Alternatives to Alethea Artemis

Compare Alethea Artemis alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Alethea Artemis in 2024. Compare features, ratings, user reviews, pricing, and more from Alethea Artemis competitors and alternatives in order to make an informed decision for your business.

  • 1
    FTK Forensic Toolkit
    Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, FTK uses 100 percent of its hardware resources, helping investigators find relevant evidence faster. Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution.
  • 2
    NewsGuard

    NewsGuard

    NewsGuard

    Leveraging its bird’s eye view of the digital information environment, NewsGuard extracts and catalogs the top misinformation narratives spreading online. NewsGuard provides data about each narrative in machine-readable format—such as example language, links containing the false claim, and related keywords and hashtags. The Misinformation Fingerprints can be used as data seeds for existing AI/Social Listening tools to trace false claims across the internet and social media or can be used by human analysts to understand mis- and disinformation risks. Purpose-built for use by both human analysts and AI tools, NewsGuard’s Misinformation Fingerprints™ provides a continuously updated view of the digital information environment—and a powerful way to track narratives that are emerging and spreading online.
  • 3
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
  • 4
    Storyzy

    Storyzy

    Storyzy

    Automated, AI-based research tools allow for easier, faster, and more effective open-source research. Thousands of categorized sources—websites, blogs, video channels, social networks, are automatically indexed and archived, and continually added to Storyzy’s platform database. This allows users to add on to it and customize their own source lists. All in 42 languages. Granular investigations are made possible, allowing the identification of clues, markers, and hard evidence of information manipulation, on websites, blogs, social media documents, but also in images and visuals. For over ten years now, Storyzy’s teams have been designing and developing tools to fight online information manipulation. Artificial and human intelligence combined are the indispensable ingredients that made it possible to build the Storyzy platform with its actual users.
  • 5
    Graphika

    Graphika

    Graphika

    Graphika leverages the power of artificial intelligence to create the world’s most detailed maps of social media landscapes. We pioneer new analytical methods and tools to help our partners navigate complex online networks. Using our unique, patented set of technologies and tools, our intelligence team creates and applies new, rigorous analytical methods to answer difficult questions about online conversations. Graphika’s analysis and investigations team is a world leader in the detection and study of harmful online networks. Through our work with industry partners, academic institutions, government bodies, and non-profit organizations, we regularly deliver public-facing reports on topics ranging from state-backed influence operations, to violent conspiracy networks, and targeted harassment campaigns.
  • 6
    Logically Intelligence
    Logically Intelligence uses artificial intelligence to identify and tackle harmful and manipulative content at speed and at scale. Our platform ingests content and data from social platforms, online media source and websites. As a result, Logically Intelligence provides analysts with the insights needed to detect, assess, and act on emerging threats. Monitor and analyze a specific information environment by creating a Situation Room using a simple keyword-based interface or advanced boolean queries. Identify and analyze narratives emerging in a specific Situation Room, including keywords driving the narrative, associated posts, and original poster data. Also, you can compare two narratives over time and measure the impact of counter-narratives. Boolean queries or keywords can be added in any language and the platform will display and translate data from all languages.
  • 7
    Buster.Ai

    Buster.Ai

    Buster.Ai

    The multiplication of fake news makes the use of an information verification algorithm indispensable. Making decisions based on false information is a huge risk for your business. Be sure of your information before you make your decisions. Our AI analyzes any statement at speed and scale, 24/7, to protect organizations from misinformation. Use data analysis on social networks to identify harmful, toxic, divisive, and false content and prevent its impact on organizations. Businesses rely on information to make important decisions, our solution reduces the risk, of checking the information and identifying fake one. Enter your assertion into natural language and get your relevant insight. Identify misinformation about your organization on social networks. Identify the actors that are detrimental to your investments.
  • 8
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 9
    Cyabra

    Cyabra

    Cyabra

    Cyabra uncovers threats to companies, products, people, and places on social platforms, by exposing and reporting malicious actors, disinformation, and bot networks. Integrating seamlessly into your systems, Cyabra’s breadth of OSINT coverage is unparalleled and includes Facebook, TikTok, Twitter, news sites, the cybercrime underground, and more. Cyabra also provides actionable insights, real-time alerts and advanced mitigation. Safeguard local and national elections from foreign and domestic influence. Stop bad actors using social engineering tactics from impacting public discourse. Uncover arising protests and key leaders fuelling online rage and hate.
  • 10
    Public Editor

    Public Editor

    Public Editor

    We’re an online community of critical thinkers vetting the most-shared news articles on the Internet. We train ourselves – across nine separate assessment tasks – to label misinformation in the news. Our browser extensions show everyone which ideas are mistaken or misleading. And if we haven’t reviewed a news article yet, you can send it our way. We need your help to ensure we can continue identifying misinformation & building trust in a shared reality.
  • 11
    Amped Authenticate

    Amped Authenticate

    Amped Software

    Amped Authenticate is the leading forensic software for unveiling the processing history of a digital image. Amped Authenticate provides a suite of powerful tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of manipulation using a photo editing software, making its admissibility as evidence questionable. Amped Authenticate is used by digital forensic experts and intelligence agencies worldwide. Authenticate is a collection of the most useful, real-world-application authentication filters and techniques identified by image analysts, based on hundreds of scientific papers and studies. These have been built into an easy-to-use, yet amazingly powerful interface to help investigators answer the many questions of authenticity and integrity surrounding today's digital images.
  • 12
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 13
    ActiveFence

    ActiveFence

    ActiveFence

    ActiveFence is the leading Trust and Safety provider for online platforms, protecting over three billion users from malicious behavior and content daily. Trust and Safety teams of all sizes rely on ActiveFence to keep their users safe from the widest spectrum of online harms, including child abuse, disinformation, hate speech, terror, fraud, and more. We offer a full stack of capabilities with our deep intelligence research, AI-driven harmful content detection and moderation platform. ActiveFence protects platforms globally, in over 100 languages, letting people interact and thrive safely online.
  • 14
    Bot Sentinel

    Bot Sentinel

    Bot Sentinel

    We designed Bot Sentinel to be simple to use and as informative as possible. We publicly display detailed information about Twitter accounts the platform is tracking to give visitors of this website a better understanding of how nefarious accounts spread disinformation and target other accounts. We try to be as transparent as possible and give visitors as many data points as possible. Bot Sentinel is a non-partisan platform; we track all accounts. The platform uses machine learning and artificial intelligence to classify Twitter accounts and add the accounts to a publicly available database that anyone can browse. We trained Bot Sentinel to classify Twitter accounts using thousands of accounts and millions of tweets for our machine-learning model. The system can correctly classify accounts with an accuracy of 95%. Unlike other machine learning tools designed to detect “bots,” we are focusing on specific behaviors and activities deemed inappropriate by Twitter rules.
  • 15
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all information in one graph. Automatically combine disparate data sources in point-and-click logic​. Use our regex algorithms to auto-detect entity types. Enrich your data through our intuitive graphical user interface​. Use entity weights to detect patterns even in the largest graphs. Annotate your graph and export it for further use.
    Starting Price: €5000 per user per year
  • 16
    OARO Media
    Technological advances in artificial intelligence have made realistic tampered with photos and videos mainstream in the form of deep fakes. OARO Media creates an immutable data trail that allows businesses, governing bodies, and even individual users to authenticate any photo or video. It is the only mobile app that generates reliable photos and videos embedded with records of user identity, content, timestamp, and GPS coordinates. Efficient claims management and improving the customer experience is a high priority for insurers. Historically the process of authenticating insurance claims has been arduous and involved high staff costs. Adjusters needed to visit sites in person to verify the damage claimed and customers could not easily review the adjuster’s records.
  • 17
    TrustLab

    TrustLab

    TrustLab

    TrustLab provides out-of-the box future-proof regulatory compliance powered by AI & leading industry experts. Ensure your platform is compliant with: EU Digital Services Act (DSA) UK Online Safety Act Australian Online Safety Act Plug-and-play user complaints covering current and future regulatory requirements such as the Digital Services Act. Compliance with regulatory requirements including transparency reports, messaging, statement of reasons, appeals, and more. Liability protection for fines from user content moderation. Monitor & measure platform moderation performance with certainty. Leverage TrustGraph's AI capabilities and industry benchmark to quantify risk in real time. Detect and enforce on networks of bad actors promoting harmful content.
  • 18
    Fakespot

    Fakespot

    Fakespot

    Fakespot protects you from getting ripped off when shopping online. Join the secure shopping revolution and get the the truth about products, reviews, and sellers before you buy. Fakespot has your back when you’re shopping online at home or on mobile. Fakespot’s new browser app allows you to browse the open-web and when you land on sites that we support you will have Fakespot's features enabled to help you make informed purchase decisions. Share via other shopping apps and browsers, Share to analyze functionality is still included for users coming from our previous app. Since Fakespot’s inception, we have analyzed over 9 billion product and seller reviews. Our analysis helps you make informed decisions so you love everything you buy and never return anything. Fakespot also stays one step ahead of emerging threats by always updating our algorithms to protect you as you shop. Fakespot is safe, secure shopping that saves time, money, and headaches.
  • 19
    Ad Observer

    Ad Observer

    Ad Observer

    Who is paying for online advertising to target you? Who’s showing you ads because you’re married, or you’re a liberal, or work in the oil industry or some other category? Are they saying different things to different people? Help hold them accountable by installing our browser plugin, which sends us the ads you see on Facebook and YouTube, without compromising your privacy. Ad Observer is a tool you add to your Web browser. It copies the ads you see on Facebook and YouTube, so anyone can see them in our public database. If you want, you can enter basic demographic information about yourself in the tool to help improve our understanding of why advertisers targeted you. However, we’ll never ask for information that could identify you.
  • 20
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 21
    Deepware

    Deepware

    Deepware

    Deepfakes are going to be the first real punch from AI to humanity. The cybersecurity industry has a very short time to get ahead of deepfakes before they undermine the public’s trust in reality. Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of AI-generated synthetic media, the most powerful cyber-weapon in history is just around the corner. We expect destructive use of deepfakes, particularly as phishing attacks, to materialize very soon. The main limitation is the lack of legitimate voice-swapping techniques, which is a much greater danger than face/head-swapping.
  • 22
    Factiverse

    Factiverse

    Factiverse

    Check information in seconds and find credible sources for any content, whether you are writing yourself or verifying AI-generated content. Focus on your writing, and save hours of manual research. Elevate your fact-checking by using the most comprehensive collection of manual fact-checks since 1991. Get hourly updates from certified fact-checkers globally in your feed. Always stay on top of false narratives. Maintain focus during research, writing, or analysis by hovering over complex terms and industry-specific jargon and getting embedded explanations. Boost reader engagement and prevent the audience from leaving your page.
  • 23
    Sensity

    Sensity

    Sensity

    We help your international expansion with our all-in-one solution to classify and analyze ID Documents. Stop frauds with a multilayer AI-Powered forensic suite. Get detailed reports about the type of forgery with our analytics dashboard. Onboard-only users who present faces coherent with the face on the ID document previously presented. Our solution can be used to find and match a face in a million faces database with 99.2% accuracy. With our passive liveness detection, your clients don't need to perform any action in front of the camera. We leverage four different types of approaches able to analyze the document from a completely different perspective in order to put in condition your fraud team to spot a wide range of document fraud. Speed-up the document review from hours to seconds and get actionable insights to evaluate the risk rate of your new clients. Keep anything monitored through a simple and intuitive dashboard.
  • 24
    Utopia AI Moderator
    Automation with Utopia AI Moderator increases quality, improves publishing speed and reduces costs. Utopia AI Moderator is a fully automated moderation tool that protects your online community and your brand from abusive user-generated content, fraud, cyberbullies and spam. It learns from the publishing decisions your human moderators made previously, works in real time, with a higher degree of accuracy when compared to humans. Utopia AI Moderator understands the context, works in any language, and is especially good in informal language, slang or dialect. Our tool increases the quality of published content. It removes publishing delays and provides reliable, consistent curation around the clock, allowing human moderators to focus on moderation policy management and only the most difficult cases. Utopia AI Moderator is ready for production use in only two weeks, and it moderates 100% of your incoming content. It stays up-to-date by learning as it works.
  • 25
    LiarLiar

    LiarLiar

    LiarLiar

    Supports all of your favorite tools and platforms. LiarLiar employs cutting-edge AI to analyze micro movements, heart rate, and subtle cues in body language to detect deception. Our tool gives you unprecedented insight into the truth during video calls or video analysis. Designed with a user-friendly interface, LiarLiar can be easily set up and operated. Even those with minimal tech experience can become experts in detecting lies with a simple click. Compatible with popular video call software like Zoom, Google Meet, Skype, and more, LiarLiar can be used on any video feed, including YouTube or your own local videos. Analyze any conversation, any time. For a limited time, we're offering lifetime access to our beta version. Be among the first to experience the power of LiarLiar and continue to receive updates at an unbeatable price. Use our simple installer to set up LiarLiar on your Windows or Mac device.
    Starting Price: $29.99 one-time payment
  • 26
    Truepic

    Truepic

    Truepic

    All digital content has a history. Real or synthetic, original or edited, details matter. Be informed with Truepic’s technology that empowers transparency and shared trust in content across the internet. Truepic’s glass-to-glass technology records where and how content is created and edited, and displays those details to you wherever you are. Named one of TIME’s Best Inventions, Truepic’s secure camera technology captures, signs, and seals critical details in every photo or video, such as date, time, location, and the true pixels captured. Increase transparency at scale about how, where, when, and by whom content is created in your products.
  • 27
    Originality.AI

    Originality.AI

    Originality.AI

    Your needs, as a serious web publisher, for a plagiarism checking and AI detection tool are unique. Yet, all the existing plagiarism checking tools are built with Academia in mind. Originality.AI is built by a team of content marketing and GPT-4 AI experts that deeply understands your needs and includes features like Team Management (no more sharing your login), Auto-Billing, Scan History by User and most importantly an AI Writing Detection tool. You can now have all your content scanned with a record of who scanned it, when it was scanned, if AI is suspected and if any plagiarism was found all saved for reference later. You will no longer need to rely on their promise that it is plagiarism free, original content or waste time scanning it yourself. With the team management function and activity history it puts you or your editor in firm control of your plagiarism checking.
    Leader badge
    Starting Price: $0.01 per 100 words
  • 28
    Intrinsic

    Intrinsic

    Decoy Technologies

    Craft your own policies beyond standard abuse categories and enforce them in just minutes. Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly. Automate moderation of text, images, videos and reports with a system that gets better with every moderation action. Manage review queues and escalations easily with fine-grained RBAC permissions. Make data-driven decisions based on policy performance reports and platform-wide health monitoring. Access advanced security, AI-powered analytics, and comprehensive information governance.
  • 29
    Google Fact Check Explorer
    The Fact Check Tools consist of two tools: Fact Check Explorer and Fact Check Markup Tool. Both tools aim to facilitate the work of fact-checkers, journalists, and researchers. Google does not endorse or create any of these fact-checks. If you disagree with one, please contact the website owner that published it.
  • 30
    Pyrra

    Pyrra

    Pyrra

    Pyrra collects over 6 million posts per day from almost 40 mainstream and alt-social media sites, then deploys cutting edge AI to enable our users to identify and track threats of violence, hate speech, reputation and brand risk and disinformation. Our customers include corporate security, risk and intelligence teams as well as communications and PR; academia and researchers; and government. We offer a range of solutions for all budgets and specifications, including set and forget monitoring, SaaS analytics platform, and AI-enhanced tailored reports.
  • 31
    PeakMetrics

    PeakMetrics

    PeakMetrics

    PeakMetrics delivers insights to create actionable, real-time predictions of how messages will develop and spread online. We do this by aggregating both social and traditional media and then utilizing machine learning to extract behavioral trends from the millions of unstructured, cross-channel datasets. PeakMetric’s is battle-tested on some of the most complex media issues today – from crisis management situations to combating state-sponsored disinformation. Our clients include some of the world’s largest brands, advertising and government agencies. Automatically collect and report media coverage. PeakMetrics extracts insights and creates actionable data from millions of unstructured, cross-channel media datasets in real-time. PeakMetrics uses machine learning to spot trends & predict message resonance across news, social, and TV/radio. Monitor every channel, get your message out, quantify impact.
    Starting Price: $399 per month
  • 32
    Storyful

    Storyful

    Storyful

    We provide production houses, advertisers and news organizations high-quality, verified content and support. Newswire by Storyful is updated in real-time with verified on-the-scene breaking news footage and licensed viral content with unrivaled speed and accuracy. We connect newsrooms, broadcasters, production houses, creative agencies and brands with newsworthy and viral video for editorial and commercial use from user-generated content (UGC) creators around the world. With a team of video, audio, and visual analysis experts, Storyful Investigations specializes in open-source reporting that uncovers false narratives and finds the origins of mis- and disinformation circulating online. Newswire helps partners break stories and utilize user-generated news footage and viral video in their reporting.
  • 33
    Cobwebs Web Intelligence

    Cobwebs Web Intelligence

    Cobwebs Technologies

    Our powerful web intelligence solution monitors online activity, collecting and analyzing data of endless digital channels – from the open, deep and dark web, to mobile and social. Our exclusive deep and dark web monitoring technology extracts targeted intelligence from the web’s big data using the latest machine learning algorithms, automatically generating critical insights. The increasing use of social media, mobile apps, and dark web has led to significant growth of illegal activities on the internet. These platforms are used by criminals, terrorists, and hackers and to conduct operations with minimal visibility. Enterprises as well as government agencies deal with manual web investigations on a day to day basis facing the various challenges to do with exposing their digital footprint. Web Intelligence has become a crucial part of Intelligence methodologies and security management.
  • 34
    Amazon Detective
    Analyze and visualize security data to rapidly get to the root cause of potential security issues. Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. Amazon Detective automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations. AWS security services like Amazon GuardDuty, Amazon Macie, and AWS Security Hub as well as partner security products can be used to identify potential security issues, or findings. These services are really helpful in alerting you when something is wrong and pointing out where to go to fix it. But sometimes there might be a security finding where you need to dig a lot deeper and analyze more information to isolate the root cause and take action.
  • 35
    RiskSeal

    RiskSeal

    RiskSeal

    RiskSeal is an AI-powered SaaS platform that helps online lenders prevent defaults, automate lending decisions, and identify valuable customers. Our Digital Credit Scoring System enables lenders to identify potential defaulters, fight fraud, and find valuable customers using digital footprint analysis. By analyzing user email, phone number, and IP address data, we conduct deep user analysis and create a detailed digital profile with 300+ data points. What online lending organizations get with RiskSeal: - Digital footprints. 100+ social and online platforms - Data enrichment. 300+ tailored data points. - Real-time trust engine. Name verification, face matching. - Risk score. Ready-to-use risk score.
    Starting Price: $499 per month
  • 36
    VU Security

    VU Security

    VU Security

    We are a cybersecurity company specialized in fraud prevention and identity protection. Our mission is to provide secure digital experiences without friction, both for citizens and businesses, during the digital transformation process. We use different technologies applied for people recognition, based on their physiological or behavioral characteristics. Once the data has been captured, the system extracts a unique pattern for each individual, which will be used to make comparisons in the future. Transactional analysis of user behavior and channels for fraud detection and prevention. Secure, fast-response exchange of sensitive data through references to a vault of encrypted data. We provide a multi-channel fraud prevention solution that uses machine learning to create intelligent profiles and detect potentially fraudulent operations based on user behavior.
  • 37
    Belkasoft Triage
    Belkasoft Triage is a new digital forensic and incident response tool developed specifically for a quick analysis of a live computer and making a partial image of important data. Belkasoft T is designed to assist in situations when an investigator or a first responder is at the scene of incident and needs to quickly identify and obtain specific digital evidence stored on a Windows machine. The product is irreplaceable in situations of time pressure, when there is a need to quickly detect presence of specific data and obtain investigative leads instead of conducting an in-depth analysis of all the digital evidence.
  • 38
    Purview Insider Risk
    Discover new capabilities that will transform how you secure your organization's data across clouds, devices, and platforms. Manage data risks with pseudonymization and strong controls. Identify hidden risks with customizable machine learning templates requiring no endpoint agents. Work with teams across security, human resources, and legal departments with integrated investigation workflows. Intelligently identify, investigate, and take quick action on insider risks. Conduct an evaluation of potential insider risks in your organization without configuring any insider risk policies. Quickly create a policy with customizable machine learning templates that require no scripting or endpoint agents to deploy. Identify patient data misuse risks with built-in indicators and detectors that use data from electronic medical record systems. Easily understand the context of an alert to help focus your investigation on the riskiest activities.
  • 39
    Recorded Future

    Recorded Future

    Recorded Future

    Recorded Future is the world’s largest provider of intelligence for enterprise security. By combining persistent and pervasive automated data collection and analytics with human analysis, Recorded Future delivers intelligence that is timely, accurate, and actionable. In a world of ever-increasing chaos and uncertainty, Recorded Future empowers organizations with the visibility they need to identify and detect threats faster; take proactive action to disrupt adversaries; and protect their people, systems, and assets, so business can be conducted with confidence. Recorded Future is trusted by more than 1,000 businesses and government organizations around the world. The Recorded Future Security Intelligence Platform produces superior security intelligence that disrupts adversaries at scale. It combines analytics with human expertise to unite an unrivaled variety of open source, dark web, technical sources, and original research.
  • 40
    Threat Meter

    Threat Meter

    Threat Meter

    Continuously view, monitor, and improve the cyberhealth of your entire ecosystem. Threat Meter gives you an outside-in view of the security posture of your entire IT infrastructure. Based on the frequency you choose for monitoring, Threat Meter helps you understand how you stack up across various risk categories. Identify and minimize external risks by gaining insights into exploitable weaknesses, compliance issues, misconfigurations, open ports, etc. Detect and discover impersonating domains, social media accounts, and mobile applications. Takedown before they target the customers or employees. Comprehensively monitor surface web, dark and deep web. Track exposed data across online file stores, criminal forums, code repositories, marketplaces, paste sites, and other sources. Get the deepest visibility into different phishing threats. Uncover typo squatting domains, and phishing pages, and takedown them.
  • 41
    ActiveMQ

    ActiveMQ

    Apache Software Foundation

    Apache ActiveMQ® is the most popular open source, multi-protocol, Java-based message broker. It supports industry standard protocols so users get the benefits of client choices across a broad range of languages and platforms. Connect from clients written in JavaScript, C, C++, Python, .Net, and more. Integrate your multi-platform applications using the ubiquitous AMQP protocol. Exchange messages between your web applications using STOMP over websockets. Manage your IoT devices using MQTT. Support your existing JMS infrastructure and beyond. ActiveMQ offers the power and flexibility to support any messaging use-case. There are currently two "flavors" of ActiveMQ available - the well-known "classic" broker and the "next generation" broker code-named Artemis. Once Artemis reaches a sufficient level of feature parity with the "Classic" code-base it will become the next major version of ActiveMQ. Initial migration documentation is available as well as a development roadmap for Artemis.
  • 42
    RBLTracker

    RBLTracker

    RBLTracker

    RBLTracker provides easy-to-use, real-time blacklist monitoring, for your email, website, and social media. We aggregate monitoring data from hundreds of different data sources. Receive real-time, multi-channel notifications, when any one of your hosts is listed. We offer both monthly, and a customizable pay-per-check plan. Integrate our API directly in to your provisioning and monitoring process. Manage thousands of IP addresses just as easily as a single IP address. We give you the confidence that your customers can contact you safely. RBLTracker is a leader in blacklist monitoring, performing over 650,000 checks every day, for thousands of customers, in over 45 different countries. RBLTracker is the only company providing URIBL, Safe Browsing, Threat Exchange, and DNS Security monitoring, for your email, websites, and social media. Manage thousands of IP addresses just as easily as a single IP address.
    Starting Price: $8.00/month
  • 43
    Early Warning

    Early Warning

    Early Warning

    A customer submits a new account application via the branch, online, mobile or contact center channel. Early Warning determines likelihood customer is who they say they are by leveraging our industry-leading bank data. Determine likelihood of a valid identity in real-time. Better detect synthetic and manipulated identities. Early Warning predicts likelihood customer will default due to first-party fraud in first nine months of account opening. Leverage predictive intelligence to better understand customer behavior. Early Warning predicts likelihood customer will default due to account mismanagement in first nine months of account opening. Tailor applicant’s privileges to align with your risk threshold. Leverage real-time, predictive analytics that enables better-informed decisions. Include more customers in the mainstream financial system while managing risk tolerance to potentially increase revenue.
  • 44
    CRYPTOLOG

    CRYPTOLOG

    Crypttech

    One of the major needs of businesses is a convenient log management system that collects logs of the IT systems in the organization and analyzes them to meet legal regulations and industry standards. CRYPTOLOG complies with public & sectoral requirements and offers unified and easy-to-use search, analysis, correlation options that can be customized to the needs and size of the IT systems. CRYPTOLOG makes it easy to identify potential security threats from log data to conduct forensic investigations. CRYPTOLOG is a cost-effective integrated log management system that helps you meet regulatory compliance on the one hand, while reducing your security risks in a variety of IT environments. With its fast and powerful engines, CRYPTOLOG brings together a wide range of log and events to give you a comprehensive view of all your network activities on a customizable panel.
  • 45
    CyberSiARA

    CyberSiARA

    CyberSiARA

    When it comes to fraud, prevention is more cost-effective than cure. By deploying intuitive traffic testing, the CyberSiARA system provides a proactive approach to cyber-security that stops fraud in its tracks. The traffic classification capability differentiates between genuine users and potential attackers in real-time using interactive enforcement challenges – quickly halting both automated and human-driven attacks before a breach can be made. CyberSiARA uses powerful traffic analysis processes to determine user intent. By identifying fraud signifiers in traffic behavior, the system deploys interactive challenges to test activity classified as suspicious. This allows genuine users to enjoy a seamless access experience, while attacks from a broad range of origins are defeated. Traffic designed to overcome authentication challenges is stopped with innovative challenge strategies.
  • 46
    Cellebrite

    Cellebrite

    Cellebrite

    All the functionality you need to conduct in-depth analysis and generate custom reports to reveal the truth. With advanced searching and filtering capabilities, and built-in AI media categorization, investigators easily find Internet History, Downloads, Locations, Recent searches, and more. Obtain user activity from Windows memory, and get registry artifacts including jump list, Windows 10 timeline activity, shellbags, SRUM, and more. Review device history from Windows Volume Shadow Copies. Review history in APFS Snapshots and Time Machine backups, display and search Spotlight metadata and KnowledgeC data, review network connections, recent documents, user activity, and more. Ingest data into Cellebrite Pathfinder, Berla, APOLLO and, ICAC tools such as Project Vic and PhotoDNA. Share your case findings with other stakeholders using customized reporting capabilities. The most complete workstation designed to handle the most rigorous datasets for digital intelligence and eDiscovery.
  • 47
    Interset Proprietory

    Interset Proprietory

    Interset Software

    Interset augments human intelligence with machine intelligence to strengthen your cyber resilience. Applying advanced analytics, artificial intelligence, and data science expertise to your security solutions, Interset solves the problems that matter most. The best security operations posture comes from a strong human-machine team that leverages the strengths of each: faster-than-human analysis by machines to identify leads for investigation, and the contextual understanding of SOC analysts and threat hunters. Interset empowers your team to preemptively detect new and unknown threats with contextual threat insights that minimize false positives, prioritize threat leads, and boost efficiency with an intuitive UI. Eliminate vulnerabilities and build secure software with intelligent application security. Empower your team with an automated, end-to-end application security solution that distinguishes true vulnerabilities from the noise.
  • 48
    VIPRE ThreatAnalyzer
    VIPRE ThreatAnalyzer is a dynamic malware analysis sandbox that lets you safely reveal the potential impact of malware on your organization, so you can respond faster and smarter in the event of a real threat. Today’s most devastating security risks are often disguised as legitimate executable files, PDFs, or Microsoft Office documents. One wrong click, and you can seriously disrupt business and rack up massive financial damage. But wouldn’t it be useful to see exactly how that might unfold? You could understand how an attack is constructed, and you could identify which networks and systems are at greatest risk. VIPRE ThreatAnalyzer allows you to intercept and reroute suspicious files, even ransomware and zero-day threats, to a sandbox where they can be detonated in a safe environment, and then analyzed by a machine-learning determination engine. You get the benefit of understanding how would-be attackers think, without compromising your networks.
  • 49
    Alibaba Cloud Security Scanner
    Cloud Security Scanner utilizes data, white hat penetration testing, and machine learning to provide an all-in-one security solution for domains and other online assets. CSS detects web vulnerabilities, illicit content, website defacement, and backdoors to prevent possible financial loss caused by damage to your brand reputation. Cloud Security Scanner comprehensively detects any risks to your website and online assets, such as web vulnerabilities, weak passwords, website defacement, and Trojan attacks. The system scans all source code, text, and images for vulnerabilities. Developed through penetration testing, WTI has built-in multi-layer verification rules to ensure high accuracy of vulnerability detection. The system uses comprehensive decision making and model-based analysis, to provide accurate detection of content risks. Submit any questions about the scanning results to our team of experts.
  • 50
    IBM Operations Analytics
    IBM® Z® Operations Analytics is a tool that enables you to search, visualize and analyze large amounts of structured and unstructured operational data across IBM Z environments, including log, event and service request data and performance metrics. Leverage your analytics platform and machine learning to gain enterprise visibility, identify issues in your workloads, locate hidden problems and perform root cause analysis faster. Use machine learning to baseline normal system behavior and detect operational anomalies. Detect emerging issues across services, so you can proactively alert and cognitively adjust to changes. Gain expert advice for corrective actions and greater service assurance. Identify unusual workload behaviors. Locate common issues hidden in operational data. Reduce time required for root cause analysis. Harness the domain expertise of IBM Z. Leverage IBM Z insights on your analytics platform.