Suggested Categories:

Video Converter Software
Video converter software, also known as video encoding or video transcoding software, allows users to convert video files from one format to another, ensuring compatibility with various devices, platforms, or media players. These platforms typically support a wide range of video formats, such as MP4, AVI, MOV, MKV, and more, enabling users to adjust resolution, bitrate, and other settings during the conversion process. Video converter software often includes additional features like batch conversion, video trimming, and audio extraction, allowing for greater flexibility. By using this software, users can efficiently prepare videos for different uses, whether for sharing, editing, or playback on various devices.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

9 Products for "shutter encoder" with 3 filters applied:

  • 1
    IDWholesaler Software
    ...This is an open format which allows you as the consumer to order proximity cards from any photo identification retailer. This is essential in helping keep your costs down.The amount of data that can be encoded on to a card with a magnetic stripe card is the same for both HiCo and LoCo cards. The primary difference between the cards has to do with how difficult it is to encode and erase the information on each type of stripe. Investing in the right ID card printer is critical, and navigating the identification buyer’s landscape can be overwhelming. ...
  • 2
    Guardtime

    Guardtime

    Guardtime

    Guardtime's core expertise is the design and implementation of machines – distributed virtualized computers that execute tasks with cryptographic proofs of correctness. The value of such machines is twofold; a) the operational cost savings achieved from security, audit and compliance being encoded into the design and b) new business models by enabling the automation of processes across organizational boundaries. VaccineGuard is a distributed data exchange platform for vaccination campaign management that enables counterfeit and diversion detection, vaccine allocation prioritization, just in time stock and supply, pinpoint recall and rapid adverse reaction detection. ...
  • 3
    Massdriver

    Massdriver

    Massdriver

    At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. ...
    Starting Price: Free trial
  • 4
    Atomic ModSecurity Rules
    Atomic ModSecurity Rules is a comprehensive WAF rule set with hundreds of ModSecurity WAF rules to protect applications against web attacks and is fully backed by expert support. WAF Rules to Strengthen ModSecurity Against: - SQL injection - Cross-site scripting - Cross-site request forgery - Encoding abuse - Protocol abuse - Unicode and UTF-8 attacks - HTTP smuggling - Path recursion - Web spam - Shells - And much more * Atomicorp developed the first ModSecurity rule set and maintains the largest number of active WAF rules that support server types from Tomcat and Nginx to IIS, LightSpeed and Apache. * Atomic ModSecurity Rules are the most comprehensive WAF rule set in the industry, have the highest level of quality and are fully backed by expert support. ****** More info: https://www.atomicorp.com/atomic-modsecurity-rules/ *******
  • 5
    WebOrion Protector Plus
    ...At the core of its capabilities is ShieldPrompt, a multi-layered defense system that utilizes context evaluation through LLM analysis of user prompts, canary checks by embedding fake prompts to detect potential data leaks, pand revention of jailbreaks using Byte Pair Encoding (BPE) tokenization with adaptive dropout.
  • 6
    BlueFiles

    BlueFiles

    Forecomm

    ...CNIL strongly advises businesses and organizations to " use data encryption during transfers " and " have people trained in the risks ". Data encryption is a central part of the modern data protection strategy. Using specialized encryption, like BlueFiles, companies can encode their data so that it becomes indecipherable to anyone but the intended recipient. BlueFiles provides a real guarantee on all your digital data transfers: Integrity of the BlueFiles file, 100% confidentiality, remote control of the files sent, and tracking. Save time, ease of use, and lower costs, we need to communicate with confidence over the Internet without the risk of our sensitive data being disclosed. ...
  • 7
    Cognitech VideoActive
    ...Patented software is the world’s only software that has a fully automatic Real-Time Universal De-Multiplexing ability, in addition to Real-Time Track & Cover, lidar crime scene reconstruction and analysis. Real-Time Universal DVR Capture, Patented Lossless Video Capture with encoding that doubles video storage and a Video Search (e.g. cars and people). Cognitech VideoActive’s modular design allows the end-user to choose a pre-defined configuration or user-defined signal processing chain. VideoActive® modules can be easily combined to produce a user-defined processing pipeline from live sources or locally stored files, all in real-time. ...
  • 8
    UserBase

    UserBase

    Encodable

    UserBase is a login system, user account manager, and password-protector for your website. It provides user authentication as a simple drop-in web app. UserBase is easy to install if you're a bit tech-savvy, or we can install it for you today. It will run on pretty much any website/server, because it requires only Perl and MySQL, which are present on virtually all servers. Full control over account creation: administrators can add/delete accounts; public sign-up can be enabled; public...
    Starting Price: $39 one-time payment
  • 9
    5centsCDN

    5centsCDN

    5centsCDN

    Experience cutting-edge content delivery with 5centsCDN's subscription plans: CDN Plans Standard: From $2.5/TB, with 10+ Points of Presence and delivery in NA and EU only. Enterprise: From $15/TB, offering 50+ Points of Presence for worldwide content delivery. CDN+ Plans Standard+: From $10/TB, with 20+ Points of Presence and delivery in NA and EU only. Enterprise+: From $35/TB, access 70+ Points of Presence for worldwide content delivery. Join over 5000 satisfied clients,...
    Leader badge
    Starting Price: $2.50
  • Previous
  • You're on page 1
  • Next