Alternatives to ActiveFence

Compare ActiveFence alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ActiveFence in 2026. Compare features, ratings, user reviews, pricing, and more from ActiveFence competitors and alternatives in order to make an informed decision for your business.

  • 1
    cside

    cside

    cside

    cside is the leading client-side intelligence platform. Protecting organizations from advanced client-side threats such as script injection, data skimming, and browser-based attacks, risks often overlooked by traditional security measures. Leveraging client-side intelligence to provide evidence to fight chargeback fraud cases. It also addresses the growing challenge of web supply chain risk, ensuring real-time visibility and control over third-party scripts running in user environments. cside provides proactive, proxy-based protection that helps organizations meet compliance requirements like PCI DSS 4.0.1, safeguard sensitive data, and uphold user privacy, all without compromising performance.
    Leader badge
    Partner badge
    Compare vs. ActiveFence View Software
    Visit Website
  • 2
    CrowdStrike Falcon
    CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
  • 3
    AIBA

    AIBA

    AIBA

    AIBA is a Norwegian cybersecurity company specializing in AI-driven content moderation for digital platforms, with a focus on protecting children and teenagers from online threats such as grooming, bullying, and toxic behavior. Amanda is an AI-powered moderation platform designed to proactively safeguard young users in online games and social media environments. Amanda employs real-time detection to identify and mitigate harmful content, automating enforcement actions and escalating complex cases to human moderators. It offers insights into user behavior and community trends, enabling organizations to foster safer and more engaging online spaces. Built with regulatory compliance in mind, Amanda supports adherence to global safety and transparency regulations, including the EU's Digital Services Act, COPPA & KOSA in the U.S., the UK's Online Safety Bill, and Australia's Online Privacy Bill.
  • 4
    Lasso Moderation

    Lasso Moderation

    Lasso Moderation

    Lasso Moderation provides content moderation tooling out of the box. Efficiently moderate your content with the help of AI, custom automation and an easy-to-use dashboard. We provide solutions for chat, comment, communities, reviews and other user-generated content. Easily integrate within hours, not weeks. Lasso Moderation provides everything that is needed to moderate your user-generated content (UGC), like: - Text & Image moderation - AI moderation - User-level moderation - User reporting - Moderation analytics - Fully featured dashboard - Automatic detection of QR codes, URLs, email and other metadata - Easy to set up and integrate with your product - Customizable to your needs Tags: content moderation, moderate, ai moderation, automated moderation, chat moderation, community moderation, review moderation, comment moderation, user-generated content, UGC
  • 5
    TrustLab

    TrustLab

    TrustLab

    TrustLab provides out-of-the box future-proof regulatory compliance powered by AI & leading industry experts. Ensure your platform is compliant with: EU Digital Services Act (DSA) UK Online Safety Act Australian Online Safety Act Plug-and-play user complaints covering current and future regulatory requirements such as the Digital Services Act. Compliance with regulatory requirements including transparency reports, messaging, statement of reasons, appeals, and more. Liability protection for fines from user content moderation. Monitor & measure platform moderation performance with certainty. Leverage TrustGraph's AI capabilities and industry benchmark to quantify risk in real time. Detect and enforce on networks of bad actors promoting harmful content.
  • 6
    ZenGuard AI

    ZenGuard AI

    ZenGuard AI

    ZenGuard AI is a security platform designed to protect AI-driven customer experience agents from potential threats, ensuring they operate safely and effectively. Developed by experts from leading tech companies like Google, Meta, and Amazon, ZenGuard provides low-latency security guardrails that mitigate risks associated with large language model-based AI agents. Safeguards AI agents against prompt injection attacks by detecting and neutralizing manipulation attempts, ensuring secure LLM operation. Identifies and manages sensitive information to prevent data leaks and ensure compliance with privacy regulations. Enforces content policies by restricting AI agents from discussing prohibited subjects, maintaining brand integrity and user safety. The platform also provides a user-friendly interface for policy configuration, enabling real-time updates to security settings.
    Starting Price: $20 per month
  • 7
    Intrinsic

    Intrinsic

    Decoy Technologies

    Craft your own policies beyond standard abuse categories and enforce them in just minutes. Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly. Automate moderation of text, images, videos and reports with a system that gets better with every moderation action. Manage review queues and escalations easily with fine-grained RBAC permissions. Make data-driven decisions based on policy performance reports and platform-wide health monitoring. Access advanced security, AI-powered analytics, and comprehensive information governance.
  • 8
    Utopia AI Moderator
    Automation with Utopia AI Moderator increases quality, improves publishing speed and reduces costs. Utopia AI Moderator is a fully automated moderation tool that protects your online community and your brand from abusive user-generated content, fraud, cyberbullies and spam. It learns from the publishing decisions your human moderators made previously, works in real time, with a higher degree of accuracy when compared to humans. Utopia AI Moderator understands the context, works in any language, and is especially good in informal language, slang or dialect. Our tool increases the quality of published content. It removes publishing delays and provides reliable, consistent curation around the clock, allowing human moderators to focus on moderation policy management and only the most difficult cases. Utopia AI Moderator is ready for production use in only two weeks, and it moderates 100% of your incoming content. It stays up-to-date by learning as it works.
  • 9
    Blackbird.AI

    Blackbird.AI

    Blackbird.AI

    Powered by our AI-driven narrative intelligence platform, organizations can proactively understand digital threats in real time for strategic decision-making when it matters most. The risk landscape has dramatically shifted for every industry. Our suite of solutions provides actionable risk intelligence for our customers and partners. Online audiences are being influenced in ways that have never been seen before by a new generation of actors and techniques. Listening tools are not enough. Quickly encapsulate narratives with daily risk intelligence summaries, providing real-time insights and empowering strategic decisions. Fine-tune your AI-generated narrative intelligence reports with the power of human context and enhance the relevance, accuracy, and strategic value of your insights. Enhance decision-making with data-driven recommendations tailored for a wide variety of problem sets, use cases, and personas. Accelerated reporting for intelligence professionals, saving time and effort.
  • 10
    Virtue AI

    Virtue AI

    Virtue AI

    Virtue AI is a comprehensive platform designed to ensure the safety, security, and compliance of AI systems across various applications. It offers a suite of tools to monitor, assess, and safeguard AI models, applications, and agents throughout their lifecycle. Virtue AI provides customizable, policy-compliant moderation for text, code, image, audio, and video content, it evaluates AI models against over 320 safety categories and delivers safety-enhanced agents for sectors like finance, healthcare, and education. Virtue AI also supports regulatory compliance and offers performance benchmarking through AI safety leaderboards. Virtue AI is utilized by enterprises to secure their AI systems, ensuring they operate safely and responsibly. By combining expertise in machine learning, security, safety, law, and sociology, we bridge the gap between AI development and secure deployment, setting new standards for secure and responsible AI practices across industries.
  • 11
    Aurascape

    Aurascape

    Aurascape

    ​Aurascape is an AI-native security platform designed to help businesses innovate securely in the age of AI. It provides comprehensive visibility into AI application interactions, safeguarding against data loss and AI-driven threats. Key features include monitoring AI activities across numerous applications, protecting sensitive data to ensure compliance, defending against zero-day threats, facilitating secure deployment of AI copilots, enforcing coding assistant guardrails, and automating AI security workflows. Aurascape's mission is to enable organizations to adopt AI technologies confidently while maintaining robust security measures. AI applications interact in fundamentally new ways. Communications are dynamic, real-time, and autonomous. Prevent new threats, protect data with unprecedented precision, and keep teams productive. Monitor unsanctioned app usage, risky authentication, and unsafe data sharing.
  • 12
    Cisco AI Defense
    Cisco AI Defense is a comprehensive security solution designed to enable enterprises to safely develop, deploy, and utilize AI applications. It addresses critical security challenges such as shadow AI—unauthorized use of third-party generative AI apps—and application security by providing full visibility into AI assets and enforcing controls to prevent data leakage and mitigate threats. Key components include AI Access, which offers control over third-party AI applications; AI Model and Application Validation, which conducts automated vulnerability assessments; AI Runtime Protection, which implements real-time guardrails against adversarial attacks; and AI Cloud Visibility, which inventories AI models and data sources across distributed environments. Leveraging Cisco's network-layer visibility and continuous threat intelligence updates, AI Defense ensures robust protection against evolving AI-related risks.
  • 13
    Stardock Fences
    Fences helps you organize your PC by automatically placing your shortcuts and icons into resizable shaded areas on your desktop called fences. Its many customization features are what make Fences the world's most popular Windows desktop enhancement. Eliminate clutter from your desktop - but keep your Fences where it's easy to find them - with our roll up feature. Double-clicking on a Fence's title-bar will cause the rest of the Fence to "roll up" into it, saving you valuable space. To reveal your fence, you can move your mouse over the title-bar or double-click it again to view the title and all of its icons as normal. Create multiple pages of fences on your desktop and quickly swipe between them. To change to a different desktop page, just take your mouse cursor to the edge of your screen and click and drag. Then a new page of fences will be displayed.
    Starting Price: $10.63 one-time payment
  • 14
    Preamble

    Preamble

    Preamble

    Preamble's AI Safety and Security Platform is an integrated solution designed to streamline and enhance the management of AI systems within an organization. It offers a centralized hub for managing people, overseeing diverse data labeling projects, providing clear guidelines for consistent data labeling, and tracking all labels and datasets. The platform also facilitates the evaluating of custom models and serves as a comprehensive center for AI safety and security testing and policy deployment. From real-time engagement with AI models to rigorous policy testing, the platform combines these multifaceted components to ensure alignment with organizational values, ethical principles, and compliance standards. Whether it's managing individual roles, conducting adversarial testing, or deploying safety controls, Preamble's platform offers a cohesive and user-friendly environment that addresses the complex and evolving needs of AI safety and security.
    Starting Price: $100/month/user
  • 15
    WebOrion Protector Plus
    WebOrion Protector Plus is a GPU-powered GenAI firewall engineered to provide mission-critical protection for generative AI applications. It offers real-time defenses against evolving threats such as prompt injection attacks, sensitive data leakage, and content hallucinations. Key features include prompt injection attack protection, safeguarding intellectual property and personally identifiable information (PII) from exposure, content moderation and validation to ensure accurate and on-topic LLM responses, and user input rate limiting to mitigate risks of security vulnerability exploitation and unbounded consumption. At the core of its capabilities is ShieldPrompt, a multi-layered defense system that utilizes context evaluation through LLM analysis of user prompts, canary checks by embedding fake prompts to detect potential data leaks, pand revention of jailbreaks using Byte Pair Encoding (BPE) tokenization with adaptive dropout.
  • 16
    PureActiv

    PureActiv

    PureTech Systems

    Our product solutions deliver a fully integrated automated outdoor wide-area and perimeter protection system. PureActiv is among the highest in probability of detection and lowest in nuisance alarm rates, providing a superior level of security for your facility, infrastructure, and border. ​ Detect, Track, Classify, and Deter with one system. Your safety is our priority. The PureActiv system provides world-class situational awareness and proactive management of outdoor security threats to lives, critical facilities and assets. PureActiv Auto-Verify only alarms on AI verified targets of interest eliminating up to 95% of nuisance alarms from motion analytics, fence sensors, radars, and other perimeter sensors.
  • 17
    Fiberify

    Fiberify

    Trakeye

    Field agents live monitoring console and individual field agent and vehicle tracking. Geo-fence entry/exit control. Field vehicle efficiency tracking. Field activity monitoring console. Location-based issue reporting. Find near-by agents to attend issues. Get service activity updates from field. View open issues and service activity on maps. Real-time Analytics.
  • 18
    Fence Cloud

    Fence Cloud

    Fence Cloud

    Designed through decades of fence industry experience, Fence Cloud does all the tedious work of estimating and organizing jobs. There’s no long setup, huge learning curves, or unknown input fields. Instead, you indicate the basics of the fence you want to build and Fence Cloud calculates a complete and accurate fence material breakdown. Many construction CRMs have tried, but they simply aren’t focused on the fence industry. The result is complicated software that doesn’t quite do what is necessary, or you are forced to run multiple pieces of software to cover all aspects of a job. Fence Cloud is focused exclusively on the fence industry and covers everything a company needs, from managing leads to job sketches, to material breakdowns and documents for the installation crew.
    Starting Price: $175 per month
  • 19
    Trusys AI
    Trusys.ai is a unified AI assurance platform that helps organizations evaluate, secure, monitor, and govern artificial intelligence systems across their full lifecycle, from early testing to production deployment. It offers a suite of tools: TRU SCOUT for automated security and compliance scanning against global standards and adversarial vulnerabilities, TRU EVAL for comprehensive functional evaluation of AI applications (text, voice, image, and agent) assessing accuracy, bias, and safety, and TRU PULSE for real-time production monitoring with alerts for drift, performance degradation, policy violations, and anomalies. It provides end-to-end observability and performance tracking, enabling teams to catch unreliable output, compliance gaps, and production issues early. Trusys supports model-agnostic evaluation with a no-code, intuitive interface and integrates human-in-the-loop reviews and custom scoring metrics to blend expert judgment with automated metrics.
  • 20
    MCP Defender

    MCP Defender

    MCP Defender

    MCP Defender is an open source desktop application that functions as an AI firewall, designed to monitor and protect Model Context Protocol (MCP) communications. It acts as a secure proxy between AI applications and MCP servers, analyzing all communications for potential threats in real-time. It automatically scans and protects all MCP tool calls, providing advanced LLM-powered detection of malicious activity. Users can manage the signatures used during scanning, allowing for customizable security measures. MCP Defender identifies and blocks common AI security threats, including prompt injection, credential theft, arbitrary code execution, and remote command injection. It supports integration with various AI applications such as Cursor, Claude, Visual Studio Code, and Windsurf, with more applications to be supported in the future. It offers intelligent threat detection, alerting users as soon as it identifies any malicious activity being performed by AI apps.
  • 21
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 22
    SeyftAI

    SeyftAI

    SeyftAI

    SeyftAI is a real-time, multi-modal content moderation platform that filters harmful and irrelevant content across text, images, and videos, ensuring compliance and offering personalized solutions for diverse languages and cultural contexts. SeyftAI offers a comprehensive suite of content moderation tools to help you keep your digital spaces clean and safe. Detect and filter out harmful text in multiple languages. SeyftAI's API makes it easy to integrate our content moderation capabilities into your existing applications and workflows. Detect and filter out harmful or explicit images with zero human intervention. Easily integrate SeyftAI's content moderation capabilities. Tailor our content moderation workflows to your specific needs. Access detailed reports and analytics on your content moderation activities. A real-time, multi-modal content moderation platform that filters harmful and irrelevant content across text, images, and videos, ensuring compliance.
  • 23
    Verax

    Verax

    Verax AI

    Verax offers a comprehensive platform to gain full visibility and control over large language models (LLMs) in production, addressing critical risks like hallucinations, data leakage, and biased outputs. Their Control Center provides real-time detection and automatic remediation to ensure AI models behave responsibly and safely. Verax Explore delivers deep insights into LLM behavior, enabling organizations to analyze user interactions and optimize model quality continuously. Verax Protect, coming soon, focuses on preventing data leakage and maintaining regulatory compliance by controlling access to sensitive information. The platform targets enterprise IT, data science, and innovation leaders who need reliable LLM monitoring to reduce risks and improve deployment success. Verax also educates users through its blog and actively supports AI trust and safety.
  • 24
    SplxAI

    SplxAI

    SplxAI

    SplxAI offers an automated platform specifically designed for conversational AI applications. Their flagship product, Probe, proactively identifies and mitigates vulnerabilities in AI systems by simulating domain-specific attack scenarios. Key features of Probe include detailed risk analysis, framework and compliance checks, domain-specific penetration testing, continuous and automated testing, and multi-language precision, supporting over 20 languages. The platform integrates seamlessly into development cycles, ensuring AI applications remain secure throughout their lifecycle. SplxAI's mission is to secure and safeguard generative AI-powered conversational apps by providing advanced security and penetration testing solutions, enabling organizations to unlock AI's full potential without compromising security. Evaluate and refine your app’s boundaries for optimal security and user experience without being overly restrictive.
  • 25
    CyberRiskAI

    CyberRiskAI

    CyberRiskAI

    Conduct cybersecurity risk audit with CyberRiskAI. We offer a fast, accurate, and affordable service for businesses that want to identify and mitigate their cybersecurity risks. Our AI-powered assessments provide businesses with valuable insights into potential vulnerabilities, enabling you to prioritize their security efforts and protect your company’s sensitive data. Comprehensive cybersecurity audit & risk assessment. All-in-one risk assessment tool and template. Uses the NIST cybersecurity audit framework. Quick and easy to set up and run, we offer a hands-off service. Automate your quarterly cybersecurity risk audit. Data gathered is confidential and stored securely. By the end of the audit, you’ll have all the information you need to mitigate your organization’s cybersecurity risks. With the valuable insights gained in potential vulnerabilities, you can prioritize your team’s security efforts to protect and mitigate cybersecurity risks.
  • 26
    ThreatMon

    ThreatMon

    ThreatMon

    ThreatMon is an AI-powered cybersecurity platform that combines comprehensive threat intelligence with cutting-edge technology to proactively identify, analyze, and mitigate cyber risks. It provides real-time insights across a wide range of threat landscapes, including attack surface intelligence, fraud detection, and dark web monitoring. The platform offers deep visibility into external IT assets, helping organizations uncover vulnerabilities and defend against emerging threats such as ransomware and APTs. With tailored security strategies and continuous updates, ThreatMon enables businesses to stay ahead of evolving cyber risks, enhancing their overall cybersecurity posture and resilience.
  • 27
    Neysa Aegis
    From thwarting model poisoning to preserving data integrity, Aegis ensures that your AI models are shielded by default, empowering you to deploy your AI/ML projects in the cloud or on-premise, confident that your security posture is protecting you against an evolving threat landscape. Unsecured AI/ML tools broaden attack surfaces, amplifying enterprise vulnerability to security breaches without vigilant oversight by security teams. Suboptimal AI/ML security posture risks data breaches, downtime, profit losses, reputational damage, and credential theft. Vulnerable AI/ML frameworks jeopardize data science initiatives, risking breaches, intellectual property theft, supply chain attacks, and data manipulation. Aegis uses an ensemble of specialized tools and AI models to analyse data from your AI/ML landscape, as well as external data sources.
  • 28
    ByteFence

    ByteFence

    ByteFence

    Bytefence's innovative Anti-malware software detects and removes trojans, worms, spyware, crapware, and other high-risk malware. ByteFence is the best protection against crapware and bundleware that infiltrate potentially unwanted programs and ads. Real-time protection keeps you protected all the time from dangerous infections and unwanted software. Robust protection against all malware. Scans and removes harmful trojans, worms, and spyware. For a long time, Byte Technologies has been a pioneer in the field of malware detection and removal. Today, we protect millions of users with technology that predicts emerging malware, allowing us to defend against any possible damage. Our software is designed to be easy to install, configure, and run. But in the rare case that you need our help, our skilled support team will get back to you quickly. We also offer a wealth of online resources and free support for our products during testing.
  • 29
    SydeLabs

    SydeLabs

    SydeLabs

    With SydeLabs you can preempt vulnerabilities and get real-time protection against attacks and abuse while staying compliant. The lack of a defined approach to identify and address vulnerabilities within AI systems impacts the secure deployment of models. The absence of real-time protection measures leaves AI deployments susceptible to the dynamic landscape of emerging threats. An evolving regulatory landscape around AI usage leaves room for non-compliance and poses a risk to business continuity. Block every attack, prevent abuse, and stay compliant. At SydeLabs we have a comprehensive solution suite for all your needs around AI security and risk management. Obtain a comprehensive understanding of vulnerabilities in your AI systems through ongoing automated red teaming and ad-hoc assessments. Utilize real-time threat scores to proactively prevent attacks and abuses spanning multiple categories, establishing a robust defense against your AI systems.
    Starting Price: $1,099 per month
  • 30
    Unitary

    Unitary

    Unitary

    Reduce manual moderation overhead with human-like AI classification. Highly accurate AI that understands tone, context, and setting. By considering signals together, just like a human would, Unitary enables you to make more accurate classifications. This means better user experience, less time reviewing inaccurate judgments, and more time for your moderators to focus on what matters. Models custom-fit to your detailed trust and safety guidelines. Off-the-shelf models that take into account tone, context, and setting to deliver significant increases in accuracy. Power real-time customer journeys and workflows. Process tens of millions of pieces of content per day. Reduce manual moderation costs and protect users. Unitary was founded to help brands and platforms understand every piece of content in detail. We do this by building context-aware AI and multimodal machine learning methods to interpret content in context.
  • 31
    CloudCover CyberSafety Platform (CC/B1)
    CloudCover CyberSafety B1 Platform (CCB1) is an advanced AI‑based SOAR security threat management solution that operates at sub‑second speed, ingesting real‑time context from an organization’s assets, configurations, threat intelligence, and business criticality to dynamically prioritize risks and deflect attacks with 99.9999999% accuracy and zero false positives. Leveraging patented deep‑learning risk orchestration, it has recorded and halted over 41 billion breach attempts in microseconds without compromise, continuously detecting, capturing, and preventing kompromat across cloud and on‑premises environments. CCB1 integrates seamlessly with existing security stacks to form a predictive CyberSafety layer that automates remediation workflows, deploying patches, configuration changes, or compensating controls, while built‑in AI agents adapt in real time to emerging threats.
  • 32
    TaskUs

    TaskUs

    TaskUs

    Safeguarding the online space with rigor and empathy. Online content is generated and shared at an exponential rate. With ever-present risks, companies need robust systems and vigilant human moderators to protect their users. Content security is a growing TaskUs service, and we are committed to creating the ideal online space. TaskUs is fully committed to becoming the industry’s number 1 content moderation provider and specialist – a goal that permeates every aspect of our services, our partnerships, and our unrelenting focus to keep the web safe for all. We created The TaskUs Method a comprehensive, global psychological health and safety program for content moderators, guided by the practice of evidence-based psychology and grounded in neuroscience. Content security is a fast-growing area of our business. We have 5,000+ dedicated Teammates powering some of the world’s leading brands in social media, FinTech, and gaming, among others.
  • 33
    inOut

    inOut

    Novaders LLP

    Time and Attendance management mobile app with Face Recognition & Geo Fencing Easy to use cloud based Time and Attendance management mobile app with Face Recognition & Geo Fencing technology. Simplify payroll and reporting. Advantages of inOut: Compliance Management Manage compliance of employees to office timings and rules without manual intervention. Get real-time alerts and analytics on location. Automation Reduce time & effort of manual leave, Time and Attendance tracking and improve productivity Real-time Live Dashboard & Report Get Leave, Time & Attendance data in simple Dashboard, Reports and Alerts. Employee Health & Safety Improve Health & Safety of employees through a Zero Contact Solution
    Starting Price: $2.00/month/user
  • 34
    Protect AI

    Protect AI

    Protect AI

    Protect AI performs security scans on your ML lifecycle and helps you deliver secure and compliant ML models and AI applications. Enterprises must understand the unique threat surface of their AI & ML systems across the lifecycle and quickly remediate to eliminate risks. Our products provide threat visibility, security testing, and remediation. Jupyter Notebooks are a powerful tool for data scientists to explore data, create models, evaluate experiments, and share results with their peers. The notebooks contain live code, visualizations, data, and text. They introduce security risks and current cybersecurity solutions do not work to evaluate them. NB Defense is free to use, it quickly scans a single notebook or a repository of notebooks for common security issues, identifies problems, and guides your remediation.
  • 35
    TROJAI

    TROJAI

    TROJAI

    Even the best AI models can have hidden risks. Identify and address potential problems before they impact your business, ensuring smooth AI adoption and compliance. AI applications are vulnerable to new and sophisticated attacks. Stay ahead of the curve by protecting your models and applications from data poisoning, prompt injection, and other emerging threats. Leverage cutting-edge public AI services with confidence. We help you ensure responsible use and prevent data leaks, so you can focus on innovation without worry. The TROJAI security platform enables organizations to comply with benchmarks such as the OWASP AI framework as well as privacy regulations by testing models prior to deployment and protecting applications from things such as sensitive data loss once deployed.
  • 36
    Terra

    Terra

    Terra

    Terra offers agentic-AI powered continuous web application penetration testing as a service, combining AI agents with human expert supervision to deliver deep, business-context aware security assessments. It provides full coverage of an organization’s web application attack surface, continuously testing through changes rather than only at fixed intervals. The tool delivers real-time adaptability, meaning newly deployed or updated features are automatically evaluated for vulnerabilities, not waiting for quarterly or annual audits. Terra’s reports are designed to be compliance-audit ready, reflecting proof of exploitability, likelihood, potential breach comparison, and business impact, along with suggestions for remediation. It emphasizes prioritization of real risks, tailored to the customer's business context and risk profile, with visibility across all applications and features. Users benefit from increased efficiency and accuracy over traditional automated pentests.
  • 37
    Cyabra

    Cyabra

    Cyabra

    Cyabra is a real-time AI-powered platform that uncovers and analyzes online disinformation and misinformation by uncovering fake profiles, harmful narratives, and GenAI content across social media and digital news channels. Cyabra’s AI protects corporations and governments against brand reputation risks, election manipulation, influence operations, and other online threats. Cyabra’s platform leverages proprietary algorithms and NLP solutions, gathering and analyzing publicly available data to provide clear, actionable insights and real-time alerts that inform critical decision-making. Headquartered in New York with a growing presence globally, Cyabra uncovers the good, bad, and fake online.
  • 38
    Fakespot

    Fakespot

    Mozilla

    Fakespot protects you from getting ripped off when shopping online. Join the secure shopping revolution and get the the truth about products, reviews, and sellers before you buy. Fakespot has your back when you’re shopping online at home or on mobile. Fakespot’s new browser app allows you to browse the open-web and when you land on sites that we support you will have Fakespot's features enabled to help you make informed purchase decisions. Share via other shopping apps and browsers, Share to analyze functionality is still included for users coming from our previous app. Since Fakespot’s inception, we have analyzed over 9 billion product and seller reviews. Our analysis helps you make informed decisions so you love everything you buy and never return anything. Fakespot also stays one step ahead of emerging threats by always updating our algorithms to protect you as you shop. Fakespot is safe, secure shopping that saves time, money, and headaches.
  • 39
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 40
    Content Analyzer AI

    Content Analyzer AI

    ContentAnalyzer.ai

    ContentAnalyzer.ai is an AI-powered Trust & Safety platform designed to help businesses confidently manage user-generated content at scale. Built to become the default moderation layer for digital platforms, it detects and mitigates harmful, abusive and non-compliant content across text, images, videos and live streams in real time. By combining advanced machine learning, language-aware analysis, and human-in-the-loop workflows, ContentAnalyzer.ai enables platforms to stay compliant, protect users and maintain brand trust—without slowing down growth. It is trusted by platforms where safety, accuracy and speed are mission-critical.
  • 41
    SafetyKit

    SafetyKit

    SafetyKit

    Zero out your backlog and increase precision with automated Trust and Safety decisions — no eng, ML, or vendor management required. Define what you do and don’t want on your platform — our AI agents will execute those policies with better-than-human precision and speed. Our quality monitoring tools let you deploy correct, repeatable policies with confidence. Legacy ML models require expensive labeling and training, and training human reviewers takes even longer. We allow you to deploy new enforcements today with no agent or model retraining. It’s impossible to understand why ML classifiers make a prediction, and human reviewers aren’t much better. SafetyKit provides detailed reasoning with every decision.
  • 42
    CyberCAST
    CyberCAST is our comprehensive cybersecurity software that enhances our managed security services. Our platform illuminates critical insights into an organization’s threat susceptibility and informs a dynamic cybersecurity strategy that matures over time. Starting with a combination of technical penetration testing and a detailed security audit, this results in a quantitative security risk score that provides a foundation for developing a comprehensive cybersecurity strategy. Our security professionals examine all findings to tailor our approach to the organization’s specific needs. The penetration test component evaluates findings based on business risk and categorizes vulnerabilities based on systemic and process-related issues. Best of all, you don’t have to be a technical genius to understand it. CyberCAST delivers all security findings in plain business language that’s easy to understand and communicate to executive leadership and your board.
  • 43
    Tenable AI Exposure
    Tenable AI Exposure is an agentless, enterprise-grade solution embedded within the Tenable One exposure management platform that provides visibility, context, and control over how teams use generative AI tools like ChatGPT Enterprise and Microsoft Copilot. It enables organizations to monitor user interactions with AI platforms, including who is using them, what data is involved, and how workflows are executed, while detecting and remediating risks such as misconfigurations, unsafe integrations, and exposure of sensitive information (like PII, PCI, or proprietary enterprise data). It also defends against prompt injections, jailbreak attempts, policy violations, and other advanced threats by enforcing security guardrails without disrupting operations. Supported across major AI platforms and deployed in minutes with no downtime, Tenable AI Exposure helps organizations govern AI usage as a core part of their cyber risk strategy.
  • 44
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
  • 45
    Crisp

    Crisp

    Crisp

    Crisp is a cutting-edge Social Media Safety and crisis monitoring firm. Our industry-leading technology is trusted by some of the world’s largest, most well-known brands to provide fast, precise detection of critical issues and crises. Established in 2005 by online gaming and social media entrepreneur Adam Hildreth, Crisp began protecting children and teenagers using online games and social networks from abuse, sexual exploitation, cyberbullying and other online threats. And as organizations began utilizing social media to engage and foster relationships with customers, Crisp evolved its offering to help brands manage and avert liabilities on their own social media channels, and the larger social web. From luxury and media, to pharmaceutical and FMCG companies, global brands trust Crisp to protect over $4.5 trillion of market capitalizations. Through 24/7 monitoring of social media channels and the wider internet, we ensure brands are immediately alerted to emerging issues.
  • 46
    ARTEMIS by Repello
    ARTEMIS by Repello AI hunts for vulnerabilities in your AI applications by simulating attacks that malicious actors would use. ARTEMIS tests, identifies, and helps remediate security risks before they can be exploited in production environments. This is powered by world's largest AI-specific threat intelligence repositories. Key Features: 1. Simulates real-world attacks against your AI systems 2. Maps vulnerabilities across your AI infrastructure 3. Provides actionable mitigation recommendations 4. Adapts to evolving threats as your AI applications grow Built by security engineers to protect AI from attackers. Secure your AI early in development and throughout deployment.
  • 47
    Fence

    Fence

    Fence

    We replace spreadsheets, PDFs, emails and traditional finance rails with a blockchain-based infrastructure to save you time and money when managing your debt. Integrate with your back office via API for data transfer, capital requests, and more. Enhance capital efficiency with quick settlements. Monitor credit agreements in real-time with up-to-date data and receive automated reports at your desired frequency through Fence's dashboard. Fence turns credit agreements into efficient smart contracts. Auto-calculate and execute waterfall steps according to the repayment schedule. Choose our legal setup or digitize your existing credit agreement. Fence manages term changes and execution, reducing time to first drawdown.
  • 48
    Captira

    Captira

    Captira

    Captira is a modern, web-based bail bond agency software that provides bail agencies with a comprehensive, secure, cloud-hosted platform accessible from any device. It offers unlimited agents and defendants, detailed inventory, sales, accounting, and defendant reporting with granular access control, and automated check‑ins via SMS links that capture location and optional photos, with geo‑fence and facial‑recognition alerts. Captira supports online bail applications via website buttons or text‑to‑apply, auto‑filled forms with free eSign, SMS, and online payment links with flexible payment plans, and integrations for background and credit checks, real estate, and incarceration history. Additional modules include Defendant Watch, which alerts agencies when a defendant is re‑arrested anywhere in the country, and Vehicle Watch, which sends real‑time location and timestamp alerts.
    Starting Price: $99 per month
  • 49
    Security Framework

    Security Framework

    PrimeSoft Solutions

    An enterprise security solution to proactively shield enterprise assets by creating an e-fence that uses software based security constructs to replace physical appliances with logical components that operate under the control of the application owner. Entire solution is developed to be up and running on Docker containers. Single agent download on user side to access all the assets (which are hybrid in nature).
  • 50
    Alethea Artemis
    Leveraging the power of advanced analytics and machine learning, Artemis conducts multi-channel analysis across a broad array of online content, including forums, social media and other resources to proactively identify and investigate disinformation online. Artemis delivers unrivaled intelligence on disinformation networks. Its real-time insights allow our customers time to protect key assets from risk and potential damage due to disinformation, misinformation, and social media manipulation.