Alternatives to Buster.Ai

Compare Buster.Ai alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Buster.Ai in 2024. Compare features, ratings, user reviews, pricing, and more from Buster.Ai competitors and alternatives in order to make an informed decision for your business.

  • 1
    TruNarrative

    TruNarrative

    TruNarrative

    Easy Onboarding. Smooth Transactions. Dynamic Risk-Rating. Digital Transformation for; Identity Verification, eKYC & eKYB, Fraud Detection, AML Compliance, FRAML, Risk Assessment, and Account Monitoring in a single solution through one API. Make real-time automated decisions on transactional and customer account behavior through our sophisticated yet simple-to-use no-code platform. Control operational expense, reduce false positives alerts, and deploy virtual AI agents in one click to review at scale in line with your own volumes. Orchestration of complex decisions combined with share
    Starting Price: £99.50
  • 2
    NewsGuard

    NewsGuard

    NewsGuard

    Leveraging its bird’s eye view of the digital information environment, NewsGuard extracts and catalogs the top misinformation narratives spreading online. NewsGuard provides data about each narrative in machine-readable format—such as example language, links containing the false claim, and related keywords and hashtags. The Misinformation Fingerprints can be used as data seeds for existing AI/Social Listening tools to trace false claims across the internet and social media or can be used by human analysts to understand mis- and disinformation risks. Purpose-built for use by both human analysts and AI tools, NewsGuard’s Misinformation Fingerprints™ provides a continuously updated view of the digital information environment—and a powerful way to track narratives that are emerging and spreading online.
  • 3
    TrustLab

    TrustLab

    TrustLab

    TrustLab provides out-of-the box future-proof regulatory compliance powered by AI & leading industry experts. Ensure your platform is compliant with: EU Digital Services Act (DSA) UK Online Safety Act Australian Online Safety Act Plug-and-play user complaints covering current and future regulatory requirements such as the Digital Services Act. Compliance with regulatory requirements including transparency reports, messaging, statement of reasons, appeals, and more. Liability protection for fines from user content moderation. Monitor & measure platform moderation performance with certainty. Leverage TrustGraph's AI capabilities and industry benchmark to quantify risk in real time. Detect and enforce on networks of bad actors promoting harmful content.
  • 4
    Alethea Artemis
    Leveraging the power of advanced analytics and machine learning, Artemis conducts multi-channel analysis across a broad array of online content, including forums, social media and other resources to proactively identify and investigate disinformation online. Artemis delivers unrivaled intelligence on disinformation networks. Its real-time insights allow our customers time to protect key assets from risk and potential damage due to disinformation, misinformation, and social media manipulation.
  • 5
    ZeroFox

    ZeroFox

    ZeroFox

    Organizations invest immense resources into social media and their digital presence, which has become the primary engagement method for many individuals and businesses. As social media becomes the preferred engagement tool, security teams must understand and address the risks posed by digital platforms, the largest unsecured IT network on earth. Explore the ZeroFox Platform - watch this 2 minute overview video. With a global data collection engine, artificial intelligence-based analysis, and automated remediation, the ZeroFox Platform protects you from cyber, brand and physical threats on social media & digital platforms. Understand your organization’s digital risk exposure across a broad range of platforms where you engage and cyberattacks occur. ZeroFox's mobile app provides the powerful protection of the ZeroFox platform at your fingertips, wherever and whenever you need it.
  • 6
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
    Starting Price: Free
  • 7
    Logically Intelligence
    Logically Intelligence uses artificial intelligence to identify and tackle harmful and manipulative content at speed and at scale. Our platform ingests content and data from social platforms, online media source and websites. As a result, Logically Intelligence provides analysts with the insights needed to detect, assess, and act on emerging threats. Monitor and analyze a specific information environment by creating a Situation Room using a simple keyword-based interface or advanced boolean queries. Identify and analyze narratives emerging in a specific Situation Room, including keywords driving the narrative, associated posts, and original poster data. Also, you can compare two narratives over time and measure the impact of counter-narratives. Boolean queries or keywords can be added in any language and the platform will display and translate data from all languages.
  • 8
    Cyabra

    Cyabra

    Cyabra

    Cyabra uncovers threats to companies, products, people, and places on social platforms, by exposing and reporting malicious actors, disinformation, and bot networks. Integrating seamlessly into your systems, Cyabra’s breadth of OSINT coverage is unparalleled and includes Facebook, TikTok, Twitter, news sites, the cybercrime underground, and more. Cyabra also provides actionable insights, real-time alerts and advanced mitigation. Safeguard local and national elections from foreign and domestic influence. Stop bad actors using social engineering tactics from impacting public discourse. Uncover arising protests and key leaders fuelling online rage and hate.
  • 9
    Storyzy

    Storyzy

    Storyzy

    Automated, AI-based research tools allow for easier, faster, and more effective open-source research. Thousands of categorized sources—websites, blogs, video channels, social networks, are automatically indexed and archived, and continually added to Storyzy’s platform database. This allows users to add on to it and customize their own source lists. All in 42 languages. Granular investigations are made possible, allowing the identification of clues, markers, and hard evidence of information manipulation, on websites, blogs, social media documents, but also in images and visuals. For over ten years now, Storyzy’s teams have been designing and developing tools to fight online information manipulation. Artificial and human intelligence combined are the indispensable ingredients that made it possible to build the Storyzy platform with its actual users.
  • 10
    Graphika

    Graphika

    Graphika

    Graphika leverages the power of artificial intelligence to create the world’s most detailed maps of social media landscapes. We pioneer new analytical methods and tools to help our partners navigate complex online networks. Using our unique, patented set of technologies and tools, our intelligence team creates and applies new, rigorous analytical methods to answer difficult questions about online conversations. Graphika’s analysis and investigations team is a world leader in the detection and study of harmful online networks. Through our work with industry partners, academic institutions, government bodies, and non-profit organizations, we regularly deliver public-facing reports on topics ranging from state-backed influence operations, to violent conspiracy networks, and targeted harassment campaigns.
  • 11
    Intrinsic

    Intrinsic

    Decoy Technologies

    Craft your own policies beyond standard abuse categories and enforce them in just minutes. Intrinsic is a platform for building AI agents for user trust. We hook directly into your existing workflows, and gradually help enhance human review with automation safely and seamlessly. Automate moderation of text, images, videos and reports with a system that gets better with every moderation action. Manage review queues and escalations easily with fine-grained RBAC permissions. Make data-driven decisions based on policy performance reports and platform-wide health monitoring. Access advanced security, AI-powered analytics, and comprehensive information governance.
  • 12
    Fakespot

    Fakespot

    Fakespot

    Fakespot protects you from getting ripped off when shopping online. Join the secure shopping revolution and get the the truth about products, reviews, and sellers before you buy. Fakespot has your back when you’re shopping online at home or on mobile. Fakespot’s new browser app allows you to browse the open-web and when you land on sites that we support you will have Fakespot's features enabled to help you make informed purchase decisions. Share via other shopping apps and browsers, Share to analyze functionality is still included for users coming from our previous app. Since Fakespot’s inception, we have analyzed over 9 billion product and seller reviews. Our analysis helps you make informed decisions so you love everything you buy and never return anything. Fakespot also stays one step ahead of emerging threats by always updating our algorithms to protect you as you shop. Fakespot is safe, secure shopping that saves time, money, and headaches.
    Starting Price: Free
  • 13
    Public Editor

    Public Editor

    Public Editor

    We’re an online community of critical thinkers vetting the most-shared news articles on the Internet. We train ourselves – across nine separate assessment tasks – to label misinformation in the news. Our browser extensions show everyone which ideas are mistaken or misleading. And if we haven’t reviewed a news article yet, you can send it our way. We need your help to ensure we can continue identifying misinformation & building trust in a shared reality.
  • 14
    Factiverse

    Factiverse

    Factiverse

    Check information in seconds and find credible sources for any content, whether you are writing yourself or verifying AI-generated content. Focus on your writing, and save hours of manual research. Elevate your fact-checking by using the most comprehensive collection of manual fact-checks since 1991. Get hourly updates from certified fact-checkers globally in your feed. Always stay on top of false narratives. Maintain focus during research, writing, or analysis by hovering over complex terms and industry-specific jargon and getting embedded explanations. Boost reader engagement and prevent the audience from leaving your page.
  • 15
    Ad Observer

    Ad Observer

    Ad Observer

    Who is paying for online advertising to target you? Who’s showing you ads because you’re married, or you’re a liberal, or work in the oil industry or some other category? Are they saying different things to different people? Help hold them accountable by installing our browser plugin, which sends us the ads you see on Facebook and YouTube, without compromising your privacy. Ad Observer is a tool you add to your Web browser. It copies the ads you see on Facebook and YouTube, so anyone can see them in our public database. If you want, you can enter basic demographic information about yourself in the tool to help improve our understanding of why advertisers targeted you. However, we’ll never ask for information that could identify you.
  • 16
    Utopia AI Moderator
    Automation with Utopia AI Moderator increases quality, improves publishing speed and reduces costs. Utopia AI Moderator is a fully automated moderation tool that protects your online community and your brand from abusive user-generated content, fraud, cyberbullies and spam. It learns from the publishing decisions your human moderators made previously, works in real time, with a higher degree of accuracy when compared to humans. Utopia AI Moderator understands the context, works in any language, and is especially good in informal language, slang or dialect. Our tool increases the quality of published content. It removes publishing delays and provides reliable, consistent curation around the clock, allowing human moderators to focus on moderation policy management and only the most difficult cases. Utopia AI Moderator is ready for production use in only two weeks, and it moderates 100% of your incoming content. It stays up-to-date by learning as it works.
  • 17
    ValidSoft

    ValidSoft

    ValidSoft

    Pretty much anything we do online now requires passwords and security questions. It’s a part of life, really. Keeping track of all this information is frustrating. All of it is meant to protect us, ensuring we are the only ones who can access our accounts and data. Granted we are always hearing news of breaches that circumvent our passwords, but we want fast, easy-to-use login authentication that delivers a better end-user experience and saves on operational costs. We believe voice is the leading authentication factor that will improve your lives. You deliver a simple, quick, secure, password-free login experience for your customers. You significantly reduce password management costs. You achieve compliance with biometric privacy laws. A real-time comparison of an individual’s voice to their unique voiceprint validates the claimed identity. Make sure people are who they say they are. Use one model across many channels for true omnichannel excellence.
  • 18
    ActiveFence

    ActiveFence

    ActiveFence

    ActiveFence is the leading Trust and Safety provider for online platforms, protecting over three billion users from malicious behavior and content daily. Trust and Safety teams of all sizes rely on ActiveFence to keep their users safe from the widest spectrum of online harms, including child abuse, disinformation, hate speech, terror, fraud, and more. We offer a full stack of capabilities with our deep intelligence research, AI-driven harmful content detection and moderation platform. ActiveFence protects platforms globally, in over 100 languages, letting people interact and thrive safely online.
  • 19
    Amped Authenticate

    Amped Authenticate

    Amped Software

    Amped Authenticate is the leading forensic software for unveiling the processing history of a digital image. Amped Authenticate provides a suite of powerful tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of manipulation using a photo editing software, making its admissibility as evidence questionable. Amped Authenticate is used by digital forensic experts and intelligence agencies worldwide. Authenticate is a collection of the most useful, real-world-application authentication filters and techniques identified by image analysts, based on hundreds of scientific papers and studies. These have been built into an easy-to-use, yet amazingly powerful interface to help investigators answer the many questions of authenticity and integrity surrounding today's digital images.
  • 20
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all information in one graph. Automatically combine disparate data sources in point-and-click logic​. Use our regex algorithms to auto-detect entity types. Enrich your data through our intuitive graphical user interface​. Use entity weights to detect patterns even in the largest graphs. Annotate your graph and export it for further use.
    Starting Price: €5000 per user per year
  • 21
    Originality.AI

    Originality.AI

    Originality.AI

    Your needs, as a serious web publisher, for a plagiarism checking and AI detection tool are unique. Yet, all the existing plagiarism checking tools are built with Academia in mind. Originality.AI is built by a team of content marketing and GPT-4 AI experts that deeply understands your needs and includes features like Team Management (no more sharing your login), Auto-Billing, Scan History by User and most importantly an AI Writing Detection tool. You can now have all your content scanned with a record of who scanned it, when it was scanned, if AI is suspected and if any plagiarism was found all saved for reference later. You will no longer need to rely on their promise that it is plagiarism free, original content or waste time scanning it yourself. With the team management function and activity history it puts you or your editor in firm control of your plagiarism checking.
    Leader badge
    Starting Price: $0.01 per 100 words
  • 22
    Truepic

    Truepic

    Truepic

    All digital content has a history. Real or synthetic, original or edited, details matter. Be informed with Truepic’s technology that empowers transparency and shared trust in content across the internet. Truepic’s glass-to-glass technology records where and how content is created and edited, and displays those details to you wherever you are. Named one of TIME’s Best Inventions, Truepic’s secure camera technology captures, signs, and seals critical details in every photo or video, such as date, time, location, and the true pixels captured. Increase transparency at scale about how, where, when, and by whom content is created in your products.
  • 23
    Sensity

    Sensity

    Sensity

    We help your international expansion with our all-in-one solution to classify and analyze ID Documents. Stop frauds with a multilayer AI-Powered forensic suite. Get detailed reports about the type of forgery with our analytics dashboard. Onboard-only users who present faces coherent with the face on the ID document previously presented. Our solution can be used to find and match a face in a million faces database with 99.2% accuracy. With our passive liveness detection, your clients don't need to perform any action in front of the camera. We leverage four different types of approaches able to analyze the document from a completely different perspective in order to put in condition your fraud team to spot a wide range of document fraud. Speed-up the document review from hours to seconds and get actionable insights to evaluate the risk rate of your new clients. Keep anything monitored through a simple and intuitive dashboard.
  • 24
    OARO Media
    Technological advances in artificial intelligence have made realistic tampered with photos and videos mainstream in the form of deep fakes. OARO Media creates an immutable data trail that allows businesses, governing bodies, and even individual users to authenticate any photo or video. It is the only mobile app that generates reliable photos and videos embedded with records of user identity, content, timestamp, and GPS coordinates. Efficient claims management and improving the customer experience is a high priority for insurers. Historically the process of authenticating insurance claims has been arduous and involved high staff costs. Adjusters needed to visit sites in person to verify the damage claimed and customers could not easily review the adjuster’s records.
  • 25
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 26
    Bot Sentinel

    Bot Sentinel

    Bot Sentinel

    We designed Bot Sentinel to be simple to use and as informative as possible. We publicly display detailed information about Twitter accounts the platform is tracking to give visitors of this website a better understanding of how nefarious accounts spread disinformation and target other accounts. We try to be as transparent as possible and give visitors as many data points as possible. Bot Sentinel is a non-partisan platform; we track all accounts. The platform uses machine learning and artificial intelligence to classify Twitter accounts and add the accounts to a publicly available database that anyone can browse. We trained Bot Sentinel to classify Twitter accounts using thousands of accounts and millions of tweets for our machine-learning model. The system can correctly classify accounts with an accuracy of 95%. Unlike other machine learning tools designed to detect “bots,” we are focusing on specific behaviors and activities deemed inappropriate by Twitter rules.
    Starting Price: Free
  • 27
    LiarLiar

    LiarLiar

    LiarLiar

    Supports all of your favorite tools and platforms. LiarLiar employs cutting-edge AI to analyze micro movements, heart rate, and subtle cues in body language to detect deception. Our tool gives you unprecedented insight into the truth during video calls or video analysis. Designed with a user-friendly interface, LiarLiar can be easily set up and operated. Even those with minimal tech experience can become experts in detecting lies with a simple click. Compatible with popular video call software like Zoom, Google Meet, Skype, and more, LiarLiar can be used on any video feed, including YouTube or your own local videos. Analyze any conversation, any time. For a limited time, we're offering lifetime access to our beta version. Be among the first to experience the power of LiarLiar and continue to receive updates at an unbeatable price. Use our simple installer to set up LiarLiar on your Windows or Mac device.
    Starting Price: $29.99 one-time payment
  • 28
    DeepFake Detector

    DeepFake Detector

    DeepFake Detector

    Deepfake videos and audio can be used to spread misinformation and deceive people. With our DeepFake Detector, you can confidently filter out AI-generated videos and audio and ensure authenticity in important situations like media reporting and legal proceedings. We understand the danger of deepfakes and the importance of authentic videos and audio. With our expert verification services, you can confidently filter out false videos and audio and ensure their authenticity. Choose a video or audio file that you want to verify for authenticity. For best results, we recommend choosing a video or audio file that is at least 8 seconds long and does not have any edits or special effects. After uploading your video or audio file, click the "detect deepfake" button to start the verification process. You will receive a result that shows the probability of the video or audio being either an AI-generated deepfake or a natural video or audio.
    Starting Price: $17.88 per month
  • 29
    Google Fact Check Explorer
    The Fact Check Tools consist of two tools: Fact Check Explorer and Fact Check Markup Tool. Both tools aim to facilitate the work of fact-checkers, journalists, and researchers. Google does not endorse or create any of these fact-checks. If you disagree with one, please contact the website owner that published it.
  • 30
    Deepware

    Deepware

    Deepware

    Deepfakes are going to be the first real punch from AI to humanity. The cybersecurity industry has a very short time to get ahead of deepfakes before they undermine the public’s trust in reality. Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of AI-generated synthetic media, the most powerful cyber-weapon in history is just around the corner. We expect destructive use of deepfakes, particularly as phishing attacks, to materialize very soon. The main limitation is the lack of legitimate voice-swapping techniques, which is a much greater danger than face/head-swapping.
  • 31
    AYLIEN

    AYLIEN

    AYLIEN

    Transform the world's news into real-time business insight. News provides mission critical information for organizations. But the global volume every day is overwhelming, resulting in missed events, misinformed decisions, and ineffective processes. Find the news you care about and filter out the noise with AI-powered search. NLP-powered tags and enrichments for every article to deliver accurate and efficient search and discovery. Identify and visualize trends and critical insights with advanced analytics features. Our analysis features make it easy to gain insight from real-time data visualizations. Get up and running in 5 minutes with a 14-day trial. Simplified access to news data and content: tagged, searchable and actionable. Empower analysts to proactively identify, investigate, and monitor news using Radar. Build News API-powered apps and models with easy access to structured news data feeds.
  • 32
    Opticks

    Opticks

    Opticks

    Opticks is an unmatched cybersecurity tool for MVAS, Affiliate Networks, and Direct Advertisers, powered by artificial intelligence that never sleeps. Advanced and highly customizable analytics detect fake subscriptions, bots, iFrames, Malware APKs, MSISDN, proxy traffic, harmful applications, dangerous IPs, and more. Seamless onboarding makes Opticks the tool of choice for forward-thinking businesses worldwide. Opticks blocks and tracks the most sophisticated ad fraud in real time. Instantly know which traffic will bring in revenue and block ad fraud before it happens. Empower your growth teams with precise acquisition data. Opticks makes it extremely easy to block and track sophisticated online ad fraud so you can drive your revenues confidently. Our proprietary technology detects the most advanced fraud techniques and its ever-evolving machine learning nature keeps ahead of fraudsters. Dissect the real quality of your traffic, identify threats and make real-time decisions.
  • 33
    Fama

    Fama

    Fama

    Fama helps you surface a range of harmful online behaviors at the point of hire to protect your business, reduce workplace toxicity, and reinvent your organization around a human focus—all with the use of software that automates your talent screening workflow in a compliant fashion. Work with the company that created the category of FCRA-compliant, AI-powered candidate screening solutions. Because race, color, national origin, sex, sexual orientation, religion, disabilities, and medical conditions can be discovered in seconds through the use of search engines and social media searches, the risk for non-compliance has never been more pervasive. When hiring managers are empowered to identify intolerance in their screening process, the result is an employee base that is rich in diversity that are more likely to unlock breakthroughs.
  • 34
    Converge

    Converge

    Verge Health

    Turnkey credentialing, privileging and performance monitoring. Transforms compliance from administrative to actionable. Proactive safety strategy, that goes beyond events. Take proactive systems to approach to unify safety, risk, and quality data. Share risk data and gain actionable insights for proactive decision-making to achieve zero harm. Powerful analytics and business intelligence embedded within Converge providing key safety information and tools. Initiate near misses, events, complaints, or compliments from the EHR. Work with your implementation manager to identify your organization’s ideal timeline, team, and scope. Combine Mortality Review, Safety Rounds, and Patient Launch to proactively identify risk. Real-time integration with CMS work order systems to reduce redundancy and drive resolution. Implement, train, and introduce solutions in a digestible way. Stagger platform roll-outs, implementing modules as appropriate.
  • 35
    AppDetectivePRO

    AppDetectivePRO

    Trustwave

    A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes like data loss and DDoS attacks. Databases are critical repositories of customer information and intellectual property, making them enticing targets for cybercriminals. Trustwave AppDetectivePRO allows your business to discover, assess and report in minutes on the security, risk or compliance posture of any database or big data store within your environment – on premises or in the cloud. AppDetectivePRO is a database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to escalation of privilege attacks, data leakage, denial-of-service (DoS), or the unauthorized modification of data held within data stores.
  • 36
    E-HAWK

    E-HAWK

    E-HAWK

    Block fake leads and fraud sign-ups. Our cloud API identifies phishers, bots, spammers, fraudsters, high-risk users and links lead quality to marketing performance. E-HAWK performs hundreds of risk checks in real-time giving you detailed insight, actionable information, and improving your fraud stack and cybercrime detection. Free trials and registrations are a great way to attract new users into your online community. But many are fake. Some are trying to use your platform for phishing, sending out spam, identity theft, and fraud. E-HAWK can automatically filter out many bad actors, so you can focus your time taking care of your good clients and building your business. Real leads are gold. Invalid or fraud leads are impossible to reach and often a waste of time. Why not use our pre-built tests to check for issues with emails, locations, IPs, phones, domains, etc. before investing marketing resources and sales efforts?
  • 37
    Amplifire

    Amplifire

    Knowledge Factor

    Confidently Held Misinformation (CHM) is when someone is sure they are right but they are actually wrong. Every organization has it. CHM hinders performance and leads to costly mistakes. It’s perilous. Smart organizations use Amplifire as a change management tool to improve outcomes. Is built on cognitive science principles that foster rapid learning and long-term retention. Uniquely detects and corrects confidently held misinformation—a hidden risk that leads to costly mistakes. Pinpoints strength and weakness with rich data analytics. Personalizes the learning experience by adapting to each learners’ current knowledge.
  • 38
    Resistant AI

    Resistant AI

    Resistant AI

    Take the offensive against advanced fraud and financial crime without breaking your existing tech stack. Resistant AI augments your existing risk touchpoints—from onboarding to ongoing monitoring—to protect them from manipulation and attack, and enhance the effectiveness of your risk and compliance teams with actionable context. A document fraud detection solution that stops bad actors at the source with AI. You'll know more than just who to trust, you'll be empowered to verify documents at scale. Identity document forgery, fake bank statements, doctored invoices: we catch them all and more, automatically. Multilayered document analysis draws on dozens of known types and can add new models in no time, making sure even the most minute suspicion in content or metadata is brought to your attention.
  • 39
    Proofpoint Social Discover
    Social Discover scans the social web to find fake social media accounts affiliated with your brand. With just a few clicks, you can see how many branded accounts exist on each social network. Social Discover continuously scans for any new accounts based on your saved search parameters, so you’ll know right away when someone attempts to impersonate your brand for unauthorized or fraudulent use. Then you can act immediately to protect your brand. Social Discover lets you easily categorize every fake social media account you discover. Use our built-in categories (corporate, product, competitor, fraudulent, and more) or create your own labels. Once you’ve categorized accounts, you can visualize and manage your social media surface area by category. Social Discover scans and finds social media accounts to discover possible security or compliance risks that pose a threat to your organization.
  • 40
    BlackBox

    BlackBox

    BlackBox

    The rule for decision making in life and business goes like this, the person with the fewest blind spots wins. It's like being at a poker table where you can see everyone else's cards. If you're an email service provider, mailbox provider or super sender, one way is by using BlackBox. We offer exclusive access to hundreds of millions of email addresses that have been proven to be detrimental to engagement and mailing reputation. It's the missing dataset needed to run preemptive risk assessments and retain more revenue. Email vendors and senders can separate good contacts from the bad before damage to reputation is done. On a scale of 1-to-5, you can easily identify the risk associated with any email address or any email list. With a super-fast app and API, and optional on-premise data, we offer a powerful and flexible solution. BlackBox is available as a cancel-anytime subscription.
    Starting Price: $299 per month
  • 41
    RealPeopleSearch

    RealPeopleSearch

    RealPeopleSearch

    It is the simplest and easiest process of finding all the available information about your target person. A people search can provide access to the target's data through their name only. It is a helpful approach to trace almost any individual from your past or nearby relations. Many search tools and applications are offering people search facilities for personal or business purposes. You can use them to find business scams and fake people who are fooling others. Such tools allow you to view basic information such as contact information, arrest and criminal records, possible photos, and social media profiles for free. The people search tools require the user to enter the person's first and last name. Then they display the available relevant information against their names. The search tools are associated with several public records and databases that exhibit the required person's identity. There is no chance of false or misinterpreted facts in the search results.
  • 42
    PESTlogics

    PESTlogics

    Land Logics Group

    Comprehensive approach to documenting ALL IPM task data - both chemical and nonchemical activities. PESTlogics builds a history of IPM data -- so that you can recall site-specific historical data in conjunction with infestations and improve IPM operations. Make IPM a true team effort. Connect IPM information across your organization, enabling more strategic decision-making. Summarize pesticide usage as it relates to organizational goals and mission. Monitor pest control approaches to evaluate success and get results. The more specific the location, the more useful the data. Quickly review label requirements, particularly where products could be toxic to wildlife and other natural resources. Easily communicate planned operations: where, when, and what. Post maps with application details to improve worker safety and awareness.
    Starting Price: $75 per month
  • 43
    Bodyguard

    Bodyguard

    Bodyguard

    Bodyguard protects your online communities and platforms against toxic content, cyberharassment and hate speech. Leverage the power of positive interactions, shield your communities from the negative ones. Different toxic content categories and severity levels. Contextual analysis. Internet language “decoding”. From a few blog comments, to thousands of social media comments, all the way up to live streaming. Powerful data bank to inform content decisions and uncover new ways to engage with your followers. Choose what toxic content categories you want to moderate. Safe platforms are 3x more likely to retain users and to attract new users towards the community. A lack of toxic content means visitors will spend around 60% more time on your platforms. Protect your brand image, users and employees. Don’t attach your business or brand to toxic content. Smooth, quick integration via API. Works with any platform. Pricing based on your needs.
  • 44
    Endor Labs

    Endor Labs

    Endor Labs

    Simplified dependency lifecycle management lies at the heart of both supply chain security and developer productivity. Endor Labs helps security and dev teams accelerate development by safely maximizing software reuse. Reduce the overall amount of dependencies with a better selection process, and eliminate of unused dependencies. Identify the vulnerabilities that matter, and use dozens of leading indicators of risk to defend against software supply chain attacks. Get out of dependency hell faster by identifying and remediating bugs and security issues in your dependency chain. Increased productivity for dev and security teams. By maximizing software reuse, minimizing false positives, and making it easier for security and development teams to select, secure, and maintain dependencies, Endor Labs helps organizations focus on shipping value-adding code. Get complete visibility into your dependency network across repos. Who is using what, and who depends on who.
  • 45
    SurveyTrax

    SurveyTrax

    nFocus Solutions

    The SurveyTrax Assessment tool is integrated with TraxSolutions and lets users create, administer, and report on virtually any survey or assessment. Use Surveys to gather the feedback you need to make program management decisions and measure your organization’s impact on the members you serve. Surveys can include branching, multi-language support, metrics, and several question and response formats. Modify ready-made templates or easily create custom surveys. Measure your impact with pre- and post-program analysis for repeated-measures and statistical analysis. Enable anonymous responses and mask personally identifiable information. Supports a wide range of question and response types, including True/False, Yes/No, multiple-choice, numeric, ratings, sliders, Likert Scales, rank ordering, and more.
  • 46
    ShadowPlex

    ShadowPlex

    Acalvio Technologies

    Organizations are turning to active defense solutions based on advanced deception because they are low-risk to deploy and avoid the false-positive issues of alternative approaches. Acalvio’s offering, ShadowPlex, has been architected to set a new standard for APT, ransomware, and malware mitigation, ShadowPlex centralizes the process. In the case of decoys (fake hosts or honeypots) they are hosted in a single area and then are strategically projected across the enterprise network, where they appear as realistic local assets. Furthermore, we change the complexity of a decoy on the fly in response to attacker engagement. This unique method of resource efficiency allows ShadowPlex to deliver both high-scale and depth of decoy realism. ShadowPlex automates and simplifies the configuration and deployment of deception objects. Combining pre-defined playbooks with an AI-based recommendation engine, the system self-generates and places the appropriate deception objects.
  • 47
    GRID

    GRID

    Moody's Corporation

    GRID is the world’s most comprehensive risk database of adverse media, sanctions, watchlists, and PEPs. Risk information is curated into detailed profiles by individual or organization, so you can see all associated, risk-relevant data in structured and detailed reports. Conduct effective screening and ongoing risk monitoring with GRID. The combination of powerful data and categorizations means you can filter information by risk type, risk stage, and risk age based on relevance and your own risk profiles. Get precision, fewer false positives, and greater efficiency. If you’re subject to the EU's anti-money laundering directive and need to identify politically exposed persons (PEPs), Moody’s has the solution. Our Nordic PEPs database provides comprehensive and current information on domestic Nordic PEPs and their close relations.
  • 48
    Alpaca

    Alpaca

    Stanford Center for Research on Foundation Models (CRFM)

    Instruction-following models such as GPT-3.5 (text-DaVinci-003), ChatGPT, Claude, and Bing Chat have become increasingly powerful. Many users now interact with these models regularly and even use them for work. However, despite their widespread deployment, instruction-following models still have many deficiencies: they can generate false information, propagate social stereotypes, and produce toxic language. To make maximum progress on addressing these pressing problems, it is important for the academic community to engage. Unfortunately, doing research on instruction-following models in academia has been difficult, as there is no easily accessible model that comes close in capabilities to closed-source models such as OpenAI’s text-DaVinci-003. We are releasing our findings about an instruction-following language model, dubbed Alpaca, which is fine-tuned from Meta’s LLaMA 7B model.
  • 49
    IPQS Device Fingerprinting
    Access over 25 data points for device fingerprinting details to analyze risk and device info. Device Fingerprinting by IPQS offers an unparalleled fraud detection solution capable of detecting even the most advanced fraudsters, bad actors, and cyber criminals. Scan over 300 data points (like operating system, screen resolution, fonts) to accurately identify fake devices, location spoofing, and high-risk behavior in a user's online fingerprint. Identify bots, automated behavior, device spoofing, & other high-confidence signals that the user is likely to engage in fraudulent behavior. Deploy JavaScript device fingerprinting for web devices or use our SDKs for mobile devices on iOS or Android. Robust risk scoring will accurately identify fake accounts, chargebacks, credential stuffing, bot behavior, and similar abuse. IPQS Device Fingerprinting can reveal advanced fraud techniques including the latest emulator software.
  • 50
    elv.ai

    elv.ai

    elv.ai

    We combine the power of AI and trained human moderators to foster safe and civil online discussions on social media profiles and websites. AI automatically detects and hides harmful comments, while human moderators safeguard freedom of speech by preventing false positives. We bring a sophisticated and complex community management tool that not only automatically moderates online discussions but also provides insights about your audience and their emotions. It consolidates the community management of all your social media profiles and websites into one place, offering a comprehensive overview of your community. AI content moderation utilizes advanced natural language processing and machine learning algorithms to dynamically understand context, adapt to evolving linguistic trends, and minimize false positives for technologically sophisticated, context-aware moderation.
    Starting Price: $79 per month