Suggested Categories:

DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
DeFi Tools
DeFi tools are tools that DeFi (decentralized finance) investors and traders can use to enhance their DeFi experience. DeFi tools offer a wide variety of different use cases, including DeFi analytics, trading tools, screening tools, tracking tools, insights, liquidity analysis, portfolio tracking, statistics, and more.
Data De-Identification Tools
Data de-identification tools are designed to remove potentially identifiable information from datasets. These tools can be used to ensure that data is anonymized and compliant with data privacy regulations, such as GDPR. Data de-identification methods typically involve techniques like suppressing or masking of certain pieces of data. Other methods like pseudonymization, tokenization, and randomization may also be used in order to completely obfuscate the original data while still allowing analysis of the remaining dataset. Furthermore, some advanced data de-identification software includes additional features for monitoring access and preventing unauthorized use of sensitive personal information. In summary, data de-identification tools provide organizations with ways to ensure compliance by removing personally identifiable information from their datasets before sharing or publishing them publicly.
DeFi Dashboards Software
Decentralized finance (DeFi) dashboards are web-based tools used to help people manage their cryptocurrency portfolios. They offer a comprehensive view of users' holdings and performance in one place, enabling them to track their investments and visualize the data over time.
DeFi Wallets Software
DeFi wallets are cryptocurrency wallets that enable users to connect to decentralized finance (DeFi) applications and platforms.
Crypto Lending (DeFi) Platforms
Crypto lending platforms enable users to lend or borrow digital assets, providing an alternative to traditional financial services. These platforms often require borrowers to provide crypto collateral to secure loans, reducing default risk. Lenders earn interest on their deposited assets, while terms and rates are usually determined algorithmically or by platform policies. Some platforms operate in a decentralized (DeFi) model, using smart contracts for transparency and automation, while others function under centralized (CeFi) management for enhanced user support and compliance. Crypto lending bridges the gap between traditional and blockchain-based finance, offering flexible solutions for both lenders and borrowers.
Crypto & DeFi Insurance
Crypto and DeFi insurance is insurance for cryptocurrencies and digital assets like Bitcoin, Ethereum, NFTs, and more. Crypto insurance providers offer insurance policies on cryptocurrencies stored in wallets or exchanges via a traditional insurance policy model. DeFi (decentralized finance) insurance is offered via trustless smart contracts that insure DeFi holdings that are on the blockchain and being used for staking, yield farming, liquidity pools, lending, and more.
Data Deduplication Software
Data deduplication software enables organizations to eliminate duplicate data from a data set in order to reduce the amount of redundant data in a dataset and reduce storage costs and utilization, as well as improve data quality.
Defrag Software
Defrag software optimizes the arrangement of files on a hard disk drive (HDD) to improve read and write speeds. By reorganizing fragmented data into contiguous blocks, it reduces seek time and enhances overall system performance. Many modern defrag tools also include scheduling, SSD optimization modes, and disk health monitoring. While SSDs don’t require traditional defragmentation, defrag software can still perform trimming and optimization tasks for them. These tools are especially valuable for extending the life of HDDs, speeding up boot times, and improving file access efficiency.
Link Management Tools
Link management tools are software solutions that help users organize, track, and optimize the use of URLs and links across various platforms. These tools allow users to shorten, customize, track, and analyze the performance of links to improve marketing efforts, user engagement, and website traffic. Common features of link management tools include custom branding of short links, real-time click tracking, analytics dashboards, link redirection, and integration with other marketing platforms. These tools are especially useful for businesses looking to streamline their content distribution, measure marketing campaign success, and ensure the efficient sharing of links across digital channels.
Video Marketing Software
Video marketing software helps businesses create, manage, and distribute video content to engage with their target audience, promote products, and drive brand awareness. These platforms provide tools for video creation, editing, and customization, allowing marketers to produce high-quality content that aligns with their campaign goals. Video marketing software also offers analytics features to track performance, such as viewership, engagement, and conversion rates, enabling businesses to optimize their video strategy. Many platforms integrate with social media, email marketing, and advertising tools, making it easier to distribute video content across multiple channels. By using video marketing software, companies can enhance their digital marketing efforts, increase customer engagement, and boost sales.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
  • 1
    AnalyticDiD
    De-identify data using selected methods and privacy models from broad areas of data de-identification and statistics.
  • 2
    DeNexus

    DeNexus

    DeNexus

    CISOs, OT facility managers, cybersecurity practitioners, executive boards, and insurers need better quantification of cyber risks across their fleet of Operational Technology (OT) assets to enable efficient risk management and transfer. DeNexus delivers an evidence-based solution for OT industrial stakeholders to gain visibility into each facility’s cyber exposure, calculate the probability and financial impact of potential cyber incidents, and prioritize risk mitigation based on ROI or other KPIs. Easily visualize how each risk mitigation project reduces your exposure and improves your risk profile. ...
  • 3
    Fireblocks

    Fireblocks

    Fireblocks

    Build, run and scale a profitable digital asset business. Fireblocks is an all-in-one platform to store, transfer, and issue digital assets across your entire ecosystem. With the Fireblocks DeFi API and Browser Extension, you can now securely access the full range of DeFi protocols for strategies like decentralized exchange (DEX) trading, lending/borrowing, staking, and yield farming. Secure customer and investor funds from cyber attacks, internal collusion and human error with a multi-layer technology that combines the latest breakthroughs in MPC cryptography with hardware isolation. ...
  • 4
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats....
  • 5
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. ...
  • 6
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If...
  • 7
    Viacryp

    Viacryp

    Viacryp

    Experience the convenience of a Trusted Third Party ( TTP ) for the careful pseudonymization of personal data, so that you can perform data analysis within the framework of the GDPR. Our basic service consists of pseudonymizing personal data. For this, we apply the principles of irreversible pseudonyms and thickening of behavior. The pseudonymized data is the source of further processing by our clients. Our filter service offers the possibility to share personal data proportionally and...
  • 8
    DeviceAtlas

    DeviceAtlas

    DeviceAtlas

    DeviceAtlas is the de facto standard for device detection and data, and the only solution that is indexed for web, apps and mobile operator environments. Our patented technology provides a common device identifier to understand device traffic across all connected environments. DeviceAtlas improves advertising conversion rates by enabling granular device targeting of advertising campaigns and detailed reporting.
    Starting Price: $399 per year
  • 9
    Halborn

    Halborn

    Halborn

    ...Halborn provides an exceedingly thorough analysis of a blockchain application’s smart contracts in order to correct design issues, errors in the code, or identify security vulnerabilities. We perform both manual analysis and automated testing to make sure your smart contract application or DeFi platform is ready for mainnet. Get your security and development processes automated to save you time and money. Our expertise is in automated scanning, CI/CD Pipeline development, Infrastructure as Code, Cloud Deployment, SAST/DAST integration, and experience to help build an effective DevSecOps culture.
  • 10
    Opus Security

    Opus Security

    Opus Security

    Prioritize what really matters based on risk, contextual analysis, and event de-duplication. Manage the full remediation lifecycle and eliminate manual effort from the remediation process by introducing automation throughout. Drive cross-organizational initiatives with ease. Consolidate all your issues across posture management and vulnerability tools. Drastically reduce the number of issues by identifying common root causes, and get clear visibility and in-depth reporting.
  • 11
    STRM

    STRM

    STRM

    Creating and managing data policies is a slow pain. With PACE by STRM, you can make sure data is used securely. Apply data policies through code, wherever it lives. Farewell to long waits and costly meetings, meet your new open source data security engine. Data policies aren't just about controlling access; they are about extracting value from data with the right guardrails. PACE lets you collaborate on the why and when automating the how through code. With PACE you can programmatically...
    Starting Price: Free
  • 12
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with...
  • 13
    Betterscan.io

    Betterscan.io

    Betterscan.io

    Reduce MTTD & MTTR with full coverage within minutes of using. Full DevSecOps toolchain across your all environments, implementing and collecting evidence as part of your continuous security. Unified and de-duplicated across all the layers we orchestrate. One line to add several thousand checks + AI. It was built with security in mind, and we have avoided common security mistakes and pitfalls. Understands modern technologies. All are callable via REST API. Integrateable with CI/CD systems, lightweight and fast. You can self-host it for 100% code control and transparency, or run source available binary only in your own CI/CD. ...
    Starting Price: €499 one-time payment
  • 14
    IriMaster

    IriMaster

    Iritech, Inc.

    IriMaster is IriTech’s state‑of‑the‑art middleware server software providing a complete set of iris recognition functions, including enrollment, verification, identification, and de‑duplication, powered by advanced algorithms. Designed for seamless integration into legacy enterprise infrastructures, it addresses the demands of large‑scale biometric systems such as national ID programs, customs and border control, and access control. As a middleware component, IriMaster supports secure transactions and data exchange using SSL and WS‑Security standards, and ensures device‑level encryption via a PKI‑based security infrastructure. ...
  • 15
    CionSystems

    CionSystems

    CionSystems

    ...Cloud migration and synchronization is complex, resulting in major security gaps. Cloud Office 365 streamlines the arduous task of Internet user account management, dramatically reducing the time required for provisioning and de-provisioning users, providing real-time tracking of all changes, and dramatically reducing unused and untracked license costs.
  • 16
    SelfKey

    SelfKey

    SelfKey

    Self sovereign identity means your data belongs to you. The SelfKey wallet is non-custodial, you are in full control of your data, documents and digital assets. SelfKey can never steal or lose your identity data or digital assets. Securely store and manage your identity documents and digital assets. Access multiple marketplaces to compare and sign up for. Start a new business, open a new bank account, or get documents notarized through the SelfKey Marketplace. Powered by the KEY token and...
  • 17
    ArmorCode

    ArmorCode

    ArmorCode

    Centralize all AppSec findings (SAST, DAST, SCA, etc) and correlate with infrastructure and cloud security vulnerabilities to get a 360o view of you application security posture. Normalize, de-dup and correlate findings to improve risk mitigation efficiency and prioritize the findings that impact the business. A single source of truth for findings and remediations from across tools, teams and applications. AppSecOps is the process of identifying, prioritizing, remediating and preventing Security breaches, vulnerabilities and risks - fully integrated with existing DevSecOps workflows, teams and tools ‍‍ An AppSecOps platform enables security teams to scale their ability to successfully identify, remediate and prevent high-priority application level security, vulnerability, and compliance issues, as well as identify and eliminate coverage gaps.
  • 18
    Assure QuickEDD
    Protect critical IBM i applications from downtime and guard against data loss with simple, scalable, full-featured available and disaster recovery products. Assure QuickEDD replicates IBM i data and objects in real-time to local or remote backup servers. These servers then stand ready to assume the production role or recover data, including data from past points in time. Assure Quick EDD is expandable to multiple nodes and supports multiple replication topologies. It can also be used with a...
  • 19
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or...
    Starting Price: €488 per month
  • 20
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying...
  • 21
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc.
  • 22
    Ubisecure

    Ubisecure

    Ubisecure

    ...Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 23
    Privitar

    Privitar

    Privitar

    The Privitar Data Provisioning Platform is a comprehensive, modern data provisioning platform that enables collaboration across data owners, data consumers and data guardians to deliver safe data – within and beyond an organization – in a fraction of the time compared with traditional approaches. Privitar is making sensitive data highly accessible through the application of privacy enhancing technologies, so organizations like yours can optimize business and customer outcomes. Countdown to...
  • 24
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    ...It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. ...
    Starting Price: $1000 per day
  • 25
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: ​IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. ...
  • 26
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches...
  • 27
    Panaseer

    Panaseer

    Panaseer

    ...The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 28
    Enigma Vault

    Enigma Vault

    Enigma Vault

    Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of...
  • 29
    Salesforce Shield
    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss...
    Starting Price: $25 per month
  • 30
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted by over 250 global customers, Zluri is committed to delivering innovative, reliable, and scalable solutions that empower organizations to optimize their SaaS usage, ensure compliance, and enhance Access Management practices.
  • Previous
  • You're on page 1
  • 2
  • Next