Alternatives to Captira

Compare Captira alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Captira in 2026. Compare features, ratings, user reviews, pricing, and more from Captira competitors and alternatives in order to make an informed decision for your business.

  • 1
    LegalEdge

    LegalEdge

    LegalEdge Software

    LegalEdge is a comprehensive case management software platform designed specifically for government legal organizations. It offers dedicated solutions for prosecutors, public defenders, and agency or municipal attorneys. The platform supports the full lifecycle of legal cases, helping teams manage case data, documents, people, and workflows efficiently. LegalEdge is built as a fully server-side application, allowing secure access from any device without client-side installations. Mobile access enables attorneys and investigators to work seamlessly from courtrooms, offices, or remote locations. Integrated data capabilities reduce duplicate data entry across criminal justice systems. LegalEdge focuses on delivering robust functionality while helping agencies control costs.
    Compare vs. Captira View Software
    Visit Website
  • 2
    Critical Start

    Critical Start

    Critical Start

    Our team of highly trained cybersecurity professionals provides expertise in compliance, tool assessments, threat hunting, incident response and more. Critical Start is leading the way in Managed Detection and Response (MDR) services. With a unique approach that treats every security alert as equal, Critical Start's proprietary Trusted Behavior Registry allows security analysts to resolve every alert. Our mission is simple: protect our customers’ brand while reducing their risk. We do this for organizations of all sizes through our award-winning portfolio, from the delivery of managed security services to security-readiness assessments using our proven framework, the Defendable Network, professional services, and product fulfillment. TEAMARES, a specialized group within Critical Start, that focuses on understanding your environment more deeply, assess how today’s attacks can impact your organization and better defend your environment.
  • 3
    A10 Defend Threat Control
    A10 Defend Threat Control, a SaaS component of the A10 Defend suite, offers a real-time DDoS attack map and proactive, detailed list of DDoS weapons. Unlike other tools available today that provide convenience at the cost of false positives and false negatives, A10 Defend Threat Control provides hands-on insights into attackers, victims, analytics, vectors, trends, and other characteristics, helping organizations establish a more robust security posture by delivering actionable insights to block malicious IPs that can launch or amplify DDoS attacks.
  • 4
    eBail

    eBail

    eBail

    eBail is rock‑solid, foolproof bail bond software that gives agencies a genuine edge by automating the entire bond‑writing and defendant‑management workflow. With end‑to‑end document management, agents can issue contracts with one‑click e‑signature and autofill, send them instantly to agents or indemnitors via mobile or desktop, and complete bonds in under three minutes. It centralizes agent, sub‑agency, defendant, court, forfeiture, arrest, and check‑in monitoring, all accessible in real time via multiple mobile apps, for agencies, agents, and defendants. Automated SMS/email reminders, tap‑and‑pay processing, and payment‑plan support ensure no forfeiture goes unnoticed. It proactively monitors court dates, forfeitures, arrests and provides arrest alerts and background checks. It logs agent accountability, team tasking, and downloadable execution reports, and includes seamless compliance, power‑management, and audit‑ready reporting.
    Starting Price: $99 per month
  • 5
    Simply Bail

    Simply Bail

    Simply Bail

    Simply Bail is a powerful, all-in-one bail bonds software designed to simplify case management, payments, and client tracking for bail bond agents. It empowers agents to close more cases faster, reduce failures to appear and forfeitures with built‑in court‑date reminders and GPS‑based check‑ins, and manage all tools in one seamless platform. Features include 24/7 arrest alerts to notify you immediately if a defendant is re-arrested, helping reduce liability and increase repeat business. E‑document signing allows indemnitors and defendants to sign electronically, saving time and enabling agents to focus on more cases. It supports automated payment plans, schedules, and collects payments, captures revenue, and securely processes credit/debit transactions. Inventory management allocates powers to agents and offices, tracking power status and liability.
    Starting Price: Free
  • 6
    BailVision

    BailVision

    BailVision

    Simply Bail is a powerful, all‑in‑one bail bonds software designed to simplify case management, payments, and client tracking for bail bond agents. It empowers agents to close more cases faster, reduce failures to appear and forfeitures with built‑in court‑date reminders and GPS‑based check‑ins, and manage all tools in one seamless platform. Features include 24/7 arrest alerts to notify you immediately if a defendant is re-arrested, helping reduce liability and increase repeat business. E‑document signing allows indemnitors and defendants to sign electronically, saving time and enabling agents to focus on more cases. It supports automated payment plans, schedules, and collects payments, captures revenue, and securely processes credit/debit transactions. Inventory management allocates powers to agents and offices, tracking power status and liability.
  • 7
    Bailbooks

    Bailbooks

    Bailbooks

    BailBooks is an online bail bond management software that makes your business faster, simpler, and more cost-efficient with electronic agreements and intuitive signing experiences across virtually any device. It includes E‑Sign functionality built directly into the software, enabling you to send your e‑signature package and collect co‑signer information seamlessly. It allows precise real‑time GPS tracking for accurate monitoring and ensures compliance with bail conditions; defendants can add and view upcoming court dates and stay updated via notifications. The BailbondPay feature provides each agency its own payment portal, enabling clients to pay balances by credit card directly from their phone, no login or app required, and payments are automatically entered into BailBooks, with email receipts and Pay‑By‑Text alerts sent before due dates and for past‑due balances.
    Starting Price: $55 per month
  • 8
    Bond Tracker

    Bond Tracker

    Bond Tracker

    Bond Tracker is a new version of its best-selling bail bond software. This version is easier to use and has a fresh new look. Bond Tracker is a simple, yet powerful application that allows you to manage a retail bond business while providing comprehensive billing, accounting, paperwork generation, and defendant/bond tracking features. The bond list now spans full-screen width, displays secured and unsecured amounts in the amount column. The thoughtful UI enhancements and filters improve workflow efficiency, data clarity, and reporting precision, making Bond Tracker 2.0 a modern, intuitive tool for managing bonds and accounting tasks in a retail bail bond agency.
  • 9
    Bail Bond Software Solutions

    Bail Bond Software Solutions

    Bail Bond Software Solutions

    Many software programs available today lack the functionality that is most important to bail bondsmen. Bonding Company Relationship Manager represents fourteen years of industry knowledge and input from end users. It comes complete with all of the modules that you will need to manage the day-to-day operations of your business. When a defendant fails to appear, it pays to not leave any stone unturned. The Attorney's module will allow you to track the defendants who are represented by each attorney and contact them in the event you cannot reach the defendant. It will provide you with the tools to make it easier to collect the money owed to you. It will allow you to quickly generate statements as well as write off any debt that remains uncollected at the end of your fiscal year. Depending on the jurisdiction in which you write, you may find yourself writing against a capacity.
  • 10
    iGUARANTEE

    iGUARANTEE

    iGUARANTEE

    iGUARANTEE is a streamlined, secure bail bond platform built for carriers, MGAs, agencies, and agents, offering full lifecycle power-of-attorney creation, issuance, tracking, and bond issuance across any device. Its data ownership & security framework encrypts and protects carrier data, ensuring access in usable formats and eliminating the risk of data hijacking. Users gain real-time visibility into electronic and physical powers, from creation and shipping to issuance and outstanding liability, cutting uncertainty around liability. iGUARANTEE streamlines state audits via comprehensive reporting on outstanding liabilities, payments, court dates, and forfeitures, reducing audit prep from weeks to hours. It enables efficient agency onboarding, power management, including unused-power auto-reporting, case management across distribution networks, instant bond issuance, and immediate forfeiture notifications.
  • 11
    Caselle Court Management
    Caselle Court Management is the solution every city needs to keep track of information associated with violations and court proceedings, from bail, to speeding tickets, to fishing and game licenses. Track individual fees for all offenses, set up individual pay schedules, and choose how to handle bail money. Quick tracking for all your court follow-up needs (warrants, trusts, alternate orders, etc.) Easy contract payment setup, even across multiple cases - to assist you in tracking delinquent payments. Comprehensive court calendar entry and reporting features.
  • 12
    BailFacile

    BailFacile

    BailFacile

    BailFacile is an online rental management software based in France aimed to independent landlords in tune with their times. BailFacile helps independent landlords manage their rental with ease, efficiency, and 100% digitally. We combine powerful tools and human expertise to transform complex situations into delightful moments for our customers. Entry and exit of tenants, storage of your documents, day-to-day management, incidents and much more. Manage entire rental life in a flash. Don't spend hours cross-checking your financial inflows and outflows. Manage the financial aspect of your rentals with peace of mind. Your receipts, annual reviews and other documents are automatically pre-filled and ready for each deadline. Comply with the law effortlessly, protect your interests and save time. Maximize your return with the best rental management software.
  • 13
    CourtWorks

    CourtWorks

    CourtWorks

    CourtWorks provides Judges and Court personnel with an organized, secure web-based record of an offender’s file. CourtWorks provides a secure online account for managing referred defendants/probationers. Probation Officers have a one-click view of a defendant’s status, secure and efficient communication between. CourtWorks is an online management and resource tool for all the important information that a defendant. The CourtWorks platform organizes the defendant’s file in a secure online environment that is accessible to all authorized parties. Judges, Probation Officers and the defendants themselves have any time controlled access to the information as well as upcoming events. New documents and other information regarding the defendant’s progress, which is uploaded by agencies are updated into the defendant’s file automatically and displayed in an attractive, easy to understand and intuitive dashboard.
  • 14
    Kinesense DEAM
    Kinesense Digital Evidence and Asset Management (DEAM) solution for police is designed to make video evidence and all other asset management even easier. Securely store and quickly retrieve important video evidence and assets from CCTV, mobile phones, or body-worn cameras. Eliminate delays and costs that make bail and charging decisions harder. Eliminate the physical transfer of video evidence and assets. Easily collaborate force-wide. Securely archive digital data.
  • 15
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 16
    Ransomware Defender

    Ransomware Defender

    ShieldApps Software Development

    ShieldApps’ Ransomware Defender deals with known ransomware in a way no other solution can. Specially designed for detecting and blocking ransomware prior to any damage, Ransomware Defender blacklists and stops both common and unique ransomware. Once installed, Ransomware Defender stands guard 24/7 utilizing active protection algorithms enhanced with user-friendly alerts and notifications systems. Ransomware Defender is fully automated, taking care of all threats via an advanced Scan > Detect > Lock Down mechanism that proactively stands guard to detected threats, and works alongside all main antiviruses and anti-malware products! Ransomware Defender also features a scheduled automatic scan, secured file eraser, lifetime updates and support! Detects and removes any known ransomware before it can take action and harm your PC. The program will deep-scan your device and find hidden ransomware in both high and low-level folders.
    Starting Price: $49.99 one-time payment
  • 17
    Syscon Jail

    Syscon Jail

    Syscon Justice Systems

    Syscon Jail provides everything you need to run a county jail or police lock-up in a single, end-to-end jail information management system. All the essentials for your staff and inmates are configured for effective and efficient operation in jails of any size. Jail booking process and dashboards geared for high-volume intakes and releases. Classification, restrictions and privileges for sentenced and un-sentenced inmates. Automated remand/detention, holds, warrants, bail, bond, sentences, and community release. Configurable assessments and classification tools, including COMPAS. Handling of incidents (like PREA or use of force) and inmate welfare requirements (like self-harm prevention) in accordance with American Jail Association (AJA) standards. Advanced capacity management and re-entry planning. Syscon provides a cohesive housing assignment feature, movement scheduling and tracking, integrated case management, work and educational programs, health care, and trust accounting.
  • 18
    AWS IoT Device Defender
    AWS IoT Device Defender is a fully managed service that helps you secure your fleet of IoT devices. AWS IoT Device Defender continuously audits your IoT configurations to make sure that they aren’t deviating from security best practices. A configuration is a set of technical controls you set to help keep information secure when devices are communicating with each other and the cloud. AWS IoT Device Defender makes it easy to maintain and enforce IoT configurations, such as ensuring device identity, authenticating and authorizing devices, and encrypting device data. AWS IoT Device Defender continuously audits the IoT configurations on your devices against a set of predefined security best practices. AWS IoT Device Defender sends an alert if there are any gaps in your IoT configuration that might create a security risk, such as identity certificates being shared across multiple devices or a device with a revoked identity certificate trying to connect to AWS IoT Core.
    Starting Price: $0.0011 per device per month
  • 19
    IBM Storage Defender
    More data resilience is in store. Monitor, protect, detect and recover across primary and secondary storage. IBM Storage Defender detects threats early and helps you safely and quickly recover your operations in the event of an attack. It is part of the IBM Storage portfolio for data resilience. IBM Storage Defender provides visibility across all of your storage, leverages AI-driven intelligence from IBM to detect threats such as ransomware, and identifies the safest recovery points. Defender integrates with your existing security operations so you can recover quickly and securely. See what IBM Storage Defender can do by registering for a live demo today. Align infrastructure, data, and security teams through actionable alerts so that threats can be quickly isolated, and recovery plans can be quickly executed. Identify the safest recovery points and orchestrate recovery at scale across primary and secondary workloads.
  • 20
    Microsoft Defender Antivirus
    Microsoft Defender is an all-in-one security app designed to safeguard your identity, data, and devices from online threats. Available with Microsoft 365, it provides real-time protection against phishing, malware, and identity theft across Windows, macOS, iOS, and Android. Defender continuously monitors the dark web for potential identity breaches and sends alerts when your personal data is at risk. Families can protect up to 60 types of personal information with identity monitoring and get 24/7 restoration support in case of theft. Users also benefit from credit monitoring, monthly credit reports, and up to $1 million in identity theft insurance. Easy to use and deeply integrated into Microsoft 365, Defender keeps you and your loved ones secure wherever you connect.
  • 21
    OmniDefend
    OmniDefend secures your employees, contractors and vendors by using strong authentication and universal single sign-on to access and secure business applications and processes. OmniDefend eliminates customer fraud by using multi-factor authentication to identify and secure customer transactions online or on-premise. OmniDefend allows you to quickly add authentication to your website so you can deliver a password-less experience for your customers and secure e-commerce transaction. When it comes to security, OmniDefend implements standards that have been proven in the industry. OmniDefend supports OpenId, OAuth 2.0, and SAML for maximum compatibility and security for single-sign on applications. SCIM 2.0 allows OmniDefend to work seamlessly alongside identity management and user provisioning.
  • 22
    dotDefender

    dotDefender

    Applicure Technologies

    dotDefender Web Application Security. dotDefender is the market-leading software Web Application Firewall (WAF). dotDefender boasts enterprise-class security, advanced integration capabilities, easy maintenance and low total cost of ownership (TCO). dotDefender is the perfect choice for protecting your website and web applications today. Application and Infrastructure Independent dotDefender works everywhere your business needs it. Whatever web applications your business uses, whether you use a Windows or Linux-based serving environment, whether you run dedicated servers, virtual machines, or employ cloud services, dotDefender Web application security can protect your business today. dotDefender can be acquired with a perpetual or annual license directly from Applicure or one of our approved global partners. Additionally, a Software as a Service model is available via our worldwide hosting and managed services partners.
  • 23
    Bitdefender Mobile Security
    Bitdefender Mobile Security is a comprehensive mobile-protection app designed to safeguard phones and tablets from malware, phishing, and device loss. It features a multi-layer antivirus engine (app-, download- and storage-scanners) that defends against viruses, ransomware and adware; web-protection that blocks phishing sites and unsafe browsers; real-time app-anomaly detection that watches for malicious behavior in installed apps; a scam-alert module that scans text messages, chat apps and notifications for dangerous links; anti-theft tools that let you remotely locate, lock or wipe your device if lost; an app-lock for biometric or PIN protection of sensitive apps; and a VPN that provides up to 200 MB/day of encrypted mobile traffic. The app runs in the cloud-to-device model, minimizing battery impact while delivering full protection. It also includes account-privacy monitoring to alert you when email addresses may have been compromised.
    Starting Price: $14.99 per year
  • 24
    FullCase

    FullCase

    Justice Systems

    Case management technology designed specifically for attorneys. Prosecutor and public defender offices are inundated with a wide range of daily tasks, including reviewing reports, appearing at court proceedings, notifying and caring for the interests of their defendants and victims, and reporting to local, state and federal agencies. With so many intricate details to manage, it is imperative to have a case management system that automates and simplifies repetitive tasks and maximizes the productivity of your staff. Designed specifically with the needs of attorneys in mind, the FullCase® software solution solves your toughest case management challenges and no matter your size, is flexible enough to adapt to your office’s requirements.
  • 25
    Alice

    Alice

    Alice

    Alice (formerly ActiveFence) is a security, safety, and trust platform built to protect AI systems and online platforms in the GenAI era. Powered by the world’s largest adversarial intelligence dataset, Alice safeguards over 3 billion users across more than 120 languages. Its Rabbit Hole intelligence engine continuously analyzes billions of toxic and manipulative data samples to detect emerging threats in real time. The WonderSuite platform includes tools like WonderBuild for pre-launch stress testing, WonderFence for runtime guardrails, and WonderCheck for automated red-teaming. By defending against prompt injection, jailbreaks, governance gaps, and harmful AI behavior, Alice enables enterprises and foundation model labs to innovate with confidence.
  • 26
    Lumen Defender
    Lumen Defender is an AI- and ML-powered network threat detection and prevention service designed to proactively block evolving cyber threats at the network edge. Leveraging threat intelligence from Black Lotus Labs, Lumen's in-house threat research team, Defender analyzes over 200 billion NetFlow sessions daily to identify and intercept malicious activities such as malware, ransomware, phishing, and botnets before they can compromise business networks. Operating without the need for additional hardware or complex configurations, it integrates seamlessly with Lumen's Internet On-Demand services, providing real-time monitoring, customizable threat blocking based on severity levels, and detailed reporting through an intuitive web portal. Available in Essentials and Plus tiers, Lumen Defender offers features like automatic blocking of high-risk IP addresses, customizable allow/deny lists, and alert notifications, enabling businesses to enhance their cybersecurity posture efficiently.
    Starting Price: $0.04 per hour
  • 27
    Microsoft Defender XDR
    Microsoft Defender XDR is an industry-leading extended detection and response (XDR) platform that provides unified investigation and response capabilities across various assets, including endpoints, IoT devices, hybrid identities, email, collaboration tools, and cloud applications. It offers centralized visibility, powerful analytics, and automatic cyberattack disruption to help organizations detect and respond to threats more effectively. By integrating multiple security services, such as Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, and Microsoft Defender for Cloud Apps, it enables security teams to correlate signals across these services, providing a comprehensive view of threats and facilitating coordinated responses. This integration allows for automatic actions to prevent or stop attacks and self-heal affected assets, enhancing overall security posture.
  • 28
    Weather Defender

    Weather Defender

    SWIFT Weather

    Arming public safety agencies, utilities, contractors and other organizations with up-to-the-second weather data and tracking systems. Always-on threat monitoring and alerts allow you to minimize risk, maximize preparedness, and optimize the allocation of costly resources. A user-friendly, intuitive and robust solution for your weather monitoring needs, from a trusted provider. Weather Defender delivers critical, real-time weather data directly to your desktop, e-mail inbox or mobile device. We turn raw weather data into actionable, easy-to-read information to fuel some of your most critical decisions. With our innovative Alert Perimeter™ technology, you’ll be the first to know when severe weather threatens.
    Starting Price: $99.00/month/user
  • 29
    HUMAN Bot Defender
    HUMAN Bot Defender is a behavior-based bot management solution that protects your websites, mobile applications and APIs from automated attacks, safeguarding your online revenue, reducing the risk of data breaches and improving operational efficiency. Automated bots can generate over 50% of the traffic to your website. Malicious bots can take over your users’ accounts, abuse your payment pages, hoard inventory or scrape your pricing and content. In addition to being a security threat, bots can also erode your competitive edge and skew your web analytics, leading to revenue loss and increased customer service costs. HUMAN Bot Defender combines intelligent fingerprinting, behavioral signals and predictive analysis to detect bots on your web and mobile applications and API endpoints. With industry-leading accuracy, HUMAN Bot Defender minimizes user friction and ensures a safe customer journey.
  • 30
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 31
    Shadow Defender

    Shadow Defender

    Shadow Defender

    Shadow Defender is an easy-to-use security solution (for Windows operating systems) that protects your PC/laptop real environment against malicious activities and unwanted changes. Shadow Defender can run your system in a virtual environment called 'Shadow Mode'. 'Shadow Mode' redirects each system change to a virtual environment with no change to your real environment. If you experience malicious activities and/or unwanted changes, perform a reboot to restore your system back to its original state, as if nothing happened. With Shadow Defender, you have the flexibility to specify which files and folders are permanently saved to the real environment. This ensures important files and folders are kept after a reboot. If you want to make a maintenance-free computer, Shadow Defender will be your best choice. Surf the internet safely and eliminate unwanted traces. Eliminate system downtime and maintenance costs. Reboot to restore your system back to its original state.
    Starting Price: $39 one-time payment
  • 32
    TrafficDefender

    TrafficDefender

    TrafficDefender

    TrafficDefender™, powered by Netacea, ensures that your site remains available to customers 24/7, no matter how busy it gets. Our enterprise-grade, scalable, cloud-based Virtual Waiting Room service sits in front of your website to control in your hands, in real-time. TrafficDefender ensures your infrastructure only ever receives the visitors it’s able to manage, allowing you to guarantee availability, protect the customer experience and maximize revenue. When the maximum number of visitors is reached, TrafficDefender delivers a waiting page to all additional visitors without any access to your servers. Nobody likes waiting. Virtual waiting room makes the process as fair, transparent and pain free as possible while guaranteeing 100% website uptime. TrafficDefender's Virtual Waiting Room operates across all platforms without any code changes. Simply point your DNS at TrafficDefender and you’re good to go.
  • 33
    MetaDefender Kiosk
    The OPSWAT MetaDefender Kiosk Tower is our largest Kiosk capable of scanning the broadest range of media types. The MetaDefender Kiosk Tower is built with an industrial touchscreen and strong metal enclosure. OPSWAT’s proven, globally trusted, and award-winning technology prevents removable and peripheral media-borne threats from entering critical IT and OT environments. MetaDefender Kiosk scans incoming removable media before it enters your network. It identifies malicious content and sanitizes it prior to use. MetaDefender provides access to real-time OT data and enables secure data transfer to OT environments while defending the OT environment from network-borne threats. Enables users to transfer large files automatically, implement data-at-rest encryption, provide role-based access, and ensure regulatory compliance and audit trails. Provides a second layer of defense against threats by blocking access to USB drives and other media devices until security conditions are met.
  • 34
    Jack Henry Financial Crimes Defender
    Jack Henry Financial Crimes Defender is a next-generation financial crimes platform. The Financial Crimes Defender platform's analytics engine integrates Feedzai, the world's largest RiskOps platform for financial risk management.
  • 35
    GitBit

    GitBit

    GitBit

    Training for MS-500: Microsoft Office 365 Security Admin. What you'll learn: * Everything you need to know to pass the MS-500: Microsoft 365 Security Administration. * Creating and managing admin roles including time-limited admin roles. * Creating and managing conditional access policies. * How to implement multi-factor authentication (MFA). * Setup and manage self service password reset (SSPR). * What's Microsoft Defender. * Setup and manage Microsoft Defender for Identity. * Protecting Windows 10 and other user devices using Microsoft Defender for Endpoint. * Managing Microsoft Defender for Cloud Apps. * How to classify data using labels. * Managing data retention to conform to compliance. * Preventing accidental and malicious data loss with DLP policies.
  • 36
    Jcats

    Jcats

    Canyon Solutions

    A Web-based comprehensive Public Defender solution. Canyon Solutions worked hand-in-hand with the County of San Diego Public Defender’s Advisory Committee to develop this solution. The Criminal, Juvenile Delinquent, and Mental Health modules have been in use since 2001 and have been adopted in many locations. A web-based comprehensive Prosecutor solution. Canyon Solutions worked hand-in-hand with the State of Georgia’s Prosecuting Attorney Council to develop this solution. The solution has been in use since 2006. A Web-based comprehensive Child Dependency/Child Advocacy solution. This product does case management at a family level and addresses each petition individually. This solution fully automates case management for dependent children providing calendar management, workflow, statistical data and financial management features as well as many other sought after features. This product has been in production since 1999.
    Starting Price: $1000 per month
  • 37
    OPSWAT MetaDefender
    MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.
  • 38
    Microsoft Defender for Cloud Apps
    Modernize how you secure your apps, protect your data, and elevate your app posture with SaaS security. Get full visibility of your SaaS app landscape and help protect your apps with Defender for Cloud Apps. Discover, control, and configure apps to ensure employees are using trusted and compliant applications. Classify and protect sensitive information at rest, in use, and in motion. Enable your employees to safely access and view files in apps. Control how apps interact with each other. Gain insight into privileges, permissions, and apps that are accessing sensitive data on behalf of another application. Defend against advanced cyberattacks using app signals. Defend against sophisticated cyberattacks using app signals as part of your advanced hunting in Microsoft Defender XDR. The scenario-based detections will enable your security operations center (SOC) to hunt across the entire cyberattack chain.
  • 39
    BlockchainDefender

    BlockchainDefender

    BlockSafe Technologies

    Blockchain Defender acts as a gateway between the application and a private blockchain. It examines every message, checks if it is allowed as per enterprise rules & policy, scans the contents of data fields for malware and authenticates transactions via the ProtectID® system. Content Scanner to stop malware before it enters the blockchain. BlockSafe Technologies™ is a subsidiary company of StrikeForce Technologies, Inc. (OTCQB: SFOR), a leading provider of cybersecurity solutions for consumers, corporations, and government agencies. BlockSafe Technologies™ has been granted licensing rights to implement and distribute the patented, award-winning cybersecurity technology offered by StrikeForce Technologies, Inc.
  • 40
    IRBsearch

    IRBsearch

    IRBsearch

    IRBsearch gives you access to more than forty individual searches and reports to find the information you need. All search and report results are saved for seven days and are exportable as a PDF, Word Document, or Excel Spreadsheet. IRBsearch gives you access to more than forty individual searches to find the information you need. Coverage for our information stretches across fifty states and all US territories. Get all your information in an easy-to-read report. With our data collection tools, three comprehensive reports make up a 360-degree background profile. The Watchdog Service monitors searches for you 24/7, detects any updates, and alerts you via email if your subject is arrested, incarcerated, or has a new phone number or address. Locate vehicles nationwide using license plate recognition data! Vehicle Sightings gives you instant access to current and historical locations of vehicles across the United States.
  • 41
    Stellar Antivirus

    Stellar Antivirus

    Stellar Security

    Stellar Antivirus uses billions of metrics to defend your devices. You're protected in real-time. Every time something happens on your device you will be notified. Auto scan does a full scan of your device, at random times, it ensures 360-degree protection. You'll get an online-guard, that helps you to stay safe online. Everything that happens on Stellar Antivirus can be seen by you. Each scan, each detection, everything is just there for you. Stellar Antivirus has over 1 billion metrics that are used to defend your devices from any kind of viruses. Each metric is there, to defend against any different kind of virus. We have done it this way for you, your privacy and security. Stellar Antivirus runs in the background, anytime something happens on your device it will notify you. You must know, what is happening on your devices, so you can take action. Enjoy peace of mind with continuous protection.
    Starting Price: €4.99 per month
  • 42
    Emergency Reporting

    Emergency Reporting

    Emergency Reporting

    Emergency Reporting provides the industry’s best platform for managing your entire public safety agency. Putting good data in and extracting useful information out has never been easier. Our Fire and EMS Software combines NFIRS and NEMSIS 3 into a single incident report. Tell your story, defend your budget, and keep your crews safer than ever before with our powerful data management modules.
  • 43
    PimEyes

    PimEyes

    PimEyes

    PimEyes is an online face search engine that goes through the Internet to find pictures containing given faces. PimEyes uses face recognition search technologies to perform a reverse image search. Find a face and check where the image appears online. Our face finder helps you find a face and protect your privacy. Facial recognition online system allows you to search by image. PimEyes is a face picture search and photo search engine available for everyone. It is a great tool to audit copyright infringement. We believe that you have the right to find yourself on the Internet and protect your privacy and image. Using the latest technologies, artificial intelligence and machine learning, we help you find your pictures on the Internet and defend yourself from scammers, identity thieves, or people who use your image illegally. That is why we have created PimEyes - a multi-purpose tool allowing you to track down your face on the Internet, reclaim image rights, and monitor your likeness.
    Starting Price: $29.99 per month
  • 44
    CrowsNest

    CrowsNest

    Flying Cloud

    CrowsNest Defends Data with Real-time Data Insight. CrowsNest is the first real-time data security analytics platform for data exfiltration protection. It delivers immediate visibility into your organization’s data movement, usage, and changes to protect it from theft and misuse. CrowsNest analyzes incoming data, data in motion across the network, and data leaving the environment to continuously monitor data usage. Anomalies trigger alerts to the CrowsNest console or to your SIEM solution. Security defenders receive a data “chain of custody” that identifies exactly who, where, when, and how content was accessed, modified, or distributed. CrowsNest data defense complements existing security measures, enabling you to protect data without adding security experts. CrowsNest uses data payload inspection and active machine learning to identify, analyze, and track files as they are used across the network.
  • 45
    MCP Defender

    MCP Defender

    MCP Defender

    MCP Defender is an open source desktop application that functions as an AI firewall, designed to monitor and protect Model Context Protocol (MCP) communications. It acts as a secure proxy between AI applications and MCP servers, analyzing all communications for potential threats in real-time. It automatically scans and protects all MCP tool calls, providing advanced LLM-powered detection of malicious activity. Users can manage the signatures used during scanning, allowing for customizable security measures. MCP Defender identifies and blocks common AI security threats, including prompt injection, credential theft, arbitrary code execution, and remote command injection. It supports integration with various AI applications such as Cursor, Claude, Visual Studio Code, and Windsurf, with more applications to be supported in the future. It offers intelligent threat detection, alerting users as soon as it identifies any malicious activity being performed by AI apps.
    Starting Price: Free
  • 46
    Wise Anti Malware
    Helps you defend against viruses, malware, adware, ransomware, phishing, spyware, and potentially unwanted programs. The most important feature of Wise Anti Malware is real-time protection, which is considered the first guard to defend your PC against malware threats. It has three shields, malware detection, adware detection, and registry protection. Thanks to the cooperation with Avira Operations GmbH & Co. KG, Wise Anti Malware adopts its latest threat detection technology and the completed virus database to help you defend against all kinds of threats such as virus, malware, adware, phishing, spyware, ransomware (like Petya GoldenEye) and potentially unwanted applications (PUA/PUP). If you download a program from an unsafe/unknown website, it may contain an ad-supported application, and once it is installed on your computer, you will keep seeing pop-up ads, news, or else. Wise Anti Malware can clean such kinds of applications, fix IE homepage settings, etc.
  • 47
    Microsoft Defender for Business
    Microsoft Defender for Business is an AI-powered device security solution designed for small and medium-sized businesses with up to 300 users. It goes beyond traditional antivirus by providing enterprise-grade endpoint protection across Windows, macOS, iOS, and Android devices. The platform helps organizations identify vulnerabilities, protect devices, detect threats, and rapidly respond to cyberattacks. AI-driven endpoint detection and response automatically disrupt ransomware and other in-progress attacks in real time. Defender for Business includes vulnerability management to prioritize and remediate security weaknesses. Its simplified onboarding and management experience makes it easy to deploy without complex security expertise. Overall, Microsoft Defender for Business delivers cost-effective, scalable security tailored to modern hybrid work environments.
    Starting Price: $3/user/month
  • 48
    Cybereason

    Cybereason

    Cybereason

    Together we can end cyber attacks at the endpoint, across the enterprise, to everywhere the battle moves. Cybereason delivers over-the-horizon visibility and high fidelity convictions of both known and unknown threats so defenders can leverage the power of true prevention. Cybereason provides the deep context and correlations from across the whole of the network to uncover stealthy operations and enable defenders to be expert threat hunters. Cybereason significantly reduces the time required for defenders to investigate and resolve attacks through both automated and guided remediation with just a click of the mouse. Cybereason analyzes 80 million events per second - that’s 100x the volume of other solutions on the market. Reduce investigation time by as much as 93% to eliminate emerging threats in a matter of minutes rather than days.
  • 49
    Vismo

    Vismo

    Vismo

    Vismo is an enterprise-grade safety, risk management, and mass notification platform designed to help organizations protect employees through real-time location tracking, emergency communication, and incident response tools. It combines GPS-based location intelligence with multi-channel communication to enable immediate, coordinated action during critical events, allowing organizations to send targeted alerts via SMS, voice calls, mobile apps, email, Microsoft Teams, and Slack from a single secure system. It provides features such as geo-fencing to identify employees within risk zones, automated notifications when thresholds are crossed, and two-way communication that allows recipients to confirm their safety, request assistance, or provide updates in real time. It includes a panic button for instant emergency alerts, check-in functionality to verify user status, and continuous monitoring through a secure portal and mobile apps that display live locations.
  • 50
    DisruptOps

    DisruptOps

    FireMon

    DisruptOps is a cloud security operations platform that monitors, alerts and responds to security risk in real-time across your public cloud infrastructure. DisruptOps breaks down barriers between development, security & operations teams, enabling everyone to become an active defender of your cloud infrastructure, working from your existing tools. DisruptOps delivers critical issues directly to the right responders inside the tools you already use, like Slack, Teams & Jira, enabling everyone to be an active defender, even when it’s not their full-time job. DisruptOps brings security operations into your DevOps workflow, empowering your teams to find & fix issues before they become incidents. Immediate visibility into your risks and threats, critical issues routed to the right responders, security context and expert guidance to remediate issues. Insights to plan & track your risk reduction and playbooks with pre-built response actions that save time.