Alternatives to netarx

Compare netarx alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to netarx in 2026. Compare features, ratings, user reviews, pricing, and more from netarx competitors and alternatives in order to make an informed decision for your business.

  • 1
    Adaptive Security

    Adaptive Security

    Adaptive Security

    Adaptive Security is OpenAI’s investment for AI cyber threats. Founded in 2024, Adaptive raised $50M+ from investors like OpenAI and a16z, as well as executives at Google Cloud, Fidelity, Shopify, and more. Adaptive protects customers from deepfakes, vishing, smishing, and AI email phishing with its next-generation security awareness training and phishing simulations. Security teams prepare employees for advanced threats with highly customized training that is role-based, enriched with OSINT, and even features deepfakes of their own executives. Employees train on mobile or desktop and rate the content an incredible 4.9/5 on average. Customers measure the success of their training program with AI-powered phishing tests. Realistic deepfake, voice, SMS, and email tests track risk across every vector. Trusted by Figma, the Dallas Mavericks, BMC, and others, Adaptive boasts a world-class NPS of 94. Want to learn more? Take a self-guided tour at adaptivesecurity.com.
    Compare vs. netarx View Software
    Visit Website
  • 2
    Sumsub

    Sumsub

    Sumsub

    Sumsub is a full-cycle verification platform that secures every step of the user journey. With Sumsub’s customizable KYC, KYB, AML, Transaction Monitoring and Fraud Prevention solutions, you can orchestrate your verification process, welcome more customers worldwide, meet compliance requirements, reduce costs and protect your business. Sumsub achieves the highest conversion rates in the industry—91.64% in the US, 95.86% in the UK, and 97.89% in Hong Kong—while verifying users in less than 50 seconds on average. Sumsub’s methodology follows FATF recommendations, the international standard for AML/CTF rules and local regulatory requirements (FINMA, FCA, CySEC, MAS, BaFin). Sumsub has over 2,000 clients across the fintech, crypto, transportation, trading, e-commerce and gaming industries including Bitpanda, Wirex, Avis, Bybit, Huobi, Kaizen Gaming, and TransferGo.
    Compare vs. netarx View Software
    Visit Website
  • 3
    Oz Liveness

    Oz Liveness

    Oz Forensics

    Oz Liveness is a leading facial recognition and authentication software used by private and public organizations across the globe to lower the risk of biometric fraud by preventing deepfake and spoofing attacks with 100% accuracy. The technology has been validated by the industry’s most rigorous testing standard, ISO 30107-3 iBeta level 1 and 2 certifications. It helps organizations validate they are dealing with a real person within seconds, lowering compliance and fraud risks. Oz Liveness features advanced algorithms able to detect many forms of biometric spoofing, including 3D and 2D masks and photos along with photos or videos displayed on a mobile or a laptop screen. On-device Liveness detection and face biometry checks allow to use of a phone as a personal biometric device. No data is sent to the server from the device and stays in the customer's hands. On-device Liveness is perfect in any customer’s use case, improving the reachability and stability of the services .
    Leader badge
    Starting Price: $2,625/year/12,500 transaction
  • 4
    Aurigo Masterworks

    Aurigo Masterworks

    Aurigo Software Technologies

    Aurigo Masterworks Cloud Suite is an end-to-end capital program management solution for public agencies and facility owners. It connects planning, project delivery, and asset operations in one unified platform. Masterworks helps organizations prioritize capital investments, secure funding, and manage construction with consistency and control. Real-time reporting and AI-driven insights act as an early-warning system when projects begin to deviate from plan. The platform simplifies complex workflows across capital planning, federal aid reimbursement, and community engagement. Stakeholders gain shared visibility across offices, jobsites, and extended teams. Aurigo Masterworks enables agencies to plan with confidence and deliver projects with quality.
  • 5
    Reality Defender

    Reality Defender

    Reality Defender

    Reality Defender provides best-in-class detection against advanced threats posed by deepfakes and AI-generated disinformation. Our industry-leading solutions for enterprises, government, and institutional clients help protect against everything from advanced voice fraud in call centers to media verification in newsrooms. With repeated successes in combating financial fraud and defending governments, our clients trust Reality Defender to help detect deepfake-driven threats.
  • 6
    Clarity

    Clarity

    Clarity

    Scalable, real-time detection of deepfakes wherever and whenever they strike, for today and for the future. Deepfakes are a threat, unlike anything the world has seen before. They undermine our fundamental trust in society and each other, and they constantly change to evade detection. They are cheap, universal, and are in everybody's hands. They appear in all digital media, video, audio, and images and they can impersonate anyone. Detecting deepfakes requires sophisticated and ongoing research in Al and cyber. The best minds are collaborating with our experts to build the best technology globally. Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of generative AI. Its patent-pending technology detects AI manipulations in videos, images, and audio and authenticates media with encrypted watermarking.
  • 7
    DuckDuckGoose AI

    DuckDuckGoose AI

    DuckDuckGoose AI

    DuckDuckGoose is an enterprise deepfake detection platform designed to help organizations identify AI-generated or manipulated media. The technology detects deepfake images, videos, voices, and identity documents before they reach verification systems or decision engines. Built for identity, compliance, and digital risk teams, the platform integrates easily into existing systems through APIs and SDKs. DuckDuckGoose provides forensic-level analysis with explainable results, visual evidence, and detailed detection logs. Its detection engine is trained on diverse datasets to accurately flag synthetic media while maintaining a low false-positive rate. The platform supports multiple deployment options, including cloud, on-premise, and hybrid environments. By identifying manipulated content early, DuckDuckGoose helps organizations prevent fraud, protect digital identity systems, and maintain regulatory compliance.
  • 8
    Microblink

    Microblink

    Microblink

    Microblink is the world’s leading Adaptive Identity Platform, designed for the evolving challenges of AI-era identity verification and fraud prevention. The platform unifies ID document capture, biometric verification, payment card scanning, AML screening, and deepfake detection in one ecosystem. Powered by proprietary machine learning models, Microblink achieves 40% higher capture success rates and processes verifications in under three seconds. Its dynamic AI infrastructure adapts in real time to new fraud patterns, ensuring resilience against synthetic and deepfake-based attacks. Flexible deployment options—including API, SDK, and no-code interfaces—enable seamless integration across industries and geographies. With unmatched accuracy and adaptability, Microblink helps businesses build lasting digital trust across customer onboarding, authentication, and compliance workflows.
  • 9
    Deepware

    Deepware

    Deepware

    Deepfakes are going to be the first real punch from AI to humanity. The cybersecurity industry has a very short time to get ahead of deepfakes before they undermine the public’s trust in reality. Cybersecurity faces an emerging threat generally known as deepfakes. Malicious uses of AI-generated synthetic media, the most powerful cyber-weapon in history is just around the corner. We expect destructive use of deepfakes, particularly as phishing attacks, to materialize very soon. The main limitation is the lack of legitimate voice-swapping techniques, which is a much greater danger than face/head-swapping.
  • 10
    GetReal

    GetReal

    GetReal

    GetReal Security offers advanced, enterprise-grade content verification solutions to prevent deepfakes and impersonation attacks in real time across audio and video streams, as well as collaboration platforms. GetReal's multi-dimensional, layered defense approach includes content credentials analysis, pixel analysis, physical analysis, provenance analysis, semantic analysis, human signals analysis, biometric analysis, behavioral analysis, and environmental analysis to ensure comprehensive protection. Designed for seamless integration into existing collaboration and cybersecurity workflows, GetReal Security helps organizations maintain trust in digital communications by verifying the authenticity, origin, and integrity of content, effectively addressing the challenges posed by AI-generated deception and malicious digital media.
  • 11
    DeepFake Detector

    DeepFake Detector

    DeepFake Detector

    Deepfake videos and audio can be used to spread misinformation and deceive people. With our DeepFake Detector, you can confidently filter out AI-generated videos and audio and ensure authenticity in important situations like media reporting and legal proceedings. We understand the danger of deepfakes and the importance of authentic videos and audio. With our expert verification services, you can confidently filter out false videos and audio and ensure their authenticity. Choose a video or audio file that you want to verify for authenticity. For best results, we recommend choosing a video or audio file that is at least 8 seconds long and does not have any edits or special effects. After uploading your video or audio file, click the "detect deepfake" button to start the verification process. You will receive a result that shows the probability of the video or audio being either an AI-generated deepfake or a natural video or audio.
    Starting Price: $17.88 per month
  • 12
    AI or Not

    AI or Not

    AI or Not

    Detect AI-generated images & audio for your business and yourself, with AI or Not. Check for generative AI in seconds to reduce fraud rates and prevent the latest scam. Protect music copyright by detecting if an artist’s voice was used in AI-generated audio. Empower your trust and safety team with AI content detection. Identify deepfakes with accuracy and transparency. Safeguard identity verification and KYC compliance against AI-generated synthetic IDs. AI or Not is a web service that helps users quickly and accurately determine whether an image has been generated by artificial intelligence (AI) or created by a human. If the image is AI-generated, our service identifies the AI model used. We offer the AI or Not API for bulk image analysis and seamless integration into your platform. AI or Not is free to use for analyzing single images. We offer a premium API service for bulk image analysis or commercial use.
    Starting Price: $5 per month
  • 13
    DeepFake-o-meter

    DeepFake-o-meter

    UB Media Forensics Lab

    An open platform integrating state-of-the-art deepfake detection methods. You can upload a video from your computer, note that should upload only one video each time. Deepfakes refer to AI-synthesized fake media, by creating illusions of an individual's presence and activities that did not occur in reality, deepfakes can cause real harm when they are weaponized. DeepFake-o-meter is an open source and user-friendly online platform developed by the UB Media Forensics Lab to detect third-party deepfake algorithms. For users, it provides a convenient service to analyze deepfake media with multiple state-of-the-art detection algorithms, with secure and private delivery of the analysis result. For developers of deepfake detection algorithms, it provides an API architecture to wrap individual algorithms and run them on a remote machine. For researchers of digital media forensics, it is an evaluation/benchmarking platform to compare the performance of multiple algorithms.
    Starting Price: Free
  • 14
    Sentinel

    Sentinel

    NFTPort

    Our technology is used by the leading organizations in Europe. It is now possible to manipulate people’s perceptions at scale because the naked eye can no longer verify malicious deepfakes. We save time and remove uncertainty by automatically determining if digital media is AI-generated. If deepfakes go undetected then decision-makers, citizens, and democratic processes will be manipulated leading to the loss of trust in democracies.
  • 15
    StegAI

    StegAI

    StegAI

    StegAI watermarks protect your digital library from misuse. Stay ahead of deepfakes, leakers, and piracy. StegAI's API keeps your unlaunched products & corporate knowledge secret. Trace leaks back to individuals and organizations. Provenance for authenticity, history, & copyright. Watermark AI-generated content that will remain intact - even when edited. A scalable solution for digital images, videos, & documents.
    Starting Price: $90 per month
  • 16
    IDLive Face Plus
    IDLive Face Plus complements IDLive Face presentation attack detection with injection attack detection, providing comprehensive protection from deepfakes and other types of fraudulent digital imagery. Detect injection attacks that use virtual and external cameras. Prevent browser JavaScript code modifications on both desktops and mobile devices. Prevent man-in-the-middle replay attacks. Protect from emulators, cloning apps, and other software used for fraud. Improve presentation attack detection performance. Facial recognition security relies on presentation attack detection (PAD) to ensure that a biometric selfie is not actually a fraudster presenting a non-live facial image to the camera, such as a printed copy, screen replay, or 3D mask. IDLive Face Plus combines award-winning presentation attack detection with a unique approach to injection attack detection to prevent deepfakes and other fraudulent digital content.
  • 17
    MatchTune

    MatchTune

    MatchTune

    Access an arsenal of revolutionary AI tools designed to solve music’s modern roadblocks and enhance your creative workflow. Identify audio copyright issues within your video & replace flagged songs with similar, cleared ones. Accurately identify deepfake music & differentiate between original recordings & imitations with 99.9% accuracy. Creatively extend or shorten music to any desired duration while preserving musical fundamentals.
  • 18
    Authentify

    Authentify

    pi-labs

    pi-labs delivers AI++ powered solutions in deepfake detection, video analytics and forensics, and data intelligence from a wide range of structured and unstructured data sources. Our technologies significantly enhance the operational efficiency of law enforcement and intelligence agencies, enabling faster, more accurate analysis and decision-making. As a leader in AI-driven cyberforensics, pi-labs is committed to providing reliable, state-of-the-art solutions that meet the complex demands of modern investigative environments, ensuring integrity, security, and actionable intelligence.
  • 19
    Paravision

    Paravision

    Paravision

    Paravision is a core Identity AI technology provider delivering top-tier accuracy, fairness, and performance. Its AI products, including face recognition, liveness detection, deepfake detection, and age estimation, powering identity workflows for enterprises and government agencies. Paravision consistently ranks among the top global performers in industry benchmarks, including NIST’s Face Recognition Technology Evaluations and DHS Biometric Tests. Its technology enables identity, access, and fraud prevention systems at global scale. Trusted by leaders across travel, payments, digital identity, hospitality, security, and health identity sectors, the company combines benchmark-leading performance with ethically built, modular AI infrastructure for high-accuracy identity verification and authentication.
  • 20
    QANplatform

    QANplatform

    QANplatform

    Developers and enterprises can build Quantum-resistant smart-contracts, DApps, DeFi solutions, NFTs, tokens, Metaverse on top of the QAN blockchain platform in any programming language. QANplatform is the first Hyperpolyglot Smart Contract platform where developers can code in any programming language and also get rewarded for writing high-quality code reusable by others. The Quantum threat is very real. Existing chains can not defend against it. QAN is resistant against it from ground up, your future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 21
    CounterSocial

    CounterSocial

    CounterSocial

    CounterSocial is serious about countering fake news and propaganda. We're the only network using AI to automagically analyze uploaded content in near real-time to determine deepfake probability. We've teamed up with Botsentinel to further protect our users from foreign influence operations. The optional browser extension offers baked-in visibility of potential 'problematic' migrating accounts. CounterSocial has integrated automatic and one-click on demand identity theft alerts. COSOGuard is checking the open and dark web all day and night. If your identity is caught up in a breach - you'll know! We've also teamed up with Factlayer to integrate realtime inline automatic political bias leaning and fake news awareness via color coded links that let you know a site's veracity BEFORE you click through.
  • 22
    Quantum-Safe Platform
    Post-Quantum's Quantum-Safe Platform is a modular cybersecurity suite designed to protect organizations from the emerging risks of quantum computing. It offers interoperable, backward-compatible, and crypto-agile solutions that ensure a seamless transition to next-generation encryption. A quantum-ready, multi-factor biometric authentication system enabling secure passwordless sign-ins. Quantum-safe VPN that secures data-in-transit against both traditional and quantum attacks. The world's first quantum-safe, end-to-end encrypted messaging app, designed for secure enterprise communication. A governance system allowing stakeholders to cast cryptographically verifiable votes to sanction actions.​ Our solutions are already aiding organizations in defense, critical national infrastructure, and financial services to transition to quantum-safe encryption.​
  • 23
    SWEAR

    SWEAR

    SWEAR

    SWEAR is a content-authenticity and security platform that verifies and protects video and audio media in real time from the moment of capture. It records a unique “Digital DNA” for every frame, pixel, and sound byte during recording; this metadata is stored in an independent, immutable blockchain ledger so that any subsequent manipulation is detectable. Users can validate footage by comparing the current state to the original authenticated version, enabling on-demand proof of authenticity. The system is designed to safeguard sensitive use cases such as surveillance, legal evidence, public safety, and corporate security, ensuring a trusted chain of custody and maintaining the integrity of media in transit or storage. SWEAR’s security solution integrates with cameras and recording devices; there is also a mobile app component. The technology includes measures for metadata tracking (frame rate, resolution, and even pixel-level detail), immutable provenance, and more.
    Starting Price: Free
  • 24
    QuSecure QuProtect
    QuSecure's QuProtect is a comprehensive post-quantum cryptography software solution designed to secure data across various platforms, including network, cloud, IoT, edge devices, and satellite communications. It offers quantum-resilient cryptography, crypto-agility, zero-trust architecture, and quantum-strength keys, ensuring protection against both current and future cyber threats. QuProtect enables organizations to implement PQC with minimal disruption to existing systems, providing a seamless integration into their cybersecurity infrastructure. It supports hybrid post-quantum TLS, allowing for control over cryptographic algorithms and key management, and offers centralized control and management for cryptographic protocols across the network. QuProtect is deployed as a quantum-security-as-a-service architecture, combining orchestration, inventory, telemetry, and cryptographic controls into a single platform.
  • 25
    Content Credentials

    Content Credentials

    Content Credentials

    Content Credentials provide deeper transparency into how content was created or edited. Critical information about the content you see online is often inaccessible or inaccurate. It reveals helpful information that's usually hidden and presents a new open technology for revealing answers to your questions about content with a simple click. Content Credentials make the origin and history of content available for everyone to access, anytime. With this information at your fingertips, you have the ability to decide if you trust the content you see, understanding what it is and how much editing or manipulation it went through. Content is often miscredited or not credited at all when shared online, creating tons of lost opportunities for creators. Our software enables creators to get recognized for their work, market it, and build their following.
  • 26
    Blackbird.AI

    Blackbird.AI

    Blackbird.AI

    Powered by our AI-driven narrative intelligence platform, organizations can proactively understand digital threats in real time for strategic decision-making when it matters most. The risk landscape has dramatically shifted for every industry. Our suite of solutions provides actionable risk intelligence for our customers and partners. Online audiences are being influenced in ways that have never been seen before by a new generation of actors and techniques. Listening tools are not enough. Quickly encapsulate narratives with daily risk intelligence summaries, providing real-time insights and empowering strategic decisions. Fine-tune your AI-generated narrative intelligence reports with the power of human context and enhance the relevance, accuracy, and strategic value of your insights. Enhance decision-making with data-driven recommendations tailored for a wide variety of problem sets, use cases, and personas. Accelerated reporting for intelligence professionals, saving time and effort.
  • 27
    ToxMod

    ToxMod

    Modulate

    ToxMod™ is the world's only full-coverage voice moderation solution. Where existing voice moderation tools focus only on the ~8% of players that submit reports, ToxMod goes beyond, independently catching all the worst harms on your platform, empowering your team to take action while it's happening, and mitigate the damage before good players churn away. ToxMod was born to understand all the nuances of voice. It goes beyond transcription to consider emotion, speech acts, listener responses, and much more. ToxMod becomes an expert in your game's code of conduct and escalates what matters most with high priority to your team. All user data is anonymized and protected to ISO 27001 standards. Modulate will not sell or rent your data, ever. ToxMod ships with a variety of plugins for different combinations of the game engine and voice infrastructure. You can integrate in less than a day. ToxMod uses sophisticated machine learning to recognize when conversations begin to take a bad turn.
    Starting Price: Free
  • 28
    Human Defense Platform
    HUMAN is a leading cybersecurity company committed to protecting the integrity of the digital world. We verify that digital interactions, transactions, and connections are authentic, secure, and human. The Human Defense Platform safeguards the entire customer journey with high-fidelity decision-making that defends against bots, fraud, and digital threats. Each week, HUMAN verifies 20 trillion digital interactions, providing unparalleled telemetry data to enable rapid, effective responses to even the most sophisticated threats. Recognized by our customers as a G2 Leader, HUMAN continues to set the standard in cybersecurity.
  • 29
    PQShield

    PQShield

    PQShield

    PQShield offers a comprehensive suite of post-quantum cryptography solutions designed to future-proof digital infrastructures against the emerging threats posed by quantum computing. Their UltraPQ-Suite encompasses a range of hardware and software products optimized for various use cases, including ultra-fast, ultra-small, and ultra-secure implementations. PQShield's offerings include PQPlatform-Lattice, a compact, FIPS 140-3 CAVP-compliant cryptographic engine supporting lattice-based algorithms like ML-KEM and ML-DSA; PQPlatform-CoPro, which combines hash-based and lattice-based cryptography engines for seamless integration into existing security subsystems; and PQPlatform-TrustSys, a fully autonomous, PQC-focused root-of-trust subsystem designed for minimal integration effort and robust side-channel protection. PQCryptoLib provides a general-purpose cryptographic library supporting both post-quantum and classical algorithms, facilitating smooth transitions to quantum systems.
  • 30
    Sensity

    Sensity

    Sensity

    We help your international expansion with our all-in-one solution to classify and analyze ID Documents. Stop frauds with a multilayer AI-Powered forensic suite. Get detailed reports about the type of forgery with our analytics dashboard. Onboard-only users who present faces coherent with the face on the ID document previously presented. Our solution can be used to find and match a face in a million faces database with 99.2% accuracy. With our passive liveness detection, your clients don't need to perform any action in front of the camera. We leverage four different types of approaches able to analyze the document from a completely different perspective in order to put in condition your fraud team to spot a wide range of document fraud. Speed-up the document review from hours to seconds and get actionable insights to evaluate the risk rate of your new clients. Keep anything monitored through a simple and intuitive dashboard.
  • 31
    Youverse

    Youverse

    Youverse

    Youverse is a decentralized identity and authentication platform that enhances security and privacy with advanced biometric authentication and digital identity verification solutions built on a decentralized architecture that avoids central data stores to reduce breach risk. It offers fully automated biometric identity verification that supports more than 15,000 types of identity documents from 250+ countries and territories, combining real-time liveness detection with document scanning and anti-spoofing technology to accelerate onboarding and combat fraud for customer registration and compliance workflows. Youverse also provides decentralized user authentication that reduces account takeover risk with a privacy-preserving experience users control, while fast, precise face matching algorithms adhere to international standards such as ISO/ICAO and are independently recognized by NIST for industry-leading accuracy.
    Starting Price: $139 per month
  • 32
    WeVerify

    WeVerify

    WeVerify

    Online disinformation and fake media content have emerged as a serious threat to democracy, economy and society. Content verification at scale and in near real-time is currently far from trivial, even for experienced journalists, fact-checkers, human rights activists or media literacy scholars. The WeVerify project aims to develop intelligent human-in-the-loop content verification and disinformation analysis methods and tools. Social media and web content will be analyzed and contextualized within the broader online ecosystem, in order to expose fabricated content, through cross-modal content verification, social network analysis, micro-targeted debunking, and a blockchain-based public database of known fakes.
    Starting Price: Free
  • 33
    RiskGuard

    RiskGuard

    GeoComply

    Combat sophisticated location fraud schemes that are not detected by existing GeoIP solutions such as account takeover and bot detection. Increase your ability to detect real fraud while reducing false positives, and false negatives, with embedded location checks. Enhance existing fraud and risk management models with advanced location data signals. Identifies sophisticated location spoofing methods such as VPNs, data centers, anonymizers, proxies and Tor exit nodes. Detects when “home” location data from a smartphone is being spoofed as part of a synthetic identity at account creation. Provides historical location information of a device and/or a user when defending chargeback disputes. Creates a fingerprint for each location fraud method identified. You can flag future transactions with similar behavior.
  • 34
    SSH NQX
    SSH NQX is a quantum-safe encryption solution designed to secure Ethernet and IP traffic across various networks, including public and private infrastructures. It employs advanced post-quantum cryptographic algorithms to protect data-in-transit from both current and future cyber threats. NQX delivers high-bandwidth performance, supporting data transmission speeds up to 100 Gbps, ensuring seamless and secure communication between enterprise sites, networks, clouds, and data centers. Utilizes quantum-resilient algorithms to safeguard data against potential quantum computing threats, ensuring long-term confidentiality and integrity. Designed to manage complex network topologies, NQX allows efficient control over multiple connections and encryption keys, facilitating scalability across large organizations. Provides encrypted links between data centers, ensuring secure data transfer without altering network topology.
  • 35
    Quantum Xchange

    Quantum Xchange

    Quantum Xchange

    Quantum Xchange is an industry leader in providing advanced cryptographic management solutions designed to safeguard data in motion against current and emerging cybersecurity threats, including those posed by quantum computing advancements. Their comprehensive platform addresses single points of failure in encryption, ensuring robust data security today and quantum-safe protection for the future. A key offering from Quantum Xchange is CipherInsights, a tool that enables organizations to discover, catalog, and prioritize cryptographic risks within their networks. This continuous monitoring facilitates proactive identification and remediation of vulnerabilities, thereby enhancing the organization's security posture. To further strengthen data protection, Phio TX provides an affordable, crypto-agile, and quantum-safe solution. It seamlessly integrates with existing IT infrastructures, enabling the deployment of post-quantum cryptographic algorithms without significant performance costs.
  • 36
    WWS Proactive Monitoring Manager
    The WWS module enables the control of the whole self service network (fleet), the activation of warning systems and the setting of automatic intervention procedures. Diagnostics and technical navigation of individual machines, virtual and physical status of the ATM and its devices. Diagnostics and technical navigation of the network, diagnosis of performance, number of ATMs connected to each node, workload balancing and division of load on each node, status of the applications. Possibility of setting automatic actions/commands in response to certain events, sending of an e-mail or SMS, against pre-established thresholds, reboot of devices in the case of an anomaly. Possibility of remotely controlled actions on an ATM, control the status of devices, reboot. Warnings on anomalies and errors.
  • 37
    ZEROSPAM

    ZEROSPAM

    ZEROSPAM

    ZEROSPAM allows organizations of all sizes to defend against email ransomware, spearphishing, and other general threats. ZEROSPAM is a simple to use email security product that has a threat defense rate of 99.9% against threats via email. ZEROSPAM integrates with Office 365, and features a very low false positive rate.
  • 38
    CleanINTERNET

    CleanINTERNET

    Centripetal

    While traditional cybersecurity solutions remediate threats as they emerge, CleanINTERNET® shields against threats proactively, preventing them from reaching your network in the first place. The largest collection of high-confidence, high-fidelity commercial threat intelligence in the world, is operationalized so your defenses adapt and defend in parallel with the threat landscape. Applying over 100 billion indicators of compromise from real-time intelligence feeds, updated every 15 minutes, to protect your network. The fastest packet filtering technology on the planet is integrated at your network’s edge with no latency, enabling the use of billions of threat indicators so malicious threats are dynamically blocked from entering your network. Highly skilled analysts augmented by AI technology monitor your network, providing automated shielding based on real-time intelligence, and validated by human expertise.
  • 39
    Radware Cloud Malware Protection
    Every day is zero-day when it comes to malware. Radware research shows that nearly 50% of malware targeting enterprises are zero-day exploits that are not recognized by existing signature-based defenses such as secure web gateways, next-generation firewalls (NGFW) or endpoint data loss prevention (DLP). Radware Cloud Malware Protection defends organizations against zero-day malware by analyzing data collected from a global community of 2 million users using patented machine learning algorithms to detect previously unknown malware based on their unique behavior patterns
  • 40
    SandboxAQ

    SandboxAQ

    SandboxAQ

    The emergence of large, fault-tolerant quantum computers poses a significant threat to current public-key cryptography, leaving sensitive data and systems vulnerable to attacks. SandboxAQ was selected by the NIST's National Cybersecurity Center of Excellence for its Migration to Post-Quantum Cryptography project, which partners with industry to help the government develop best practices to transition from current public-key cryptography to post-quantum cryptography algorithms. Easily adhere to new cryptographic requirements and switch between them without requiring additional development or maintenance. Application Analyzer detects and records all calls to cryptographic libraries made by an application at run time, identifying vulnerabilities and policy breaches.
  • 41
    HookProbe

    HookProbe

    HookProbe

    HookProbe is an open-source AI-native intrusion detection system (IDS/IPS) that runs on Raspberry Pi and edge devices. It combines eBPF/XDP kernel-level packet filtering with machine learning threat classification to deliver autonomous network security with zero cloud dependency. The stack includes NAPSE (AI packet inspection), HYDRA (threat intelligence pipeline), SENTINEL (ML classification engine), and AEGIS (autonomous defense orchestrator). In production, a single Raspberry Pi 5 processes 11M+ security events, classifies 177K ML verdicts, and tracks 11,800+ attacker IPs — all autonomously. Key features: - 5-minute install on Raspberry Pi 5 or any Linux device - eBPF/XDP wire-speed packet filtering and DDoS mitigation - ML-based threat classification (benign/suspicious/malicious) - Real-time QSecBit security posture scoring - Web dashboard with live threat visualisation - Post-quantum cryptography (Kyber KEM) - Collective mesh defense across nodes
    Starting Price: $9/month
  • 42
    OpenText Core Adversary Signals
    OpenText Core Adversary Signals is a SaaS-based analytics tool that enhances threat hunting by uncovering malicious internet traffic and tracking adversarial behaviors across digital ecosystems. It provides organizations with expanded visibility beyond their network perimeter, revealing attack paths, early warning signs, and the motives of threat actors. The platform applies advanced analytics to sift through noise and highlight real threats, enabling security teams to reduce response times and minimize potential damage. With zero-touch deployment, it integrates seamlessly into existing SIEM or XDR systems without requiring additional hardware or resources. Cross-agency models facilitate collaboration by validating threat activities across multiple organizational divisions. OpenText Core Adversary Signals empowers security operations to proactively detect and stop sophisticated cyberattacks.
  • 43
    Cellframe

    Cellframe

    Cellframe

    Cellframe Network is a scalable open-source next generation platform for building and bridging blockchains and services secured by post-quantum encryption. We offer a stage for enterprises and developers for building a vast array of products ranging from simple low-level t-dApps to whole other blockchains on top of Cellframe Network. We believe that the next paradigm for blockchain technology is mass adoption and our platform strives to expand the use cases associated with blockchain technology. Cellframe can provide extremely high transaction throughput based on the original sharding implementation. In addition, Post-quantum cryptography makes the system resistant to hacking by quantum computers, which are not far off. Based on the original sharding implementation, Cellframe can provide extremely high transaction throughput.
  • 44
    LEFTA

    LEFTA

    LEFTA Systems

    Law enforcement software for mission-critical processes that improve productivity. U.S. cities paid more than $300 million in lawsuit settlements involving police use for force incidents and false arrests in 2019 alone, according to ABC News. Across the country, more than 400 agencies and over 80,000 law enforcement officers at local, state and federal levels are using our software to better monitor incidents, identify early warning signs and improve trust and transparency in their communities. With over a decade of being in business, our client retention rate is 98%! Our SHIELD Suite is a one stop solution for all of your internal documentation processes. One price, one login and one user profile to access 10 applications. Harness the power of a comprehensive Early Warning System and statistical reporting. Click on an application below to learn how we can protect your agency from liability.
  • 45
    Graphus

    Graphus

    Kaseya

    90% of cyberattacks that end in a data breach start with a phishing email. Graphus is a cost-effective automated phishing defense solution for companies of all sizes that protects your customers from today’s biggest cyber threats. Using patented AI algorithm to detect and quarantine suspicious emails fast, Graphus is a powerful boost for your clients’ security (and your MRR). Powerful automated phishing protection for Office 365 and G Suite. Graphus’ unique, innovative AI learns and evolves with each company’s communication patterns to provide three layers of protection against malicious attacks and strengthen your clients’ security posture -- giving you and your clients peace of mind. TrustGraph® automatically detects and quarantines dangerous emails that get through email platform security or an existing Secure Email Gateway (SEG). EmployeeShield® adds an interactive warning banner to questionable messages, prompting recipients to quarantine or mark them as safe with one click.
  • 46
    Lumen Adaptive Threat Intelligence
    Adaptive Threat Intelligence helps security specialists quickly neutralize threats before they attack. Leveraging our global network visibility, we provide high-fidelity intelligence correlated to your IP addresses, combined with Rapid Threat Defense to proactively stop threats and simplify security. Automated validation technology developed and deployed by Black Lotus Labs tests newly discovered threats and validates the fidelity of our threat data, minimizing false positives. Rapid threat defense automated detection and response capabilities block threats based on your risk tolerance. Comprehensive virtual offering eliminates the need to deploy or integrate devices and data, and provides a single escalation point. Easy-to-use security portal, mobile app, API feed and customizable alerts that allow you to manage threat visualization and response with context-rich reports and historical views.
  • 47
    Frame

    Frame

    Frame

    Frame is the new standard for security awareness, built to defend against AI-powered threats by learning your organization and creating personalized security training, simulations, and deepfake scenarios in minutes. Unlike legacy awareness tools that rely on generic libraries, Frame generates training and simulations from your world: your threats, policies, roles, technology stack, and real organizational context. It trains employees for everything, not just phishing, with personalized content on deepfake awareness, AI-powered social engineering, secure coding, sophisticated threats, compliance, privacy, developer training, and industry security news. Its simulations feel real because they are crafted from organizational context, including hyper-realistic phishing emails, voice calls, and deepfake videos, with adaptive difficulty that scales with each employee and multichannel campaigns that mirror what real adversaries do.
  • 48
    PAN-OS

    PAN-OS

    Palo Alto Networks

    PAN-OS is Palo Alto Networks’ ML-powered next-generation firewall operating system that delivers core network security capabilities in a single, high-performance platform. It features App-ID, a patented traffic classification engine that automatically discovers and controls new and evasive applications, and Content-ID, which scans all network traffic in a single pass for comprehensive threat protection without sacrificing throughput. The Cloud Identity Engine aggregates and synchronizes user identities across multiple identity providers, enabling consistent, point-and-click zero-trust authentication and authorization. Device-ID maintains policy enforcement for devices regardless of IP changes or location, providing full context for security, decryption, QoS, and authentication policies. The OS employs post-quantum cryptographic algorithms and Quantum-resistant VPNs to safeguard against future decryption threats.
  • 49
    AI Aware

    AI Aware

    AI Aware

    AI Aware is an advanced AI detection platform designed to identify AI-generated and AI-manipulated content across text, video, audio, and images. The platform helps organizations protect brand reputation, reduce fraud risks, and verify the authenticity of digital content in an era of rapidly growing generative AI usage. AI Aware uses an ensemble detection architecture that combines multiple machine learning and algorithmic models to improve detection accuracy and resilience against evolving AI generators. Its text detection tools can identify content produced by major language models such as ChatGPT, Claude, Gemini, Grok, and LLaMA. The platform also detects deepfake videos, AI-generated images, and synthetic audio, including voice cloning and manipulated recordings. AI Aware provides confidence scores and explainable outputs rather than simple binary results, helping users make informed decisions about suspicious content.
  • 50
    Inkrypt AI

    Inkrypt AI

    Inkrypt AI

    Inkrypt.ai is an enterprise-grade cryptographic security and key management platform designed to deliver automated encryption, post-quantum readiness, and centralized cryptographic governance for modern software systems. The platform enables organizations to integrate encryption and key management directly into applications through generated SDKs while maintaining full operational visibility and compliance readiness. Inkrypt.ai provides end-to-end encryption across the data lifecycle, including key generation, secure storage, rotation, and access control. Its hybrid cryptographic architecture aligns with NIST post-quantum cryptography guidance, allowing enterprises to prepare for future quantum threats without disrupting existing systems. The platform includes a web-based administration and analytics console, real-time telemetry pipelines, centralized audit logging, and policy-driven access controls. Automated key rotation, zero-downtime cryptographic operations, and real-time se