Suggested Categories:

Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
Mentoring Software
Mentoring software is a type of software designed to facilitate the mentor-mentee relationship. It provides users with tools for scheduling, tracking progress, providing feedback, and developing plans for growth. The software can be used as a standalone system or integrated into existing enterprise solutions. Mentoring software allows organizations to easily manage and monitor their mentorship programs remotely and efficiently.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Product Recommendation Engines
Product recommendation engines use algorithms and customer data to suggest personalized products to users based on their browsing behavior, past purchases, or preferences. These platforms analyze large sets of data, such as customer interactions and purchase history, to identify patterns and recommend products that are most likely to interest the individual customer. Product recommendation engines help e-commerce businesses increase sales and customer engagement by offering a more personalized shopping experience. By integrating these engines, businesses can provide relevant suggestions, improve conversion rates, and enhance customer satisfaction.
View more categories (6) for "algorithm"
  • 1
    RECOGNITO

    RECOGNITO

    RECOGNITO

    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions that are fully optimized for usability, security, and privacy. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID...
    Leader badge
    Starting Price: Free
  • 2
    Neurodactyl

    Neurodactyl

    Neurodactyl

    Neurodactyl is a technology startup, specializing in сontactless fingerprint recognition algorithms. Our main advantages: - Highly accurate neural network algorithms, top-tier results on NIST PFT III - The technology works with scans and photo images - All types of fingerprints are supported - Very fast matching - from 100M matches pers 1 s on 1 CPU. Our products: - Server fingerprint recognition SDK for verification and identification - Mobile SDK for fingerprint acquisition on mobile...
    Starting Price: USD 0.01 per verification
  • 3
    TrustLink

    TrustLink

    AarateK

    ... algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers.
  • 4
    SAV7

    SAV7

    SAV7

    ... authentication codes (MACs). The AES algorithm, one of the world’s leading encryption algorithms, provides strong encryption and is utilized by governments, banks, and organizations worldwide. SAV7 secures your sensitive data against unauthorized access by offering a robust method of encryption and authentication that adheres to the latest security standards.
  • 5
    AccuHash

    AccuHash

    AccuHash

    AccuHash 2.0 is Windows 95/98/Me/NT/2000/XP/2003 utility for protecting the integrity and verifying the accuracy of data files using checksum calculation algorithms (CRC32, MD5 and SHA-1). It will allow to easily and quickly verify integrity of files downloaded from Internet, transferred over a network and/or burned onto CD/DVD. AccuHash 2.0 use the checksum file format based on XML and Unicode-enabled - this allows to easily exchange checksum files between different systems in different...
    Starting Price: $19.95 one-time payment
  • 6
    StealthDisk Mobile

    StealthDisk Mobile

    Security Group Six

    StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder...
    Starting Price: $49.95 one-time payment
  • 7
    VeriFinger SDK

    VeriFinger SDK

    Neurotechnology

    ... for biometric system integrators. Since that time, Neurotechnology has released more than 10 major and minor versions of the VeriFinger, providing most powerful fingerprint recognition algorithms to date. Numerous awards in competitions and technology evaluations, including NIST MINEX, PFT III and SlapSeg III, have been received by Neurotechnology's fingerprint recognition algorithms. Rolled and flat fingerprint matching that is tolerant to fingerprint translation, rotation and deformation.
  • 8
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps...
  • 9
    SafePass

    SafePass

    Reason Cybersecurity

    ...Pass will remember your password so you don’t have to. A master password unlocks your private key, which decrypts your data in SafePass. An AES-256 symmetric encryption algorithm is used to lock down sensitive data with a new random key every time. An RSA-4096 asymmetric encryption algorithm enables SafePass to secure your data with a public key and unlock it with a private key that only you have.
  • 10
    Argoscope

    Argoscope

    Detelix Software Technologies

    ... examining every end-to-end business process. The system is based on the knowledge and experience of the best experts, including finance managers, risks, internal auditors, information security and cyber of the large organizations in Israel, using machine learning, business intelligence, re-learning and developing new algorithms on an ongoing basis. Argoscope keeps track of your organization's assets anywhere, anytime, anytime.
  • 11
    east-tec InvisibleSecrets
    .... east-tec InvisibleSecrets is a file encryption software that helps you protect your confidential information from prying eyes or unwanted access by helping you encrypt file or folder structures on your computer. Featuring strong file encryption algorithms, it ensures you the maximum security level you need for complete privacy protection. Securely hide files and your sensitive information.
    Starting Price: $39.95 one-time payment
  • 12
    Digital.ai Application Protection
    ... and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.
  • 13
    WinDataReflector

    WinDataReflector

    Veridium Software

    WinDataReflector is a lightweight file synchronization and backup tool that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up and support for two way synchronization with fully customizable rules, real time synchronization and scheduling. WinDataReflector also supports synchronizing files to network shares, Google Drive, OneDrive, DropBox and SFTP.
    Starting Price: $15.00/one-time/user
  • 14
    Netspark

    Netspark

    Netspark

    ... that what users really need is a content filtering tool focused on enabling access to content, not just blocking it. Our unique algorithms and machine learning engines work together to contextually understand web content and the value it offers our users, prior to filtering out any inappropriate elements.
  • 15
    iolo Malware Killer
    ... to discover the newest threats. Features a carefully developed threat-detection algorithm. On-demand malware discovery and removal. Safely analyzes suspicious files with proprietary technology. Can even detect previously unknown threats.
    Starting Price: $19.95 one-time payment
  • 16
    VoodooShield

    VoodooShield

    VoodooShield

    ... product. Our unique antimalware contextual engine is a highly developed, refined, and sophisticated algorithm that examines the context of every feature of every possible attack chain event so that benign events are automatically allowed and potentially malicious events are automatically blocked. This enables VoodooShield to provide extremely robust ransomware, script, LOLBins, and fileless malware protection capabilities.
    Starting Price: $20 per year
  • 17
    CryptoSentry

    CryptoSentry

    SentryBay

    ... variants which have had a significant impact on productivity and finance. Because ransomware is an attack on the availability of data, our CryptoSentry solution is designed to prevent it from getting access to data so it can encrypt files. Once installed on your employees’ devices, it will constantly monitor for suspicious encryption activity. If its algorithms determine a threat, it will proactively prevent file encryption.
  • 18
    KeePass

    KeePass

    KeePass

    KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can store all your passwords in one database, which is locked with a master key. So you only have to remember one single master key to unlock the whole database. Database files are encrypted using the best and most secure encryption algorithms currently known (AES-256, ChaCha20 and Twofish). KeePass can be downloaded for free from SourceForge.
    Starting Price: Free
  • 19
    ShieldApps Webcam Blocker
    ShieldApps’ Webcam Blocker equips you with highly sophisticated security software that utilizes advanced privacy enhancement algorithms – packaged in a simple interface that allows single-click protection. ShieldApps Webcam Blocker prevents hackers from accessing and using information collected through a webcam and microphone against you. The clean and user-friendly design will give you easy, one-click control over both Webcam and microphone-blocking features. ShieldApps Webcam Blocker adds...
    Starting Price: $29.99 one-time payment
  • 20
    ShieldApps Anti Malware
    Anti Malware offers active protection from malicious threats and is set to monitor, block, and alert whenever malware is detected. Anti Malware offers full protection from online threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Anti Malware will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer...
    Starting Price: $79.99 one-time payment
  • 21
    Shield Antivirus
    ... emails. Shield antivirus offers full protection from internet/browsing threats at a fraction of the CPU load due to its advanced detection engine and algorithms. Shield Antivirus will automatically scan a computer for threats on a defined schedule and also includes extra tools and features such as the secure file eraser, history cleaner, and start-up manager to help keep your computer protected and operating at peak performance.
    Starting Price: $69.99 one-time payment
  • 22
    HarfangLab

    HarfangLab

    HarfangLab

    Detect files considered malicious based on specific signatures discovered by researchers, publishers and our CTI team. Set up detection alerts on IOCs corresponding to known threats and enrich them with your own IOCs to adapt EDR to your environment. Our R&D team is constantly training its algorithms to enable you to detect binaries that are reputed to be undetectable. Take advantage of 1,200+ detection rules and identify potential new threats not listed by IOCs or in signature databases...
  • 23
    Fingerbank

    Fingerbank

    Fingerbank

    ... is performing continuous data mining to extract common patterns from networking devices and can therefore raise an alert when a device acts abnormally. When a device connects to a network, it exposes various precious information on different layers of the networking stack. The Fingerbank collector can build a precise fingerprint of the device and use the knowledge and algorithms of the Fingerbank cloud API to accurately identify the device.
    Starting Price: $250 per month
  • 24
    360 Antivirus Pro

    360 Antivirus Pro

    360 Antivirus Pro

    For Windows devices, 360 Antivirus Pro is a complete security solution that offers real-time shield against a wide range of threats, such as viruses, malware, ransomware, and spyware. It uses advanced algorithms to detect and block threats, ensuring your system remains secure. The intuitive user interface makes it easy to manage scans, schedule updates, and adjust protection settings. With its robust protection capabilities and user-friendly design, 360 Antivirus Pro provides peace of mind...
    Starting Price: $69.99
  • 25
    PrimeSSL

    PrimeSSL

    PrimeSSL

    ...-edge cryptographic algorithms, PrimeSSL delivers strong security and builds trust through recognizable browser security indicators.
    Starting Price: $5.99/year
  • 26
    MATLAB

    MATLAB

    The MathWorks

    MATLAB® combines a desktop environment tuned for iterative analysis and design processes with a programming language that expresses matrix and array mathematics directly. It includes the Live Editor for creating scripts that combine code, output, and formatted text in an executable notebook. MATLAB toolboxes are professionally developed, rigorously tested, and fully documented. MATLAB apps let you see how different algorithms work with your data. Iterate until you’ve got the results you want...
  • 27
    AssureID

    AssureID

    Acuant

    ..., and significantly reduces employee training. Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 28
    Veriato Workforce Behavior Analytics
    Monitor productivity, run investigations, and protect against insider risk with one platform. Our powerful workforce behavior analytics allow you to regain visibility into your remote or hybrid employee activity. Veriato workforce behavior analytics go beyond passive monitoring to proactively analyze productivity, monitor for insider risk and much more. Powerful, easy-to-use tools to keep your remote, hybrid and office teams productive. Veriato’s AI-powered algorithm analyzes user behavior...
    Starting Price: $25 per user per month
  • 29
    Passwork

    Passwork

    Passwork

    Passwork provides an advantage of effective teamwork with corporate passwords in a totally safe environment. Employees can quickly access all their passwords, while the rights and actions are closely supervised and managed by local system administrators. All data is encrypted using the AES-256 algorithm while being securely stored on your server and managed solely by system administrators. Passwork runs on PHP and MongoDB and can be installed on Windows and Linux, with or without Docker...
    Starting Price: $480 one-time
  • 30
    Cofense PhishMe
    ..., in just a few clicks. Our Smart Suggest capability uses advanced algorithms and embedded best practices to recommend scenarios based on current active threats, industry relevance, and your program’s history. The most important part of your phishing defense is reporting and resiliency rates. Boost reporting and help users become active defenders with Cofense Reporter™, our one-click reporting button.
  • Previous
  • You're on page 1
  • 2
  • Next