Alternatives to Verimatrix

Compare Verimatrix alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Verimatrix in 2024. Compare features, ratings, user reviews, pricing, and more from Verimatrix competitors and alternatives in order to make an informed decision for your business.

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
    Leader badge
    Compare vs. Verimatrix View Software
    Visit Website
  • 2
    Red Points

    Red Points

    Red Points

    Red Points is the most widely used solution to combat online fraud. Over 1,200 companies rely on our AI-led technology to fight online counterfeits, piracy, and impersonation. They leverage Red Points to recover their digital revenue, maintain control, and improve their brand's value. The solution gives brands full visibility onto their online presence. With offices in New York, Barcelona, Beijing and Salt Lake City, Red Points has disrupted an industry traditionally led by service providers with a scalable, cost-effective solution. We serve leading global brands across a variety of sectors, from sports, cosmetics, fashion, entertainment and many more. The key to our success is our investment in technology and product to make our solution incredibly intuitive, effective and easy to use.
    Compare vs. Verimatrix View Software
    Visit Website
  • 3
    AppSealing

    AppSealing

    INKA Entworks

    AppSealing - the AI-powered next-gen AppShielding solution crafted to enable organizations to prevent mobile app attacks and deal with sophisticated threat landscapes with perfect precision in just 3 simple steps. AppSealing brings the benefits of DevSecOps to Mobile Apps with a ZERO-FRICTION, ZERO-CODING Approach. Get the best of Defense-in-depth security and regulatory compliance in a single solution for mobile apps AppSealing is trusted by industries like Fintech/Banking, O2O, Movie Apps, Gaming, Healthcare, Public apps, E-commerce, and others globally.
    Partner badge
    Compare vs. Verimatrix View Software
    Visit Website
  • 4
    Finite State

    Finite State

    Finite State

    Finite State manages risk across the software supply chain with comprehensive SCA and SBOMs for the connected world. By providing end-to-end SBOM solutions, Finite State enables Product Security teams to meet regulatory, customer, and security demands. Finite State's best-in-class binary SCA creates visibility into any-party software that enables Product Security teams to understand their risk in context and shift right on vulnerability detection. With visibility, scalability, and speed, Finite State correlates data from all of your security tools into a single pane of glass for maximum visibility.
  • 5
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    Quick License Manager (QLM) is a license protection framework that creates professional and secure license keys to protect your software against piracy. Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. Analytics to understand usage behavior. Self Help portal for your customers. Check for Updates for your application. Trial Registration Form to allow your customers to request a trial license.
    Leader badge
    Starting Price: $200 one-time payment
  • 6
    Zimperium MAPS

    Zimperium MAPS

    Zimperium

    Mobile application risks start in development & persist throughout the app’s entire lifecycle, including when running on an end user’s device. Zimperium’s Mobile Application Protection Suite consists of four products with a centralized dashboard to view threats & create response policies. It is the ONLY unified platform that combines centralized visibility with comprehensive in-app protection, combining both inside-out & outside-in security approaches to help enterprises build & maintain secure mobile apps. zScan: Helps organizations continuously discover and fix compliance, privacy, & security issues prior to being published. zKeyBox: Protect your keys so they cannot be discovered, extracted, or manipulated. zShield: Protects the source code, intellectual property (IP), & data from potential attacks like reverse engineering and code tampering. zDefend: Provides threat visibility & on-device ML-based runtime protection against device, network, phishing, & malware attacks.
  • 7
    Appdome

    Appdome

    Appdome

    Appdome changes the way people build mobile apps. Appdome’s industry defining no-code mobile solutions platform uses a patented, artificial-intelligence coding technology to power a self-serve, user-friendly service that anyone can use to build new security, authentication, access, enterprise mobility, mobile threat, analytics and more into any Android and iOS app instantly. There are over 25,000 unique combinations of mobile features, kits, vendors, standards, SDKs and APIs available on Appdome. Over 200+ leading financial, healthcare, government, and m-commerce providers use Appdome to consistently deliver richer and safer mobile experiences to millions of mobile end users, eliminating complex development and accelerating mobile app lifecycles.
  • 8
    zDefend

    zDefend

    ZIMPERIUM

    Zimperium zDefend offers an outside-in approach to mobile in-app protection. It’s an SDK that enables the host application to detect and proactively protect itself by taking actions on the end user’s device, even without network connectivity. The SDK leverages z9, Zimperium’s patented machine learning-based threat detection engine. The on-device actions are configured within the application. They can be updated in real-time without publishing a new version making it practical and scalable across large install bases. zDefend’s mobile RASP capabilities allow continuous monitoring, protection, and effective threat modeling within the mobile DevSecOps life cycle. -Advanced machine learning-based behavior detections -Restrict access & disable features when risk is unacceptable -Update in-app protection policies in real time -SDK optimized for size and performance -Minimal app permissions to preserve privacy -No PII data taken off the device
  • 9
    Irdeto

    Irdeto

    Irdeto

    We provide services and solutions that protect revenue, enable growth and fight cybercrime in video entertainment, video games, and connected industries including transport, health, and infrastructure. Helping companies in a wide variety of industries safeguard revenue, create new offerings and fight cybercrime. Protect your assets, safeguard your operations and innovate with confidence. streaming service with confidence and maximizing your premium ad inventory. Reduce your cost and remove the hassles of maintaining the infrastructure underpinning broadcast and online content delivery. Protect your business models, brand reputation, productivity, and profitability. Irdeto Cloaked CA is the most advanced and most widely deployed cardless conditional access system for broadcast and IPTV operators worldwide. Protect your content, brand, and investments. Irdeto is the preferred security partner to empower a secure world where people can connect with confidence.
  • 10
    QShield

    QShield

    Quarkslab

    Obfuscate your highly valuable source code and protect your sensitive assets thanks to QShield compiler-obfuscator. Protect your applications against static and dynamic analysis. Software running on untrusted environments is at risk of reverse-engineering, an application running on a device that is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, and intellectual property. To prevent unauthorized parties from gaining insight, tampering with or even recovering the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property. 30+ obfuscation schemes are available. Granular control of the protection profile thanks to a file-based policy or comments throughout the code. Build diversification, each compiled application is different with a user-controlled randomness seed. Integrity checks and detection of debuggers, emulators, and hooking frameworks.
  • 11
    ThreatCast

    ThreatCast

    Guardsquare

    After an Android or iOS app is released, security teams and developers often lack visibility into the most common attack vectors and vulnerable parts of their code...until it’s too late. ThreatCast lets DexGuard and iXGuard customers monitor threats in real time, adapt their security configurations and protect apps against suspicious activity and malicious users. Use easy-to-navigate dashboards and custom alerts to detect threat events as they happen. Analyze threat data to respond immediately to attacks or block suspicious users. Prioritize mobile security within the development process, without sacrificing speed-to-market.
  • 12
    DRMtoday

    DRMtoday

    castLabs

    Let’s face it, digital rights management (DRM) can get downright complicated. With numerous technologies in use, protecting your valuable video assets across over-the-top (OTT) platforms isn’t always straightforward. Our DRMtoday licensing solution lets OTT businesses quickly launch monetized services without worrying about how to meet those content owner security requirements. Rapidly adopt all leading DRM systems at once so you can focus on getting to the market. We’ve gathered a deep understanding of studio compliance by working with DRM protection since 2007. Our DRM systems meet strict content owner security requirements letting you deliver premium video online. Managing hardware protection is essential for HD, UHD, and HDR. DRMtoday can enforce studio requirements by only allowing stream qualities that meet a device’s security level. With our expert assistance, we’ll help you complete security checks to accelerate turnaround time when obtaining studio media.
  • 13
    Data Theorem

    Data Theorem

    Data Theorem

    Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease.
  • 14
    EZDRM

    EZDRM

    EZDRM

    EZDRM is a pioneer, leader and innovator of a managed hosted Digital Rights Management as a Service (DRMaaS) solution of Google Widevine, Microsoft PlayReady and Apple FairPlay. Our worldwide customers enjoy the benefits of a straight forward Key Management interface, while leveraging the robust full feature set of DRM technology. Dynamic business rules and API driven licensing complete the integration process, which allows our clients to expand their viewership and create new revenue streams while maintaining full control over studio content. With technology that is distributed across the world's best cloud data centers and backbone networks, our service is highly available and reliable. From the smallest trial to the traffic peaks of popular live event delivery, our technology scales to meet your service needs, and so does the cost. With a simple cloud-based service and proven API integrations, your video service can be safe and secure in hours, not weeks.
    Starting Price: $99.99 per month
  • 15
    Promon SHIELD
    Achieving application security doesn’t have to be difficult or time-consuming. With Promon SHIELD™, your developer team can implement protection to any desktop application, in minutes, without affecting the end-users. Promon SHIELD™ is designed to secure code integrity, data protection, intellectual property and ultimately brand and revenue against targeted malware. With security protections that are infused directly into your application, Promon SHIELD™ protects your desktop apps from both static and dynamic attacks. Since security is embedded into the application, protection is not invasive to the end user’s computer or network, nor does it rely on external libraries or hardware for its protection. Promon SHIELD™ is a security technology that offers multi-layered app protection beyond what the operating system can offer, and beyond what can be achieved by normal best practice and programming by app developers.
  • 16
    Dotfuscator

    Dotfuscator

    PreEmptive

    Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning – apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors. Breaches in any of these areas can cause serious revenue, reputation, and brand damage. Sophisticated app dev organizations know that investing in app protection is good risk management. Basic renaming obfuscation isn’t enough. PreEmptive Protection Dotfuscator for .NET provides many layers of protection: multiple forms of obfuscation (renaming, string encryption, control flow, and more) plus active runtime checks (tamper, debug, root, and more). But it’s not just about protection – we design and test all these layers to be sure that they won’t break your app as the runtime platform evolves.
  • 17
    EndCrypt

    EndCrypt

    Procenne

    EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt is a security solution implemented within the application (instead of the network or the operating system) to make it more resistant to attacks. It is a ready-to-use SDK to embed within a mobile application to secure it from environmental threats. EndCrypt provides a broad range of patented security capabilities to protect applications by preventing reverse engineering techniques via code obfuscation and anti-repackaging technology. It actively detects malicious key logging, screen readers, repackaged applications, debuggers and emulators, and jailbroken or rooted devices. It blocks foreign code from executing or shuts down the application to protect sensitive data from cybercriminals.
  • 18
    DashO

    DashO

    PreEmptive

    Professional obfuscation and in-app protection for over 20 years. We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. These days, intellectual property theft is just the beginning, apps are also gateways to trade secret theft, customer/user data theft, and to identifying further attack vectors.
  • 19
    OneSpan Mobile App Shielding
    Empower your mobile app to operate safely in untrusted environments without interrupting the end-user experience. Fortify your app against the latest mobile threats without hindering deployment frequency or speed. Strengthen your app's resistance to intrusion, tampering, reverse-engineering, and malware. Add strong data protection controls to support compliance with regulations such as PSD2, GDPR, and more. Serve more customers – even on jailbroken or rooted devices – while reducing risk. Automate app shielding via integrations with your dev teams’ favorite CI/CD tools. Financial institutions lack visibility into the security status of their customers’ mobile devices. The OneSpan application shielding solution protects a mobile banking app from the inside out. It allows the app to securely operate even in potentially hostile environments, such as jailbroken or rooted iOS and Android devices – and only deny service when absolutely necessary.
  • 20
    RedShield

    RedShield

    RedShield

    RedShield has partnered with the no.1 cloud provider AWS to create a next-generation architecture that offers unparalleled DDoS protection as part of RedShield’s service. In a world where the odds are stacked against you, with 50 new vulnerabilities published each day, it can feel like a near-impossible task to stay ahead of cybercriminals. RedShield uses a best-practice operational model with cybersecurity experts, tools, and AI-supported processes to allow our customers to minimize their risk and maximize their cybersecurity resilience. Not only is the cybersecurity battle complex and dynamic, coupled with the high demand & short supply of security & development professionals, but it can also soon become a costly distraction away from core business. RedShield’s service not only solves the people's problem but does so at approx. 10% of the cost of building & running your own in-house web app security team, offering a compelling return on mitigation investment.
  • 21
    Widevine

    Widevine

    Google

    Widevine enables secure premium content protection utilizing free-to-use, standards-based solutions for OTT and CAS services. Widevine supports the use of standards-based royalty-free solutions for encryption, adaptive streaming, transport and player software without licensing fees or required participation in the CWIP training program. Widevine supports the use of standards-based royalty-free solutions for encryption, adaptive streaming, transport and player software without licensing fees or required participation in the CWIP training program. Widevine supports the largest number of devices on the broadest number of chipsets and is currently available on 5 billion mobile, desktop, set top box and living room devices.
  • 22
    SkyDRM

    SkyDRM

    NextLabs

    Keep your documents safe from unauthorized access and control how they can be used. Move faster, automate, improve efficiency, and be more agile. Prevent wrongful disclosure of customer data and provide secure access to critical business applications. Protect trade secrets and intellectual property. Close the security gap of perimeter security while allowing users to collaborate effectively. Protect and monitor your business-critical document such as intellectual property and product design, wherever it lives or travels, across devices, apps, cloud services, and on-premises. SkyDRM uses digital rights management and dynamic authorization technology to protect files and enable secure sharing. Protection stays with the document, regardless of where it’s stored or who it’s shared with: inside or outside your network, on file servers, or in the cloud. Determine whether your file can be accessed, viewed, edited, printed, or shared.
  • 23
    Irdeto Keystone
    Protect your revenue, create new offerings and fight cybercrime. The World Leader In Digital Platform Security. Irdeto protects platforms and applications for video entertainment, video games, connected transport, connected health and IoT connected industries. Over 6 billion devices and applications secured. 50+ years experience in digital security Inventors and key patent holders of whitebox cryptography. Close to 1000 experts in 15+ offices around the globe. Helping video entertainment customers to protect their revenue, create new offerings and fight cybercrime. 600m+ streams secured monthly. 400+ operators protected. 40m+ software CA client devices protected. Number 1 in Video Games protection. Connected Industries. World-leading software security that protects devices and applications against tampering, hacking and IP theft. 50m transactions protected per day. Early leader in connected vehicle security.
  • 24
    Digital.ai Application Protection
    Our proprietary protection capabilities shield apps from reverse engineering, tampering, API exploits, and other attacks that can put your business, your customers, and your bottom line at risk. Obfuscates source code, inserts honeypots, and implements other deceptive code patterns to deter and confuse threat actors. Triggers defensive measures automatically if suspicious activity is detected, including app shutdown, user sandbox, or code self-repair. Injects essential app code protections and threat detection sensors into CI/CD cycle after code development, without disrupting the DevOps process. Encrypts static or dynamic keys and data embedded or contained within app code. Protects sensitive data at rest within an app or in transit between the app and server. Supports all major cryptographic algorithms and modes with FIPS 140-2 certification.
  • 25
    Symantec Secure Access Service Edge (SASE)
    SASE is a vision of converged technologies to improve network performance and security for users who can be anywhere, use any device, and need access to content and applications from corporate data centers and cloud platforms. Symantec can help you achieve all of the benefits of digital transformation and SASE through low-latency cloud and internet access, as well as a complete range of integrated best-in-class network security capabilities. Get advanced, cloud-delivered network security service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 26
    ARMO

    ARMO

    ARMO

    ARMO provides total security for in-house workloads and data. Our patent-pending technology prevents breaches and protects against security overhead regardless of your environment, cloud-native, hybrid, or legacy. ARMO protects every microservice and protects it uniquely. We do this by creating a cryptographic code DNA-based workload identity, analyzing each application’s unique code signature, to deliver an individualized and secure identity to every workload instance. To prevent hacking, we establish and maintain trusted security anchors in the protected software memory throughout the application execution lifecycle. Stealth coding-based technology blocks all attempts at reverse engineering of the protection code and ensures comprehensive protection of secrets and encryption keys while in-use. Our keys are never exposed and thus cannot be stolen.
  • 27
    Intertrust ExpresssPlay
    Content protection and anti-piracy services for premium and high-value OTT streaming and broadcast delivery. Cloud-based multi-DRM content protection and media monetization service for video streamers and content distributors. Cloud-based broadcast TV security solution, enabling direct-to-TV broadcasting to smart TVs without STBs/CAMs, reducing CAPEX/OPEX. Comprehensive anti-piracy services featuring digital fingerprinting, forensic watermarking, web monitoring and piracy take-down. The emergence of streaming as a crucial component of pay-TV business models has spawned unprecedented online piracy. Reversing this worrisome trend requires a new, innovative approach that goes well beyond legacy security platforms optimized for traditional broadcasting and streaming services. To ensure robust content protection in this new era, Intertrust offers the ExpressPlay Media Security Suite, comprising cloud-based multi-DRM service, anti-piracy and forensic watermarking services, and more.
  • 28
    Azure Content Protection
    Setting up and configuring a DRM license server in your system can be complicated. Azure Content Protection lets you set up major DRM license delivery (Microsoft PlayReady, Widevine, and FairPlay Streaming) in minutes. You define what type of licenses you want and we handle the infrastructure, security, and scalability. Azure Media Services gives you on-the-fly encryption for video on demand (VOD) and live streams. It’s also more cost-effective than traditional static encryption and packaging, because Media Services stores only one copy of standard multiple-bitrate MP4s and employs dynamic encryption. If your content key is ever compromised, simply call our APIs to change the key instead of re-encrypting your entire library.
  • 29
    Vitrium Security

    Vitrium Security

    Vitrium Systems

    A robust, yet easy to use content security and enterprise digital rights management software. Get started today with our cloud-hosted subscription service or contact our team to learn how you can implement in your business as part of your overall content strategy or workflow process. Protect all your video, document, and image content files for secured and controlled distribution with Vitrium’s Enterprise Content Security Software. Enjoy one of the highest levels of encryption while still offering seamless access for your customers and gain incredible insight with detailed, analytics reports. Your customers (clients, students or employees) do not require any apps or plug-ins to view their secured content and they can access the content from any device at anytime.
    Starting Price: $300.00/month
  • 30
    Fasoo Enterprise DRM
    Fasoo Enterprise DRM (Fasoo EDRM) is the most advanced data security solution hosted in AWS by our team of experts. The solution protects, controls, and tracks sensitive documents at rest, in transit, and in use persistently on any device at any time throughout the entire document lifecycle. By encrypting files and adding granular controls, you can limit editing, printing, and sharing sensitive content with unauthorized users both inside and outside your organization. Fasoo EDRM plays a crucial role in building a Data Security Platform (DSP) by managing insider threats, preventing data breaches, and offering the highest level of protection for unstructured data.
  • 31
    NextLabs Enterprise Digital Rights Management
    NextLabs Enterprise Digital Rights Management (EDRM) is designed to protect data as it moves and is shared across today’s extended enterprise. With NextLabs, any file type can be protected and accessed from any device to ensure secure collaboration. Users can access protected files through a web browser, mobile clients, or their native applications. The solution can easily adapt to dynamic business situations and support ad hoc data sharing, while still allowing the organization to maintain centralized visibility and control of data-sharing policies. NextLabs also provides comprehensive auditing and reporting capabilities to satisfy compliance requirements. NextLabs EDRM is available on-premises or in the cloud (SkyDRM), where both can work together to enable secure collaboration between partners, vendors, customers, and multi-tier supply chains.
  • 32
    Locklizard Safeguard PDF Security
    Locklizard protects PDF files and other digital documents from piracy, leakage and misuse. We stop unuauthorized access to documents and control how authorized users can use them. Stop theft of confidential and sensitive information, intellectual property, trade secrets, training courses, reports, ebooks, etc. Share and sell documents securely, stop data leakage and enforce compliance. Lock documents to devices and locations, dynamically watermark content, control expiry, stop printing, editing, copying and screen grabbing, and revoke access at any time. Track how your documents are being used. Locklizard uses strong US Gov strength encryption, DRM and licensing controls to ensure your documents remain fully protected at all times regardless of their location.
    Starting Price: $500.00/month
  • 33
    FilmTrack

    FilmTrack

    FilmTrack

    FilmTrack offers a cloud-based platform that streamlines and automates the complex tasks associated with managing and monetizing entertainment content libraries. FilmTrack provides a set of robust yet intuitive tools to track and manage entertainment Rights, Royalties, Participations, Availabilities, Contracts, Brand Licensing, and the most complex Financials all in one unified, seamless platform. With over 20 years of service to the entertainment industry, FilmTrack provides valuable solutions to companies ranging from just a few employees on up to major film studios and television networks. And as an affiliate of one of the most trusted banks in the world, City National Bank, FilmTrack is required to adhere to the most rigorous bank-level security standards, a level of security unmatched in the industry.
  • 34
    Fasoo Smart Screen
    Fasoo Smart Screen (FSS) is an advanced security solution designed to protect sensitive information displayed on computer screens. The solution displays visible dynamic watermarks, containing detailed user-specific information, discouraging users to take a photo with their smart devices. Fasoo Smart Screen also blocks unauthorized screen capture attempts from specific website URLs and applications, to secure confidential data from malicious users. In addition, Fasoo Smart Screen tracks all screen capture attempts, including an image of what was captured, providing detailed insights and audit trails for organizations.
  • 35
    Trend Micro Deep Security
    Get streamlined with a complete set of workload security capabilities and protect your cloud-native applications, platforms, and data in any environment with a single agent. Thanks to our strong API integration with Azure and AWS, Deep Security works seamlessly in the cloud. Protect your sensitive enterprise workloads without the need to set up and maintain your own security infrastructure. Accelerate and maintain compliance for your hybrid and multi-cloud environments. Although AWS and Azure have many compliance certifications, you are still responsible for securing the workloads you put in the cloud. Secure servers across the data center and cloud with a single security product. Remove the need to worry about product updates, hosting, or database management. Quick Start AWS CloudFormation templates available for NIST and AWS Marketplace. Host-based security controls that can be deployed automatically, even while auto-scaling.
  • 36
    Perygee

    Perygee

    Perygee

    Imagine every important detail about your assets from location to lifecycle status to vulnerabilities is at your fingertips, in one place. It’s normalized and ready for you to take action. That’s your future with Perygee. The Perygraph is the data engine that powers the Perygee platform. Unlike other security solutions, the Perygraph is 100% customizable and it combines private and open data to enrich your asset inventory. 78% of organizations use more than 50 cybersecurity products. And still many rely on spreadsheets to keep track of non-security information like OT owner and device location. With Perygee’s import tool, you can bring together and normalize all your device, security, and organizational data in just a few clicks. You don’t have to sacrifice convenience for security. Protecting cyber-physical devices requires an understanding of the people and processes that manage their day-to-day operations.
  • 37
    CUJO AI

    CUJO AI

    CUJO AI

    CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses. CUJO AI brings to fixed network, mobile and public Wi-Fi operators around the world a complete portfolio of products to provide end users with a seamlessly integrated suite of Digital Life Protection services while improving their own network monitoring, intelligence and protection capabilities. Leveraging artificial intelligence and advanced data access technologies, unprecedented visibility and actionable insight are provided for end-user networks by inventorying connected devices, analyzing applications and services in use, and detecting security and privacy threats. Artificial intelligence and real-time network data combine, working together to create smarter and safer environments for people and all their connected devices.
  • 38
    Cradlepoint NetCloud Service
    Cradlepoint is a global leader in cloud-delivered 4G and 5G wireless network edge solutions. Cradlepoint’s NetCloud™ platform and cellular routers deliver a pervasive, secure, and software-defined Wireless WAN edge to connect people, places, and things – anywhere. More than 25,000 businesses and government agencies around the world, including many Global 2000 organizations and top public sector agencies, rely on Cradlepoint to keep mission-critical sites, points of commerce, field forces, vehicles, and IoT devices always connected. Cradlepoint was founded in 2006, acquired by Ericsson in 2020, and operates today as a standalone subsidiary within Ericsson’s Business Area Technologies and New Businesses. Cradlepoint is headquartered in Boise, Idaho, with development centers in Silicon Valley and India and international offices in the UK and Australia.
  • 39
    Plume

    Plume

    Plume Design

    Where traditional routers, mesh WiFi systems, and WiFi extenders fail is in their quest for one-size-fits-all WiFi speed in an ever-changing environment. We created HomePass to support every facet of the home network, optimizing in lock-step with life’s changes. At the core of the holistic system is the best, most consistent WiFi connection enabled by adaptive, cloud-controlled technology. You also get intuitive management of people and device access, state-of-the-art security powered by AI, data visibility and protection, WiFi motion sensing, and whatever services we dream up next. Elevate your subscribers’ experience with HomePass— a dynamic Smart Home Services suite that constantly optimizes, adapts, and adds features for the connected home. Understand the dynamics of your subscriber base with Harvest. Detect patterns, glean insights, and take action in ways never before possible.
  • 40
    Primetime DRM
    Adobe Primetime DRM is an UltraViolet approved content protection platform for premium video. Adobe Primetime DRM can protect content and enable flexible business models such as anonymous, subscription, rental, and download-to-own content for desktop (Windows, Mac), iOS, Android, Roku, Xbox and embedded device platforms. Account means a billing account for the customer’s multi-channel and on-demand video delivery service. Active Device means a device that is counted the first time a unique user starts to view customer content via a customer player on a device.
  • 41
    DRM-X

    DRM-X

    Haihaisoft

    DRM-X 4.0 content protection platform, with new security architecture and more advanced security features. You can securely distribute protected Audio/Video, PDF, Web pages, Images and Javascript to Windows, Mac, iPhone/iPad and Android. With DRM-X 4.0 protection, you can get rid of the problem that you cannot effectively deliver and sell these contents due to piracy. DRM-X, Haihaisoft's digital rights management platform. Haihaisoft provides DRM as a service. The copy protection platform includes: File Encryption, Audio/Video Encryption, PDF Encryption, and Web Page (HTML DRM Encryption), all of them with DRM-X 4.0 advanced DRM features, and you can manage users, groups, rights and license profiles online in your DRM-X account. DRM-X 4.0 is a new generation DRM software platform based-on Xvast browser. It with new security architecture, support online/offline playback, improved user experience. DRM-X provides dynamic watermarking capabilities on protected digital content.
  • 42
    Vaultize DRM

    Vaultize DRM

    Vaultize Technologies

    Achieve security and governance of files throughout their lifecycles, inside and outside your network. Vaultize enables your team to store, access and share files securely & easily and, you to protect & manage them, with digital rights management (DRM), secure file sharing and continuous data protection. The Vaultize platform is designed to protect enterprise data end-to-end - from external or internal threats, from accidental or intentional data leakage and, exposure. Vaultize offers secure and user-friendly solutions that enable teams to store and share files easily via any kind of device while giving IT and auditors complete visibility and control over those files. DRM protection - give and revoke access rights (view, edit, print, share, copy/paste & more). Powerful sharing controls at admin and user level. Full control of who, where, when, how & more.
    Starting Price: $5,000 one-time payment
  • 43
    PlayReady

    PlayReady

    Microsoft

    Microsoft is committed to working with companies across the content delivery spectrum to ensure that consumers can access premium content inside or outside the home regardless of the device or service they choose. CBC-S support in software clients! Run PlayReady Server on Linux with full Async performance boost! Plus, many more improvements. Addresses content owners' full 1080p, 4K and higher resolutions, as well as early window content protection requirements. In an effort to accelerate the adoption of PlayReady and HTML5 EME on devices such as mobile phones, set-top boxes and smart TVs, Microsoft will provide a standard set of tools for integrating PlayReady into next-generation browsers on those devices. These tools will shorten development times and reduce complexity for ecosystem partners while enabling service providers to offer premium video directly through a viewer’s browser without requiring plug-ins.
  • 44
    Vera

    Vera

    Fortra

    Your data will travel. Shouldn’t your security? Vera is powerful digital rights management software for ultimate data protection. Prevent costly intellectual property exposure and data breaches. Our leading digital rights management solution protects crown jewels, from design files to investor reports, everywhere they go. In today’s highly collaborative, cloud-based and mobile-centric work environment, Vera provides simple, flexible, transparent data security, enabling businesses of all sizes to protect any file, on any device, anywhere it travels. Automatically secure your sensitive data as it's shared internally, or externally with suppliers, partners and customers. Track every successful and unsuccessful access to sensitive data. Mitigate compliance risk with a full audit trail. Revoke access to sensitive data kept internally or externally at any point.
  • 45
    myBlogs

    myBlogs

    Toroblocks

    Creating your blog is not an easy task. It takes time, energy and resources. Why let others monetize from it? It's your intellectual property and you are entitled to copyright protection. myBlogs automatically protects your blog’s content in real time using the powerful technology of blockchain by CopyrightsWorld. Just create your Toroblocks account and connect it with your blogs. Within 24 hours, we’ll send your certificate of ownership to your email. Monitor for sharks (and people) stealing your content. Our monitoring system finds exact duplicates but also plagiarism of your blog posts. Taking down stolen content has never been easier. myBlogs provides you with the tools you need to send takedown notices with a click of a button. With 99% success rate, we are confident that this will work for you too. And of course, in case you want to move forward with legal action, our support and legal team is always here to help you!
    Starting Price: €2.99 per month
  • 46
    Kleptofinder

    Kleptofinder

    Kleptofinder

    Kleptofinder is a tool that helps you protect your pictures/images from people that use them without permission. It searches them online and shows you exactly what websites and social media profiles use them. To put it simply, it's a tool that scours the internet, finds pictures and remembers them. Unlike other tools Kleptofinder does not require you to upload any images manually. Simply paste your website or link your Instagram account, select the security pack that suits your needs and and let our AI do a magic. You will be presented with a list of websites where your pictures are republished, all with a single click of a button. Kleptofinder is an Artificial Intelligence tool, made for a single purpose of finding NFTs or pictures stolen from YOUR website or Instagram account. It’s a unique piece of software, requiring NO manual uploads, NO risk of privacy loss and NO time wasted.
    Starting Price: $10 for 100 credits
  • 47
    StarForce ProActive

    StarForce ProActive

    StarForce Technologies

    This reliable solution for software protection and licensing is designed to protect games and other end user software against illegal distribution and pirate use, commercial replication and private copying, reverse engineering and cracking. It has fully functional DRM and Steam integration. Advanced software license management to control breach of software license (expiration time, number of activations, etc.). Protection from running the applications under debuggers (the feature works for both user and system levels). Protection from running the applications through remote terminal sessions (protection from remote access). Protection from running the applications on virtual machines (adjustable parameter).
  • 48
    EditionGuard

    EditionGuard

    Kodelite

    EditionGuard enables you to securely automate eBook fulfillment after an online purchase and control how your eBook content is shared. Upload an eBook or use one of our example ebooks to see for yourself how fast and easy eBook DRM can be. We support EPUB, MOBI, and PDF files. Select a DRM and choose your setting, such as limiting reading to a single device or restricting printing or copying text. We offer Adobe DRM, Readium LCP and a number of social DRM solutions. EditionGuard provides you a storefront complete with secure payment and eBook delivery for every eBook or PDF you upload. Setup in just a few minutes, customize your URL and have sales directly deposited to your bank account. You can also connect to your website with our plugins. EditionGuard provides beautiful activity monitoring for you to keep track of downloads and fulfillment across your catalog.
    Starting Price: $120 per month
  • 49
    CENTRI Protected Sessions

    CENTRI Protected Sessions

    CENTRI Technology

    Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.
  • 50
    Verizon IoT Security Credentialing
    Stay productive and protected with application and device security services that include data encryption and trusted user authentication components. Your internet of things ecosystem is teeming with intelligent endpoints. Unfortunately, those endpoints can expose your enterprise data. But it’s possible to stay productive and protected with our Internet of Things Security Credentialing. Our IoT Security Credentialing platform provides flexible tools and services for a comprehensive approach to maintain the security of your IoT apps and devices. We offer three layers of protection, with an over-the-top layer of security for devices and apps, data encryption and trusted user and device authentication. Our IoT security solutions run on America’s largest, most reliable 4G LTE network, with insights gained from more than a dozen years analyzing over 200,000 security incidents around the globe.