Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
ResolverMore than 1,000 organizations globally rely on Resolver’s software for security, risk management, and compliance. This includes a diverse range of sectors such as healthcare, educational institutions, and vital infrastructure entities like airports, utility companies, manufacturers, hospitality businesses, technology firms, financial services, and retail outlets. For those in leadership roles focused on security and risk management seeking innovative methods to handle incidents and mitigate risks, Resolver offers a pathway to transition from merely addressing incidents to gaining valuable insights. With its comprehensive solutions, Resolver empowers organizations to enhance their overall risk management strategies effectively.
-
OmnilertEnhance safety by identifying potential dangers ahead of time and acting swiftly through advanced visual gun detection technology. Our AI-driven Gun Detect software ensures dependable, round-the-clock surveillance of security cameras, facilitating the seamless implementation of an early detection system for firearms. Additionally, our Emergency Communications and Automation Platform enhances situational awareness by automatically executing emergency response protocols and safety measures. We empower you to make the most of each moment, safeguarding your personnel from various hazards, whether from firearms or extreme weather conditions. By prioritizing the protection of your workforce, facilities, and operations, you can face any contemporary threats with confidence. With our solutions in place, you can ensure a safer environment for everyone involved.
-
Criminal IPCriminal IP functions as a cyber threat intelligence search engine designed to identify real-time vulnerabilities in both personal and corporate digital assets, enabling users to engage in proactive measures. The concept behind this platform is that by acquiring insights into potentially harmful IP addresses beforehand, individuals and organizations can significantly enhance their cybersecurity posture. With a vast database exceeding 4.2 billion IP addresses, Criminal IP offers crucial information related to malicious entities, including harmful IP addresses, phishing sites, malicious links, certificates, industrial control systems, IoT devices, servers, and CCTVs. Through its four primary features—Asset Search, Domain Search, Exploit Search, and Image Search—users can effectively assess risk scores and vulnerabilities linked to specific IP addresses and domains, analyze weaknesses for various services, and identify assets vulnerable to cyber threats in visual formats. By utilizing these tools, organizations can better understand their exposure to cyber risks and take necessary actions to safeguard their information.
-
MuukTestIt's clear that enhancing your testing efforts could help identify bugs sooner, yet effective QA testing often demands significant time, effort, and resources. With MuukTest, engineering teams can achieve up to 95% coverage of end-to-end tests in a mere three months. Our team of QA specialists is dedicated to creating, overseeing, maintaining, and updating E2E tests on the MuukTest Platform for your web, API, and mobile applications with unparalleled speed. After reaching 100% regression coverage within just eight weeks, we initiate exploratory and negative testing to discover bugs and further elevate your testing coverage. By managing your testing frameworks, scripts, libraries, and maintenance, we significantly reduce the time you spend on development. Additionally, we take a proactive approach to identify flaky tests and false results, ensuring that your testing process remains accurate. Consistently conducting early and frequent tests enables you to catch errors during the initial phases of the development lifecycle, thus minimizing the burden of technical debt in the future. By streamlining your testing processes, you can improve overall product quality and enhance team productivity.
-
Plexxis SoftwarePLEXXIS serves as a comprehensive solution for subcontractors by integrating project management, accounting, estimating, takeoff, and mobile applications within a unified technological framework. Furthermore, Plexxis ensures that all implementation and support services are handled entirely in-house, while also offering straightforward agreements designed to safeguard subcontractors from several issues. These include unfair subscription practices, where vendors lack transparency regarding total onboarding costs and may misrepresent offerings without providing reasonable cancellation options. Additionally, they combat cloud cuffing, a tactic where vendors demand fees before clients are operational and may hold client data hostage to extract further payments. The platform also addresses smoke stacking, which occurs when vendors exaggerate the integration capabilities of their tools, and overages, where clients receive vague service rates and non-binding estimates that lead to unexpected change orders. Overall, Plexxis prioritizes the needs of subcontractors by promoting clarity and fairness in their agreements and services.
-
DronedeskDronedesk stands out as the most extensive and intuitive platform for managing drone operations available today, boasting an impressive 98% of users rating it as "great" or "excellent," along with a remarkable NPS of 80! This platform consolidates all necessary business administration and flight planning resources into one secure web application, effortlessly adapting to the needs of individual pilots as well as large enterprises. With Dronedesk, you have the ability to: - Ensure safety: Execute compliant drone flights with the help of advanced airspace intelligence, layered street and satellite maps, and real-time hazard data for both air and ground. - Maintain compliance: Keep thorough records of all components of your drone operations, including detailed flight plans, inventories of your fleet and equipment, and comprehensive flight logs. - Optimize your time: Eliminate the need for spreadsheets or document templates, as everything is recorded in one central location, accessible from any device with ease and immediacy. - Reduce costs: Many operators have reported an average savings of 51 minutes per job after transitioning to Dronedesk, and our handy calculator can help you determine your potential savings. - Expand your business: Generate quotes and invoices, discover tender opportunities, and streamline lead generation to enhance your business growth. By utilizing Dronedesk, you can transform how you manage your drone operations and experience significant improvements in efficiency and effectiveness.
-
TrustInSoft AnalyzerTrustInSoft has developed a source code analysis tool known as TrustInSoft Analyzer, which meticulously evaluates C and C++ code, providing mathematical assurances that defects are absent, software components are shielded from prevalent security vulnerabilities, and the code adheres to specified requirements. This innovative technology has gained recognition from the National Institute of Standards and Technology (NIST), marking it as the first globally to fulfill NIST’s SATE V Ockham Criteria, which underscores the significance of high-quality software. What sets TrustInSoft Analyzer apart is its implementation of formal methods—mathematical techniques that facilitate a comprehensive examination to uncover all potential vulnerabilities or runtime errors while ensuring that only genuine issues are flagged. Organizations utilizing TrustInSoft Analyzer have reported a significant reduction in verification expenses by 4 times, a 40% decrease in the efforts dedicated to bug detection, and they receive undeniable evidence that their software is both secure and reliable. In addition to the tool itself, TrustInSoft’s team of experts is ready to provide clients with training, ongoing support, and various supplementary services to enhance their software development processes. Furthermore, this comprehensive approach not only improves software quality but also fosters a culture of security awareness within organizations.
-
ESET PROTECT AdvancedESET Protect Advanced delivers a robust cybersecurity solution tailored for organizations of various sizes. This platform provides cutting-edge endpoint security to combat ransomware and zero-day vulnerabilities effectively. It features full disk encryption to uphold legal standards and safeguard data integrity. The solution employs adaptive scanning, cloud sandboxing, and behavioral analysis to defend against emerging cloud-based threats proactively. Additionally, mobile threat protection encompasses anti-malware and anti-theft measures for both Android and iOS devices. Beyond this, it includes cloud application security, mail server protection, vulnerability assessment, patch management, and comprehensive cloud app safeguards. Enhancements such as multi-factor authentication and extended detection and response (XDR) bolster threat detection and response capabilities. The system offers a unified remote management interface that allows for seamless visibility into threats and user activities. Furthermore, it provides in-depth reporting and tailored notifications to keep users informed of potential risks and system status. This holistic approach ensures that businesses can maintain a strong security posture in an increasingly complex digital landscape.
-
KubitWarehouse-Native Customer Journey Analytics—No Black Boxes. Total Transparency. Kubit is the leading customer journey analytics platform, purpose-built for product, data, and marketing teams that need self-service insights, real-time data visibility, and complete control—without engineering bottlenecks or vendor lock-in. Unlike legacy analytics solutions, Kubit is natively integrated with your cloud data warehouse (Snowflake, BigQuery, Databricks), so you can analyze customer behavior and user journeys directly at the source. No data exports. No hidden models. No black-box limitations. With out-of-the-box capabilities for funnel analysis, retention metrics, user pathing, and cohort analysis, Kubit delivers actionable insights across the full customer lifecycle. Layer in real-time anomaly detection and exploratory analytics to move faster, optimize performance, and drive user engagement. Leading brands like Paramount, TelevisaUnivision, and Miro rely on Kubit for its flexibility, enterprise-grade governance, and best-in-class customer support. See why Kubit is redefining customer journey analytics at kubit.ai
What is Xeoma?
Xeoma features a variety of modules such as the ability to recognize license plates, faces, emotions, age, and gender, along with identifying different object types. It can also detect missing or abandoned items, assess the presence of medical masks or safety gear, and monitor for camera tampering or other system integrity issues. Additionally, the system is capable of crowd detection, color analysis, and loitering identification, while also providing visitor and passenger counting, PTZ tracking, and guided tours. Users can benefit from screen capture, heat mapping, and floor planning, as well as organization and access control systems. Xeoma supports integration with point of sale systems and smart home technologies, among other functionalities. Furthermore, Xeoma allows for free rebranding and the establishment of a personalized cloud service with no limits on server numbers or capacity. If your business requires solutions involving artificial intelligence or audio/video analysis, we are here to assist you in finding the best approach! Customized paid development services are also available to help meet your specific business goals. Xeoma provides complimentary dome licenses for trial purposes and offers a perpetually free mode that allows for viewing up to 1,000 cameras and recording archives from four cameras, making it an excellent choice for both testing and long-term use. With such extensive features, Xeoma caters to a wide range of security and monitoring needs.
What is Remote Eyes?
The Remote Eyes retail surveillance system serves as a crucial management tool that not only enhances safety through the use of security cameras but also increases your business’s profitability by reducing shrinkage and improving employee efficiency. This system employs Virtual Circuit Television (VCTV) technology, allowing it to seamlessly connect with your existing point of service systems for improved access and control. Additionally, it enables users to remotely monitor and manage multiple security camera setups across different store locations. This configuration exemplifies an optimal combination of application, integration, and security, making it an invaluable tool for various types of establishments, such as convenience stores, pharmacies, discount retailers, and dining venues. Major retail chains, including McDonald’s, Dunkin’ Donuts, and Subway, are swiftly incorporating Remote Eyes with POS Integration to enhance their in-store security protocols. Beyond its robust features, Remote Eyes is positioned as a key player in the landscape of retail management and security, ensuring that businesses not only protect their assets but also foster a safe shopping environment for customers. As such, it is increasingly recognized as essential for any retailer aiming to thrive in a competitive market.
Integrations Supported
IT Retail POS
API Availability
Has API
API Availability
Has API
Pricing Information
$11, one-time, perpetual
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Felenasoft
Date Founded
2004
Company Website
xeoma.com
Company Facts
Organization Name
Remote Eyes
Company Location
United States
Company Website
www.remoteeyes.com/retail-management
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues