attack listing what was changed, what it was before making it quick to resolve. OSE reporting helps with ISO 27000 compliance. OSE (Operating system Security Enforcer) implements your defined Security Policy which can either be an out of the box OSE standard or your personalized version. ...
  • 16
    xSecuritas

    xSecuritas

    xSecuritas, Inc

    ...With features like invisible watermarks, screen capture prevention, and webcam watermarks, it ensures secure handling of digital content. The platform supports both visible and invisible watermarks that can include metadata such as user ID, IP address, and Microsoft sensitivity labels. xSecuritas is designed to work with virtual desktop infrastructure (VDI), video conferencing platforms, and remote work environments, ensuring comprehensive protection across all devices and channels. Additionally, it offers flexible policy management through a cloud or on-premises policy server, providing businesses with the tools they need to enforce data security policies effectively.
    Starting Price: $39
  • 17
    Legion

    Legion

    Castle Shield

    Our patented IP has been proven to scale for billions of security events from thousands of customers, in real-world security environments. Castle Shield’s solution utilizes a leading-edge log collection engine with robust correlation and analysis as well as a multi-tenant SIEM Platform. Multi-tenancy allows our customers to employ one Security Analyst per 100 customers.
    Starting Price: $1000/month
  • 18
    Fasoo Smart Print
    Fasoo Smart Print (FSP) is a print security solution that prevents unauthorized data breaches through printouts. The solution applies dynamic watermarks containing user name, IP address, printed time, user ID, and company information to make documents traceable to their source. With context-aware print control, it prevents unauthorized printing and applies data masking to detected sensitive information. A comprehensive audit trail monitors all printing activities, capturing both text and images of what users printed, ensuring a secure chain of custody for privacy and a robust defense against data breaches. ...
  • 19
    BalanceNG

    BalanceNG

    Inlab Networks

    ...Available for Linux and also macOS, BalanceNG easily integrates into data center networks and offers top quality packet processing performance, making this solution the ideal choice for hosting companies, network operators, and telco product designers. BalanceNG by Inlab Networks comes with a highly specialized IP stack for IPv6 and IPv4 and an independent active/passive cluster environment that is based on VRRP and the "bngsync" session table synchronization protocol. Operating BalanceNG with two nodes implements high availability on top of the Direct Server Return (DSR) topology. Direct Server Return (DSR) ist the most popular BalanceNG topology. ...
    Starting Price: $350 one-time payment
  • 20
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend and frontend tools for license management, augmented by professional services. ...
  • 21
    Mullvad VPN
    ...When you connect to the internet with Mullvad, we ensure that the traffic to and from your computer is encrypted to the highest standards even if you are using a public WiFi network at a cafe or hotel. We keep no activity logs, do not ask for personal information, and even encourage anonymous payments via cash or one of the cryptocurrencies we accept. Your IP address is replaced by one of ours, ensuring that your device's activity and location are not linked to you. Using Mullvad is straightforward and simple – just download and install the app. You won't need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind. Privacy is fundamental to a well-functioning society because it allows norms, ethics, and laws to be safely discussed and challenged.
  • 22
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    ...It handles data volumes up to 30 times larger than Elasticsearch and Grafana Loki on the same hardware, making it a powerful choice for various environments. VictoriaLogs supports fast full-text search over high-cardinality log fields like trace_id, user_id, and IP. It works seamlessly with traditional Unix log analysis tools like grep, less, sort, and jq. It also offers multi-tenancy support, accommodating diverse needs.
    Starting Price: $0
  • 23
    Ivanti Endpoint Security for Endpoint Manager
    Endpoint Security for Endpoint Manager delivers powerful, integrated endpoint protection and unified management from within the familiar Ivanti console. It combines passive visibility, discovering and inventorying every IP-enabled device and installed software in real time, including rogue devices, with active control features such as application whitelisting, device control (USB/media lockdown and detailed copy logs) and antivirus orchestration (Ivanti AV or third-party engines) to detect and prevent threats before they spread. Automated patch management covers Windows, macOS, Linux, and third-party applications across on-site, remote, and offline devices, ensuring systems stay up to date without impacting users. ...
  • 24
    ACSIA

    ACSIA

    DKSU4Securitas Ltd

    ...ACSIA is focused on stopping cyber threats at the pre attack phase. It is a hybrid product incorporating a SIEM (Security Incident and Event Management), Intrusion Detection Systems (IDS) Intrusion Prevention Systems (IPS), Firewall and much more. - Built for linux environments - Also monitors Windows servers - Kernel Level monitoring - Internal Threat detection
    Starting Price: Depends on number of servers
  • 25
    Blokada

    Blokada

    Blokada

    ...For ultimate privacy protection, upgrade to Blokada Plus and connect through our VPN. We use WireGuard®, the most advanced VPN protocol, to encrypt your network activity and hide your IP address. Blokada Slim is a lightweight version of the app, and it only contains features allowed by the Google Play policy. Blokada is not only the privacy app. It is also the community of people who care about their digital privacy and wellbeing. You will find us on our forum, where you can ask any questions you may have. We are also present on other social media and chats.
  • 26
    Trust DNS

    Trust DNS

    Surfshark

    DNS (Domain Naming Service) changer translates domain names, like Surfshark.com, to numerical IP addresses that machines use to communicate with each other. Your DNS provider is most likely your Internet Service Provider (ISP). Your ISP can see what websites you visit, and store your browsing history. DNS changer helps to protect your privacy by encrypting your DNS requests and allows you to switch to one of the third party public DNS servers.
    Starting Price: $2.50 per month
  • 27
    NeuVector
    NeuVector covers the entire CI/CD pipeline with complete vulnerability management and attack blocking in production with our patented container firewall. NeuVector has you covered with PCI-ready container security. Meet requirements with less time and less work. NeuVector protects your data and IP in public and private cloud environments. Continuously scan throughout the container lifecycle. Remove security roadblocks. Bake in security policies at the start. Comprehensive vulnerability management to establish your risk profile and the only patented container firewall for immediate protection from zero days, known, and unknown threats. ...
    Starting Price: 1200/node/yr
  • 28
    EmailAuth.io

    EmailAuth.io

    EmailAuth

    ...If anyone in the world spoofs your domains, EmailAuth collates data from all across the world to ensure that even a single unauthorized email is caught and rejected by global recipients of the world. It even extracts the IP of the sender, so this threat intelligence can be used to block the attacker across your cyber security fabric (SOAR capable). #StopGettingPhished #BeSpoofProof
  • 29
    Octo Browser

    Octo Browser

    Octo Browser

    ...This software works by masking users' digital fingerprints, preventing websites from linking multiple accounts to the same person. It integrates seamlessly with proxy servers, allowing users to switch IP addresses effortlessly, reducing the risk of detection. Additionally, it enables per-account management of cookies, browser settings, and other identifiers, ensuring each profile operates independently. With robust privacy features and a user-friendly interface, it is an essential tool for those who require secure and organized online account management.
    Starting Price: €10 per month
  • 30
    Multilogin

    Multilogin

    Multilogin

    ...Multilogin now also offers Cloud Phones, allowing users to manage TikTok, Instagram. You can create unlimited Android profiles that look like real mobile devices, each with unique fingerprints and IPs - without buying SIM cards or physical phones.
    Leader badge
    Starting Price: €5.85 per month
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB