Best Shield AI Alternatives in 2024
Find the top alternatives to Shield AI currently available. Compare ratings, reviews, pricing, and features of Shield AI alternatives in 2024. Slashdot lists the best Shield AI alternatives on the market that offer competing products that are similar to Shield AI. Sort through Shield AI alternatives below to make the best choice for your needs
-
1
Birdeye
Birdeye
3,965 RatingsPlease also update our description as follows: Birdeye is the top-rated reputation, social media, and customer experience platform for local brands and multi-location businesses. Over 150,000 businesses leverage Birdeye’s AI-powered platform to get found online, improve online reputation, streamline social publishing, connect through digital channels, and deliver a wowing customer experience. -
2
We are a veteran owned business with over 70% veteran workforce, owned and run by former Navy SEALS. We are also a proud Official Partner of the Navy SEAL Foundation and an Executive Sponsor of the SEAL Legacy Foundation. •Trident 1 is an industry-leading point of sale solution that helps gun stores monitor retail operations, process payments, manage customer relationships, and more. • Trident 1 is the premier provider of the first all-in-one FFL software designed specifically for the firearms retail industry. • Trident 1 streamlines and consolidates ALL systems into a single solution to save you time and money, and allow you to focus on giving your customers what they need. • Trident 1 is a cloud-based software that can be accessed from anywhere on any device. • We specialize in retail sales, range management, compliance, industry leading integrations, secure payment processing, and excellent US based customer service.
-
3
AppSealing
INKA Entworks
44 RatingsAppSealing is an AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally. -
4
Hivemind
Shield AI
Hivemind is our AI pilot. It will allow swarms to operate autonomously, without GPS, communication, or a human pilot. Our mission is to provide intelligent systems that protect service members and civilians. More than preset behaviors and waypoints. Hivemind is a human-like pilot that reads the battlefield and reacts accordingly. It does not rely on GPS, waypoints or prior knowledge in order to make decisions. It is the only fully autonomous AI pilot to be deployed in combat since 2018. Hivemind™, from indoor building clearance using quadcopters, to integrated air defence breach with fixed-winged drones, to F-16 dogfights – it learns and executes missions autonomously. Hivemind will fly a new generation of aircraft to provide persistent aerial control across land, sea, and air. -
5
End-to-end encrypted file sharing & sync Tresorit is the secure cloud storage and sync place to store, sync, and share files from anywhere, anytime. Tresorit uses end-to-end encryption to protect your files from hackers and internal data breaches. All data is stored in accordance with the GDPR in Europe in Microsoft Azure Datacenters. You can manage who can edit, add, or view the data you share. Securely access the updated files from your browser, desktop or mobile device. Files can also be shared securely outside of your company. Securely share files instead of unsecured attachments to email. End-to-end encryption ensures that nothing leaves your device unencrypted. This means that only you and the recipient can access the files. To ensure collaboration with external parties, use the Content Shield features to protect your Business. Read more here: https://tresorit.com/tresorit-content-shield
-
6
AviPLAN
Transoft Solutions
AviPLAN's market-leading technology is at its core. This unique feature-set is tailored to meet the needs of today's airside planners, designers, and operators. AviPLAN offers a unique feature-set that addresses the specific needs of today's airside planners, designers, and operators. AviPLAN's extensive, accurate specifications library of aircraft and ground support vehicles, and passenger boarding bridges allows you to spend less time searching for information and produce more results. AviPLAN's powerful features enable users to adjust and define aircraft maneuver and stand planning parameters on the fly. This makes it possible to complete tasks that used to take days or weeks. -
7
T-Mobile Visual Voicemail
T-Mobile
Free 1 RatingT-Mobile Voicemail keeps getting better! Visual Voicemail's latest release includes UI enhancements for Voice to Text and the new Scam Shield™, along with stability and performance improvements. T-Mobile Scam Shield™ allows users identify, block, report, and report potential scam calls. Visual Voicemail allows you to listen to any message in any order, respond quickly, update your contacts, and manage your inbox from anywhere without ever having to dial into your voicemail. -
8
RapidPath
Invarion
$45 per monthRapidPath simulates vehicle movements for road and site project layouts, so you can be sure your plan can accommodate any vehicle maneuvers. Simulate vehicle turns in forward and reverse quickly and easily. You can perform complex, two-dimensional vehicle movements confidently knowing that your results will be reliable and accurate. Your vehicle simulation can be prepared and mapped directly to the software. Importing mapping from external sources such as GIS systems and online mapping services is also possible. RapidPath is pre-loaded with the national standard dimensions of vehicle designs for multiple countries. You will always have the most current vehicles in your libraries. RapidPath offers extensive customization options that allow you to modify various dimensions and even create custom vehicles. -
9
ForceShield
ForceShield
We are the dynamic application protector for Web, Mobile, IoT and IoT. ForceShield was founded in 2016 by a group security experts with the aim of changing the rules in cybersecurity. The founders believed that traditional signature-based security technology was failing in the face sophisticated automated attacks. Dynamic Transformation, a proprietary security technology that they developed, increased the complexity and cost of attackers while shifting security from reactive to proactive protection. ForceShield saw that the rapid rise of automated attacks against the Internet of Things was a security challenge that their engineering and technology expertise could address. ForceShield provides a network defense layer that protects Web/Mobile applications as well as IoT devices from bot attacks. -
10
Higher-education institutions can provide educators and learners with a social, collaborative, inclusive, inclusive, and engaging learning environment. The Engageli platform is completely web-based and does not require installation. Engageli's mission aims to provide superior learning and teaching experiences that maximize student success. We will ensure that all our learners and instructors have access to our platform, including those with disabilities. Developed by security experts, including tenured Stanford CS professors. Decru was founded by former officers from the elite military intelligence unit (IDF) of NetApp. Engageli can be integrated with the most popular Learning Management Systems. Reduce the need to use fragmented video recording, quiz, and polling tools.
-
11
Nexium Defence Cloud
Thales
Nexium Defence Cloud is an integrated, modular private cloud that meets the security and operational requirements of military forces. It allows armed forces adapt their Communications and Information Systems to dynamic operational scenarios. This is done through automated management tools that are mission-oriented. Nexium Defence Cloud integrates civil cloud technologies in military environments to enhance operational efficiency, accelerate maneuvers, and empower joint force commanders with minimal expertise. They can prepare missions in just days, deploy them in hours, and then adapt them in minutes. The solution provides a distributed cloud architecture that allows for local storage and computing to be provided to avoid single points failure. Form factors range from rackable servers for headquarters to rugged edge server for hostile environments. -
12
Polkadot
Polkadot
Polkadot, a blockchain network, is being built to enable Web3.0. This will allow users to control their data and ensure that markets benefit from network efficiency. Gavin Wood, a former co-founder and CTO at Ethereum, founded Polkadot in 2016. Polkadot's technology solves the major problems that have hindered blockchain adoption over the past few years. Parity Technologies created Polkadot's Substrate software development toolkit that allows blockchain developers to create their own custom, fit for use blockchains. Polkadot allows multiple blockchains to communicate with each other, allows for easy upgrades, and introduces "shared Security", a plug and play network security model that allows developers focus on the technology instead of spending time and resources recruiting operators to run a new Blockchain. -
13
Nothing OS
Nothing
Nothing OS is an Android 12 based custom user interface. It was developed by Nothing - a technology firm founded by Carl Pei - the former cofounder of OnePlus. Nothing OS is designed as a simple, clutter-free, and clean operating system. It uses a unique design called "Glyph Interface" which uses LED lights for notifications and status information. Nothing OS includes a variety of other features such as a font, a weather app, and new launcher. Here are some key features of Nothing OS. Simplicity and minimalism are key features of the OS. The animations are fluid and smooth, and the UI is clutter-free. Glyph Interface - The Glyph Interface provides notifications and status information in a unique manner. The LED lights on your phone's back light up in different patterns for different things such as incoming messages, incoming calls and battery status. -
14
SHIELD
SHIELD
On DemandDevice-First Fraud prevention with Real-Time Intelligence & Identification. Device Intelligence from SHIELD identifies persistently devices, users and accounts that you can trust - and those that you shouldn't. Don't let fraudsters fool you. With the global standard for device ID -- SHIELD DeviceID -- you can make precise decisions about device trustworthiness. Get a comprehensive view of each user with real-time device signals and continuous risk profiler. Eliminate blind spots and provide superior user experiences to accelerate growth. Instant insights. No need for additional codes. Get intelligence without revealing PII. Risk thresholds that can be configured independently. We provide all data and more. Transparent intelligence gives you the complete picture. Stay on top of the latest fraud attacks. Real-time attack patterns synchronization worldwide. -
15
CleanINTERNET
Centripetal
While traditional cybersecurity solutions respond to threats as they arise, CleanINTERNET® shields your network against threats proactively by preventing them from ever reaching it. The largest collection of commercial threat intelligence with high-fidelity and confidence in the world is operationalized to allow your defenses to adapt and defend in parallel as the threat landscape changes. Protect your network by using over 100 billion indicators from real-time intelligence updates every 15 minutes. No latency is required for the fastest packet filtering technology in the world to be integrated at the edge of your network. This allows you to use billions of threat indicator so that malicious threats can be dynamically blocked. AI-enabled analysts with high levels of expertise monitor your network and provide automated shielding that is validated by human expertise. -
16
Aritic Swarm
Aritic
Aritic Swarm allows you to go beyond traditional messaging. Engage in interactive messaging using text formatting, emojis and sharing. You can easily collaborate with your entire team and other teams to complete work faster and increase business growth. You can instantly share media, videos, or files with anyone and everybody by simply uploading them from your computer. You can do more than one-on-1 messaging. Make group calls, create video calls, format texts with bold, italics, etc. Transform discussions into actions. Your team can take a leap forward in smart collaboration by creating and assigning tasks in Aritic Swarm rooms. You know how important it is to mark important messages in your email? Why wait for an email? You can save valuable discussions and tag them later to continue the conversation or use it as a reference. Aritic Swarm Meetings can be used on both desktops and mobiles. -
17
iolo System Shield
iolo
$31.95 one-time paymentSystem speed is not affected by persistent PC pests. System Shield is more that an antivirus system. It provides certified protection while maintaining maximum computer performance. This allows you to shop, bank, and socialize online, without worrying about viruses and spyware. Antivirus shield detects and removes dangerous PC infections and protects your system against future attacks. It protects your system without any unnecessary background activities or add-ons. It finds and eliminates computer parasites and pests, restoring system stability and releasing resources. Innovative technology is used to provide real-time threat protection, without interruptions. Your PC will be protected by an invisible armor suit that instantly blocks external attacks. -
18
Digivault
Digivault
Protect your digital assets with an industry-accredited solution designed by technology and security experts. Digital assets are protected from security threats with defense-grade security. Built by security and defense professionals, it is industry-accredited and FCA-registered and Nasdaq-listed. Digivault offers industry-accredited custody solutions to investors, family offices and trust and fund managers as well as corporate treasuries and law enforcement agencies. White-glove and custom solutions are subject to strict regulatory and institutional standards. Former nuclear bunkers and bank grade vaults provide the highest level of physical protection to protect client assets and private keys as well as IT systems. The Digisafe policy engine protects against internal collusion and can be customized to exceed the highest risk tolerance. It automates governance around-the-clock. -
19
Buildpad
Buildpad
$20 per monthBuildpad can help you start your $10k MRR business right now. Reddit discussions can help you validate your ideas and conduct market research. You are able to build projects, but you want to use the right process in order to avoid creating another $0 MRR project. You are building on your own, and you'd appreciate the help of an AI cofounder who will fill in your skill gaps. You and your friends want to create a platform that allows you to work together and create a great project. All sensitive data is encrypted and stored in our databases to ensure your information remains secure. We use strong authentication techniques, including hardware security key, to protect your data and access to our servers. We are committed in protecting your privacy, and treating your data with the highest level of care and respect. We prioritize the security and privacy of your business data at Buildpad. We implement industry-standard encryption for data storage. -
20
Shield
KingsBridge
$500.00/month KingsBridge's Shield, a web-based business continuity platform, provides companies with disaster recovery plans and contingency plans. Shield offers users over 250 pages of optimized content, which can be easily customized to meet their business needs. Shield's customization allows users to add, delete, and rename groups to fit their company structure. Users can identify threats that could have negative consequences on their businesses with Shield's integrated risk assessment (TRA). -
21
Plandek
Plandek
$1900 per monthPlandek is an intelligent analytics platform that empowers software engineering teams and leaders to deliver value faster and more predictably. Celebrated by Gartner and Forrester as a 'leading global vendor', Plandek mines data from delivery teams’ toolsets and gives them the opportunity to optimise their delivery process using both intelligent insights and predictive analytics. -
22
Cloverpop
Cloverpop
$49 per monthSlack allows you to track your decisions and keep them in order. Slack allows you to quickly and easily make decisions. Smooth is quick with Slack's streamlined decision polls and announcements. You can make decisions! As a team, decide. Include diverse views. Engage people and drive performance through transparent decision-making. Know who made the decisions and why. Accountability is key. Measuring decision results can improve decision-making. Cloverpop decisions are used by marketing, technical, and creative leaders to improve their teams' agility, innovation, and productivity. Zero learning curve! Slack is your single source of information for all decisions. You can track decisions from initial discussions to announcements and approvals. Unlimited decisions, unlimited participants, and up to five decision drivers are all available at no cost. Your decisions are protected. Cloverpop is SOC 2 certified and EU/US Privacy Shield accredited. -
23
Secretary 2000
Sterlingsoft
The Secretary 2000 is a window-based, professional software application that allows secretarial firms (company secretaries) to manage and manage corporate company profiles and statutory status. It can easily integrate, compile and analyze data, as well as transfer it to documents and resolutions. It is a smart event-driven feature that allows you to quickly and efficiently complete all the important and time-consuming tasks associated to corporate management. This will allow you to spend more time on strategic planning and other business activities. Secretary 2000 has been very well-received for its stability and user-friendliness. -
24
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
25
ShieldApps PC Privacy Shield
ShieldApps
$39.99 one-time paymentPC Privacy Shield will erase your digital footprint including your browsing history, tracking records and other online data. PC Privacy Shield also provides you with a sophisticated file encryption mechanism that will protect your sensitive and personal files! PC Privacy Shield can be used to protect one's personal information from phishing and to hide their tracks when necessary. PC Privacy Shield allows you to encrypt or erase login credentials, and will alert you in real-time when they are being recorded by browsers. PC Privacy Shield comes with an easy-to use adblocker that blocks annoying banner ads. -
26
AuthenticID
AuthenticID
Get exclusive insights into emerging fraud threats and tactics, as well as breaking news about fraud incidents. Note: Subscription requests must be approved and reviewed by AuthenticID. AuthenticID is the best enterprise fraud prevention and identity verification platform for protecting against crime and increasing revenue. Organizations choose AuthenticID over all other solutions in head-to-head assessments. Discover what AuthenticID can offer you. Our ROI tools can help you calculate fraud prevention savings as well as customer onboarding improvements. 90% of fraud is committed by organized crime, which operates in the shadows. Our organization is also invisible due to the severe toll we take on crime syndicates. Our advanced SaaS platform for machine learning instantly determines if someone is who they claim to be. - 27
-
28
AI Dev Codes
AI Dev Codes
$1 per monthChat with AI to create simple, but highly customizable and interactive web pages. OpenAI's ChatGPT text generation model uses OpenAI's advanced ChatGPT text generator. If requested, automatically generates the appropriate images with stable diffusion. Optional voice interface with realistic text-to speech. Free hosting at user paths or a custom subdomain at padhub.xyz costs $1/month Mock-ups for discussion. Stable Diffusion prompts and images. Some basic custom code is required for internal or one-off tools. Utility pages or informational pages. Illustrated creative writing exercises. Sites that are finished (with persistence and prompt engineering, and possibly a link to an externe stylesheet). Soon, we will be adding templating to assist with creating more attractive pages. This site allows you to create simple web pages using AI-generated content and functionality. It integrates the ChatGPT APIs and Stability.ai APIs for this purpose. -
29
SURE Aerial
nFrames
nFrames SURE software provides an efficient solution to dense image surface reconstruction for mapping and surveying, geoinformation, and research organizations. The SURE software can be used to generate precise point clouds, DSMs and True Orthophotos from small, medium, and large frame images. This advanced solution is ideal for countrywide mapping, monitoring projects using manned aircraft and UAVs as well as cadaster, infrastructure planning and 3D modeling. SURE Aerial is designed to capture aerial image datasets using large frame nadir cameras or oblique cameras. It allows the creation of 3D Meshes and True Orthophotos, Point Clouds, Digital Surface Models, and True Orthophotos without limiting image resolution. SURE Aerial is easy to set up and use. It can also be used for web streaming technologies. -
30
AWS Shield
Amazon
AWS Shield, a managed Distributed Delusion of Service (DDoS), protection service, protects applications that run on AWS. AWS Shield provides automatic inline mitigations and detection that ensure application uptime and minimize latency. AWS Support is not required to use AWS Shield to provide DDoS protection. AWS Shield has two levels: Advanced and Standard. All AWS customers receive the automatic protections of AWS Shield Standard at no additional cost. AWS Shield Standard protects your web site and applications against the most common, frequent, and frequently occurring network or transport layer DDoS attacks. AWS Shield Standard is combined with Amazon CloudFront or Amazon Route 53 to provide comprehensive availability protection against all known infrastructure (Layer 3 & 4) attacks. -
31
Inflection AI
Inflection AI
FreeInflection AI, a leading artificial intelligence research and technology company, focuses on developing advanced AI systems that interact with humans more naturally and intuitively. The company was founded in 2022 by entrepreneurs like Mustafa Suleyman (one of the cofounders of DeepMind) and Reid Hoffman (co-founder of LinkedIn). Its mission is to make powerful AI accessible and aligned to human values. Inflection AI is a company that specializes in creating large-scale language systems to enhance human-AI interaction. It aims to transform industries from customer service to productivity by designing AI systems that are intelligent, responsive and ethical. The company's focus is on safety, transparency and user control to ensure that their innovations are positive for society while addressing the potential risks associated with AI. -
32
IRI DarkShield
IRI, The CoSort Company
5000IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS. -
33
Pannacotta
Pannacotta
Pannacotta, a conversational platform for management, is a platform that allows users to manage their conversations. It uses Slack conversations to keep everyone in the company focused. Our AI cofounder communicates the strategy, helps break it into actionable tasks and updates all involved seamlessly. -
34
Shield Antivirus
ShieldApps
$69.99 one-time paymentShield antivirus protects your desktop and laptop computer from the latest viruses, malware, trojans and spyware. Shield antivirus uses active protection mechanisms to protect you computer from all threats. It is set up to monitor, block and alert when a threat is detected. Shield Antivirus has an easy installation, extensive monitoring and alert capabilities as well as email security by blocking and quarantining threats found in incoming emails. Shield antivirus provides full protection against internet/browsing-related threats while using a fraction of CPU power due to its advanced algorithms and detection engine. Shield Antivirus scans a computer automatically for threats according to a schedule. It also includes additional tools and features like the secure file eraser and history cleaner. -
35
Google Shielded VMs
Google
Shielded virtual machines (VMs), which are hosted on Google Cloud, are protected against rootkits and other malware by a series of security controls. Shielded virtual machines help protect enterprise workloads against threats such as remote attacks, privilege escalation and malicious insiders. Shielded VMs provide advanced platform security capabilities like secure and measured boot and a virtual trusted module (vTPM), UEFI software and integrity monitoring. Protect your VMs quickly against advanced threats You can enable Shielded VMs in just a few mouse clicks to help protect against malicious project insiders, malicious guests firmware, and kernel-mode vulnerabilities. More -
36
Project Shield
Project Shield
Project Shield is a free, unlimited protection against DDoS, a type digital attack that is used to censor websites by taking them offline. It was created by Google Cloud, Jigsaw, and powered by Google Cloud Armor. Project Shield filters malicious traffic by using Google's infrastructure, including DDoS tools. Our servers will block DDoS traffic if your website is under attack. This will keep your website running. Project Shield can fetch content from the servers of your website once and serve it as a cached version on subsequent requests. This reduces traffic on your servers and absorbs any potential DDoS attack. Project Shield caches site content to improve site performance and bandwidth. Users can invalidate caches according to their site's requirements. Project Shield offers controls such as JavaScript Cookies and IP Denylists to increase site protection. -
37
MCP Shield
MCP Insight
500MCP Insight's Fraud Blocking and Fraud Detection Solution is a bespoke solution MCP Shield offers real-time fraud detection, blocking and an intuitive analytics portal. It also has a simple implementation process. The tool detects unexpected changes and actions on your payment page or service landing page. It monitors the activity of the alleged consumer to determine whether it is legitimate or fraudulent. In addition, it logs whether the consent is human or bot in a transaction assessment. MCP Shield gives you the information you need in order to decide whether to block a service. -
38
KOT4X
KOT4X
KOT4X is an online broker that offers forex, crypto and CFD trading. It provides traders around the world with cutting-edge technology for trading the world's markets. Our shield will protect your trades, and our sword will enhance them! Bitcoin was the first cryptocurrency to become mainstream. It is still the most popular cryptocurrency. Other options, such as Ethereum, are now highly valued on the markets. KOT4X is now offering Ripple and Dash, which are quickly becoming global top options. KOT4X is a participant in the Straight Through Processing (STP) execution model. KOT4X clients can place trades with no manipulation from the dealing desk. This means that there are no requotes and no conflicts of interest between clients of KOT4X. Every trade is placed in the KOT4X aggregater which will provide the best price for you, as a trader or client. These trades are pulled directly from the top-tier liquidity providers within the financial industry. -
39
Zimperium MAPS
Zimperium
Zimperium’s Mobile Application Protection Suite (MAPS) helps developers build safe and secure mobile apps resistant to attacks. It is the only unified solution that combines comprehensive app protection and pure on-device threat detection with centralized threat visibility. MAPS comprises four solutions, each of which addresses a specific need as shown below: zScan: A solution to scan your app binary for security, privacy, and regulatory risks that can be exploited by an attacker. zKeyBox: State-of-the-art white-box cryptography that protects your encryption keys and secrets, while obscuring cryptographic algorithms so an app’s execution logic is not visible to an attacker, even if the device is in their hands. zShield: Advanced protection for an app’s source code, intellectual property (IP), and data from potential attacks like reverse engineering and code tampering. zDefend: Our machine learning-based device attestation tool with runtime awareness through RASP delivers a vast amount of telemetry and analytics from the on-device ML solution to zConsole. zDefend protects against 0-day attacks and can be updated Over-The-Air without the need to rebuild and redistribute the app itself. -
40
Systancia Gate
Systancia
Systancia Gate, previously IPdiva Secure is a cybersecurity solution that offers ultra-secure access and applications to corporate resources for all types of remote users (roaming, teleworkers and third-party service providers). It is the only solution in the market awarded at the so-called "Elementary-Qualification" level by the ANSSI Agence Nationale de la Securite des Systemes d'Information. The French National Cybersecurity Agency of France (ANSI) is a government agency that reports to the Secretary General for Defence and National Security (French National Cybersecurity Agency). It is responsible for authentication, primary and secondary authentication. Authentication allows a user or visitor to verify their identity before they can access a resource or service. There is no need to install an extension. It also allows you to separate your actions from the system and your workstation, sealing both. -
41
Siteglide
Siteglide
Siteglide is a Digital Experience Platform, (DXP), that assists Agencies in building and managing User-First Digital Experiences. This includes online courses, marketplaces, membership sites, and customer portals. -
42
IRI CellShield
IRI
$35 one-time paymentIRI CellShield®, protects sensitive information in Microsoft Excel®, allowing you to comply data privacy laws. You can protect your columns with reversible or non-reversible masking options. CellShield protects your data, no matter how many sheets they are. Multiple search methods are available to locate and report on PII across the LAN. Protect it all at once with CellShield. Intuitive graphical dialogs allow you to classify and mask it. CellShield's core technology uses the award-winning IRI FieldShield flat file and database data masking product. Data that is hidden in one platform can be seen in another. CellShield EE, the only fully-featured professional data discovery, masking and auditing package for Excel 2010, 2016, and 2019 (plus Office 365 workbooks) in your LAN, is available. CellShield EE goes beyond the security and scope a single password can provide by combining and automating all of these additional capabilities. -
43
ShieldApps VPN
ShieldApps
$79.98 per yearShieldApps VPN secures your connection between the device you are using, the WiFi hotspot you have connected to and the internet. ShieldApps VPN protects your online browsing against tracking, information snooping and ip-logging, and more. It provides you with complete anonymity and privacy. ShieldApps VPN masks and fakes your location using strong encryption algorithms. This allows you to browse the internet without any geographical restrictions, censorship, or other restrictions. Watch any content from anywhere. ShieldApps VPN server locations are spread across multiple countries, allowing users to choose any remote server they want, and mask their location. ShieldApps can be used on desktops, laptops and android devices. ShieldApps is compatible with a variety of operating systems and devices. This ensures your privacy, wherever you use it. -
44
OmniShield
OmniNET
OmniShield™, the next-generation cybersecurity system, extends your company's perimeter across all sites and provides enterprise-grade security. OmniShield™ is NextGen tech that does more than any traditional, premises-based security system. It is available 24/7, unlimited, and virtual. It protects you against all cyber-based threats. You can rest easy if your business has multiple locations. OmniShield enforces the same security policies and restrictions in all locations. OmniShield allows you to access resources in multiple locations, even if you're in one location. OmniShield's next generation of protection is available for you even if you are not at work. You can feel secure knowing that OmniShield adapts automatically to new threats and protects all your devices, no matter where they are located. -
45
IRI Data Protector Suite
IRI, The CoSort Company
Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud. Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets. IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. -
46
ShieldApps Webcam Blocker
ShieldApps
$29.99 one-time paymentShieldApps Webcam Blocker is a highly sophisticated security program that uses advanced privacy enhancement algorithms. It's packaged in an easy-to-use interface that provides protection with just one click. ShieldApps' Webcam Blocker stops hackers from accessing or using information collected via a webcam or microphone against you. The user-friendly interface allows you to easily control Webcam and Microphone-blocking features with just one click. ShieldApps' Webcam Blocker provides an additional layer of protection for your computer, and is proactive in protecting your privacy. After selecting the options, any attempt to access your webcam from the outside or inside will be denied. -
47
RidgeShield
Ridge Security
RidgeShield cloud work load protection is your first line defense. It provides zero-trust micro segmentation technology to secure cloud workloads whether they are deployed in hybrid cloud or multi-cloud environments. RidgeShield helps organizations protect their network from sophisticated security threats. RidgeShield is an innovative micro-segmentation host platform that supports a variety of operating systems and workloads. It continuously monitors traffic across workloads while enforcing security policies in any environment. -
48
ZeroEyes
ZeroEyes
ZeroEyes is an AI weapons detection platform. It can identify threats at first glance. Our mission was to detect weapons before they are fired, speed up first responders' response times, and end mass shootings. AI weapon identification can be used to identify threats before they become deadly. This gives first responders the best information. Integration with local 911 and police can help to prevent dangerous situations from getting worse. ZeroEyes gives first responders the information they need in real-time so they can respond quickly to any threat. ZeroEyes provides customized solutions to meet your needs. ZeroEyes can connect to your existing security cameras or building infrastructure for additional protection. Senseless violence has resulted in the loss of too many people's lives. ZeroEyes is committed to supporting law enforcement and security professionals. The faster you can recognize a threat, you can respond quicker. -
49
HostShield
HostShield
$64.99HostShield is a UK-based hosting company that excels at VPS Hosting and dedicated servers, serving primarily the Netherlands. We combine our UK headquarters and Dutch data centers to deliver exceptional online performance with instant VPS activation. HostShield Ltd is the best choice for hosting excellence where the UK and the Netherlands seamlessly meet. Our commitment to customer service, combined with our dedication to cutting edge technology, ensures your online presence is secure, robust and highly responsive. Experience hosting solutions that are unmatched in the industry by joining the HostShield LTD team. -
50
School Lunch Choice
School Lunch Choice
$25 per monthSchool Lunch Choice was founded in 2007 because of the growing number of charter schools, independent schools, and the need to find a new way of thinking about school lunch. Ben Burr, the founder of School Lunch Choice, was operating a small school lunch catering company from several restaurants he owned at the time. It was obvious that a simple and user-friendly software program was necessary to expand the school lunch catering business. Jared Rossean, his technical co-founder, was formed as a partnership. Jared brought many years of experience in POS, ecommerce and shopping cart development to the table. Together they created an online ordering system that can be used for school lunches. This software allowed the school lunch catering business to reach unimaginable heights of success. In just two years, the business was able to serve over thirty schools and thousands of parents and students. Software generated millions of dollars in sales.