Alternatives to SeeTrue Autonomous AI Detection
Compare SeeTrue Autonomous AI Detection alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SeeTrue Autonomous AI Detection in 2026. Compare features, ratings, user reviews, pricing, and more from SeeTrue Autonomous AI Detection competitors and alternatives in order to make an informed decision for your business.
-
1
Athena Security
Athena Security Concealed Weapons Detection System
Athena Security is a physical security technology company that specializes in AI-powered threat detection and entryway management. Founded in 2018 and headquartered in Austin, Texas, Jacksonville Florida and SF. The company focuses on replacing outdated security hardware with AI based software and hardware solutions designed for high-traffic environments like hospitals, schools, and casinos. Key Product Ecosystem: Concealed Weapons Detection System (Apollo 500): A high-throughput walk-through detector that uses AI to distinguish between metal weapons (firearms, knives) and everyday metal objects like keys or phones, allowing people to pass through without emptying their pockets. AI-Assisted X-Ray: Software and or hardware that integrates with baggage scanners to automatically highlight threats and stop the conveyor belt if a weapon or prohibited item is detected. Hospital Visitor Management System for healthcare facilities that automates visitor check-in with EPIC. -
2
Kognition
Kognition AI
Kognition AI security stops threats in real-time. Transform legacy security into intelligent protection that pays for itself. Kognition AI integrates seamlessly with existing cameras and access control - no costly rip-and-replace required. Why Security Leaders Choose Us: ✓ 24/7 AI Guardian that never misses threats or calls in sick ✓ Works with Axis, Hanwha, Avigilon, Genetec, Milestone, and other popular platforms and devices. ✓ Real-time alerts deliver actionable intelligence in seconds ✓ Easy to deploy enterprise-grade security Perfect for corporate campuses, schools and universities, office buildings, hospitals, and retailers seeking modern security to reduce risk and improve staff, student, and tenant safety. Transform your security team from reactive responders to proactive guardians with Kognition AI - schedule a demo today! -
3
Omnilert
Omnilert
Save lives through early threat detection and rapid response with visual gun detection. Our AI-powered Gun Detect software brings reliable, 24x7 monitoring to security cameras, creating a widely deployable early gun detection solution. Our Emergency Communications and Automation Platform shares needed intelligence through automatic activation of emergency response plans and safety systems. No matter the threat, from guns to severe weather, we help you maximize every critical second and keep your people from harm's way. Safeguard your people, facilities and operations from all of the threats you face today. -
4
Resolver
Resolver
Resolver gathers all risk data and analyzes it in context — revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks — whether compliance or audit, incidents or threats — and translates those effects into quantifiable business metrics. Finally, risk becomes a key driver of opportunity instead of being disconnected from the business. Choose the risk intelligence software used by over 1000 of the world’s largest organizations. Resolver makes it easy to collaborate and collect data from across the enterprise, allowing teams to fully understand their risk landscape and control effectiveness. Understanding your data is one thing; being able to use it to drive vital action. Resolver automates workflows and reporting to ensure risk intelligence turns into risk reduction. Welcome to the new world of Risk Intelligence.Starting Price: $10,000/year -
5
ZeroEyes
ZeroEyes
ZeroEyes is an AI weapons detection platform that identifies threats at first sight. Founded by a team of Navy SEALs our mission is to detect weapons before shots are fired, enable faster response times for first responders and ultimately end mass shootings. AI weapon identification can help locate threats before they become violent. This provides first responders with the best information possible. Integration with local 911 and police forces can help prevent a dangerous situation from escalating. Using ZeroEyes, first responders have the right details in real time, so they can immediately respond to the threat. With custom solutions for your specific needs, ZeroEyes connects to your existing security cameras and building infrastructure for an added layer of protection. Senseless violence has caused the loss of too many lives. At ZeroEyes we are working to support security professionals and law enforcement. The quicker you know there may be a threat, the quicker you can respond. -
6
CrowdStrike Falcon
CrowdStrike
CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity. -
7
PAX CHECKPOINT
Vanderlande
The process of moving passengers through an airport needs to be secure, seamless, rapid and deliver a positive experience for all travelers. Vanderlande cooperates closely with airports to provide the core components of the security process through innovative systems and intelligent software solutions. As part of our next generation of scalable solutions, evolutions, Vanderlande offers PAX CHECKPOINT. This combines state-of-the-art automated screening lanes with configurable multiplex screening software to create a fully integrated checkpoint solution. Scalable and flexible, it offers increased throughput and an improved passenger experience while allowing for easy expansion. The PAX Advanced lane is the most cutting-edge automated screening lane (ASL) for the screening of passengers’ hand luggage in airports or other secured areas. PAX MX2 allows passengers to divest and reclaim on both sides of the screening machine, ultimately offering the efficiency of two conventional lanes. -
8
Evolv Express
Evolv Technology
The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. Visitors want to move quickly through security checkpoints at a seamless pace, knowing they’re well-protected everywhere inside your venue—while your security teams want the assurance that they can reliably pinpoint and stop threats. The Evolv weapons detection system combines powerful sensor technology with proven artificial intelligence (AI), security ecosystem integrations, and comprehensive venue analytics to ensure safer, more accurate threat detection at an unprecedented speed and volume. The new outdoor Evolv Express system has a ruggedized design making it easier to move over rough and sloped surfaces. Customers also have the option to order a retrofit kit for their existing outdoor systems. -
9
PureActiv
PureTech Systems
Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors. -
10
acre Intrusion
acre security
Acre’s acre Intrusion systems provide advanced solutions for protecting businesses and properties by detecting and responding to unauthorized access or suspicious activity. These systems integrate cutting-edge technology to offer real-time monitoring, alarm notifications, and automated responses to potential security threats. Acre’s intrusion detection solutions are designed to seamlessly connect with other security systems, such as access control and video surveillance, creating a comprehensive security network. The system’s flexibility allows businesses to customize alerts and responses based on the severity and type of threat. It also offers easy-to-use interfaces for managing and controlling the system, providing users with complete visibility into security events. Acre’s intrusion detection solutions are built with advanced analytics to reduce false alarms, improving the accuracy and reliability of the system. -
11
Ontic
Ontic
Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence. -
12
T3
Roeville Computer Systems
T3 is the passenger reservation solution for ALL operators, with the processing power, scalability and security expected of a true client server database product. Based on the SAP - Advantage Database Server (ADS SQL), t3 currently powers the majority of household name Tour Operators in the UK and is responsible for the administration of millions of passenger holidays and daytrips every single year. Designed to support and manage the entire operation, t3 meets all requirements of a modern day operation from enquiry through booking, reporting through to financial management. Payment processing is all handled by the system as well as email confirmations, rooming lists and other passenger communications. We continue to extend the range of business functions to meet the exacting needs of all organisations, including an optional graphical interchange/pickup management tool and our e-commerce platform. -
13
rainmaker
Cendyn
A revenue management solution built to optimize profit for every segment of your group and transient business. Go beyond a rules-based revenue strategy and benefit from true science. rainmaker employs advanced statistical approaches to help its forecast quickly adapt to changes and achieve better stability in the outcome. Lift revenues of 7-10% by accounting for guest activity across your property, including ancillary spend. Based on true science and not confined by a set of rules. Built as a true revenue and profit optimization solution. Detect unexpected events or anomalous demand patterns that are often missed by human analysis. Data-driven micro-segmentation of demand across your hotel’s unique business mix. Forecasting models based on the relative weighting of the myriad factors influencing demand. Go beyond a rules-based revenue strategy and benefit from a science-based system and understand your business needs from all angles. -
14
HiveWatch
HiveWatch
HiveWatch is an AI-driven physical security platform that unifies disparate security systems, such as access control, video surveillance, and guard operations, into a single, cloud-based command center that transforms security from reactive to strategic. It features a rules engine for customizing incoming alarms by criteria like time, location, or repeatability, and embedded standard operating procedures to guide operator response. HiveWatch reduces false alarms through machine learning, escalates genuine threats to human supervisors via its AI Operator module, and automates tailgating detection. It also supports multi-site orchestration, device health monitoring, case management of incidents, and performance metrics (e.g., time to resolve, incident counts) for executive reporting. Field teams receive real-time incident data and site snapshots, can initiate manual incidents with photographic data, execute guard tours, and maintain coordination.Starting Price: Free -
15
Darktrace
Darktrace
Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations. -
16
Protecsys 2 Suite
Horoquartz
With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification. -
17
TravelX
TravelX
TravelX’s algorithm expertly clusterizes flights and customers, detects opportunities to repurchase seats and resell them to higher-yielding passengers, and sends personalized and dynamic repurchase and flight swap offers to passengers. TravelX offers a white label solution or API integration that allows airlines to offer unparalleled flexibility to passengers: a Self-Service Ticket that can be renamed, transferred, gifted, or resold according to rules predefined by the airline. A fully automated product that optimizes airline revenue through the use of dynamic flight swap and seat buyback offers, in order to free up space for last minute, high yield passengers on high demand flights. A white-label or API-integrated product that enables passengers to access a unique self-service ticket that can be easily renamed, transferred, gifted, or sold to other passengers, all within an airline-controlled ecosystem designed to boost revenues and enhance customer experience. -
18
CyberTrap
CyberTrap
Enable the immediate detection of attacks with CyberTrap’s deception technology. Our threat detection solutions deliver immediate detection of attacks, luring, deceiving, and entrapping hackers. Traditional cybersecurity solutions are unable to prevent Advanced Persistent Threats (APTs) and targeted attacks, allowing cyber criminals to exploit vulnerabilities and gain access to organizations’ data, applications, and systems without being detected. In contrast, CyberTrap helps organizations outsmart cyber attackers with advanced threat intelligence and our proprietary deception technology. Identify snoopers before they reach production. As soon as someone interacts with our strategically placed lures, it generates a true positive result, instantly flagging potential threats. This proactive approach ensures that suspicious activities are recognized and addressed in real time. Divert intruders away from authentic assets. -
19
Exigent-GR
Arcarithm
Applying Artificial Intelligence to identify guns as early as possible to save lives. The Exigent®-GR gun detection capability is based on AI technology developed by Arcarithm for the US Army. The technology was originally developed to detect both drones and guns, based on the concept that a larger operational space allows more reaction time. Current security camera systems require a human to identify gun threats. Even dedicated security professionals using the best camera system cannot provide 100% real-time observation. An effective, proactive solution is needed to identify guns before they enter the building and shots are fired. Autonomously detects people with guns as early as possible, before shots are fired. Instantly analyzes imagery using AI algorithms to determine the type of gun (long gun vs. pistol). Automatically notifies security officials via text message or email showing the person with the gun, their location and type of gun. -
20
Defendry
Defendry
The Defendry Security Suite is a powerful, automated set of components designed to work seamlessly together whether you only need one or two components or the entire suite. The Defendry SeeSay mobile app is the perfect way to get started! It is fast and easy to deploy, and quickly makes everyone part of your security solution. SeeSay empowers anyone with a smartphone to send texts, alerts, and videos of potential threats directly to your security staff. SeeSay can exponentially speed intelligence and communication as a potential threat situation emerges. The smartphone instantly turns into a security camera. Secure direct messaging with security staff. Everyone is part of your security solution. IoTalk gives operations teams the ability to pre-plan every detail of automatic threat response by creating customized, pre-programmed workflows, to speed a well-coordinated response to any type of threat. Defendry can auto-detect hundreds of different kinds of guns and weapons. -
21
Sentinel IPS
Sentinel IPS
An affordable suite of network security services, including a Managed Network Detection and Response team, our unique Network Cloaking™ methodology, and CINS Active Threat Intelligence. Comprehensive managed security. Designed to support lean IT teams, and get them back to their other projects. Working with you to deflect outside intrusions, detect malicious threats, and respond quickly to critical events. Autonomous Threat Defense and Active Threat Intelligence beyond the firewall. Another set of eyes on traffic inside the network. Sentinel Outpost provides advanced threat protection at the network’s edge with Network Cloaking™, blocking malware, exploitation attempts, and other threats before they reach the firewall. -
22
Ariadne
Ariadne Maps
Ariadne Maps is a high-tech company that provides detailed indoor and customer analytics with its cutting-edge artificial intelligence approach. This approach enables indoor and outdoor localization in many industries, such as transportation, malls, retailers, and airports. We use advanced artificial intelligence algorithms for precise and anonymous tracking of passengers and customers to help companies optimize their infrastructure, e.g., minimizing congestion and having better-targeted advertising and marketing while maximizing the satisfaction and experience of consumers. Ariadne Maps is based in Munich, Germany, and has been operating for years. With our rapid growth, we vision enabling physical businesses to leverage the data they have been exposed through the whole time. In this vision, our strong team, advisors, investors, and partners give us the confidence to advance, expand and succeed.Starting Price: $30 per device -
23
Xovis
Xovis
Xovis offers a comprehensive suite of solutions designed to optimize people flow across various environments. Their technology integrates 3D sensors and software to provide real-time data on movement patterns, enabling efficient management of spaces such as airports, retail stores, transportation hubs, and smart buildings. In airports, Xovis' Passenger Flow Management System (PFMS) accurately tracks passengers' journeys from curb to gate, providing key performance indicators like waiting times and passenger volumes. This data helps airport operators monitor queues, identify bottlenecks, and enhance the passenger experience. For retail applications, Xovis' solutions offer insights into customer behavior by analyzing flow and dwell times, allowing retailers to optimize store layouts and improve customer journeys. The system can also detect group formations and exclude staff from customer counts to ensure data accuracy. -
24
Aptiv
Aptiv
Aptiv is a global technology company that develops safer, greener and more connected solutions enabling the future of mobility. Aptiv is focused on developing and commercializing autonomous vehicles and systems that enable point-to-point mobility via large fleets of autonomous vehicles in challenging urban driving environments. With talented teams working across the globe, from Boston to Singapore, Aptiv is the first company to deploy a commercial, autonomous ride-hailing service based in Las Vegas. Aptiv has provided over 100,000 public passenger rides, with 98% of passengers rating their Aptiv self-driving experience 5-out-of-5 stars. At Aptiv, we believe that our mobility solutions have the power to change the world. -
25
Daylight
Daylight
Daylight merges lightning-fast agentic AI with elite human expertise to deliver a next-gen managed detection and response service that goes beyond alerts, aiming to “take command” of your cyber-frontier. It promises full coverage of your environment with no blind spots, context-aware protection that continuously learns from your systems and past cases (including Slack chats), near-zero false positives, the industry’s lowest mean time to detection and mean time to response, and deep integration with your IT and security stack so it supports unlimited platforms, unlimited integrations, and delivers actionable, noise-free insights via AI dashboards. With Daylight, you get true end-to-end threat detection and response (no escalation games), 24/7 expert support, custom response workflows, environment-wide visibility, and measurable improvements in analyst utilization and response speed, all built to shift your security operations from reactive to commanding. -
26
Kai
Kai
Kai is an agentic AI cybersecurity platform designed to transform how organizations defend against modern cyber threats by replacing fragmented security tools with a unified system that can autonomously reason, analyze risk, and execute defensive actions. It was built from the ground up to address the limitations of traditional security stacks, where teams rely on many disconnected tools, dashboards, and manual workflows that cannot keep up with the speed and complexity of AI-driven attacks. Kai uses agentic artificial intelligence systems that continuously contextualize security data, assess risks, reason about threats, and take action across multiple security domains, including threat intelligence, exposure management, detection, and incident response. Instead of acting only as a monitoring dashboard, it performs the actual security work by orchestrating data, tools, and workflows into a single pipeline that operates at machine speed. -
27
NVISO
NVISO
NVISO is a global leader in human behaviour artificial intelligence (AI) software serving manufacturers of user-centric products and services worldwide. Globally deployed and validated human behaviour AI technology with high accuracy for key applications in making autonomous vehicles (e.g. Tesla EVs) safe with interior monitoring, patient monitoring for remote tele-medicine in healthcare/ robotics, and intelligent devices for smart homes. Enabling financial advisors to provide best interest advice with scientifically validated tools which detect and help manage client behaviours. Enhancing the safety, security, and comfort of connected and autonomous vehicles with advanced driver and occupant detection, authentication, and monitoring. Empowering medical professionals with intelligent patient monitoring to drive better patient outcomes while improving efficiency in aged-care homes and hospitals. -
28
SecuriThings
SecuriThings
Bringing IT Standards to the IoT Space. The operational management of large-scale IoT deployments creates significant challenges: Default credentials & brute force attacks, weak configurations, device malware & botnets, insider threats & tampering, performance issues & failures, manual maintenance & upgrades, excessive network & storage usage, Ongoing troubleshooting. Endpoint protection capabilities, real-time health monitoring & analysis, mitigation & maintenance. Protect connected devices deployed in airports and ports against malicious actors exploiting vulnerabilities to jeopardize the overall security operations. Enable the dedicated teams in airports and ports to automatically verify their connected devices are always up and running. Airports and ports are massively deploying IoT devices firstly to maximize the overall security and safety, but also to enhance passenger experience. -
29
AlertEnterprise
AlertEnterprise
AlertEnterprise delivers a unified cyber-physical security convergence platform by linking IT, OT and Physical Security for risk prevention, detection and mitigation. We help you eliminate security silos, to deliver the most complete view of threats and vulnerabilities while enhancing workforce safety, data privacy and experience. As the only SaaS provider to connect physical security, IT, OT and HR systems, we can help you empower your workforce and unlock new levels of business with a zero-trust, cyber-physical platform for identity, access governance and security. P.S. No coding required. If you work in compliance or investigations, trade the logs and manual checks for self-service, built-in checks, defined rules, workflow processes and more. And if you’re a facility owner, pull reporting, view required training and access an automatic audit trail — whenever you need to. -
30
Abnormal AI
Abnormal AI
Abnormal AI offers a behavioral AI platform designed to protect humans from sophisticated email threats like phishing, social engineering, and account takeovers. The platform leverages advanced anomaly detection to identify and stop AI-powered email attacks that operate at machine speed and evade traditional defenses. It delivers fully autonomous threat detection and response with minimal manual intervention. Abnormal AI integrates seamlessly with cloud email platforms, enhancing security without adding operational overhead. Trusted by over 3,000 customers including many Fortune 500 companies, it has demonstrated significant reductions in phishing attacks and SOC workload. Its unique human-focused, behavior-driven approach helps organizations proactively defend against evolving cyber threats. -
31
SafePointe
SoundThinking
SafePointe by SoundThinking is an AI-based concealed weapons detection system designed for high-throughput facilities. Each lane comprises two discreet metal bollards positioned 8–10 feet apart, equipped with an advanced 3D camera and an NVIDIA-powered edge processor running a state-of-the-art AI model. As individuals pass through, the system utilizes magnetic moment technology to identify digital signatures of magnetically conductive objects, analyzing motion data to determine direction, speed, and movement. If a potential threat is detected, information is reviewed by human analysts within 10 seconds to filter out non-threats, such as armed security personnel. Verified threats prompt digital alerts sent to the facility's security team via the SafePointe app, including images and short video clips identifying the individual. It supports unmanned screening, reducing operational costs, and is safe for individuals with medical devices due to its passive screening technologies. -
32
ARMO
ARMO
ARMO pioneers a new approach to Cloud Security with an open source powered, behavioral driven, Cloud Runtime Security Platform. ARMOs CADR (Cloud App Detection & Response) solution addresses a major unsolved pain point for organizations running on cloud-native architectures: how to continuously protect dynamic workloads during runtime without overwhelming teams with alerts or interrupting operations. ARMO CADR continuously reduces the cloud attack surface using real-time runtime insights, while actively detecting and responding to threats with true risk context. It includes 2 major products that are tightly integrated together and are part of one platform solution - * Kubernetes-First, runtime driven, Cloud Security Posture mgmt (CSPM) - identifying risks, prioritizing them and offering remediation without breaking applications in production * Real-Time Threat Detection & Response - detecting and responding to active threats across the entire cloud and applications stack -
33
Nuclearn
Nuclearn
Artificial Intelligence-driven automatic condition report coding, condition trend detection, safety reporting, CAP screening, and more. Nuclearn provides automation for the nuclear industry's most commonly performed time-intensive tasks using machine learning trained specifically for nuclear power by an industry-leading team. The Nuclearn team has first-hand experience complying with the challenges of nuclear export regulations and sometimes it is just plain easier to keep everything on-premise. This is why the Nuclearn platform was designed to be a true hybrid – equally as powerful and easy to use whether deployed on-premise or used in the cloud. The same Nuclearn platform you see at nuclearn.ai can be easily deployed on a single machine in your on-premise data center. -
34
Hakimo
Hakimo
Our remote guarding solution uses AI to monitor surveillance cameras and enables communication through speakers to deter unwanted visitors, providing more effective, lower-cost security than an on-site guard. Unauthorized access is a problem for every enterprise, but it can be tough to cut through the noise. Hakimo clears time-consuming nuisance alarms so that your team can focus on real threats that need action, including tailgating through doors and vehicle gates. Malfunctioning cameras and door hardware could potentially lead to a missed incident. Our software continuously monitors the health of your system hardware to identify any issues so they can be quickly resolved. When time and resources are limited, standing up for your own security operation doesn’t make a lot of sense. Regardless, security should be as effective and efficient as possible. This is where artificial intelligence-powered remote guarding comes in. You've got a business to run, so leave security to the experts. -
35
door2door
door2door
Electric, autonomous or classic: door2door's technology helps you to launch, manage and scale new mobility worldwide. Discover the door2door Mobility Platform™ and find the ideal solution to serve your customers. Whether you’re looking for ridepooling software, best-in-class technology for autonomous on-demand shuttles, multimodal mobile apps (MaaS) or intelligent tools for analysis, simulation and transport planning, our experienced teams of experts will set you up for success with our outstanding technology. At door2door, we help you deliver innovative mobility services – either autonomous or human-driven. This involves smart fleets that offer maximum passenger convenience and operating efficiency, using any brand of vehicle. The door2door Mobility Platform™ includes everything you need to offer successful mobility services. -
36
Samsride Dispatching System
Samsride
Samsride is an on-demand App software for taxi, limo or delivery services. We offer white-label or co-branding solutions for existing transportation companies. We can generate iOS/Android driver and passenger apps with your logo and name. Customer who downloads apps will not see anything about us, it looks like your company owns the mobile application. Our platform is built on noSQL technology, which can handle large fleets with ease. We design our software to be flexible so we can change and customize according to your business requirements. Drivers and passengers communicate within a sub-second response. Passenger can scan credit card in App. Our app is PCI compliant as we use a leading payment gateway. None of the credit card information is stored on our app server so passenger can rest assured that the credit card information is secure. Once the trip is completed, the payment is deducted automatically using passenger's registered card. The invoice is sent to the passenger’s email. -
37
Core Network Insight
Core Security (Fortra)
Instead of monitoring specific assets or the network itself, these security solutions constantly watch network traffic, creating a picture of what normal traffic patterns look like. With a baseline developed, NTA tools can then flag traffic abnormalities as possible security threats. Though there are multiple approaches to this, NTA tools should have some degree of analysis of anomalies to determine whether it’s a harmless abnormality, or a true threat. With network traffic monitoring, Network Insight observes device behavior in real time. It is continually capturing and correlating evidence using multiple detection engines to arrive at a verdict of "suspected" or "infected." The Case Analyzer, a context aware network traffic analysis and threat intelligence engine, confirms the infection, and a series of risk profilers assess and prioritize the infection based on the determined risk level. -
38
AT&T Cybersecurity
AT&T Cybersecurity
As one of the world’s largest Managed Security Services Providers (MSSP), AT&T Cybersecurity delivers the ability to help safeguard digital assets, act with confidence to detect cyber threats to mitigate business impact, and drive efficiency into cybersecurity operations. Defend your endpoints from sophisticated and ever-present cyber threats, detect and respond autonomously at machine speed, and proactively hunt threats down before they start to act. Instant threat prevention, detection, and response to help protect your devices, users, and business. Automatically terminate malicious processes, disconnect and quarantine infected devices, and rollback events to keep endpoints in a constant clean state. Logic and analysis performed on the endpoint agent, not in the cloud, helping protect endpoints in real time, even when offline. Automatically group alerts into patented storylines that provide analysts with instant actionable context and fewer headaches. -
39
odix
odix
odix’s patented technology disarms malicious code from files. Our concept is simple, instead of trying to detect the malware, odix generates a malware free copy of the file to the user. Total protection from known and unknown threats delivered to corporate network by incoming files. odix’s malware prevention solutions are based on its Deep File Inspection and TrueCDR™ patented technology. The algorithms provide new detection-less approach against File-Based attacks. The core CDR (Content Disarm and Reconstructions) process focuses on verifying the validity of the file structure on the binary level and disarms both known and unknown threats. This is very different from anti-virus and sandbox methods that scan for threats, detect a subset of malware and block files. With CDR, all malware, including zero-days, are prevented and the user gets a safe copy of the originally infected file. -
40
Bricklayer AI
Bricklayer AI
Bricklayer AI is an autonomous AI security team designed to enhance Security Operations Centers (SOCs) by managing endpoint, cloud, and SIEM alerts. Its multi-agent architecture mirrors human team workflows, enabling AI analysts and incident responders to collaborate seamlessly with human experts. Key features include automated alert triage, incident response, and threat intelligence analysis, all executed through natural language commands. The platform integrates effortlessly with existing tools and processes, allowing for the development of custom API integrations to gather data from an organization's entire tech stack. Bricklayer AI reduces monitoring costs, accelerates threat detection and response times, and scales operations without the need for additional human resources. Its action-based tasking ensures that every alert is investigated, feedback is shared, and responses are delivered in real time. -
41
TrueSight Operations Management
BMC Software
TrueSight Operations Management delivers end-to-end performance monitoring and event management. It uses AIOps to dynamically learn behavior, correlate, analyze, and prioritize event data so IT operations teams can predict, find and fix issues faster. Identify data anomalies and predictively alert to remediate issues before service impact. TrueSight Infrastructure Management helps you detect and address performance abnormalities before they impact the business. It automatically learns the behavior of your infrastructure, telling you what’s normal, and only issues alerts when behavior needs attention. This helps you focus on the events that matter most to IT and the business. TrueSight IT Data Analytics uses machine-assisted analysis for log data, metrics, events, changes, and incidents. You can automatically sift through millions of messages with a single click to solve problems faster. -
42
NODAR
NODAR
NODAR has re-imagined stereo vision using patented algorithms that enable standard cameras to deliver unprecedented 3D range, precision, and reliability. NODAR's advanced 3D vision technology is engineered to push the limits of what's possible in automotive and industrial applications. Whether passenger vehicles, autonomous trains, or monitoring and surveillance applications, reliable 3D data is critical to safety and performance. NODAR provides industry-leading 3D spatial data for autonomous systems across industries. Autonomy is transforming nearly every aspect of society, boosting output, delivering convenience, and enhancing safety. In many outdoor settings, conditions can be harsh and demanding. Automated equipment must operate 24 hours a day in the face of inclement weather, glare, dust, and high vibration. NODAR technology and products deliver unparalleled data, precision, and reliability for safety-critical applications that depend on 3D data. -
43
TourTools
DataVast Technologies
TourTools® automates virtually every task that must be performed in a group tour operator’s office and is simple and easy to use. Our powerful CRM stores vital information from conversations, follow-up reminders to the passenger’s personnel information passport numbers, frequent flyer, medication, client preferences. From bulk emails to individual correspondence, TourTools® provides everything you need for optimal, efficient, passenger correspondence and marketing. Our powerful CRM stores vital information from conversations, follow-up reminders to the passenger’s personnel information passport numbers, frequent flyer, medication, client preferences. From bulk emails to individual correspondence, TourTools® provides everything you need for optimal, efficient, passenger correspondence and marketing. The TourTools® Operations module allows you to prepare custom rooming and passenger lists by vendor, calculateStarting Price: 345 per month -
44
eBoarding
Edea Transport Technology
Whether you are a ferry company looking to automate and speed up the check-in process or a Port Authority looking to control the access of passengers and vehicles across the Port’s checkpoints, eBoarding® is the ultimate solution for your needs. For many passengers, the Port experience can be overwhelming. In a busy, fast-moving environment, knowing where and when you need to be and how to navigate the Port labyrinth is crucial. Therefore this should be as simple and stress-free as possible. The boarding process at Ports and Terminals is becoming a key aspect of the end-to-end travel experience from a passenger’s point of view. In most cases, it influences the level of passengers’ satisfaction and their propensity to book again same itinerary with the same ferry company. eBoarding® provides you with a turnkey, modular system to rethink and transform the passengers' experience at Ports. -
45
GroupCollect
GroupCollect
Planning group travel doesn't have to be so darn stressful because only GroupCollect gives tour operators the ability to streamline passenger payments & passenger registration. Trip leaders will love you. How did we get so smart? Designed from the collective wisdom of 30 years of group travel planning experience & feedback from our awesome customers. GroupCollect was built to help your trip leaders collect all the passenger information and passenger payments you need to book their trip. Then, we give you the workflows and reports to create room lists, flight lists, etc. Passengers can submit all the trip registration information and payments online from any device. It's not fun collecting hand-signed waivers. Start collecting all the forms you need from Day 1 online and organized. Passengers can pay online with a credit card, bank card or e-check, or even set-up auto-payments. Reduce passenger drops by making payments easier. -
46
Digifort
Digifort
Intelligent video monitoring software utilizing the highest levels of available technology and providing best performance to suit any requirement. Complete IP video management platform with advanced alarm management, events, occurrences and automation of environments through a single system, reliable, intuitive with easy configuration and operation. Automated license plate reader solution fully integrated with our video management system, automation alerts, alarms and pre-configured actions, statistical graphs and integration with third party systems. Capture, remote control and recording of Windows based computer screens. Ideal for Call Centers, Headless Server Controls and third party software management. Live Applied intelligence without video monitoring, providing proactive actions for programmed behavioral situations with automatic event and alarm generation in addition to valuable statistical information for business intelligence application. -
47
Pony.ai
Pony.ai
We are developing safe and reliable autonomous driving technology globally. Having accumulated millions of kilometers in autonomous road testing in complex scenarios, we have built a solid foundation to deliver autonomous driving systems at scale. Pony.ai was the first to launch Robotaxi service in December 2018, allowing passengers to hail self-driving cars via the PonyPilot+ App to start a new, safe and enjoyable journey. The service is currently available in Guangzhou, Beijing, Irvine, CA, and Fremont, CA. We have launched autonomous mobility pilots in multiple cities across the US and China, serving hundreds of riders every day. These pilots have enabled us to build a strong technical and operational foundation to further expand and improve our service. We have come together to tackle the biggest tech challenges in mobility. We are making concrete progress every day toward our vision of autonomous mobility everywhere. -
48
Sightbit
Sightbit
SightBit provides an AI-powered solution for enhancing safety and security around open water. The company’s proprietary deep-learning AI models and computer vision technology enable capabilities including object detection and classification, drowning detection, hazard detection and prediction, object penetration detection and pollution detection. SightBit’s technology addresses climate challenges by detecting, monitoring, and providing alerts regarding events such as tsunamis and rip currents, while simultaneously providing management capabilities. The company’s solution can easily be deployed using off-the-shelf video cameras, without the need for sensors, edge processors, or customization. SightBit’s core system is based on deep-learning computer vision technology that transmits real-time information to monitors in various control rooms, sounding an alarm when people are in danger, and providing alerts when a system or structure is likely to fail. -
49
CruxOCM
CruxOCM
The future of autonomous control room operations. Efficiency and safety. Who is CruxOCM? CRUX OCM enables the autonomous control room of tomorrow, operating within the safety constraints of today. Combining advanced physics-based methodologies with machine learning, CRUX software helps ensure operators stay safe while contributing to a seamless, continuous operation. The Human in the Room. Automation is the aim, but humans are the heart of our business. Our long term goal is to work within industry regulations to create a remote working environment, helping operators stay safe and ensuring operations continue even as the world changes. Benefits of automated control room. Throughput Expand throughput production capacity up to 10%. By automating control room operator actions. Power. Reduce power utilization up to 10%, reducing power costs. Using real time power optimization control in the control room. Safety Improve safety performance and business continuity. -
50
nebty
nebty
nebty is an innovative cybersecurity solution from Munich, Germany, designed to protect businesses from digital identity theft, online fraud, and phishing attacks. Utilizing advanced artificial intelligence, the company goes beyond conventional security measures by continuously monitoring the internet for potential threats. The software-as-a-service (SaaS) platform analyzes potential attack vectors and scans for signs of phishing activity, allowing for early detection and prevention of digital threats before they can cause harm. It also provides a managed takedown service to respond to threats quickly and effectively.Starting Price: €49