Suggested Categories:

Social Proof Software
Social proof software tools help businesses leverage user-generated content and feedback to build trust and credibility with potential customers. These tools gather and display testimonials, reviews, ratings, user activity, and social media mentions to demonstrate the popularity, satisfaction, and positive experiences of existing customers. Social proof software can feature real-time notifications of product purchases, customer reviews, or user engagement, showing potential buyers that others are making similar decisions.
Visual Feedback Tools
Visual feedback tools enable teams to provide clear, contextual feedback directly on digital assets such as websites, designs, documents, or videos. They allow users to annotate, highlight, comment, and collaborate in real time, simplifying the review and approval process. These tools often integrate with project management and design software to streamline workflows and ensure feedback is actionable and tracked. By enhancing communication and reducing misunderstandings, visual feedback tools improve project quality and speed up delivery. They are widely used by designers, developers, marketers, and product teams for efficient collaboration.
Stock Footage Sites
Stock footage sites offer a wide range of video clips and visuals that can be licensed for use in various projects, including marketing, advertising, presentations, film production, and social media. These platforms provide access to high-quality video content, including nature scenes, urban landscapes, business settings, people in action, and more, with options for purchasing individual clips or subscribing to a collection. Stock footage sites typically allow users to search by category, resolution, and licensing type, ensuring that creators can find the right visuals for their needs. By using these sites, businesses and creatives can save time and resources by obtaining professional-quality video content without the need to shoot footage themselves.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    New Relic

    New Relic

    New Relic

    ...As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 2
    myACI

    myACI

    ACI Learning

    ...From compliance and cloud to security and systems, ACI Learning helps professionals build confidence and capability. myACI offers role-based learning paths, video+lab combos, practice exams, and progress tracking. Managers get dashboards, credential tracking, and analytics that tie training to outcomes—with enterprise tools like SSO, LMS/LTI integration, SCORM support, and audit-ready reporting.
    Leader badge
    Starting Price: $59/mo./user
    Partner badge
    View Software
    Visit Website
  • 3
    Control D

    Control D

    Control D

    ... - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with client level granularity - Re-route traffic via proxies (through DNS) for improved privacy and security - Enjoy superior UX and simplicity Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 4
    Aikido Security

    Aikido Security

    Aikido Security

    ...Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Starting Price: Free
  • 5
    NeuBird

    NeuBird

    NeuBird

    ...Hawkeye by NeuBird connects to the tools you already use, like Datadog, Splunk, PagerDuty, ServiceNow, AWS CloudWatch, and more and reasons across all of them the way a senior engineer would, without the 2 AM wake-up call. The result: incidents that used to take hours to resolve get closed in minutes, with MTTR cut by up to 90%. It runs continuously, deploys as SaaS or inside your own VPC, and works within your existing security controls. No rip-and-replace required. Triage and resolve incidents proactively, and faster. Escalate less.
    Starting Price: $25/investigation
  • 6
    Insightful

    Insightful

    Insightful

    ...You can see where time is going, how teams are performing, and where work is breaking down — without relying on manual tracking or guesswork. With Insightful, you can: See how time is spent across teams Spot drops in utilization and output early Understand where work slows down or gets stuck Compare performance across teams, roles, or locations Use real activity data to review work and resolve disputes This is not just another monitoring tool. Insightful helps you run better operations. You get clear data you can use in weekly reviews, planning, and day-to-day decisions. It combines automatic time tracking, activity data, and reporting in one place
    Starting Price: $6.40 per employee per month
  • 7
    Zercurity

    Zercurity

    Zercurity

    Bootstrap and build out your cybersecurity posture with Zercurity. Reduce the time and resources spent monitoring, managing, integrating, and navigating your organization through the different cybersecurity disciplines. Get clear data points you can actually use. Get an instant understanding of what your current IT infrastructure looks like. Assets, applications, packages, and devices are examined automatically. Let our sophisticated algorithms find and run queries across your assets. Automatically highlighting anomalies and vulnerabilities in real-time. ...
    Starting Price: $15.01 per month
  • 8
    ManageEngine Applications Manager
    ...This way, issues are fixed before application end-users are affected. Applications Manager has a fully functional dashboard that can be customized to get performance insights at a glance. By configuring alerts, it constantly keeps a lookout for performance issues within the application stack. Combining this with intelligent machine learning, Applications Manager helps turn performance data into actionable insights.
    Leader badge
    Starting Price: $395.00/Year
  • 9
    Passit

    Passit

    Passit

    Using a password manager makes you more safe online, and our modern security features lock down your passwords without getting in your way. Our code is open source, so anyone can learn how Passit works. This makes us more trustworthy, and we think it helps create a more secure product overall. Easily take your passwords to any online device and share them with others. Read existing passwords when offline, just in case. Import and export CSV files with passwords to get data into and out of Passit. ...
    Starting Price: Free
  • 10
    Kroll Cyber Risk
    ...Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 11
    Domotz

    Domotz

    Domotz

    Domotz is an IT Infrastructure Monitoring and Management Software on a mission to provide all service providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty, and solve problems faster than ever. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with a plug-and-play setup, a friendly UX, and a comprehensive feature set accessible from any desktop...
  • 12
    Cyberwatch

    Cyberwatch

    Cyberwatch

    ...Cyberwatch natively embeds a Patch Management module, compatible with your infrastructure (WSUS / RedHat Satellite...). Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 13
    Privileged Access Management
    ...Imprivata Privileged Access Management combines all the features of a traditional enterprise-grade solution but with zero clients and server footprint. Incorporate the principle of least privilege by providing just enough access to complete a task through granular policy control at the system level. Get going in just minutes with a completely agentless architecture that helps you meet wide-ranging compliance requirements quickly.
    Starting Price: $25 per month
  • 14
    StrongDM

    StrongDM

    StrongDM

    ...Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Starting Price: $70/user/month
  • 15
    Splashtop Remote Support
    Remotely support internal and client computers with unattended remote access and provide users with remote access. Whether you’re just getting started with remote support tools, or looking to find an alternative to another product due to high prices, Splashtop Remote Support is the solution for you. Splashtop Remote Support is a best-in-class remote support tool that gives you the freedom to remote into your managed computers from any device, at any time, thanks to our fast, high definition connections.
    Starting Price: $40/month for 25 computers
  • 16
    FusionAuth

    FusionAuth

    FusionAuth

    ...Designed with developers in mind, FusionAuth integrates seamlessly with any language, framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 17
    Snow Software

    Snow Software

    Snow Software

    ...Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with the rapidly evolving needs of your business. Fast implementation and intuitive design means you are saving money in weeks, not months. Break down your data silos to see on-prem, hybrid and cloud technologies together. Get clean and augmented data, updated daily and powered by the world's largest discovery catalog. ...
  • 18
    Authress

    Authress

    Rhosys

    Authress, Complete Auth API for B2B. Authentication & Authorization gets complicated quickly, even if it appears easy, there is a lot of hidden complexity in authorization, you don’t want to do it on your own. It takes time to get authorization right In simple cases, it takes an average software team 840 hours to implement authorization logic. As you add features to your application, this number grows rapidly.
    Starting Price: $1.10 per month
  • 19
    ManageEngine Network Configuration Manager
    ...Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
    Leader badge
    Starting Price: $238
  • 20
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 21
    Fraud.net

    Fraud.net

    Fraud.net, Inc.

    Fraudnet's AI-driven platform empowers enterprises to prevent threats, streamline compliance, and manage risk in real-time. Our sophisticated machine learning models continuously learn from billions of transactions to identify anomalies and predict fraud attacks. Our unified solutions: comprehensive screening for smoother onboarding & improved compliance, continuous monitoring to proactively identify new threats, & precision fraud detection across channels and payment types. With dozens...
  • 22
    SHIELD

    SHIELD

    SHIELD

    Get the full picture with transparent intelligence. Stay ahead of new and emerging fraud attacks. Real-time attack pattern syncing worldwide.
  • 23
    Query Inside

    Query Inside

    Queryinside

    Get metrics like total queries, top search terms, average daily queries, click-through rates, and more. 📊 Page Analytics: Track visitor behavior across different pages. See page views, engagement, and traffic trends with
    Starting Price: $10
  • 24
    miniOrange

    miniOrange

    miniOrange

    ...With miniOrange, you can configure Single Sign-On (SSO), Multi-Factor Authentication (MFA), set up custom rules or policies, and customize the login page for any cloud, on-premise, or in-house apps. Get pre-built integrations for 5000+ applications including legacy apps, cloud apps, and many more. Customers praise miniOrange’s outstanding support and their ability to provide customized solutions for unique use cases.
    Starting Price: $1 per user per month
  • 25
    Cribl Stream
    ...With Cribl Stream, you can trim wasted data streams and analyze only what you need. Cribl Stream is the best way to get multiple data formats into the tools you trust for your Security and IT efforts. Use the Cribl Stream universal receiver to collect from any machine data source - and even to schedule batch collection from REST APIs, Kinesis Firehose, Raw HTTP, and Microsoft Office 365 APIs
    Starting Price: Free (1TB / Day)
  • 26
    Telepresence

    Telepresence

    Ambassador Labs

    ...It simplifies and expedites collaborative development, debugging, and testing within Kubernetes environments by establishing a seamless connection between your local machine and shared remote Kubernetes clusters. Why Telepresence: Faster feedback loops: Spend less time building, containerizing, and deploying code. Get immediate feedback on code changes by running your service in the cloud from your local machine. Shift testing left: Create a remote-to-local debugging experience. Catch bugs pre-production without the configuration headache of remote debugging. Deliver better, faster user experience: Get new features and applications into the hands of users faster and more frequently.
    Starting Price: Free
  • 27
    Infection Monkey
    Unleash the Infection Monkey in your network and discover security flaws in no time. Get a visual map of your network as seen from the attacker's eyes with a breakdown of the machines the Monkey managed to breach. Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios - credential theft, compromised machines and other security flaws. The Infection Monkey assessment produces a detailed report with remediation tips specific to each machine breached in your network. ...
  • 28
    Aerobase

    Aerobase

    Aerobase

    Aerobase is an open-source Identity and access management (IAM) platform that specializes in identity federation, SSO, strong & adaptive authentication, access control, account management & identity provisioning, API & microservices security and privacy regulation. This guide helps you get started with Aerobase. It covers server configuration and use of the default database. Advanced deployment options are not covered. For a deeper description of features or configuration options, consult the other reference guides.
    Starting Price: $690 per month
  • 29
    360 Security Guard

    360 Security Guard

    360 Security Guard

    ...Scan the computer from multiple dimensions, including garbage cleaning, computer running speed, system abnormalities, and computer security risks, and quickly assess the computer system status. 38 layers of protection barriers are added layer by layer to sense the threat situation at the first time, forming an all-round, all-weather cyberspace defense system. Get the latest information on popular games and events in real time, gather multiple media, and unify the entrance. The latest and hottest game download and installation, 360 exclusive distribution channel, fast direct access.
  • 30
    Prelude

    Prelude

    Prelude

    Organizations of all sizes can use our tools to run continuous security tests against their systems to discover areas of weakness to fix. We do this in a way that's safe, transparent, and integrated with existing defensive tools to allow organizations to get ahead of real incidents, before they happen. Organizations of all sizes use Prelude to continuously test their defensive systems. For enterprises with security teams, Operator Enterprise offers continuous testing infrastructure, team collaboration and the ability to personalize attacks and agents to your organization. Are you an IT professional? ...
    Starting Price: $50 per month
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB