Suggested Categories:

Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
Mentoring Software
Mentoring software is a type of software designed to facilitate the mentor-mentee relationship. It provides users with tools for scheduling, tracking progress, providing feedback, and developing plans for growth. The software can be used as a standalone system or integrated into existing enterprise solutions. Mentoring software allows organizations to easily manage and monitor their mentorship programs remotely and efficiently.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Product Recommendation Engines
Product recommendation engines use algorithms and customer data to suggest personalized products to users based on their browsing behavior, past purchases, or preferences. These platforms analyze large sets of data, such as customer interactions and purchase history, to identify patterns and recommend products that are most likely to interest the individual customer. Product recommendation engines help e-commerce businesses increase sales and customer engagement by offering a more personalized shopping experience. By integrating these engines, businesses can provide relevant suggestions, improve conversion rates, and enhance customer satisfaction.
View more categories (6) for "algorithm"
  • 1
    RECOGNITO

    RECOGNITO

    RECOGNITO

    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions that are fully optimized for usability, security, and privacy. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID...
    Leader badge
    Starting Price: Free
  • 2
    NINJIO

    NINJIO

    NINJIO

    NINJIO lowers human-based cybersecurity risk through engaging training, personalized testing, and insightful reporting. Our multi-pronged approach to training focuses on the latest attack vectors to build employee knowledge and the behavioral science behind human engineering to sharpen users’ intuition. The proprietary NINJIO Risk Algorithm™ identifies users’ social engineering vulnerabilities based on phishing simulation data and informs content delivery to provide a personalized experience...
    Leader badge
    View Software
    Visit Website
  • 3
    aiReflex

    aiReflex

    Fraud.com

    Fraud.com's aiReflex determines which transactions are legitimate in real-time using a multi-layer defence coupled with explainable AI to fight fraud & improve customer trust. The detection layer analyses your transactional data in real-time to deliver unmatched risk-scoring accuracy. The multi-layer defence identifies suspicious transactions using our adaptive machine learning algorithms, adaptive rules & next-generational behavioural engine to create hyper granular profiles for every...
    Partner badge
    View Software
    Visit Website
  • 4
    QANplatform

    QANplatform

    QANplatform

    ... future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 5
    Classiq

    Classiq

    Classiq

    Classiq is a quantum computing software platform that enables the design, optimization, analysis, and execution of quantum algorithms. It transforms high-level functional models into optimized quantum circuits, allowing users to quickly develop circuits with 100, 1,000, or 10,000 qubits and execute them on any gate-based system and cloud provider. It offers a quantum application development environment to build internal expertise and create reusable quantum intellectual property. Classiq...
  • 6
    Imageware Biometric Engine
    ... in biometric algorithm and hardware, supporting the largest number of algorithms and devices on the market. Using two or more biometric types, such as a face and finger, the modalities are processed through different algorithms and the results are merged after programmed logic is applied to the results. Imageware has been developing proven solutions for secure identities since 1997.
  • 7
    Precise BioMatch

    Precise BioMatch

    Precise Biometrics

    Precise BioMatch is an advanced AI-based fingerprint recognition algorithm designed for secure and convenient identity authentication across various platforms, including mobile devices, laptops, cars, smart door locks, and smart cards. Optimized for high performance in constrained computing environments, it delivers industry-leading biometric accuracy and security. It supports fast, reliable fingerprint verification for diverse applications, ensuring robust user authentication. Precise Bio...
  • 8
    Oz Liveness

    Oz Liveness

    Oz Forensics

    ... Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. On-device Liveness detection and face biometry checks allow to use of a phone as a personal biometric device. No data is sent to the server from the device and stays in the customer's hands. On-device Liveness is perfect in any customer’s use case, improving the reachability and stability of the services .
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 9
    Cryptomage

    Cryptomage

    Cryptomage

    Threat detection provides deep inspection of every single network packet including transported data with: Network protocol discovery and validation – easily check unknown and hidden protocols. Machine Learning algorithms – proactive traffic risk-scoring. Network steganography detection of hidden network traffic, including data leaks, espionage channels, and botnets. Proprietary steganography detection algorithms – effective way of uncovering methods of hiding information. Proprietary...
  • 10
    ArmorVox

    ArmorVox

    Auraya

    ArmorVox is the next generation voice biometric engine developed by Auraya that provides a full suite of voice biometric capabilities in telephony and digital channels. ArmorVox helps streamline and improve customer experience and information security. It can be securely deployed via the cloud or through an on-premise deployment. It uses machine learning algorithms to create speaker-specific background models for each individual voice print to deliver the best performance. Our algorithms set...
  • 11
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic...
  • 12
    Neurodactyl

    Neurodactyl

    Neurodactyl

    Neurodactyl is a technology startup, specializing in сontactless fingerprint recognition algorithms. Our main advantages: - Highly accurate neural network algorithms, top-tier results on NIST PFT III - The technology works with scans and photo images - All types of fingerprints are supported - Very fast matching - from 100M matches pers 1 s on 1 CPU. Our products: - Server fingerprint recognition SDK for verification and identification - Mobile SDK for fingerprint acquisition on mobile...
    Starting Price: USD 0.01 per verification
  • 13
    CaptchaText

    CaptchaText

    CaptchaText

    CaptchaText is 100% FREE, built on a revolutionary ZERO database architecture, powered by a proprietary Hybrid In-Memory Indexing (Hybrid IMI) engine algorithm, that enables CAPTCHA authentication to be performed using minimal data bits against server memory. CaptchaText's multi-layered security approach includes real-time IP verification, sophisticated bot detection algorithms, and intelligent token management that adapts to your traffic patterns. With support for 23 languages and flexible...
    Starting Price: $0
  • 14
    GLAnalytics

    GLAnalytics

    GLAnalytics

    In today’s business environment, data integrity, compliance with internal policies and procedures, reducing errors, and risk management are essential to managing top line growth. GLAnalytics’ cloud-based analytics software delivers financial reporting that proactively monitors financial data for errors and potential fraud. This risk management solution offers peace of mind through the use of powerful algorithms. These algorithms scan financial data proactively and securely through an easy...
  • 15
    Biometric Vision

    Biometric Vision

    Biometric Vision

    Developers, businesses and system integrators upgrade your facial recognition applications performance with a few lines of code whilst preserving your customer’s privacy. Integrate with Biometric Vision’s next generation AI-powered algorithm in minutes and increase the accuracy, speed and performance of your facial recognition apps. 99.99% accuracy in the most challenging of conditions. A 0.006% error rate tested against 1 million ethically sourced face images. AES-256+ end-to-end encryption...
    Starting Price: $29 per month
  • 16
    DeepArmor

    DeepArmor

    SparkCognition

    DeepArmor leverages patented algorithms and model-building tools to predict and prevent across every attack vector including file-based, fileless, and in-memory attacks. DeepArmor intercepts and prevents attacks before they can execute, eliminating the need for post-infection behavioral analysis, ineffective system rollbacks, and time-intensive reimaging.
  • 17
    Cerber Security

    Cerber Security

    Cerber Tech

    Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design. A set of specialized request inspection algorithms screen incoming requests for malicious code patterns and traffic anomalies. Bot detection engine identifies and mitigates automated attacks. Mitigates brute force and code injection attacks. Restricts access with GEO country rules. Prevents both REST API and ordinary user enumerations. Restricts access to REST API...
  • 18
    TrulySecure
    The fusion of face & voice biometric authentication creates a highly secure, hassle free experience. Sensory’s proprietary speaker verification, face recognition, and biometric fusion algorithms leverage Sensory’s deep strength in speech processing, computer vision, and machine learning. The unique combination of face and voice recognition provides maximum security, yet remains fast, convenient and easy to use, while ensuring the highest verification rates for the user. Biometrics aren’t just...
  • 19
    eClear 360

    eClear 360

    eConnect

    Finding affordable, turnkey solutions that can quickly plug into existing systems to scale up operations. eConnect's Identity Management system, eClear 360, leverages multiple data integrations and ties them to our industry-leading facial recognition algorithm. This opens the door for new insights, opportunities, and revenue protection, all from one platform. Key capabilities include: Identifying anonymous high-value patrons, their gaming value, and frequency of visits, detecting excluded...
  • 20
    Getvisibility

    Getvisibility

    Getvisibility

    Getvisibility's customizable AI revolutionizes the DSPM landscape. With cutting-edge algorithms and user-friendly interfaces, it empowers businesses to unlock unprecedented insights, optimize performance, and detect anomalies in real time. Experience the power of tailored solutions that elevate your DSPM capabilities to new heights. Using AI and machine learning, Getvisibility provides the fastest and most accurate data discovery and classification platform. Our AI Models are trained...
  • 21
    NSFOCUS NGFW
    ... to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate.
  • 22
    TrustServista

    TrustServista

    TrustServista

    TrustServista uses advanced artificial intelligence algorithms in order to provide media professionals, analysts, and content distributors with in-depth content analytics and verification capabilities. TrustServista determines the trustworthiness of news articles using artificial intelligence. The trustworthiness algorithm combines deep content analysis, the publisher's profile, the sources it mentions or directly links to, and the different viewpoints of the same story, from other publishers...
  • 23
    SSH NQX
    SSH NQX is a quantum-safe encryption solution designed to secure Ethernet and IP traffic across various networks, including public and private infrastructures. It employs advanced post-quantum cryptographic algorithms to protect data-in-transit from both current and future cyber threats. NQX delivers high-bandwidth performance, supporting data transmission speeds up to 100 Gbps, ensuring seamless and secure communication between enterprise sites, networks, clouds, and data centers. Utilizes...
  • 24
    SafePass

    SafePass

    Reason Cybersecurity

    ...Pass will remember your password so you don’t have to. A master password unlocks your private key, which decrypts your data in SafePass. An AES-256 symmetric encryption algorithm is used to lock down sensitive data with a new random key every time. An RSA-4096 asymmetric encryption algorithm enables SafePass to secure your data with a public key and unlock it with a private key that only you have.
  • 25
    PQShield

    PQShield

    PQShield

    ...-based algorithms like ML-KEM and ML-DSA; PQPlatform-CoPro, which combines hash-based and lattice-based cryptography engines for seamless integration into existing security subsystems; and PQPlatform-TrustSys, a fully autonomous, PQC-focused root-of-trust subsystem designed for minimal integration effort and robust side-channel protection. PQCryptoLib provides a general-purpose cryptographic library supporting both post-quantum and classical algorithms, facilitating smooth transitions to quantum systems.
  • 26
    Biosite

    Biosite

    Biosite Systems

    Turning data into insight. It makes Sense. Underpinned by a unique biometric algorithm, Biosite provides market-leading solutions for workforce management, task management, material management and fire safety & security on site. At the heart of all Biosite solutions is the capture of accurate data that is converted to valuable real-time insight, to enable more informed decision-making. Putting you in control. We work collaboratively with our customers to provide a tailored solution; becoming...
  • 27
    VikingCloud Asgard
    Our cloud-native Asgard Platform™ blends algorithms and technologies to deliver hyper-effective cybersecurity and compliance. Predictive platform providing continuous cybersecurity and compliance. We stop threats before they stop your business. Next generation signature and behavior-based threat detection. Model behavior and auto-discover patterns of interest. Continuous monitoring of your network to uncover suspicious activity. Understand the threat landscape, plus make compliance and risk...
  • 28
    Netspark

    Netspark

    Netspark

    ... that what users really need is a content filtering tool focused on enabling access to content, not just blocking it. Our unique algorithms and machine learning engines work together to contextually understand web content and the value it offers our users, prior to filtering out any inappropriate elements.
  • 29
    Prophaze WAF

    Prophaze WAF

    Prophaze Technologies

    Prophaze Cloud WAF protects organizations from malicious hackers who are trying to attack and steal data from Web Applications or Mobile App Gateways or APIs. Unlike traditional firewalls, Prophaze WAF exclusively protects web and mobile APIs from security breach using its Adaptive Profiling and Behavioral-based machine learning algorithms. The product is built natively on Kubernetes Platform and secures customers Kubernetes clusters and cloud infrastructure from various attack vectors.
    Starting Price: $299 per month
  • 30
    AVANU WebMux
    AVANU’s WebMux Network Traffic Manager (“WebMux”) is a cost-effective full-featured enterprise-class load balancing solution. WebMux integrates application delivery network (ADN) and global server load balancing (GSLB) with its built-in FireEdge™ for Apps Web Application Firewall (WAF). In development since 1987, WebMux is developed using intensive algorithms for sophisticated network designs that require load balancing flexibility to meet and manage the most stringent network traffic demands...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next