Alternatives to InsMsg

Compare InsMsg alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to InsMsg in 2026. Compare features, ratings, user reviews, pricing, and more from InsMsg competitors and alternatives in order to make an informed decision for your business.

  • 1
    Element

    Element

    Element

    Element is a secure communications platform built on Matrix: a decentralised and end-to-end encrypted protocol. Bring your teams together, boost productivity and workplace satisfaction, while retaining complete ownership of your data. Element is a leader in the Forrester Wave: Secure Communications report. Easily collaborate with your partners, suppliers or clients with video calls and instant messaging: like email for the 21st century. You can even connect your Slack, MS Teams, WhatsApp accounts. On the other hand Element can be closed for high security environments using secure border and cross domain gateways, and even air-gapped deployments. Being built on Matrix, there is no single point of failure for the network thanks to the decentralised network architecture, making it perfect for mission-critical environments. Please contact us to explore how your business can benefit from Element.
    Starting Price: $5 Per Monthly Active User
  • 2
    SwiftCount

    SwiftCount

    SwiftCount

    SwiftCount, a cloud-based inventory management platform, has key features that include inventory counting, product management, multiple location support, and inventory searching. SwiftCount allows users to manage and monitor an updated product database across multiple devices. SwiftCount also includes Swift Scan that enables users to scan product UPCs to build a product database. You can use SwiftCount stand alone or integrated to an accounting system to perform all movement related inventory transactions such as shipping, receiving, counting, producing, printing labels and much more. Fully Web and mobile enabled. Easy to use and very affordable. SwiftCount integrated to 3rd party platform such as Shopify or QBO or many others can give you the tools needed to properly manage your inventory. Very flexible for small to medium and even large businesses.
    Leader badge
    Starting Price: $49.95/month
  • 3
    NymVPN

    NymVPN

    Nym Technologies

    Enjoy secure browsing, streaming, and messaging with our unmatched blend of decentralized VPN, mixnet, and zero-knowledge payments. Elevated privacy with advanced onion encryption, data splitting, mixing, and concealment in cover traffic. Swift two-hop decentralized mode with onion encryption but no cover traffic. Inability to correlate IPs with network requests, by design. No backdoor or covert access to traffic and private data. Unmatched privacy within a single application thanks to the unique blend of mixnet and decentralized VPN. Zero-knowledge payment method, ensuring privacy and concealing user identity for transactions.
  • 4
    Placement Auditor

    Placement Auditor

    Placement Auditor

    Placement Auditor is an automated backdoor hire detection platform built for staffing and recruitment agencies. It continuously monitors submitted candidates via LinkedIn to detect undisclosed job changes and unpaid placements. Users upload candidate data once, and the system scans automatically without manual effort. When a potential backdoor hire is detected, Placement Auditor generates forensic-grade synthetic evidence that is court-ready and compliant. The platform also creates attorney-reviewed legal demand letters to help agencies recover owed placement fees. With real-time alerts and zero commission on recovered revenue, agencies keep 100% of what they collect. Placement Auditor operates as a true set-and-forget system that protects placement revenue around the clock.
    Starting Price: $49/month
  • 5
    Z1 SecureHub

    Z1 SecureHub

    Zertificon

    25% of the 100 German companies with the highest turnover use Zertificon's solutions. Z1 SecureHub is our web-based MFT solution. Encrypted large file transfer made simple, so you can confidently –and effortlessly– send and receive large files with anyone, anywhere over the Internet. Secure data flows are instant between your employees, teams, customers, partners, and systems— no end-user installations are needed. Involved parties receive an email with every upload or download so that everyone stays up-to-date on a project. Users enjoy extensive file management, and admins have enterprise-grade capabilities to control transfer activity. Comprehensive monitoring features make audits smooth. And virtual appliance delivery makes for easy integration. Get no-backdoor German-engineered security for data compliance and cyberthreat protection, with full data sovereignty in the cloud or on-premises. Customizable, quick to deploy, and easy to manage. APIs are also available.
  • 6
    Suavei

    Suavei

    Suavei

    Suavei Internet Security. Intelligent Threat Management for IoT. We detect your vulnerabilities before hackers do. Today, computer networks have open backdoors everywhere — especially in remote locations — even though a lot of capital is being spent in ineffective, time- and resource-consuming tools and processes to protect them. The number of attached network devices is exploding and each one of them has the potential to undermine even the most rigorous network security practices. Most enterprises have no visibility into 80% of the devices attached to their networks. Current cybersecurity products are clearly not sufficient to curb the increasing threats, in great part because they use old, static, techniques that are outdated and ineffective. In essence, Suavei was borne out of 3 fundamental issues we identified in other active vulnerability scanning products: They don’t identify the devices accurately and reliably. They can’t handle slow network environments.
  • 7
    Heimdal Next-Gen Endpoint Antivirus
    Heimdal Next-Gen Endpoint Antivirus is an NGAV solution featuring unparalleled threat intelligence, EDR, forensics, and firewall integration. Our tool uses signature-based code scanning to monitor your organization’s files' activity to protect your endpoints against malware, ransomware, APTs, and other types of threats. Heimdal Next-Gen Endpoint Antivirus allows you to perform file scans in real-time, as a permanently active process. In addition to this, you can run scheduled or on-demand scans for your endpoints to detect any suspicious activity. Our solution uses signature-based code scanning, real-time cloud scanning, sandboxing, and backdoor analysis to monitor the activity of your organization’s files in order to protect your endpoints
  • 8
    yEdit2

    yEdit2

    Spacejock Software

    It also includes a special .yedit2 file format, which is password-protected. You can put all your web logins, email accounts, etc in yEdit and then save them out in a password-protected file. (The contents of your files are not sent to, nor viewable by, Spacejock Software, and there is no magical backdoor to open your files if you lose your password.) There's also an Android version on the play store, currently available in public beta, and an iOS version is on the way. Due to play store/app store regulations, mobile versions will not have file encryption.
  • 9
    Tencent Cloud Workload Protection
    AI-based WebShell detection engine effectively detects encrypted and disguised malicious scripts. CWP leverages Tencent Cloud’s Internet-wide threat intelligence to detect hacker attacks in real time. With self-developed lightweight agents, CWP carries out most of its computing and protection workload in the cloud, ensuring low consumption of server resources. In addition, quick deployment is supported with high compatibility with mainstream operating systems. CWP can automatically collect asset statistics, including servers, components, accounts, processes, and ports. Centralized data management helps you stay up to date on asset risks. CWP uses machine learning algorithms to detect malicious files such as WebShell backdoors and binary trojans. Detected files are access controlled and quarantined to prevent reuse.
  • 10
    Alibaba Cloud Security Scanner
    Cloud Security Scanner utilizes data, white hat penetration testing, and machine learning to provide an all-in-one security solution for domains and other online assets. CSS detects web vulnerabilities, illicit content, website defacement, and backdoors to prevent possible financial loss caused by damage to your brand reputation. Cloud Security Scanner comprehensively detects any risks to your website and online assets, such as web vulnerabilities, weak passwords, website defacement, and Trojan attacks. The system scans all source code, text, and images for vulnerabilities. Developed through penetration testing, WTI has built-in multi-layer verification rules to ensure high accuracy of vulnerability detection. The system uses comprehensive decision making and model-based analysis, to provide accurate detection of content risks. Submit any questions about the scanning results to our team of experts.
  • 11
    JM-Crypt

    JM-Crypt

    JM-Crypt

    Low-cost professional and multi-platform software (Windows - Android) intended to encrypt sensitive data such as documents or photos in order to protect them from theft or ransom. Ideal for VIPs or liberal professions such as lawyers, medical professions etc. Consult our detailed product sheets on MS Store - "JM-Crypt PC" and Play Store - "JM-Crypt Mobile". Our software install on your device, with no IT backdoor, no remote servers, no third parties, no sponsorship, no pub and this for a derisory cost and an unlimited duration. Our software use the best known algorythm : AES-256 – CBC – PKCS official unaltered version with authentication (encrypt-then-mac) and random IV (initialization vector). Hash functions and HMAC: SHA3 – 256. Better than full disk encryption slowing down your computer's performance, "JM-Crypt PC" can target for fast serial encryption specific folders or file extentions of your choice.
    Starting Price: $2.99 (Android) - $9.99 (PC)
  • 12
    Ziroh Store

    Ziroh Store

    Ziroh Store

    It’s unsafe to store/sync your critical files to cloud storage platforms. Because there is no cloud that is able to keep your details completely private to you. All your files on the cloud are telling tales about you to your cloud storage provider, your personal images, academic transcripts, bank details, and work documents. You really don’t have a say in who reads your information, and what they do with it. When you sync your gallery to your cloud, it exposes the personal photos and videos on your device to all third parties who have a backdoor to your cloud storage. They are privy to every private moment you capture and even delete. Do a simple search to check when your cloud storage provider was last hacked. Your files on the cloud are private to you, your cloud storage provider and their allies only until a savvy hacker looks your way. Ziroh Store is a privacy-preserving intuitive software that helps you to upload your files end-to-end encrypted to any of your cloud platforms.
  • 13
    Panda Security VPN
    Download Panda Security VPN for Windows or Android. For secure and private online browsing. Internet without hackers, no borders, no limitations, no danger. We have thousands of servers around the world to ensure maximum connection speed and performance. Our technology uses the most secure VPN (Virtual Private Network) protocol on the market. Panda Security lets you access all Internet content safely and privately, TV shows, social networks, sports and news channels, video/audio streaming, dating sites, and video games, from anywhere in the world! Surf the Web safely and privately. We protect your data and identity in your home, at work, and in public environments everywhere. We encrypt your data and communications but don't collect or share any information about your online activity. To unblock all Internet content. No limitations or borders. To change your virtual location and access any content from anywhere in the world.
    Starting Price: $36.96 per year
  • 14
    RBridge

    RBridge

    Inlab Networks

    RBridge implements a virtual, encrypted Ethernet cable. It easily and securely connects two distinct Ethernet LANs as they were connected by plugging a very long cable between two switches over the distance. Operating with true random key material and ChaCha20 makes it the most secure Layer 2 site-to-site VLAN solution available on the market. RBridge bears the quality certificate “IT Security made in Germany” (ITSMIG) issued by the “IT Security Association Germany” (teletrust): Unrestricted by political requirements, we guarantee that RBridge is free from any undocumented loopholes, undocumented backdoors and any other undocumented interception mechanisms.
    Starting Price: EUR 120 one-time fee
  • 15
    EdGuards

    EdGuards

    EdGuards

    Score the highest grade in education system compliance. We provide scanning solutions and services for PeopleSoft, Ellucian, and other systems. Over the last 5 years, the number of breaches in Education has increased by 15 times. Education is attacked more than Retail and Administrative industries. In the 2017 breach, Kennesaw State University lost up to 7,500,000 records Protect your PeopleSoft applications against cyber attacks. Identify vulnerabilities, fix misconfigurations, detect vulnerabilities and backdoors in source code, manage access control and user rights. Education Industry Cyber Incidents Report is the only annual report in the education industry that covers high-profile cybersecurity incidents in K-12 and Higher Education institutions. Do not wait for a breach to occur. Secure your business applications now to avoid future risks. Get in touch and learn how our products and services can help you.
  • 16
    GOOSE VPN
    We are GOOSE VPN, the European VPN and we are on a mission! Together with you we provide control in your online life, so that you can enjoy the online environment safely and without limits. Find the best deals, compare prices worldwide and grab that local offer! VPN stands for Virtual Private Network. Think of it as a secure tunnel between your device and the internet. As soon as you are connected to a secure GOOSE VPN server, your internet traffic goes through an encrypted tunnel where no one can look inside, not even hackers, governments, or your internet provider. You move anonymously on the internet and you can choose your own location, which bypasses blockades, censorship and stalker pop-up ads. VPN stands for Virtual Private Network. Think of it as a secure tunnel between your device and the internet. As soon as you are connected to a secure GOOSE VPN server, your internet traffic goes through an encrypted tunnel where no one can look inside.
    Starting Price: €1,80 per month
  • 17
    eperi Gateway
    You alone have full control over the encryption of your data – at any time and definitely without backdoors. All Systems – One Solution. Thanks to the patented template concept you can use the eperi® Gateway for all your (cloud-) applications and adapt it to your data protection requirements. Your employees can continue working as usual, while the eperi® Gateway encrypts data transparently and preserves the central functions of your applications (such as search and sort). Take advantage of cloud applications while staying compliant with the stringent regulations of the financial industry like privacy-preserving analytics. IoT brings forth smart machines and products that collect data independently and automatically. Thanks to encryption, you can ensure data privacy and comply with legislation.
  • 18
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 19
    Baidu AI Cloud Intrustion Detection System
    Based on the full-flow image and big data processing technology, the IDS can analyze the flow log authorized by the user, via a bypass. Also, it can identify the web application attack quickly and profoundly mines the remote command execution, web shell backdoor, and sensitive file leakage attacks against the web by hackers, and make the alarm accurately. Furthermore, it saves the original web traffic log and audit report, meeting the audit requirements for cybersecurity classified protection compliance services. Under the user authorization, IDS analyzes the bidirectional HTTP traffic log of user EIP in a real-time manner and quickly identifies various common web attacks, such as SQL injection, XSS cross-site scripting, web shell back door uploading and unauthorized access.
  • 20
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 21
    AMS File Transfer

    AMS File Transfer

    Automated Messaging Systems

    Secure 2-way communication made simple with AMS File Transfer. AMS File Transfer is a secure encrypted solution, allowing your users to transfer files securely with a full audit trail to internal colleagues or external recipients whilst maintaining control over the access of the information. With 3 authentication options, plus unique sender controls the solution offers peace of mind that the transfer is protected throughout the whole process. Secure files using 256bit AES encryption with full virus scan, 3 authentication options for recipients including 2-factor and the ability to initiate DRM. No more concerns of file size limitations when transferring or receiving files via the secure branded web portal or Outlook. Have your portal branded how you like, allowing you to increase brand recognition and add additional reassurance for external parties. Eliminate the concern of sensitive information being sent via email.
  • 22
    Basis Inventory

    Basis Inventory

    BarcodeApps

    Inventory Management for Small to Mid-size Businesses. Easy to use and extremely user friendly, requires only a basic training session for your staff to utilize it. Basis Inventory by BarcodeApps allows you to use any iOS device paired with an inexpensive Bluetooth scanner to very efficiently count your inventory. You can even use the device camera to scan barcodes. Do full or cycle counts and track bin location, serial and lot numbers using a very simple and intuitive interface. Enter items by scanning or find by part number or description. Data held in the device so no worries if you need to go out of range of the Wi-Fi network. Send wirelessly once in range. Combines the count of all users in all warehouses for a live picture of the count process at any time. During the process you can reconcile your data with a wide range of reports then export the data back to your accounting package.
    Starting Price: $19.00/month
  • 23
    Araali Networks

    Araali Networks

    Araali Networks

    The first identity-based, cloud-native solution to neutralize network exposure in Kubernetes, access to data, services, and backdoors. Auto-discover and neutralize your Kubernetes exposure in real-time. Prioritizes your mitigation and bring properly configured eBPF-based controls to manage your exposure and keep your sensitive data secure. Shared responsibility makes you liable to securely configure your infrastructure to minimize exposure. Default open egress leads to data loss. For cloud-first organizations who want to secure their customers’ data and demonstrate compliance, Araali Networks provides proactive protection that is easy to manage. The self-configuring, preventive controls are especially beneficial to lean security teams. Data will have minimal possible exposure and be invisible to intruders. API and services will have minimal possible exposure and be invisible to threats. Data will not leave your premise to unapproved external destinations.
  • 24
    BleachBit

    BleachBit

    BleachBit

    When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Adobe Flash, Google Chrome, Opera, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source. BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy. No adware, spyware, malware, backdoors, browser toolbars, or "value-added software".
  • 25
    transfer4all

    transfer4all

    transfer4all

    Share & Send Big Files Fluidly. Transfer-exchange and deliver big files up to 50GB. A fast and free app to make it easy to send big files. Simplify file transfer tasks, save time, and improve communications. Secure transfer platform with zero trust network security. Encrypted cloud storage with high level data encryption. Hybrid cloud at maxi speed. Cloud file sync to keep files up to date across all devices. Performance and availability with Load Balancing System and ultra-fast static and dynamic CDN over global network. Transfer file size limit: 50.00 GB Space limit: 1,000.00 GB No. of download: 1000 Unlimited Users User Security Roles User Management 1 TB of Storage HTTPS secured transfers/uploads Manage transfer history Files never expire Unlimited downloads Up to 50 GB per file 5 Receive File Plugins for Website Unlimited Bandwidth Customizable Branding Premium Support Up to 100 Emails at once.
    Starting Price: $9 per month
  • 26
    Barcodery

    Barcodery

    Barcodery

    Master your inventory with Barcodery. Almost everything can be customized. Android app to scan items and manage your inventory. You can have multiple users with different permissions. Email alerts for minimum count or date expiration. You can add documents to the items. If you don't need the web app and syncing data, then you can use the Android app totally free. Just choose the local plan. Works offline, when you don't have an internet connection you can still do your job. Then, when you have an internet connection again, everything is synced with the web app. You can scan items using the camera scanner, connected Bluetooth scanner, or NFC. You can export or import data into the Android app using an Excel file (.xls). Just set up which column should be imported into which field and you are good to go. Audits are done using the Android app or web app. You create an audit, then go to the chosen location and scan all items there to see what is missing.
    Starting Price: $5 per month
  • 27
    PrivMX

    PrivMX

    PrivMX

    PrivMX Fusion is privacy-by-design, all-in-one collaboration software for all kinds of teams, protecting all data with zero-knowledge encryption. With a Fusion of Tools integrated within one digital workspace, it helps teams in organising and managing daily tasks, files and communication in a fresh new way, making it easier to look at projects from various angels. It includes: * group, private an thematic communication within Chat channels; * video calls in private, ad hoc and thematic channels; * async communication with video and audio messages; * easy task management with to-do lists and Kanban boards; * private data storage with smart access policy; * buit-in editor for end-to-end encrypted text notes, mind maps and spreadsheets; * clear 2-dimensional UI architecture; * zero-knowledge encryption of all the content created, uploaded, stored and shared by the team - no third party can access your data; * GDPR compliance within the network of EU-located servers.
    Starting Price: €4 user per month
  • 28
    BriefLink

    BriefLink

    BriefLink

    BriefLink is a free, private, and trackable tool specifically designed for startup founders to share fundraising pitch decks with investors in a streamlined, secure way. Founders can upload their deck in formats like PDF or PPTX (up to a 30 MB limit), and generate a confidential link protected via email access, which can be disabled at any time. It offers analytics on investor engagement, such as view counts and read receipts, empowering founders to see who’s interested and how they interact with the material. BriefLink decks follow a vetted structure reflecting how venture capitalists typically review startups, and they include inline expert advice videos from top investors to help shape messaging and metrics. Integration with the Signal investor network amplifies visibility, while recommendations embedded in briefs can boost meeting rates by about 24%.
  • 29
    Trellix XDR
    Introducing the Trellix Platform, a composable XDR ecosystem that adapts to the challenges of your business. The Trellix Platform learns and adapts for living protection while delivering native and open connections and providing expert and embedded support for your team. Keep your organization resilient with adaptive prevention that adjusts and responds in machine time to threats. Customers trust 75M endpoints to Trellix. Maximize business agility through zero trust principles and protect against front-door, side-door, and back-door attacks, all while streamlining policy management. Get comprehensive, non-invasive protection for your cloud-native applications, through secure agile DevOps and visible deployment environments. Our email and collaboration tool security protects against high-volume exposure points and attackers, automating for optimized productivity and enabling secure and agile teamwork.
  • 30
    DataVault

    DataVault

    DataVault

    Know where your viewers are spending the most time, so you can follow-up strategically and close more deals. Create an organized space with custom security settings for each investor or deal stage as the deal progresses. Customize a branded experience for each account. Know your metrics, manage collaboration and satisfaction. Update your investors qualitatively and securely, with military strength information security. No more battling with e-mail attachments and version controls. Track the use of your data assets by sharing documents, content and data with clients, customers and investors with just a link. When you want to expand access to a new group, simply generate a new link and send. Define and limit accesses, set expiry dates and verify emails or domains. Gone are the days of scattered content across emails, chat messengers and forgotten accesses. Thanks to real-time analytics, you can see exactly who is viewing which content.
    Starting Price: $10 per month
  • 31
    SSuite PC-Drop

    SSuite PC-Drop

    SSuite Office Software

    SSuite PC-Drop is a free and easy-to-use file transfer application that allows you to transfer files between Android smartphones and also any Windows PC that is connected to your local Wi-Fi network. It uses direct Peer-To-Peer FTP (File Transport Protocol) communications for data transfers over your local Wi-Fi network, so there is no need for an internet connection or any cloud account registration. To use SSuite PC-Drop, simply install the application on both your Android smartphone and your Windows PC. Once the applications are installed, open them and connect to the same Wi-Fi network. SSuite PC-Drop supports a wide range of file types, including images, documents, videos, music, and archives. The transfer process is very fast and efficient. The interface is simple and straightforward, and the transfer process is quick and painless. SSuite PC-Drop is compatible with all Android devices including all Windows PCs. SSuite PC-Drop is completely free to download and use.
    Starting Price: Free
  • 32
    Datascan

    Datascan

    DATASCAN

    Our next-generation technology solution is designed and specifically built for retailers, enabling unparalleled performance and ease during an inventory count. Datascan partners with companies who produce cutting-edge products and services ensuring our self-scan solution is suitable for your inventory count needs. The Datascan self-scan solution is designed to have minimum impact on retailers’ IT infrastructure, requiring very little setup and network configuration. In order to maintain high availability and ensure optimum inventory efficiency, Datascan employs redundant server pools with automated failover and backup. Also, our scanners are able to communicate with our servers via wireless or wired networks using a TCP connection. Adaptable technology results in a simpler inventory process for our retailers.
  • 33
    THOR

    THOR

    Nextron Systems

    THOR is the most sophisticated and flexible compromise assessment tool on the market. Incident response engagements often begin with a group of compromised systems and an even bigger group of systems that are possibly affected. The manual analysis of many forensic images can be challenging. THOR speeds up your forensic analysis with more than 12,000 handcrafted YARA signatures, 400 Sigma rules, numerous anomaly detection rules and thousands of IOCs. THOR is the perfect tool to highlight suspicious elements, reduce the workload and speed up forensic analysis in moments in which getting quick results is crucial. THOR focuses on everything the Antivirus misses. With its huge signature set of thousands of YARA and Sigma rules, IOCs, rootkit and anomaly checks, THOR covers all kinds of threats. THOR does not only detect the backdoors and tools attackers use but also outputs, temporary files, system configuration changes and other traces of malicious activity.
  • 34
    Bopup Communication Server
    Bopup Communication Server is an in-house enterprise messaging server built to provide efficient and private communication over networks of any size. The server meets most of the critical business needs, such as centralized management, the Active Directory (LDAP) support, message and file transfer logging. It can be easily deployed over the business infrastructure to unite the entire company's offices and other locations into one internal IM workspace with control over messaging groups, user permissions to view others and send messages and documents, message and transfer archives with printing support. Since the server stores and delivers offline messages and files, users never lose information they are supposed to receive. Messaging is encrypted with strong algorithms so personal and group conversations are safe and secure even if data is sent via the Internet.
    Starting Price: $199
  • 35
    TrackMyRisks

    TrackMyRisks

    Continuity Partner

    All your governance, risk & compliance documents in one place. Upload and share PDFs, Office docs, images and more. Automatic version control makes it easy to manage your files. No more searching through inboxes and network folders. Other helpful features include: - Document expiry reminders - Unlimited permissioned users - Custom document tagging - In system notifications Secure and reliable visibility. Having the most up-to-date version of a document is not enough. Version control and user access tracking are essential aspects of proving compliance. TrackMyRisks offers: - User activity log - Backup and virus scan - Document revision history - Encryption of all files
    Starting Price: #10 per month
  • 36
    Joe Sandbox

    Joe Sandbox

    Joe Security

    Tired of high level malware analysis? Perform one of the deepest analysis possible - fully automated or manual - from static to dynamic, from dynamic to hybrid, from hybrid to graph analysis. Rather than focus on one, use the best of multiple technologies including hybrid analysis, instrumentation, hooking, hardware virtualization, emulation and machine learning / AI. Check out our reports to see the difference. Deeply analyze URLs to detect phishing, drive by downloads, tech scam and more. Joe Sandbox uses an advanced AI based algorithm including template matching, perptual hashing, ORB feature detection and more to detect the malicious use of legit brands on websites. Add your own logos and templates to extend the detection capabilities. Interact with the sandbox through Live Interaction - directly from your browser. Click through complex phishing campains or malware installers. Test your software against backdoors, information leakage and exploits (SAST and DAST).
  • 37
    loginTimer

    loginTimer

    satheeshsoft

    satheeshsoft Y2K38 technology successful invention software. loginTimer is powerful software that automatically scans computer login times and secretly stores them for you in a private text file, in addition to all users' login date, time, total logins each day/user, admin actions, login behavior (local and remote) and saves them continuously, one by one, in a private log file. This makes it easy for you to identify any suspicious activity on your computer and take appropriate action if necessary. So that, software is useful for home, business, personal computers, computer networks. It included the first successful discovery of Y2K38 technology. It works up to 2099 or after, with no Y2K year limitations. Portable in computer drive. Works in any of your personal folder in computer other than Windows system drive. The software is useful for home, business, personal computers, computer networks.
    Starting Price: $400
  • 38
    Diode Collab
    Diode Collab™ is a decentralized, local-first collaboration tool that combines secure chat, file sharing, VPN-like access, and team coordination inside a private “Zone.” All communication and data stay fully end-to-end encrypted, with no third-party servers involved - not even Diode can see your activity. Use it for secure messaging, files, notes, dashboards, and external uploads—without ever compromising identity or privacy.
  • 39
    LinkUS

    LinkUS

    SunSmart Technologies

    LinkUS - The private enterprise messaging app helps large enterprises in securely communicating within the organization and among their customers & suppliers. LinkUS helps in faster and secured communication with easiness across the organization. LinkUS is Very light and is available on web, Android and iOS based devices. Data is stored completely private, secured and encrypted within the data center of the corporate. You can create any number of groups in LinkUS. Further there is no limitation on the number of users in your group. LinkUS comes with real time language translator, so that the users can view the content in their preferred language dynamically. Similarly, when user types in their preferred language, LinkUS does auto translation 2 other people based on their language preference. Users can share text, smiley's, audio, video, camera photo, real-time camera picture, any files on LinkUS.
  • 40
    DUPI

    DUPI

    D10 Networks

    Explore advanced real-time network monitoring with unparalleled deep visibility into live NETFLOW, DNS, HTTP & SSL network traffic. Monitor AWS logs or any protocol at your sites universally from the cloud. A lightweight capture application on-site exports all relevant protocol info over a fast connection to your dedicated cloud server. Observe aggregate protocol statistics across multiple sites to view all network traffic in your business as a 'whole'. Alternatively based on your use case simply choose to observe only the network traffic at an individual site. Analyze your network traffic in real time for deep visibility into actual traffic patterns. Define detailed alerting rules per specific protocol field on various metrics such as request rates, randomization, lengths, counts, and geo-location info. Explore network traffic at your sites easily and interactively from the comfort of your browser. Quickly switch protocols, fields, and intervals and apply specific filter conditions.
    Starting Price: $0.25 per hour
  • 41
    Cubbit for Teams
    Cubbit for Teams is a SaaS distributed cloud storage that provides businesses with complete security. Thanks to the distributed zero-knowledge network, not even the service provider can access the uploaded files, meaning Cubbit goes beyond the facade of regulatory compliance. Cubbit for Teams reimagines the concept of security by providing an easy-to-use platform: zero-knowledge and end-to-end encryption protects the user as he saves, syncs and shares its data. Information can be accessed from anywhere at any time through the web-app, while employee permissions are managed with the click of a button. Files are shared with no size limit and unsecured email is replaced by Cubbit Private Links: a 100% secure sharing method that matches an encryption key to the folder. Relying on a distributed architecture instead of traditional data-centers allows Cubbit to be cost-effective and provide a significantly cheaper service than the competition. Plus, you will save CO2 per file stored.
    Starting Price: €6 per user, per month
  • 42
    WizTree

    WizTree

    WizTree

    Find the files and folders using the most space on your hard drive quickly! WizTree makes it very easy to locate and remove "Space hogs" from your hard drive. The visual treemap displays the sizes of all of your files visually, helping you to quickly locate large files and folders. Don't waste time waiting for the disk scan results. WizTree does in seconds what similar applications take minutes to do. WizTree is in active development and new features are added regularly. If you have any suggestions for new features please contact us. When scanning NTFS formatted drives, WizTree reads the hard drive's Master File Table (MFT) directly from the disk (like Everything Search does). It can also quickly scan non-NTFS and network drives. Unlike similar applications, WizTree correctly handles hard-linked files (doesn't count them more than once). The total allocated space reported by WizTree will actually match what Windows reports.
    Starting Price: $20 one-time payment
  • 43
    Retail Sensing

    Retail Sensing

    Retail Sensing

    Tests show video people counting achieves over 98% accuracy. This is how it's done anonymously. Overhead closed-circuit television camera, or IP camera, tracks people's movements. The camera connects to a people counter which accurately detects and records how many people pass through the counting zone. The people counters send back data over Wi-Fi, Internet, IoT, IP, Ethernet, RS485 or RS232. Counts can be combined with live sales data in a POS database, giving real-time sales conversion figures. Wide entrances and areas are handled by linking several cameras across the ceiling. The embedded video server lets you view live video footage alongside the people counts, so you can accurately verify, and configure, the system over the internet. Once set up, counts alone can be sent over the network to save bandwidth. Replay counting videos for off-site commissioning.
  • 44
    DriveHQ

    DriveHQ

    Drive Headquarters

    Works like your local hard drive/file server. Map cloud storage as a network drive. Directly edit cloud files, drag-n-drop email attachments, file locking, map multiple drives with different permissions. Very efficient & reliable. A mapped cloud drive is the most straightforward way of accessing cloud-based files. It works just like your local hard drive. There is no learning curve. DriveHQ's Cloud Drive Mapping Tool makes it extremely easy to map a cloud drive. Moreover, it uses advanced caching, monitoring and reporting technologies to make the solution more efficient and reliable than any other WebDAV drive mapping service. Map cloud storage as a "local" drive. A mapped "local" drive is more compatible with Microsoft Office. Supports longer file path. The path length limit is a limit of Windows operating system and Microsoft Office. The Drive Mapping Tool minimizes the path length.
    Starting Price: $29.99 per month
  • 45
    Marta

    Marta

    Marta

    File manager for macOS. Native, extensible, and fast. Marta is a native macOS application written entirely in Swift. Not only it allows for a native experience, the application is also blazingly fast, click or press. Whenever you prefer to use a keyboard or a mouse, you will feel comfortable in Marta. All hotkeys are customizable. Marta doesn't collect or sell your data. There's no hidden functionality or backdoors and will never be. Work with archives as with folders on your Mac. Marta opens and writes ZIP archives, and opens RAR, 7Z, XAR, TAR, ISO, CAB, LZH, and many more formats. You can even look through and edit files in nested archives! Designed with power users in mind, Marta provides a vast of configuration options. Instead of cluttered tabs where you can't find anything, there's a streamlined DSL that makes configuration editing and sharing a trivial matter. Marta comes with five polished themes. Whether you like light or dark backgrounds, there's one for you.
    Starting Price: Free
  • 46
    SafeCount

    SafeCount

    InfraRed Integrated Systems

    Designed for accuracy and fast implementation, a SafeCount system helps businesses comply with social distancing and occupancy guidelines by anonymously counting people as they enter and exit your building. Suitable for buildings of all sizes, even those with multiple entrances and exits, a SafeCount solution delivers live occupancy data with visual warnings and alerts when limits are approached or exceeded. SafeCount works independently of existing IT networks and is designed for simple setup and fast installation. Can be self-installed. No complicated setup or configuration. Unrivaled person detection accuracy in excess of 99%. Accuracy is important. Anonymous sensing technology. Does NOT use cameras to detect people. Works independently of existing IT networks. Scale with SafeCount Plus. SafeCount can be used to monitor occupancy of entire buildings, individual rooms or anything in between.
  • 47
    Cora

    Cora

    Cora

    Cora is an AI-assistant for managing your Gmail inbox that acts like a chief of staff, screening your incoming emails, prioritizing what’s important, drafting replies in your own style, and sending you brief summaries of everything else. It learns your email habits and communication voice, lets you adjust its behaviour via natural chat or settings, and helps keep your inbox zero. Twice a day, it sends a “Brief” summarizing non-urgent messages (newsletters, notifications, FYIs) so you can skim instead of wading through hundreds of emails. You always retain control, Cora doesn’t send or delete emails itself, drafts appear for you to review before sending. It promises strong privacy; your data isn’t used to train external models, there’s no back-door access to your mail, and the product meets standards like Google Verification, CASA Tier 2, GDPR, and ISO 27001.
    Starting Price: $12 per month
  • 48
    Chooch

    Chooch

    Chooch AI

    Chooch AI healthcare inventory management turns hospital inventory rooms into self-managing systems. Chooch installs small cameras in hospital supply areas and autonomously tracks inventory usage. When inventory reaches defined thresholds, the system triggers replenishment signals without manual counting or scanning. Hospitals using Chooch eliminate manual counts, reduce waste, and prevent stockouts. The Inventory Control Tower provides live dashboards that unify supply data, forecast demand, and alert teams to low stock across the network. By removing manual counts and barcode scans, Chooch AI frees clinicians to focus on patient care and enables supply chain teams to plan confidently with continuous, data-driven insights.
  • 49
    Jami

    Jami

    Jami

    Jami is completely peer-to-peer and doesn't require a server for relaying data between users. Jami is a GNU project backed by the Free Software Foundation and distributed under a GPLv3 license. We use state of the art end-to-end encryption with perfect forward secrecy for all communications and comply with the X.509 standard. Without restriction on file size, speed, bandwidth, features, number of accounts, storage or anything else. There will never be advertising on Jami. There will never be advertising on Jami. Latency is reduced and transfer speeds are greatly increased thanks to the direct peer-to-peer connection. Users who are on the same local network can communicate with Jami even if they are disconnected from the internet.
  • 50
    WarehouseNet
    The design of WarehouseNet is very simple, easy & flexible. Whatever to learn, daily using or implement by stock keeper. We understand the warehouse environment is extremely busy and fast moving, most stock keeper will prefer a simple and flexible software in order to speed up their daily receiving and deliveries activities. Rather than using a complex MRP system which is actually slow them down. leftover reports with different grouping, by article no, item, brand name, description, supplier and specification, FIFO, storage breakdown, storage charges calculation, low level alert and stock checking by location. Export closing stock report for accounting audit at the year end to save manpower and time to re-type by excel. Expiry date alert avoid expires and waste of day limited items. Storage days report reduced the storage day and hence minimizes depreciation percentage.
    Starting Price: $49 one-time payment