Alternatives to Vigilance

Compare Vigilance alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Vigilance in 2026. Compare features, ratings, user reviews, pricing, and more from Vigilance competitors and alternatives in order to make an informed decision for your business.

  • 1
    VIGIL

    VIGIL

    Reliable IT Services

    Vigil Point of Sales software is the best accounting retail point of sale system and is easy to configure, user-friendly, has good inventory management, strong reporting tools, and has excellent ease of use. It provides capabilities such as scanning and printing barcodes, making a purchase order/sale order or printing a receipt, connecting a receipt printer, barcode scanner, cash drawer, connecting customer display, etc. Vigil point of sale (POS) software can provide different ways to calculate profit. It has support to determine best-selling items and categories, View complete sales history, and Export sales data to spreadsheets. Vigil POS tracks sales by employee and determines the best performers. Vigil Point of Sales (POS) software works as the best accounting and inventory software in the UAE for vat operations. It’s actually quite simple and best for medium-scale businesses in UAE.
  • 2
    IQVIA Vigilance Platform
    IQVIA Vigilance Platform is an integrated, comprehensive platform built to simplify safety and pharmacovigilance processes while boosting speed, accuracy, and efficiency. Delivered in our secure SaaS environment, using proprietary artificial intelligence, machine learning, and natural language processing algorithms, Vigilance Platform delivers insights that improve compliance, and product safety, and add value to your product development process. The platform covers every aspect of pharmacovigilance processes, capturing cases from patients through case processing, case submission to all authorities, and all case types. An intuitive interface makes IQVIA Vigilance Platform easy to use for affiliates, case processing teams, and signal detection teams. A transformational approach to pharmacovigilance improves compliance so you can focus on delivering safer, more effective drugs and devices faster.
  • 3
    SafetyEasy

    SafetyEasy

    AB Cube

    Efficient drug safety operations with the technological expertise of industry veterans begins here. Align international pharmacovigilance operations teams with an intuitive, unified, cloud-based safety system trusted by industry leaders. SafetyEasy® Suite is a multivigilance management solution which integrates automation with existing drug safety processes. Growing biotechnology firms trust individual vigilances provided by AB Cube for their safety regulatory processes. Life sciences organisations manage adverse event reporting and stay compliant with the latest regulations with SafetyEasy® Suite. SafetyEasy® Suite is AB Cube’s all-in-one ecosystem for automated multivigilance management. Built to make safety simple, scalable, and smart. Designed for organizations of all sizes, it’s a modular, cloud-based platform that automates every step of the vigilance process, from early stage data capture to regulatory reporting and advanced analytics. Flexible and compliant by design,
  • 4
    Vigil

    Vigil

    HEIRLOOM

    ​Vigil is a comprehensive mobile application designed to discreetly record videos and audio in the background, even when the phone is locked or other apps are in use. Key features include the ability to record with either the front or back camera, support for various video orientations, and options to enable or disable preview screens. Users can record during phone calls, and the app ensures recordings are free from camera shutter sounds. Vigil offers unlimited video and audio recording durations, automatic white balancing, and customizable settings for camera, audio source, and video quality. The app also includes an "auto stop" feature when device storage is low, supports multiple video resolutions based on device capabilities, and provides easy access to recorded files within a user-friendly interface.​
    Starting Price: $0.99/month/user
  • 5
    Appian Workforce Safety

    Appian Workforce Safety

    Appian Corporation

    Every aspect of Appian is architected for simplicity – from our intuitive end user experience, to our productive low-code design environment, to our fully managed cloud. Appian can be learned in days and mastered in weeks. Appian requires far less full-time employee (FTE) support than other vendors, with Appian Cloud eliminating maintenance and upgrade support entirely. Smart automation for a safe return and ongoing vigilance, including with vaccination insights. Appian Workforce Safety is the only solution with a unified, automated, and flexible approach for safely returning to onsite work. Confidently respond to positive cases and changing regulations—without burdening IT. A flexible approach and visibility into employee health data keeps you vigilant beyond the pandemic.
  • 6
    Timesys Vigiles

    Timesys Vigiles

    Timesys Corporation

    The timesys vigiles vulnerability management suite is a best-in-class Software Composition Analysis (sca) and vulnerability management solution optimized for embedded systems built on top of the linux operating system. Vigiles will reveal your exposure for every product and software release, and provide clear engineering guidance on how to remediate vulnerabilities. Now your customers can receive software updates sooner and stay secure throughout the lifecycle. Automatically monitors thousands of reported vulnerabilities and provides unique targeted vulnerability detection for your specific product components, including alerts of new vulnerabilities, summaries of severities and status, and on-demand reports for your projects. Gives you all of the Free version’s vulnerability monitoring features along with powerful vulnerability analysis, triage, and collaboration tools, to enable your team to rapidly prioritize, assess and mitigate security issues.
  • 7
    SkyLync

    SkyLync

    GuideSTAR Technologies

    SkyLync™ : Executes a comprehensive, intelligent federated search for information across commercial, government and web databases, uncovering hidden associations and threats. Vigilance™ : Quick, inexpensive, counter-fraud enterprise solution for worker’s compensation, general liability, and fraud.
  • 8
    BlockVigil

    BlockVigil

    BlockVigil

    Designed for entrepreneurial software developers, BlockVigil is the ultimate developer tool to build and scale blockchain apps with just a few lines of code. We allow you to build full-stack apps on blockchain, without learning protocol specifics. Smart contracts are quickly deployed through our system and the resulting API is instantly available to start testing. Use webhooks and WebSockets to integrate with third-party services in real-time with minimal technical effort. Our docs cater to every developer, all the way from beginners to advanced. We also provide examples to build upon. Use webhooks, WebSockets and Zapier to execute powerful off-chain and real-world workflows. BlockVigil's API gateway makes it super easy to build your blockchain apps, so you can quickly build and scale with just a few lines of code, from web developers to app developers.
  • 9
    PeriWatch Vigilance
    PeriWatch Vigilance is an automated maternal-fetal early warning system designed to enhance clinical efficiency, standardize care, and facilitate timely interventions during labor and delivery. As the only AI-based electronic fetal monitoring analysis tool commercially available in the United States, it continuously analyzes streaming data, notifying clinicians when maternal vital signs, fetal heart rate, or labor progress exceed safety limits set by the hospital. The system consolidates critical data into a single view for individual patients, allowing clinicians to quickly assess if conditions are worsening. Additionally, a hub view provides a live, interactive listing of multiple patients across one or more sites, with color-coded notifications for quick attention. PeriWatch Vigilance integrates seamlessly with existing EFM systems and electronic medical records using ADT/HL7 interfacing, avoiding the need for costly software replacements.
  • 10
    ARIADNEXT

    ARIADNEXT

    ARIADNEXT

    Finance is considered as one of the industries most exposed to the direct impact of new technologies. The digital transformation thus created new needs, new opportunities and new stakeholders: Fintech companies. Contraction of finance and technology, the term Fintech has emerged since 2015 to illustrate the arrival of new technologies in the finance sector. Specialists in payment, credit, money transfer, savings management and account aggregation, Fintechs offer their clients ever more innovative platforms and shake up the codes of the financial sector. As fairly young start-ups, they use digital, artificial intelligence, mobile and connected technologies to reach a large number of B to B and B to C consumers. Just like traditional players in the financial sector, Fintechs remain subject to vigilance measures and numerous regulations related to customer knowledge.
  • 11
    Neysa Aegis
    From thwarting model poisoning to preserving data integrity, Aegis ensures that your AI models are shielded by default, empowering you to deploy your AI/ML projects in the cloud or on-premise, confident that your security posture is protecting you against an evolving threat landscape. Unsecured AI/ML tools broaden attack surfaces, amplifying enterprise vulnerability to security breaches without vigilant oversight by security teams. Suboptimal AI/ML security posture risks data breaches, downtime, profit losses, reputational damage, and credential theft. Vulnerable AI/ML frameworks jeopardize data science initiatives, risking breaches, intellectual property theft, supply chain attacks, and data manipulation. Aegis uses an ensemble of specialized tools and AI models to analyse data from your AI/ML landscape, as well as external data sources.
  • 12
    WebWatch

    WebWatch

    Damian Troncoso

    WebWatch provides vigilant, periodic checks for updates to your favorite websites right on your device. What makes it even more unique is its ability to operate seamlessly, even when the application is in the background. When a change on a monitored website is detected, you will receive a prompt notification. The brilliance of WebWatch is its ability to differentiate between trivial and significant updates. This means you can customize your preferences to receive notifications only when specific, relevant parts of the website undergo changes. WebWatch makes efficient use of iOS's background app refresh functionality, handing off the task of periodic checking to the system. Due to this intelligent integration, the frequency of refresh intervals may vary based on your device and its settings.
  • 13
    Blissfully

    Blissfully

    Blissfully Tech

    Manage all your technology assets and workflows in one comprehensive IT platform. Hundreds of companies across industries manage their IT with Blissfully, including tons of top tech companies. SaaS Management and SO much more. Blissfully helped create and still leads the SaaS management category, though we see it as a part of a broader IT platform. Blissfully brings together traditionally disparate data and systems into one comprehensive IT platform. Earning and maintaining our customers' trust is our top priority. We invest heavily in policies and controls, technical security, and a culture of vigilance. Create and maintain a single source of truth for technology. Define and execute consistent IT processes. Engage and empower everyone in your organization. Build and ensure confidence through consistent execution.
  • 14
    Vigilant FaceSearch

    Vigilant FaceSearch

    Motorola Solutions

    Analyze over 350 vectors of a suspect’s facial image and take a responsible, policy-based approach to facial recognition-based identification to generate immediate leads from matches to a highly controlled booking image gallery. Pinpoint persons of interest faster with facial cataloging and alerting. Transform license plate data into promising leads that close cases. Solve more crime by uncovering actionable insights within your data. Crowd-sourcing the identity of a wanted suspect is time-consuming. Vigilant FaceSearch analyzes over 350 facial vectors of a suspect’s face to generate immediate leads using a booking image gallery sourced from your department, partner agencies and our own exclusive database - providing a responsible, policy-based approach to facial recognition-based identification. When it comes to facial recognition, precision matters.
  • 15
    Cegid Conciliator
    Automate your firm's accounting production and eliminate routine accounting entry tasks. Cegid offers a 12 or 36 month subscription for firms that have successfully completed their transformation and wish to make a long-term commitment at a better price. Accelerate the collection of documents and simplify the life of your customers. Cegid Conciliator instantly captures documents by mobile application, filing on a secure Web space, e-mail, scanner at your clients' premises, or in bulk at the firm. Automate filing, cutting and merging of documents. Cegid Conciliator eliminates tedious tasks with a reliable and fully automated cutting, merging and grading process. Cegid Conciliator guarantees maximum reliability with more than 70 automatic control points for each invoice (VAT, consistency of quantities and amounts, etc.) without ever relaxing its vigilance. Cegid Conciliator relies on intelligent machine learning that takes into account the particularities of the chart of accounts used.
  • 16
    IDCheck.io

    IDCheck.io

    ARIADNEXT

    IDCheck.io is the solution to automatically and instantly verify a person’s identity remotely. With the explosion of the internet and online subscriptions, companies need to be increasingly vigilant in their customer onboarding processes. Fraud and identity theft are on the rise and present numerous risks for both companies and users. Our identity verification service verifies that the user who wishes to subscribe to a service is really who he/she claims to be. This provides you the necessary confidence to enter into a customer relationship, allows you to be in compliance with the various regulations related to your activity, all optimizing the customer experience of your users, who today are looking for seamless, instant and secure journeys. Achieve a high level of seurity by verifying ID documents and their holder. Fight documentary fraud and avoid identity theft. Meet the different regulatory requirements of your industry.
    Starting Price: €1.99 per document
  • 17
    AssetPro 360

    AssetPro 360

    Access Control Group

    As eCommerce continues to rise year-after-year, the supply chain industry has been forced to keep up with the increased demand and operational standards by expanding across multiple locations, increasing their overall asset count. Manual fleet management is no longer an option and more robust solutions are necessary to manage safety and compliance efforts. After recognizing this need and acknowledging that a web-based application was the solution to remotely managing assets, Access introduced the industry’s first digital fleet management system – Vigilant. Our clients guide the direction of our products. By understanding the core issues, we can be confident that our products serve as a true solution to real problems. At Access, we believe in building innovative, quality and multi-functional products that can ultimately save our clients time and money.
  • 18
    eyeDnow

    eyeDnow

    eyeDnow

    It’s becoming difficult to trust people for who they claim to be online. The eyeDnow digital verification process in real-time ensures the authenticity of the customers and reduces identity theft. Onboarding customers remotely is highly tedious and risky. Switch to an automated and secure verification process to help you reduce the customer onboarding time by 90%. Avoid theft and fraud with a vigilant and end-to-end encrypted call built for contactless digital onboarding. eyeDnow can also be integrated with custom work processes for a seamless experience. eyeDnow provides the utmost security with end-to-end encryption while performing visual identity verification. The comprehensive integration with security compliance also gives a full audit trail. eyeDnow leverages real-time identification during a virtual interaction. It pioneers advanced verification technology to match the real-time selfie with the provided government ID. It's fast, accurate and end-to-end encrypted.
    Starting Price: $150 per month
  • 19
    Cyberly

    Cyberly

    Cyberly

    Cyberly is a human-risk management platform designed to protect organizations by focusing on the people side of cybercrime. It offers realistic phishing and deep-fake simulations to train employees to spot suspicious behavior, such as verifying recruiter identities, challenging unsolicited software requests, and recognizing social-engineering triggers. The platform also includes an “AI teaching co-pilot” to engage teams through modern awareness training, replacing outdated, passive methods with interactive, scenario-based exercises. Through its simulations and insights, Cyberly helps organizations build a stronger security culture, reduce human-error risk, and elevate employee vigilance across phishing, identity fraud, and insider-threat vectors.
  • 20
    365 Community Engagement
    Build a stronger partnership with citizens & create safer communities together. Sometimes life and death situations depend on a vigilant citizen taking a picture of an incident or sending a tip to law enforcement. 365 Community Engagement tools enable everyday citizens to help their communities become safer by providing critical information to law enforcement anonymously, straight from their phones. The app immediately passes information from citizens to law enforcement to help agencies save lives and solve crime faster. Agencies can alert citizens of important crime and safety updates and request information to help solve crimes faster. Allow citizens to submit non-emergency incident reports directly from the safety and comfort of their homes. Easy-to-use online portal streamlines report submission and reduces paperwork. Report submissions sync with RMS for officer assignment and follow-up.
  • 21
    ThreatSign Website Anti Malware
    ThreatSign Web Protection: Your Digital Fortification Adaptive Intelligence: Dynamic algorithms learn from patterns, anticipate threats, and adapt. No static defenses—ThreatSign evolves with the threat landscape. Zero-Day Shielding: Proactively neutralize vulnerabilities before they strike. Sleep soundly knowing your assets are fortified. Advanced WAF: Impenetrable barrier filters malicious traffic without hindering user experience. Swift Incident Response: Minimal downtime, maximum peace of mind. Your business continuity is our priority. Customized Defense: Tailored to your unique needs, whether e-commerce or financial. Financial Sector Ready: Compliance, data protection, trust. 24/7 Vigilance: Real-time monitoring, expert support. Blocklist Resolution: We meticulously analyze the issue, identify the root cause, and work tirelessly to remove your site from blocklists like Google Safe Browsing and other authorities. Elevate your security. Defend your domain.
    Starting Price: $10 per month
  • 22
    DF Literature Monitor
    DF Literature Monitor is an advanced AI-powered solution designed to automate the monitoring of vast amounts of literature and optimize safety vigilance processes. It integrates with major global and local literature sources for simultaneous article retrieval, employing semantic search to identify relevant articles efficiently. The platform features automatic de-duplication, extraction of minimum safety information, and auto-population of safety case forms, which can be submitted to safety databases in E2B or Excel/PDF formats with a single click. Additionally, it offers automated translation of abstracts and full articles into English. DF Literature Monitor includes configurable workflows to facilitate collaboration and quality control among pharmacovigilance teams. By leveraging this solution, teams can save up to 60% or more time and effort in the literature monitoring process while ensuring quality and compliance.
  • 23
    MetaPhish

    MetaPhish

    MetaCompliance

    MetaPhish is a phishing simulation software that allows the administrator to orchestrate phishing simulations and ransomware attacks to directly target their staff and management. Ultimately, this will keep staff safe from phishing scams through automated training that increases their vigilance and identifies the need for additional cyber awareness training. Choose from an extensive range of regularly updated phishing templates. Templates are based on current phishing threats which imitate reputable websites and brands. The templates can be matched with relevant domain names that improve the ease of use within your organization’s network. The templates are all fully customizable and can be adapted to suit specific business sectors. Phishing emails can be created from the ground up using our in-house design team and the extensive range of templates are available in 12 different languages.
  • 24
    ReconMore

    ReconMore

    ReconMore

    ReconMore is our authoritative service which can effectively improve your IT’s security level. In areas where Pen Testers didn’t fins security susceptibility our service can show mistakes in just 24 hours from the launch of the application. ReconMore will detect present security irregularities, as well as handle any future discrepancies which could appear. We produce unique software which especially effective in providing cybersecurity, utilizing automatic reconnaissance for security irregularity detection. We effectively analyze (in real time) resources to detect security inconsistencies. We are always vigilant, looking out for already existing security’s errors and the ones which might appear in the future – in the server infrastructure and in the software.
  • 25
    Keysight Application Threat Intelligence
    Fortune magazine reports that security issues are among the top three concerns of leaders around the world today. Understandably, when Ponemon Research finds that the average malicious hack takes an astonishing 256 days to discover (and pegs the average cost of a data breach at $4 million). The aim is clearly to get in front of these bad guys and, if attacked, quickly identify the issue and contain the damage. As new security threats surface every week, staying on top of today’s threat landscape is a full-time job, requiring constant vigilance and in-depth research. It is an expensive and time-consuming proposition, but no enterprise manager, government agency, or service provider wants to be caught unprepared. Our Application and Threat Intelligence (ATI) subscription service provides up-to-the-moment threat intelligence.
  • 26
    Inspectiv

    Inspectiv

    Inspectiv

    Identify complex security vulnerabilities and sensitive data exposures to reduce risk of security incidents and provide assurance to your customers. Bad actors are constantly finding new ways to compromise companies' systems, and new vulnerabilities are reintroduced every time a company pushes new code/product. Inspectiv's vigilant security researchers ensure your security testing evolves as the security landscape evolves. Fixing web and mobile application security vulnerabilities can be challenging, but the right guidance can help expedite remediation. Inspectiv simplifies the process of receiving and escalating vulnerability disclosures, and provides your team with clear, concise, and actionable vulnerability reports. Each vulnerability report demonstrates impact and provides clear remediation steps. Reports provide high level translation of risk to execs, detail to your engineers, and auditable references that integrate with ticketing systems.
  • 27
    TaskUs

    TaskUs

    TaskUs

    Safeguarding the online space with rigor and empathy. Online content is generated and shared at an exponential rate. With ever-present risks, companies need robust systems and vigilant human moderators to protect their users. Content security is a growing TaskUs service, and we are committed to creating the ideal online space. TaskUs is fully committed to becoming the industry’s number 1 content moderation provider and specialist – a goal that permeates every aspect of our services, our partnerships, and our unrelenting focus to keep the web safe for all. We created The TaskUs Method a comprehensive, global psychological health and safety program for content moderators, guided by the practice of evidence-based psychology and grounded in neuroscience. Content security is a fast-growing area of our business. We have 5,000+ dedicated Teammates powering some of the world’s leading brands in social media, FinTech, and gaming, among others.
  • 28
    SupplyPro

    SupplyPro

    Hyphen Solutions

    Designed specifically for suppliers, trades and contractors, SupplyPro is the digital backbone of the residential construction industry. With simple interfaces to manage and track jobs, orders and schedules for all your builder clients in one portal, it's easy to see why more than 14,500 suppliers collaborate with 90% of the national builders and hundreds of regional builders to build 1 out of every 3 homes in America. The complexity of completing a residential construction project goes well beyond getting the right materials and crafts to the site in a timely and accurate manner. Many details can change over just a few hours and where the builder maintains the information, the supplier must maintain vigil tracking of the work in progress and relay it to trades, sales and back-office personnel. SupplyPro interacts with Hyphen’s widely utilized BuildPro solution for builders to facilitate real-time communication between builders and contractors.
  • 29
    EquityMultiple

    EquityMultiple

    EquityMultiple

    Industry-leading underwriting, informed by decades of CRE experience and proprietary methodologies. A team of experts with over $75 billion of combined transaction experience, working for you. A rigorous multi-step due diligence and investment structuring process to help protect your interests. Vigilant asset management through the lifetime of each investment you make. Transparent reporting, investor services are dedicated to you. A constant focus on protecting your principal and maximizing your returns. Efficient, transparent, secure investing, tailored to your needs. An intuitive investing experience you can access anytime, anywhere. The simplicity of your online brokerage account, now for private-market real estate investments. Our dedicated investor relations team is standing by to help simplify your real estate investing process. Invest in high-yield, professionally managed real estate, starting with as little as $5K.
  • 30
    RCM Virtual Deal Rooms

    RCM Virtual Deal Rooms

    RealCapitalMarkets.com

    Whether you’re managing acquisitions, dispositions, asset portfolios, or the fundraising process, RCM’s Virtual Deal Rooms provide a secure way for commercial real estate professionals to share and store sensitive information online. Easily distribute confidential documents within your firm and across professional networks anytime, anywhere, and from any device, and do it all with the confidence of knowing your information is safe, secure, compliant and fully auditable with bank-grade security. Since 1999, Real Capital Markets has been the leading provider of virtual data room solutions for commercial real estate owners, brokers, lenders, equity partners, sevicers, asset managers, attorneys, title companies and others. RCM’s VDRs provide vigilant document protection for a variety of commercial real estate applications. Real Capital Markets is the global marketplace for buying & selling commercial real estate.
  • 31
    YOU Get It First

    YOU Get It First

    YOU Get It First

    YOU Get It First equips you and your organization with everything necessary to inform, guide, and safeguard your entire staff and for everybody who matters. At you get it first, we prioritize your safety and well-being through our comprehensive suite of services, including active shooter alert systems, tornado warning alerts, medical emergency reporting, and natural disaster response. We believe in the power of community and offer tools like see something say something, neighborhood watch, and anonymous tip to keep everyone informed and protected. Our commitment extends to workplace safety, addressing issues such as employee no-shows, workplace violence, sexual harassment, workplace hazards, and theft reporting. Plus, we stay vigilant against modern threats like cyber attacks and offer resources for worker's compensation prevention.
  • 32
    HTTPCS Cyber Vigilance
    HTTPCS solutions comparison vs the other automated tools on the cybersecurity market. The features of each HTTPCS solution have been compared to the features of alternative solutions available on the cybersecurity market. Click on a tab and discover HTTPCS, a complete alternative to other cybersecurity solutions. 4 tools have been compared to HTTPCS Cyber Vigilance, a darknet monitoring tool that warns you in real-time if your organization becomes the target of a cyberattack. 6 tools to scan and detect security breaches on websites have been compared to HTTPCS Security, the vulnerability scanner with a 0 false-positive guarantee. 4 web integrity monitoring products and viewing of changes have been compared to HTTPCS Integrity, a cybersecurity solution which detects malicious files, malware and internal errors. Request a demo or try a free 14-day trial for HTTPCS Integrity and see for yourself its features!
  • 33
    RADICL

    RADICL

    RADICL

    Protecting the fast-evolving IT infrastructure is a daunting task - particularly if you don’t have dedicated staff to focus on. We leverage best-in-class technology to protect your infrastructure and mobile perimeter from known threats. We leverage our deep-spectrum™ analytics to detect novel and deeply embedded threats. We are ready to respond 24/7 should an attack get through. Our platform never tires, our people are ever vigilant. Managed operation of best-in-breed endpoint protection technology to ensure most attacks are blocked and compromises are avoided. Leverages environmental visibility, machine analytics, and expert-driven hunting to detect novel attacks and deeply embedded threats. Around-the-clock monitoring and investigation into indicators of compromise ensure sophisticated attacks don't go unnoticed.
  • 34
    NexaSpy

    NexaSpy

    NexaSpy

    NexaSpy is a cutting-edge Android Spy App designed to empower parents and employers with comprehensive monitoring capabilities over Android devices. With a focus on ensuring the safety of children and enhancing workplace productivity, NexaSpy serves as a versatile mobile tracker app equipped with robust parental controls. Key Features: Android Spy App: NexaSpy provides discreet and effective monitoring of Android devices, offering insights into user activities without compromising privacy. Mobile Tracker App: As a reliable mobile tracker, NexaSpy enables users to keep a vigilant eye on the whereabouts of their loved ones or employees. Real-time location tracking provides peace of mind and enhances security. Parental Controls: NexaSpy prioritizes the well-being of children by offering advanced parental controls. Parents can monitor their child's digital activities, including app usage, internet browsing, and social media interactions, ensuring a safe online environment.
  • 35
    CoVigilAI

    CoVigilAI

    CoVigilAI

    CoVigilAI is an AI-enabled medical literature monitoring solution that employs advanced algorithms and data analytics to proactively detect and manage adverse drug events, ensuring patient safety and regulatory compliance in real time. The platform offers streamlined tracking of scientific and medical publications across prominent global literature databases such as PubMed and Embase, with customizable search strings facilitating an effortless pharmacovigilance literature monitoring journey. Periodic surveillance of scientific and medical literature databases and publications from diverse local journals is conducted, encompassing both global literature monitoring and localized literature surveillance. Advanced algorithms categorize Individual Case Safety Reports (ICSRs) into valid, potential, and invalid cases, while automated key entity detection efficiently recognizes crucial entities like patients, medications, adverse events, and designated medical events.
  • 36
    HealthyServers

    HealthyServers

    HealthyServers

    For every critical performance monitor, set multiple thresholds and get instant notifications for crossing thresholds. HealthyServers monitoring capabilities let you keep a vigilant eye on the abnormalities occurring within the server infrastructure on a real-time basis. You can even use different notification channels for different alert priorities. Healthyservers identify KPIs so you can create customized health cards showing the score for each server. Server Healthcard provides a transparent picture of comparative server health to the CXO level team. HealthyServers offer numerous analytical capabilities to measure, track and predict the server’s resource utilization and its performance trends. Our analytics include forecast reports based on machine learning algorithms to anticipate and predict your server utilization. HealthyServers presents relevant information in an intuitive dashboard and charts to help users take immediate action.
  • 37
    Hunto.ai

    Hunto.ai

    Hunto.ai

    Our approach offers complete life cycle protection from a broad range of external threats that are based on a three-phased approach of discovery, monitoring, and enforcement. Our team of experienced professionals uses cutting-edge algorithms and human augmented approach to discover and respond to threats aimed toward your organization with unmatched speed and accuracy. Utilizing neural networks and advanced algorithms, our experts proactively detect threats targeting your organization. Continuous monitoring ensures timely responses to potential risks. Integrating human expertise with technology, our security team accurately classifies incidents as safe or malicious, enhancing threat assessments. Discover, monitor, and enforce comprehensive protection against cyber threats with Hunto’s SaaS-based Digital Attack Surface Management (DASM) platform. Our dedicated SOC provides round-the-clock monitoring, ensuring constant vigilance against cyber threats for your organization.
  • 38
    Cyguru

    Cyguru

    Cyguru

    Cyguru offers an all-in-one proactive security solution, also featuring an open SOCaaS powered by an AI analyst for comprehensive threat detection and mitigation. Experience seamless security with our platform, offering both preventative and reactive measures in just a few clicks. We support Windows, Linux, Centos, and Syslogs, allowing you to monitor exactly what you need. Simply register, choose your monitoring preferences, and leverage our advanced ML and AI capabilities for an enhanced security experience. Our security operation center is the cornerstone of our service domain, yet we go beyond by offering a breadth of features unmatched in the market for both SMEs and large enterprises. Not only do we enhance product scalability, automation, and AI integration, but we also ensure it stands at the forefront of completeness and innovation. Our vigilant agents keep a constant watch on your infrastructure, operating systems, and services round the clock.
    Starting Price: €7.33 per month
  • 39
    Avast Secure Web Gateway
    Block web threats before they hit the network - secure your network traffic without additional proxy servers or on-premise appliances. Filter web traffic and keep unwanted malware away from networks. Secure Web Gateway is simple to deploy and manage across multiple locations, and can be set up in minutes. Devices are automatically directed to the nearest data center for lightning-fast connections from anywhere in the world. Our threat network is geographically dispersed with over 100 data centers, on five different continents, and draws from dozens of top threat feeds that act as vigilant security guards, observing, processing, and reporting on around 30 billion requests per day. When an uncategorized web address is accessed via Secure Web Gateway, the site gets inspected for threats and categorized into one of dozens of categories, resulting in constant updates to the whole security network.
  • 40
    ePROMIS FutureGen Enterprise Cloud
    Modernize several processes and operations to take your business to the next level. Leverage technology to implement several industry best practices and soar to newer heights. Intelligently designed technology helps you track business performance and gain vital insights into productivity across multiple sectors. Different modules work together in perfect harmony, making processes simpler and more efficient. ePROMIS also reduces manual workload by helping in automating menial and repetitive tasks. Provide resolutions quicker, improve output and gain results faster while improving accuracy, efficiency, and control. Better vigilance and control through multiple devices improve both convenience and flexibility. Share and receive real-time updates from anywhere, anytime you want. Improve collaboration, accountability, and transparency even with a distributed workforce. Access to an integrated database ensures that work is synchronized, communication is facile, and results are visible.
  • 41
    T.O.V.A.

    T.O.V.A.

    The TOVA Company

    The T.O.V.A. provides healthcare professionals with objective measurements of attention and inhibitory control. The visual T.O.V.A. aids in the assessment of, and evaluation of treatment for, attention deficits, including attention-deficit/hyperactivity disorder (ADHD). The auditory T.O.V.A. aids in the assessment of attention deficits, including ADHD. T.O.V.A. results should only be interpreted by qualified professionals. The T.O.V.A. is a culture- and language-free, sufficiently long computerized test that requires no left/right discrimination or sequencing. Responses to visual or auditory stimuli are recorded with a unique, highly accurate (±1 ms) microswitch. The T.O.V.A. calculates response time variability (consistency), response time (speed), commissions (impulsivity), and omissions (focus and vigilance). These calculations are then compared to a large age- and gender-matched normative sample, as well as to a sample population of individuals independently diagnosed with ADHD.
  • 42
    Hamilton Security

    Hamilton Security

    Hamilton Apps

    Hamilton Security offers you an efficient and intuitive digital solution for managing your security incidents tracking, so you can stay in control of your website. Upgrade the security of your building by equipping your security team with Hamilton Security. Your round teams and security safety agents benefit from a powerful 100% digital tool that optimizes their management, facilitates their collaboration, and reinforces their vigilance. Send automatic SMS or email notifications to your round teams. Share important information about an incident to support rapid decision-making, and always keep an eye on the progress of ongoing tasks. With real-time management, you stay in control of your business. Your round teams can track the progress of all incidents, from start to finish. Your managers can monitor the resolution of incidents by assigning specific or recurring tasks to their agents. The intelligent dashboard gives you a global view of your team's activity in real-time.
    Starting Price: €99 per site per month
  • 43
    Mission Cloud Secure
    Mission Cloud Secure is a SaaS application that delivers 24/7 security monitoring and incident response through a powerful combination of CrowdStrike's world-class security platform and Mission's AWS expertise. Protect your cloud resources, endpoints, and credentials while maintaining compliance and operational excellence. Mission Cloud’s team of CloudOps Engineers works directly with the CrowdStrike SOC to give you 24/7 managed detection and response. We alert you to incidents and help the SOC to respond with the runbooks we’ve co-developed. CrowdStrike’s analysts also operate a continuous threat detection engine and partner with other security experts from the public and private sectors to proactively protect your environment and manage threats. In today's landscape of sophisticated cyber threats, comprehensive security requires constant vigilance, specialized expertise, and the right tooling. Never worry about when or how a security incident occurs.
  • 44
    MaticVigil

    MaticVigil

    MaticVigil

    We allow you to build full-stack apps on Ethereum via Matic Network, without learning protocol specifics. Our docs cater to every developer, all the way from beginners to those already building apps via web3, and provide examples to build upon. Smart contracts are quickly deployed through our system and the resulting Open API spec along with webhook and WebSockets are instantly available to start testing. Supercharge and extend your blockchain apps with our integration services over Websockets, Webhooks, Zapier, Slack, IFTTT. The possibilities are endless. MaticVigil is an API gateway on top of the Matic-network EVM-compatible sidechain. It enables a developer to write code to interact with value transfers and transactions on Matic as if it were talking to just another web service REST API over HTTP. You can focus on coding "business logic" without worrying about the "protocol logic" behind the scenes.
  • 45
    Quantiply

    Quantiply

    Quantiply

    Quantiply fights financial crime by delivering a suite of fully automated artificial intelligence (AI) powered risk and compliance softwares that address Know Your Customer (KYC), and Anti-Money Laundering (AML). With Quantiply, financial institutions are able identify suspicious actors, interactions, and activities to address financial crime more successfully than ever before, so they are not only more efficient, but can mitigate risk against damage to reputation, client trust, and market share.
  • 46
    Nasdaq Verafin
    Nasdaq Verafin is a leading provider of anti-financial crime solutions that leverage consortium analytics and AI technology to detect and prevent various types of fraud. Their products cover payment fraud detection, check fraud, wire fraud, and AML (anti-money laundering) compliance. The platform integrates data from thousands of institutions and hundreds of sources across the cloud to analyze over 1.1 billion transactions each week. Nasdaq Verafin’s consortium approach enables deep insights, helping financial institutions reduce fraud losses, as demonstrated by a top 25 U.S. financial holding company that prevented $9.6 million in fraud within two months. The company also offers educational resources, webinars, and research reports to keep clients informed about evolving financial crime trends. With industry recognition such as the Chartis Risk Tech 100, Nasdaq Verafin remains a trusted leader in the fight against financial crime.
  • 47
    Chainalysis

    Chainalysis

    Chainalysis

    Chainalysis cryptocurrency investigation software helps law enforcement and financial institutions identify and stop bad actors who are using cryptocurrencies for illicit activity such as fraud, extortion, and money laundering. With an intuitive graphical interface, Chainalysis Reactor enables users to easily conduct in-depth investigations into the source and provenance of cryptocurrency transactions. With growing investment in cryptocurrencies, businesses without controls in place face regulatory action, reputational damage, or exclusion from the financial system. Businesses need an automated way to assess money laundering risk so they can meet regulatory requirements and maintain relationships with key stakeholders. Chainalysis KYT is the cryptocurrency transaction monitoring solution that meets this need. The intuitive interface has been designed with anti-money laundering (AML) compliance workflows in mind.
  • 48
    ACI Fraud Management for Banking
    Turn banking fraud detection and prevention into a competitive differentiator with a secure and seamless enterprise-wide fraud analytics solution. Financial institutions must stay ahead of fraudsters and the competition to retain customers and grow revenue. Bring the power of data science and AI into the hands of your fraud team. Deliver bank fraud detection and prevention across all digital channels and payments in combination with seamless payment experiences. Leverage transaction risk analysis and integrate with your access control server to successfully apply for exemptions. Maintain compliance with 3DS regulations for online and CNP transactions. Comply with Anti-Money Laundering (AML) regulations and manage watch list restrictions. Enterprise fraud prevention is essential to ensure customers are protected across all digital channels and payment types. Combat account takeover fraud and prevent financial crimes across all digital channels.
  • 49
    PATRIOT OFFICER

    PATRIOT OFFICER

    GlobalVision Systems

    PATRIOT OFFICER is endorsed by the American Bankers Association through its subsidiary, the Corporation for American Banking, LLC and other prestigious financial trade associations across the nation. PATRIOT OFFICER is the industry leading regulatory compliance and risk management solution for financial institutions of all sizes, integrating anti-money laundering, counter-terrorist financing, and anti-fraud capabilities all into a single streamlined system. PATRIOT OFFICER is fully compatible with your existing core processing system - delivering scalability and data accuracy while eliminating the need for costly third-party interface solutions. PATRIOT OFFICER exclusively uses the most advanced adaptive intelligence technology, empowering financial institutions to effectively comply with risk-based policy, procedure and process as required by the BSA/AML examination manual.
  • 50
    Simplici

    Simplici

    Simplici

    Create a frictionless customer experience, enhance operational efficiency and cut costs: The ultimate account origination, KYB/KYC verification, and funding solution. Reduce your compliance risk by implementing Simplici’s Compliance Fabric™ which combines strong KYC (Know Your Customer) and AML (Anti-Money Laundering) tools, giving you a complete compliance solution while drastically reducing fraud. Design branded ID verification flows for KYC/KYB in minutes with automated tasks boosting user conversion. Safeguard your business and clients from fraud by combining biometrics, device information, liveness checks, and relevant KYC data.
    Leader badge
    Starting Price: $4.99 per user per month