Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
ResolverMore than 1,000 organizations globally rely on Resolver’s software for security, risk management, and compliance. This includes a diverse range of sectors such as healthcare, educational institutions, and vital infrastructure entities like airports, utility companies, manufacturers, hospitality businesses, technology firms, financial services, and retail outlets. For those in leadership roles focused on security and risk management seeking innovative methods to handle incidents and mitigate risks, Resolver offers a pathway to transition from merely addressing incidents to gaining valuable insights. With its comprehensive solutions, Resolver empowers organizations to enhance their overall risk management strategies effectively.
-
FeedzaiFeedzai is a leading AI-powered financial crime risk management platform that covers the full spectrum of fraud prevention and anti-money laundering (AML) compliance, from account opening to transaction monitoring. Using sophisticated behavioral biometrics and analytics, Feedzai builds trusted digital identities and continuously profiles normal customer behavior to identify and flag abnormal or fraudulent activities in real time. The platform processes over 70 billion events annually, securing more than $8 trillion in payments worldwide while protecting over one billion consumers. It supports a wide range of financial institutions including retail banks, commercial banks, payment service providers, merchant acquirers, and core banking providers, as well as government agencies. Feedzai’s AI-driven approach delivers higher fraud detection rates—up to 62% more—while reducing false positives by 73%, improving operational efficiency significantly. The platform’s risk scoring, watchlist screening, and orchestration tools enable organizations to adapt rapidly to evolving threats and complex regulatory environments. Feedzai seamlessly integrates with existing banking and payment infrastructures to provide scalable and compliant solutions. Customers benefit from faster model deployment times, often 25% quicker than previous systems, ensuring timely response to emerging fraud patterns. The company also offers expert briefings and insights to help clients stay ahead of financial crime trends. Feedzai is widely recognized as a leader in transaction fraud prevention and AML, driving innovation and trust in the financial industry globally.
-
Proton PassProton Pass safeguards your passwords and personal information through robust end-to-end encryption. Developed by the same team behind Proton Mail, the largest encrypted email service globally, Proton Pass has garnered recommendations from the United Nations for sharing sensitive information securely. The encryption technology utilized is open-source and has been rigorously tested for reliability. As the pioneering password manager crafted by a security-focused company prioritizing privacy, Proton Pass offers a unique solution for data protection. Become one of the millions who trust Proton to keep their information safe and secure. By choosing Proton Pass, you are not just getting a password manager, but also investing in your online safety and peace of mind.
-
gtechnagtechna's advanced parking management and enforcement solution is relied upon by prominent cities around the globe. Our cloud-based platform equips municipalities, transportation authorities, and educational institutions with state-of-the-art applications designed to boost parking revenue, reduce operational expenses, and enhance the overall experience for drivers. By selecting gtechna for your parking management and enforcement requirements, you are aligning yourself with a pioneering company celebrated for its relentless innovation. Major cities such as Washington, D.C., Boston, Pittsburgh, Toronto, and Vancouver have already revolutionized their parking systems with gtechna—now it’s time for you to embrace the future of parking as well. Experience the benefits of a more efficient and effective parking management solution that adapts to your unique needs and challenges.
-
CharityTrackerReduce the time spent sorting through piles of documents and focus more on assisting your clients. With CharityTracker, you can access client files from any location, offering not just secure storage but also an efficient and integrated approach to enhance your case management process. Implementing CharityTracker is straightforward and budget-friendly, allowing you to experience the rapid setup of its cloud-hosted solution. You’ll soon appreciate the elegantly designed interface that gets you operational in no time. This cloud-based software, compliant with HIPAA regulations, is user-friendly and tailored for nonprofits of all sizes. There are no setup costs, hidden charges, or binding contracts, so you have the freedom to cancel whenever you choose! Our solution is crafted to save time and securely streamline your case management processes, enabling you to record notes, create reports, collaborate effectively, set objectives, evaluate outcomes, make referrals, and demonstrate your impact with comprehensive reports for your funders. We are already making a difference in thousands of communities! Schedule a complimentary demo to see how it works. With pricing beginning at just $20 per month per user, it’s an opportunity you won't want to miss.
-
PsonoPsono, an open-source password manager designed for self-hosting, places a strong emphasis on the security of your sensitive information. It utilizes encryption techniques to store your credentials in a way that ensures only you can access them, while also allowing for secure, encrypted sharing with your team members. With a variety of features, Psono makes managing data and accessing passwords simpler than ever. Its encryption process begins with client-side encryption, providing true end-to-end security for shared passwords, and is enhanced by both SSL and storage encryption methods. Moreover, the entire codebase is available for public scrutiny, highlighting the belief that true security relies on effective encryption rather than hiding flaws in the system. Choosing a self-hosted solution like Psono grants you greater control over access and reduces reliance on third-party data storage services, reinforcing its position as one of the most secure password management options available. Additionally, this self-hosting capability empowers users to tailor security measures to their specific needs and preferences, further enhancing their overall data protection strategy.
-
Proton VPNSafeguard your online presence with a high-speed Swiss VPN that prioritizes your privacy. This VPN encrypts your internet traffic through a secure tunnel, ensuring your passwords and sensitive information remain safe, even on insecure networks. With this protection, your browsing history stays confidential. As a Swiss VPN provider, we uphold a strict no-logs policy and do not share user data with any third parties. Our anonymous VPN service enables you to navigate the web freely without the threat of being tracked. Originally designed to support journalists and activists using Proton Mail, Proton VPN breaks down barriers to internet censorship, granting you access to a wide range of websites and content. Unlike typical VPN services, Proton VPN is specifically engineered with security at its core, informed by experiences with journalists and activists in challenging environments. In situations where servers may be under surveillance, conventional VPNs risk being compromised; however, Proton VPN mitigates this risk by initially routing user traffic through our SecureCore network, enhancing your online security even further. This level of protection ensures that you can browse the internet with greater peace of mind, knowing that your privacy is a top priority.
-
ExtoleExtole is a platform utilized by retailers, financial service providers, and consumer brands to transform their customers into passionate advocates. The enterprise-level service includes a team of specialists dedicated to developing advocacy, referral, and engagement initiatives that empower brands to leverage customer enthusiasm and sharing, ultimately boosting revenue. By using Extole, marketers can actively connect with thousands of customers, enhance brand loyalty, and amplify word-of-mouth efforts to attract new clientele. This innovative approach not only fosters a sense of community among customers but also drives sustainable growth for businesses.
-
Aikido SecurityAikido serves as an all-encompassing security solution for development teams, safeguarding their entire stack from the code stage to the cloud. By consolidating various code and cloud security scanners in a single interface, Aikido enhances efficiency and ease of use. This platform boasts a robust suite of scanners, including static code analysis (SAST), dynamic application security testing (DAST), container image scanning, and infrastructure-as-code (IaC) scanning, ensuring comprehensive coverage for security needs. Additionally, Aikido incorporates AI-driven auto-fixing capabilities that minimize manual intervention by automatically generating pull requests to address vulnerabilities and security concerns. Teams benefit from customizable alerts, real-time monitoring for vulnerabilities, and runtime protection features, making it easier to secure applications and infrastructure seamlessly while promoting a proactive security posture. Moreover, the platform's user-friendly design allows teams to implement security measures without disrupting their development workflows.
What is OpenEye?
Focus on the essential aspects by leveraging actionable insights that help you pinpoint opportunities for improving and expanding your environments. Our sophisticated cloud-managed video solutions integrate flawlessly with existing business frameworks, allowing you to enhance surveillance capabilities while simultaneously enriching the experiences of customers, employees, and students.
OpenEye Web Services boosts organizational intelligence, reduces IT burdens, and maximizes overall value across your operations.
With a wide-ranging clientele across different industries, OpenEye customizes its features and integrations to meet your unique needs, thus enhancing the experience for all stakeholders involved.
Explore the benefits of OpenEye Web Services through a brief demonstration led by our experienced security experts. As you join the ever-growing community of satisfied users, you'll witness firsthand how OpenEye's cutting-edge products can significantly impact your organization, fostering a safer and more efficient environment for everyone involved.
What is Coram AI?
Coram AI offers a cutting-edge video surveillance solution that utilizes advanced artificial intelligence to elevate physical security management. It seamlessly integrates with any IP camera, allowing businesses to incorporate the system into their existing surveillance frameworks without the need for extensive modifications. The platform is equipped to provide instant alerts for critical events like slip-and-fall incidents and weapon detection, owing to its sophisticated AI features. Users benefit from the ability to search for specific footage using straightforward natural language queries, streamlining the process of retrieving relevant video clips. Additionally, Coram AI provides organizations with tools aimed at boosting operational efficiency by tracking productivity, identifying areas for enhancement, and supporting informed decision-making through data-driven insights. The scalability of the system means it can accommodate setups ranging from a handful of cameras to thousands, and it supports a broad array of NDAA and ONVIF compliant IP cameras, ensuring high-quality video surveillance. Moreover, by optimizing the use of existing infrastructure, Coram AI stands out as a budget-friendly option within the security technology sector. As a result, businesses can enhance their security measures without incurring significant expenses on new equipment.
Integrations Supported
Feenics Access Control
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Free
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
OpenEye
Date Founded
1999
Company Location
OpenEye
Company Website
www.openeye.net
Company Facts
Organization Name
Coram AI
Company Location
United States
Company Website
www.coram.ai/
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues