Alternatives to PlexTrac

Compare PlexTrac alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to PlexTrac in 2026. Compare features, ratings, user reviews, pricing, and more from PlexTrac competitors and alternatives in order to make an informed decision for your business.

  • 1
    Aikido Security

    Aikido Security

    Aikido Security

    Secure your code, cloud, and runtime in one central system. Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - AI Pentests - Automated Compliance Aikido covers the entire Software Development Lifecycle (SDLC), including: static application security testing (SAST), dynamic application security testing (DAST), infrastructure-as-code (IaC), container scanning, secrets detection, open source license scanning (SCA), cloud posture management (CSPM), runtime protection, AI pentests, and more.
    Compare vs. PlexTrac View Software
    Visit Website
  • 2
    Astra Pentest

    Astra Pentest

    Astra Security

    Astra’s Pentest is a comprehensive penetration testing solution with an intelligent automated vulnerability scanner coupled with in-depth manual pentesting. On top of 10000+ tests including security checks for all CVEs mentioned in the OWASP top 10, and SANS 25, the automated scanner also conducts all tests required to comply with ISO 27001, HIPAA, SOC2, and GDPR. Astra offers an interactive pentest dashboard that the user can use to visualize vulnerability analyses, assign vulnerabilities to team members, and collaborate with security experts. And if the users don’t want to get back to the dashboard every time they want to use the scanner or assign a vulnerability to a team member, they can simply use the integrations with CI/CD platforms, Slack, and Jira.
    Compare vs. PlexTrac View Software
    Visit Website
  • 3
    Kroll Cyber Risk
    We are the world incident response leader. Merging complete response capabilities with frontline threat intelligence from over 3000 incidents handled per year and end-to-end expertise we protect, detect and respond against cyberattacks. For immediate assistance, contact us today. Tackle every facet of today and tomorrow’s threat landscape with guidance from Kroll’s Cyber Risk experts. Enriched by frontline threat intel from 3000+ incidents cases every year, our end-to-end cyber risk solutions help organizations uncover exposures, validate the effectiveness of their defenses, implement new or updated controls, fine-tune detections and confidently respond to any threat. Get access to a wide portfolio of preparedness, resilience, detection and response services with a Kroll Cyber Risk retainer. Get in touch for more info.
  • 4
    Pentera

    Pentera

    Pentera

    Pentera (formerly Pcysys) is an automated security validation platform that helps you improve security so you can know where you stand at any given moment. It tests all cybersecurity layers by safely emulating attacks, arming you with a risk-based remediation roadmap. Pentera identifies true risk and security exposure so you can focus on the 5% of weaknesses that constitute 95% of the actual risk. Pentera is an agentless, low-touch, fully automated platform that requires no prior knowledge of the environment. The solution can see what no one else does, providing immediate discovery and exposure validation across a distributed network infrastructure. With Pentera, security teams can think and act as your adversary does, giving you the insights required for anticipating and preventing an attack before it happens. Hundreds of organizations trust Pentera‘s do-no-harm policy with no locked users, zero network downtime, and no data manipulation.
  • 5
    Vulcan Cyber

    Vulcan Cyber

    Vulcan Cyber

    At Vulcan Cyber we’re changing the way businesses reduce cyber risk through vulnerability remediation orchestration. We help IT security teams go beyond remedial vulnerability management to help them drive vulnerability remediation outcomes. The Vulcan platform consolidates vulnerability and asset data, with threat intelligence and customizable risk parameters to deliver risk-based vulnerability prioritization insights. But we don't stop there. Vulcan remediation intelligence takes the vulnerabilities that matter to your business and attaches the remedies and fixes needed to mitigate the threat. Then Vulcan orchestrates and measures the rest of the remediation process with integrations and inputs into application security, DevSecOps, patch management, configuration management, and cloud security tools, teams and functions. From scan to fix, Vulcan Cyber delivers the unique ability to orchestrate the entire vulnerability remediation process to GET FIX DONE at scale.
    Starting Price: $999 / month
  • 6
    Invicti

    Invicti

    Invicti Security

    Application security is noisy and overly complicated. The good news: you can relieve that unnecessary noise and dramatically reduce your risk of attacks with Invicti. Keeping up with security is more manageable with accurate, automated testing that scales as your needs shift and grow. That's where Invicti shines. With a leading dynamic application security testing solution (DAST), Invicti helps teams automate security tasks and save hundreds of hours each month by identifying the vulnerabilities that really matter. Combining dynamic with interactive testing (DAST + IAST) and software composition analysis (SCA), Invicti scans every corner of an app to find what other tools miss. With asset discovery, it's easier to discover all web assets — even ones that are lost, forgotten, or created by rogue departments. Through tried-and-true methods, Invicti helps DevSecOps teams get ahead of their workloads to hit critical deadlines, improve processes, and communicate more effectively.
  • 7
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight into an organization's risk posture. It's a leader for a reason: the technology behind Acunetix delivers the only product on the market that can automatically detect out-of-band vulnerabilities to enable comprehensive management, prioritization, and control for vulnerability threats by criticality. Plus, it's available both online and as an on-prem solution, integrating with popular issue trackers and WAFs so that DevSecOps teams don't have to slow down when building innovative apps.
  • 8
    GlitchSecure

    GlitchSecure

    GlitchSecure

    Continuous Security Testing for SaaS Companies - Built by Hackers Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you. We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year. Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year. Let us help you sleep better at night.
    Starting Price: $6,600 per year
  • 9
    Reporter

    Reporter

    Security Reporter

    Security Reporter is an enterprise-grade pentest reporting software designed to streamline and standardize the penetration testing and security assessment reporting workflow. The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments. Key capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes. Security Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. By reducing manual reporting effort and minimizing errors, the platform improves productivity and shortens reporting cycles.
  • 10
    Hexway Pentest Suite
    Efficiently collaborate with your team, generate actionable, detailed reports, and build better relations with customers with Hexway Hive & Apiary.
  • 11
    Dradis

    Dradis

    Dradis Framework

    Import findings from over 20 popular pentesting and security tools and present your findings in a number of formats including Word, Excel, HTML, CSV, XML, realtime results portal or a custom format. Use multiple methodologies for different stages of a project, keep track of all your tasks and deliver consistent results across your organization without fail. Working together is easier when security project data, tool outputs, scope, results, screenshots and notes are centralized. Track changes, leave feedback and push updated findings to keep everyone on the same page. No need to learn any new technologies - combine the output from your favorite security tools - like Nessues, Burp, Nmap and more to create custom reports using our simple yet powerful templates we help you build to create reports in just a few minutes - not days. Overcome the limitations of static security reports using Dradis Gateway. Share the results of security assessments in real-time.
    Starting Price: $79 per month
  • 12
    Ivanti Neurons for RBVM
    Ivanti Neurons for RBVM is a risk-based vulnerability management platform designed to help organizations prioritize and remediate cybersecurity risks efficiently. It continuously correlates vulnerability data, threat intelligence, and business asset criticality to provide a contextualized view of risk. The platform automates remediation workflows, including SLA management and real-time alerts, to accelerate vulnerability closure. Role-based access controls and customizable dashboards foster collaboration across security teams from SOC to C-suite. Ivanti’s proprietary Vulnerability Risk Rating (VRR) prioritizes vulnerabilities based on real-world threat context rather than severity alone. This enables security teams to focus on the most critical risks and reduce exposure to ransomware and other cyber threats.
  • 13
    PlexVPN
    Unblock global websites and apps with PlexVPN wherever you are. You can stream Netflix, Hulu, BBC and other streaming sites securely and quickly, and enjoy games with geo-blocking. PlexVPN protects users' privacy from being leaked. When you use PlexVPN, we will hide your real IP address, and no one can track your location. PlexVPN has a huge range of servers around the world, supporting 38 countries and 55 regions. Thousands of servers ensure that your Internet performance is not slowed down. Your browsing, downloading, streaming will be lightning-fast through PlexVPN’s huge network. Want privacy on all devices? PlexVPN offers user-friendly clients for Android, iOS, macOS, Ubuntu and Android TV devices. Your data is safe with PlexVPN across all apps and platforms. Login to the client and connect with one click to freely access the global network and get your IP hided. Register a PlexVPN account and get a 3-day trial after completing email verification.
    Starting Price: $1.75 per month
  • 14
    ShadowPlex

    ShadowPlex

    Acalvio Technologies

    Organizations are turning to active defense solutions based on advanced deception because they are low-risk to deploy and avoid the false-positive issues of alternative approaches. Acalvio’s offering, ShadowPlex, has been architected to set a new standard for APT, ransomware, and malware mitigation, ShadowPlex centralizes the process. In the case of decoys (fake hosts or honeypots) they are hosted in a single area and then are strategically projected across the enterprise network, where they appear as realistic local assets. Furthermore, we change the complexity of a decoy on the fly in response to attacker engagement. This unique method of resource efficiency allows ShadowPlex to deliver both high-scale and depth of decoy realism. ShadowPlex automates and simplifies the configuration and deployment of deception objects. Combining pre-defined playbooks with an AI-based recommendation engine, the system self-generates and places the appropriate deception objects.
  • 15
    RidgeBot

    RidgeBot

    Ridge Security

    Fully automated penetration testing that discovers and flags validated risks for remediation by SOC teams. RidgeBot® is a tireless software robot, it can run security validation tasks every month, every week or every day with a historical trending report provided. Provides a continuous peace of mind for our customers. Evaluate the effectiveness of your security policies by running emulation tests that follow mitre Attack framework. RidgeBot® botlet simulates the behavior of malicious software or downloads malware signatures to validate the security controls of the target endpoints. RidgeBot® botlet simulates the unauthorized movement of data from your server—for example, personal data, financial, confidential, software source codes, and more.
  • 16
    SitePlex

    SitePlex

    SitePlex Ltd.

    SitePlex is field management software that digitally connects construction site & back office teams to deliver great projects. It increases efficiency, and monitors project progress, quality & safety. Whether on site using a device, or in the office working on a PC, SitePlex is designed to be easy to use by anyone, no matter what their standard of technical expertise. Instantly share documents from office or site, with hold-point aknowledgements to confirm they've been reviewed. Forms with digital signatures, approvals, reminders & notifications enable your team to be responsive, accountable and compliant. From instant notifications of incidents, to sharing of approved investigations & reports, SitePlex maintains & enforces Health & Safety policies, keeping your team compliant and their reaction time at a minimum. SitePlex empowers your site & back office teams to deliver great projects, together.
    Starting Price: £30/month/user
  • 17
    CyCognito

    CyCognito

    CyCognito

    Expose all the hidden security gaps in your organization using nation-state grade technology. CyCognito’s Global Bot Network uses attacker-like reconnaissance techniques to scan, discover and fingerprint billions of digital assets all over the world. No input or configuration needed. Uncover the unknown. The Discovery Engine uses graph data modeling to map your organization’s full attack surface. You get a clear view of every single asset an attacker could reach — what they are and how they relate to your business. Using CyCognito’s proprietary risk-detection methods, the attack simulator identifies risks per asset and discovers potential attack vectors. It doesn’t affect business operations and works without deployment, configuration or whitelisting. CyCognito scores each risk based its attractiveness to attackers and impact on the business, dramatically reducing the thousands of attack vectors organizations may have to those critical few dozen that need your focus
    Starting Price: $11/asset/month
  • 18
    TRAC

    TRAC

    SBS CyberSecurity

    Take the frustration out of risk assessments, vendor management, business continuity management, and other critical cybersecurity risk management tasks. Unlike spreadsheets that offer annoying, manual processes without any promise of usable data, TRAC was built to help you easily demonstrate compliance while also giving you the information you need to make the best decisions for your organization. When it comes to completing complex information security tasks, organizations often grapple with the same persistent challenges like time, manpower, expertise, and patience. Spreadsheets are the most common approach to performing these duties, but spreadsheets weren’t created for the level of sophisticated risk management, TRAC was. Backed by a team of cybersecurity experts and filled with easy-to-use workflows and built-in intelligence, using TRAC is the equivalent of adding a cybersecurity expert to your team at a fraction of the cost of hiring one.
  • 19
    QCT QuantaPlex
    The QCT QuantaPlex series is a sophisticated line of multi-node servers that deliver exceptionally high density and computing performance, making them ideal for data-intensive applications. Designed with a shared infrastructure approach, the QuantaPlex series offers the flexibility to accommodate various workloads, including large-scale data computing, data storage, and business-critical applications. By maximizing space utilization and optimizing cooling and energy efficiency, the QuantaPlex series effectively reduces total cost of ownership (TCO) while providing organizations with a powerful and versatile solution for meeting their data center and computing needs​.
  • 20
    Plex Quality Management System (QMS)
    Plex Quality Management System (QMS) helps process and discrete manufacturers meet strict industry and customer compliance with a closed-loop digital system of record. Ensure predictable, repeatable quality delivery through in-line quality, clear reporting, and simple audit tracking. Meet industry compliance and customer regulations with quality documentation available in real-time, digitally, across the enterprise. Drive new and repeat business growth with on-time delivery performance, improved supplier management, and increased customer satisfaction. Making quality management inherent to your workflows and processes reduces quality loss and risk of warranty issues or recalls, improving your brand reputation and customer relationships. With Plex quality requirements and documentation are available and shared in real-time across the enterprise. Plex helps you generate process control plans with detailed inspection instructions and digital checksheets.
  • 21
    Defendify

    Defendify

    Defendify

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning
  • 22
    Silent Armor

    Silent Armor

    Silent Breach

    Silent Armor is an AI-powered perimeter defense platform designed to predict and prevent cyber breaches before they occur. It continuously analyzes hundreds of security metrics across an organization’s attack surface to deliver real-time, intelligent protection. The platform combines predictive analytics, dark web monitoring, and threat correlation to uncover emerging risks. Agentless attack surface monitoring allows organizations to discover exposed assets without deploying endpoint software. Automated mitigation playbooks help neutralize threats directly from a unified dashboard. AI-generated daily security briefs provide executive-level insights and prioritized remediation steps. Built for CISOs, SOC teams, and MSSPs, Silent Armor transforms fragmented security data into proactive, actionable defense.
    Starting Price: $49/asset/month
  • 23
    IngeniousPlex

    IngeniousPlex

    IngeniousPlex

    Join the leading name in the programmatic advertising industry and multiply your revenue with the help of the right tools and technologies under one roof. Stretch your budget for amazing results; IngeniousPlex budget optimization makes every dollar count. Publishers, imagine reaching the masses effortlessly; IngeniousPlex specializes in scaling your website traffic, quickly and efficiently. It can also be a game-changer for your similar web ranking, enhancing credibility. IngeniousPlex ensures your content resonates with the right people. It comes with support that’s as dedicated as you are and can scale your traffic precisely where it counts. It aligns your blog perfectly with your audience’s interests and strategically targets video views to amplify your presence within your niche. We can boost your video engagement, building your social influence and credibility. With IngeniousPlex, your videos align seamlessly with your audience’s interests.
  • 24
    InfiPlex

    InfiPlex

    InfiPlex

    The InfiPlex™ Order Management System (OMS) is a complete solution that helps simplify and optimize your eCommerce sales channels. The InfiPlex OMS manages all of your orders, inventory, pricing, and fulfillment across all of your selling channels. It can also get you connected with your drop-shippers to automate your shipping process, allowing you to grow faster. The InfiPlex OMS offers a secure and scalable environment to meet the demands of your business. We are an Amazon AWS Partner and all of our systems run on the Amazon cloud. We also offer custom programming to meet any special integration needs you may have.
    Starting Price: $99.99 per month
  • 25
    CloudPlex

    CloudPlex

    CloudPlex

    CloudPlex is an enterprise cloud enablement platform that meets both the technical and business needs of the enterprise for running their applications in the cloud. It handles all key aspects of managing apps including governance, security, orchestration and cost management. The platform manages cloud-native, container-based and legacy applications on all major public clouds in a unified manner. It enables a completely automated application provisioning and orchestration process. CloudPlex addresses the business needs of the enterprise by providing a complete estimation, review, approval and change management workflow of cloud-spend, as well as end-to-end license management.
  • 26
    OnSecurity

    OnSecurity

    OnSecurity

    OnSecurity is a leading CREST-accredited penetration testing vendor based in the UK, dedicated to delivering high-impact, high-intelligence penetration testing services to businesses of all sizes. By simplifying the management and delivery of pentesting, we make it easier for organisations to enhance their security posture and mitigate risks, contributing to a safer, more secure digital environment for everyone. Make use of real-time reporting and immediate validation on fixes with FREE retesting. Streamline and reduce your admin overhead by integrating with existing workflows and demonstrate clear ROI. Pentesting, Vulnerability Scanning and Threat Intelligence all in one platform.
    Starting Price: $9.30 per month
  • 27
    SCYTHE

    SCYTHE

    SCYTHE

    SCYTHE is an adversary emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. SCYTHE allows organizations to continuously assess their risk posture and exposure. SCYTHE moves beyond just assessing vulnerabilities. It facilitates the evolution from Common Vulnerabilities and Exposures (CVE) to Tactics, Techniques, and Procedures (TTPs). Organizations know they will be breached and should focus on assessing detective and alerting controls. Campaigns are mapped to the MITRE ATT&CK framework, the industry standard and common language between Cyber Threat Intelligence, Blue Teams, and Red Teams. Adversaries leverage multiple communication channels to communicate with compromised systems in your environment. SCYTHE allows you to test detective and preventive controls for various channels.
  • 28
    ImmuniWeb

    ImmuniWeb

    ImmuniWeb

    ImmuniWeb SA is a global application security company operating in over 50 countries, headquartered in Geneva, Switzerland. Most of ImmuniWeb customers come from regulated industries, such as banking, healthcare, and e-commerce. ImmuniWeb® AI Platform leverages award-winning AI and Machine Learning technology for acceleration and intelligent automation of Attack Surface Management and Dark Web Monitoring. The data is later leveraged for a threat-aware and risk-based Application Penetration Testing for web, mobile, and API security testing. ImmuniWeb is the only company that offers a contractual zero false-positives SLA with a money-back guarantee. ImmuniWeb’s AI technology is a recipient of numerous awards and recognitions, including Gartner Cool Vendor, IDC Innovator, and the winner of “SC Award Europe” in the “Best Usage of Machine Learning and AI” category. ImmuniWeb® Community Edition runs over 100,000 daily tests, being one of the largest application security communities
    Starting Price: $499/month
  • 29
    Plex Manufacturing Execution System (MES)
    Take control of your plant floor with full visibility into your production lifecycle and full connectivity to your manufacturing ERP. By automating tasks, preventing errors, driving in-line quality, and ensuring accurate communication between the top floor and the plant floor. With a comprehensive, real-time view of your entire production lifecycle. For both you and your customers with full traceability and operations monitoring. In many plants today, people still manually enter much of their data. Plex’s paperless, easy-to-use operator Control Panel automates tasks, preventing human errors and increasing productivity. Plant operators can mitigate compliance risk through database-driven traceability and direct, in-line quality control. Traditionally, MES/MOM systems contain disparate applications connected through complex integrations. Plex provides a unified solution — that means a single user interface to applications that are designed to work as one.
  • 30
    Nessus

    Nessus

    Tenable

    Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment. From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Today, Nessus is trusted by more than 30,000 organizations worldwide as one of the most widely deployed security technologies on the planet - and the gold standard for vulnerability assessment.
  • 31
    ESOF

    ESOF

    TAC Security

    Security teams are overwhelmed with tools and data that show vulnerabilities across their organizations, but don’t provide a clear roadmap of how to allocate scarce resources to reduce risk most efficiently. TAC Security combines the widest view of vulnerability and risk data across the enterprise to create insightful cyber risk scores. The power of artificial intelligence and user-friendly analytics helps you measure, prioritize, and mitigate vulnerabilities across the entire IT stack. Our Enterprise Security in One Framework is the next generation, risk-based vulnerability management platform for forward-looking security organizations. TAC Security is a global pioneer in risk and vulnerability management. TAC Security protects Fortune 500 companies, leading enterprises and government across the globe through its AI based vulnerability management platform – ESOF (Enterprise Security on One Framework).
  • 32
    PleX Travel Suite

    PleX Travel Suite

    HyperTech Solutions

    The market-leading PleX Travel Suite is a sophisticated solution that is designed to manage a full range of travel requirements. It is a proven and scalable system that automates much of the leisure travel distribution process. PleX allows you to sell flights, hotels, car rentals, local activities and travel insurance, as standalone products or as packaged deals. The PleX Travel Suite offers the flexibility of a custom-built solution with the reliability of a 'tried and tested' out-of-the-box solution. Fully supported so clients can save money on capital expenditures, developers and tech support teams. HyperTech solutions include offering an advanced reservations applications that support the flexibility required to compete in today’s global leisure travel industry. We’ve created innovative applications that enable tour operators, consolidators, online brands and other players to source content from multiple suppliers, and combine this to add value while applying business rules.
    Starting Price: $50000 one-time payment
  • 33
    Plex

    Plex

    Plex

    Share, reminisce, and give your moments the spotlight on any device you choose, complete with feature-rich options for organization, full format support, and no need to upload to the cloud. Setup is easy with our step-by-step wizard, you’ll be streaming your media in no time. Once you add your photos and videos to Plex, they are organized in one place that is easy to navigate and beautiful to look at from any device. Create photo albums, share libraries, edit metadata, browse all of your photos and videos using automatic image- and geo-tagging, or rediscover forgotten memories. Using object and scene recognition, Plex tags your photos based on subject (kids, sports, sunsets, etc.). Fine-tune your tags by removing, editing, or adding your own! Plex also supports places, which uses any GPS data in a photo to show you where it was taken. Chronological clusters make it easy to see your precious memories in the order they happened.
    Starting Price: $5 per month
  • 34
    Plex Smart Manufacturing Platform
    Drive plant floor efficiency with high-resolution visibility, error-proofed control, and a real-time production ecosystem that is connected to your ERP—by design. ERP systems weren’t designed for manufacturing execution. Plant floor information available post-production—or “back-flushed”—doesn’t help you control output at the manufacturing moment. Plex’s Manufacturing Execution Suite (Plex MES) gives you real-time production management so you have up-to-the-second manufacturing data—for end-to-end visibility and closed-loop control. Flexible, configurable, cloud-native solution for ease of deployment, standardization and integration to complement your corporate ERP system. Suite of unified shop floor applications on a common database to eliminate the risk of disruptions or errors due to inter-application integrations. Paperless, easy to use, operator control to increase productivity, and eliminate manual process errors.
    Starting Price: $3000.00 per month
  • 35
    Outpost24

    Outpost24

    Outpost24

    Understand your attack surface with a unified view and reduce cyber exposure from an attacker’s view with continuous security testing across networks, devices, applications, clouds and containers. Having more information alone won’t help you. Even the most experienced security team can be blindsided by the sheer amount of alerts and vulnerabilities they have to deal with. Powered by threat intelligence and machine learning our tools provide risk-based insights to help prioritize remediation and reduce time to patch. Our predictive risk based vulnerability management tools ensure your network security is proactive – helping you reduce time to remediation and patch more effectively. The industry’s most complete process to continuously identify application flaws and secure your SDLC for safer and faster software releases. Secure your cloud migration with cloud workload analytics ,CIS configuration assessment and contain inspection for multi and hybrid clouds.
  • 36
    Elasticito

    Elasticito

    Elasticito Limited

    We alert organisations to Risks & Threats. Our approach integrates state-of-the-art automation with the seasoned expertise of our Cyber Specialists, offering you exceptional visibility & control over the evolving cyber threats your business faces. We deliver the intelligence needed to proactively defend against attacks & understand third-party exposures. Through ongoing analysis of your security infrastructure, we identify areas of strength, uncover weaknesses & prioritise critical fixes based on potential business damage. Achieve a clear understanding of your security posture, benchmark against competitors & ensure regulatory compliance. Our Crown Jewel Protection, Detection & Response Solutions, aligned with the MITRE ATT&CK Framework, secure your critical assets at every stage.
  • 37
    Tenable One
    Tenable One radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to isolate and eradicate priority cyber exposures from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. The world’s only AI-powered exposure management platform. See every asset across your entire attack surface—from cloud environments to operational technologies, infrastructure to containers, and remote workers to modern web-apps with Tenable's market-leading vulnerability management sensors. With more than 20 trillion aspects of threat, vulnerability, misconfiguration and asset information, Tenable’s machine-learning powered predictions reduce remediation efforts by enabling you to focus first on the risks that matter most. Drive improvements required to reduce the probability of a business-impacting cyber event from occurring by communicating objective measures of risk.
  • 38
    Picus

    Picus

    Picus Security

    Picus Security, the leading security validation company, gives organizations a clear picture of their cyber risk based on business context. Picus transforms security practices by correlating, prioritizing, and validating exposures across siloed findings so teams can focus on critical gaps and high-impact fixes. With Picus, security teams can quickly take action with one-click mitigations to stop more threats with less effort. The Picus Security Validation Platform easily reaches across on-prem environments, hybrid clouds and endpoints coupled with Numi AI to provide exposure validation. The pioneer of Breach and Attack Simulation, Picus delivers award-winning threat-centric technology that allows teams to pinpoint fixes worth pursuing, offering a 95% recommendation in Gartner Peer Review.
  • 39
    Comm-Trac

    Comm-Trac

    Environmental Data Management

    Manage all your Environmental, Health and Safety data, documents, regulations compliance procedures, deadlines and tasks with Comm-Trac™ commitment tracking software from EDM. Now you can get ahead of the compliance curve, and stay ahead once and for all, with Comm-Trac™. Whether you operate a small business or are part of a global operation, there is a Comm-Trac™ product to fit your level of complexity and budget. Click the buttons on this page to learn more about Comm-Trac™ products. You can also use Comm-Trac to manage training programs, equipment and facilities maintenance schedules, tax compliance, and many other applications unique to your business. With Comm-Trac™ and its customizable features, the sky is the limit! If you run a small operation and EHS compliance is a constant challenge Comm-Trac™ Basic can help you organize your requirements, set up a "compliance dashboard", manage documents and establish an automated reminder system.
  • 40
    StudentTrac

    StudentTrac

    Education Dynamics

    Students and families can complete their enrollment paperwork and upload documents, such as previous school transcripts and immunization records, online with no hassle. StudentTrac captures electronic signatures from guardians in a single click. Reduce paperwork by tracking attendance and delivering progress reports online. With StudentTrac, there's no need for office staff to input daily attendance. Our system will compile it for you. Parents and guardians can monitor student attendance and progress via the StudentTrac parent portal. StudentTrac has dozens of pre-built reports designed to identify trends and disruptions in student matriculation. These can be vital to understanding where and when your students need additional academic support or interventions to stay on pace to graduate. StudentTrac also allows users the ability to create custom reports which can be filtered or grouped by any collected data point.
  • 41
    TRAC

    TRAC

    Leadmark

    Drop the lengthy email threads, out-of-date spreadsheets and clunky software for managing your sourced services portfolios. TRAC gives you insight, clarity and control of your sourced services landscape at a single glance. TRAC is our revolutionary subscription-based platform in the cloud that streamlines and empowers sourcing governance efforts at prices anyone can afford. It comes out of the box with pre-configured processes, workflows, dashboards and reports. Moving to the cloud however, doesn’t mean you can’t have it your way. TRAC brings incredible configurability allowing it to easily adapt to your specific needs. Connect to TRAC and experience the power of up to date, factual information managed collaboratively by both customer and supplier teams. It’s the ideal solution for companies looking to reduce administrative overheads, stop the frustration of chasing data on critical aspects of sourcing performance and increase the maturity of their sourcing governance.
  • 42
    Trac

    Trac

    Edgewall Software

    Trac is an enhanced wiki and issue tracking system for software development projects. Trac uses a minimalistic approach to web-based software project management. Our mission is to help developers write great software while staying out of the way. Trac should impose as little as possible on a team's established development process and policies. Trac allows wiki markup in issue descriptions and commit messages, creating links and seamless references between bugs, tasks, changesets, files and wiki pages. A timeline shows all current and past project events in order, making the acquisition of an overview of the project and tracking progress very easy. The roadmap shows the road ahead, listing the upcoming milestones. Trac has a built-in wiki system which you can use for organizing knowledge and information in a very flexible way by creating pages containing an intuitive and easy to learn textual markup.
  • 43
    ZeroThreat.ai

    ZeroThreat.ai

    ZeroThreat Inc.

    ZeroThreat.ai is an AI-powered web application and API pentesting platform designed to identify real, exploitable vulnerabilities—not just surface-level findings. Built for modern engineering teams, it combines Agentic AI pentesting with a high-performance scanning engine to deliver up to 10× faster, deeply validated security testing. Unlike traditional DAST tools that rely on static signatures and generate excessive noise, ZeroThreat.ai executes adaptive, attacker-style workflows that evolve based on application behavior. Its interpreter-driven vulnerability intelligence continuously ingests emerging threats and newly disclosed CVEs, enabling near real-time detection updates and rapid CVE-to-exploit mapping. The platform supports over 100,000 vulnerability checks, including native Nuclei template execution, and extends beyond known issues with zero-day detection through behavioral pattern analysis.
    Starting Price: $100/Target
  • 44
    SecurityHQ

    SecurityHQ

    SecurityHQ

    SecurityHQ is a world leading independent Managed Security Service Provider (MSSP), that detects, and responds to threats, instantly. As your security partner, we alert and act on threats for you. Gain access to an army of analysts that work with you, as an extension of your team, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs. Most Popular Services: Managed Detection and Response (MDR) Endpoint Detection and Response (EDR) Managed Extended Detection and Response (XDR) Vulnerability Management Services Managed Firewall Digital Forensics & Incident Response Managed Network Detection and Response (NDR) Penetration Testing CISO as a Service
  • 45
    uTRAC

    uTRAC

    uTRAC

    Simplify your entire staffing operations from recruitment to payment with uTRAC. As a dynamic workforce management software solution, uTRAC enables event services companies and temp agencies to quickly and easily coordinate and track workers across multiple locations. Designed with the specific complexities of contingent staffing in mind, uTRAC helps streamline staff scheduling, improves workforce communication, and promotes faster and more efficient billing and payroll.
    Starting Price: $39.00/month/user
  • 46
    BeneTrac

    BeneTrac

    Paychex

    BeneTrac is sold only through employee benefit brokers. Only BeneTrac gives you a local rep with both carrier and technology experience. BeneTrac gives you a long-term answer to your company's HCM needs. BeneTrac software and the Paychex Flex® HCM platform deliver seamless interactivity with your current office platform. Now after almost two decades of improvements, we’ve expanded our cloud-based solutions to include comprehensive Human Capital Management.
  • 47
    Plexe AI

    Plexe AI

    Plexe AI

    Plexe AI is a no-code/low-code machine-learning platform that allows users to build, train, and deploy predictive models simply by describing what they want in plain language. You connect your data or upload a dataset, then type your intent, such as “predict customer churn” or “recommend products based on purchase history”, and the system handles everything from preprocessing and feature engineering to model selection, evaluation, and deployment as an API endpoint. With seamless integrations into your existing infrastructure, provider-agnostic support for different LLMs and frameworks, and an open source Python SDK for deeper control, Plexe AI significantly reduces the time and complexity of turning raw data into production-ready ML applications. Trusted by early adopters, the platform is designed to democratize machine learning development and accelerate value from data.
  • 48
    CaseTrac

    CaseTrac

    ETHIX360

    With game changing innovation in the use of artificial intelligence, best practice workflows and features designed by HR and compliance professionals for HR and compliance professionals, CaseTrac is the leading case management solution available in the market today. CaseTrac™ offers the industry’s most comprehensive intake methods for reporting your company’s concerns, and collects, manages and resolves any incidents that arise. We always protect the anonymity of each reporter and provide seamless communication with the individual who chooses to report. ETHIX360 believes that the more constituents report to your company, the more your company can learn, grow and elevate its overall performance. Our Web Services application also provides an API to leading HRIS solutions, facilitating maximum utilization and value. The solution includes a powerful workflow engine and notification matrix along with a comprehensive, easy-to-use reporting and analysis platform.
  • 49
    CasinoTrac

    CasinoTrac

    CasinoTrac

    The CasinoTrac casino management system by Table Trac, Inc. delivers comprehensive insights to your business ranging from accounting and revenue audits to Players Club and promotions. Now processing millions of transactions daily at over 150 casinos worldwide, it provides full functionality on all levels of casino operations. We welcome and encourage requests for interviews and speaking arrangements with our executives or those seeking additional information about Table Trac. Our news page is designed to provide accurate, current, and easily accessible information about Table Trac. Find the players, games and bets with the highest returns. Spot anomalies, discrepancies, and fraud and prevent losses. Visualize and optimize the gaming floor with PAR, coin, win and drop views. Follow up with reports on cage hand-pay rolls per shift, slot bank fills and credits, and ticket tracking.
  • 50
    FileTrac Evolve

    FileTrac Evolve

    Evolution Global

    FileTrac has a long-standing legacy of being the #1 claims management system in the industry. Building on this reputation, it has now evolved into FileTrac Evolve. This enhanced version is a crucial component of the Evolve Suite, a comprehensive platform designed to revolutionize your claims management process. FileTrac Evolve is a leading web-based claims management system for independent adjusters, third-party administrators (TPAs), managing general agents (MGAs), and insurance companies of all sizes. Comes with a built-in diary system with reminders and provides integrations with Quickbooks, Outlook, Xactanalysis, Symbility, LEDES, NFIP/NFS, and Google Maps, FileTrac Evolve helps businesses manage their adjusters while ensuring accountability to their customers. Other key features include time and expense tracking, invoicing, adjuster timesheets, image and video uploads, accounting reports, quick notes, and more.