Results for: security camera

Suggested Categories:

Camera Apps
Camera apps are software apps that enable users to take photos or videos using their smartphone or computer. Most devices come with a native camera app, but third-party camera apps can add a wide variety of features that native camera apps do not offer.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IoT Security Software
IoT (Internet of Things) security software is designed to protect connected devices and networks from cyber threats, ensuring the confidentiality, integrity, and availability of data transmitted between IoT devices. These tools monitor and secure devices, applications, and networks that are part of the IoT ecosystem, which includes sensors, actuators, smart appliances, wearables, and industrial equipment. IoT security software includes features such as threat detection, data encryption, access control, device authentication, and vulnerability management to mitigate risks from cyberattacks, unauthorized access, and data breaches. It is essential for industries like healthcare, manufacturing, transportation, and smart cities, where the IoT devices are widely used and often contain sensitive or critical data.
Data Center Security Software
Data center security software enables IT security professionals and organizations to secure their data center infrastructure including racks, networks, server endpoints, and more. Data center security tools provide all aspects of security for data centers. Data center security software helps protect the physical and virtual infrastructure of data centers from unauthorized access, cyber threats, and data breaches. Data center security software ensures that sensitive information and critical systems are safeguarded from external and internal threats by providing real-time alerts, logging activities, and implementing compliance with security standards.
Application Security Software
Application security software is designed to protect applications from cyber threats by identifying vulnerabilities, preventing attacks, and ensuring data integrity throughout the application’s lifecycle. This software typically includes features like static and dynamic analysis, runtime protection, and vulnerability scanning to detect and address potential security issues such as SQL injection, cross-site scripting (XSS), and unauthorized access. It helps organizations maintain secure applications by implementing best practices for secure coding, performing penetration testing, and monitoring for security breaches. Application security software is crucial for organizations to safeguard sensitive data, comply with regulations, and minimize the risk of exploitation.
Website Security Software
Website security software protects websites from cyber threats such as malware, hacking attempts, DDoS attacks, and data breaches. It continuously monitors website traffic, scans for vulnerabilities, and blocks suspicious activity in real time. Many solutions include firewalls, bot protection, SSL management, and automated malware removal to keep sites safe and compliant. Website security software also provides dashboards and reports to help teams understand risks and stay ahead of emerging threats. Overall, it ensures websites remain fast, secure, and trustworthy for users.
Cloud Security Software
Cloud security software consists of tools, software, and services designed to protect data, applications, and infrastructure associated with cloud environments. It addresses unique security challenges posed by the cloud, such as data breaches, unauthorized access, and compliance with regulatory standards. These solutions often include features like encryption, identity and access management, intrusion detection systems, and security information and event management (SIEM). By implementing cloud security software, organizations can safeguard their cloud-based assets from cyber threats and ensure the integrity and confidentiality of sensitive information. As businesses increasingly adopt cloud services, robust cloud security measures have become essential for maintaining operational continuity and customer trust.
Database Security Software
Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
Network Security Software
Network security software is a type of software that helps protect computers, networks, and data from malicious attacks and unauthorized access. It is typically used by businesses to protect their confidential information and keep systems safe. It can also be used by individuals to protect their personal information and devices from potential threats.
API Security Software
API security software is designed to protect APIs from security threats such as unauthorized access, data breaches, and denial-of-service attacks. These tools monitor, authenticate, and secure the connections between APIs and the systems they interact with, ensuring that only authorized users and systems can access the data or services offered by the API. Features typically include encryption, rate limiting, authentication (such as OAuth, JWT), API traffic monitoring, threat detection, and automated security testing. API security software is crucial for businesses that rely on APIs to connect with third-party services, mobile apps, or microservices, as it helps mitigate risks and maintain data integrity.
Computer Security Software
Computer security software helps protect devices, networks, and sensitive data from unauthorized access, cyberattacks, and other security threats. These tools provide a range of protective features such as antivirus, firewall, encryption, malware detection, and intrusion prevention systems. Computer security software is essential for safeguarding against viruses, ransomware, spyware, and phishing attacks, ensuring the integrity, confidentiality, and availability of data. Many security solutions also offer real-time monitoring, automated updates, and threat intelligence to detect and mitigate new vulnerabilities as they emerge. Businesses and individuals rely on computer security software to reduce risks, comply with regulations, and maintain a secure computing environment.
Container Security Software
Container security software is software designed to protect containerized applications and environments from security vulnerabilities, threats, and attacks. Containers, which are used to deploy and run applications in isolated environments, present unique security challenges due to their dynamic and ephemeral nature. Container security software helps secure containerized environments by providing capabilities such as vulnerability scanning, runtime protection, access control, and image security. These tools monitor container configurations and activity to detect anomalies, ensure compliance with security policies, and mitigate risks like container escapes or unauthorized access. By enhancing the security of containers and container orchestration platforms (like Kubernetes), these solutions enable organizations to securely deploy and manage applications in cloud-native and microservices environments.
Email Security Software
Email security software protects organizations from cyber threats such as phishing, malware, and spam by filtering incoming and outgoing email traffic. It uses advanced threat detection, encryption, and data loss prevention (DLP) to safeguard sensitive information. These tools also offer features like email authentication (DMARC, SPF, DKIM) and real-time threat intelligence to block emerging attacks. By securing email communications, businesses can prevent data breaches, ensure regulatory compliance, and maintain user trust. Email security software is essential for mitigating human error, which is one of the leading causes of data breaches.
Secure Web Gateways
Secure web gateways protect users and organizations from online threats by monitoring and controlling web traffic between internal networks and the internet. They filter malicious websites, block unauthorized access, and prevent data leaks by enforcing security policies in real time. These gateways use technologies such as URL filtering, malware scanning, sandboxing, and data loss prevention to safeguard users across devices and locations. Cloud-based versions extend protection to remote and hybrid workforces without relying on traditional network perimeters. Ultimately, secure web gateways ensure safe, compliant, and controlled internet access while maintaining high performance and user productivity.
Security Awareness Training Programs
Security awareness training programs are platforms designed to help employees, partners, and other stakeholders recognize and respond to security threats and best practices. These programs typically focus on topics like phishing, password management, data protection, and secure browsing habits, aiming to create a culture of security within an organization. By providing interactive modules, quizzes, and real-world scenarios, these programs ensure that participants can identify potential risks and mitigate them effectively. Many security awareness training platforms offer tracking and reporting features, allowing organizations to monitor progress and measure the effectiveness of their training efforts. The goal is to reduce the likelihood of security breaches caused by human error and ensure that individuals are well-informed about their role in maintaining cybersecurity.
Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
DNS Security Software
DNS security software enables organizations to protect their DNS against threats and malware. DNS security solutions streamline the process of securing DNS servers against attacks.
View more categories (20) for "security camera"

282 Products for "security camera"

  • 1
    Alibi Security

    Alibi Security

    Alibi Security

    Our security solutions and gun detection analytics work with educational institutions of all types to provide their communities with improved security and peace of mind. Our gun detection technology turns any existing security camera into an intruder and gun-detecting smart camera, enabling instant, real-time responses to trespassing and brandished weapons.
  • 2
    Kognition

    Kognition

    Kognition AI

    Kognition AI security stops threats in real-time. Transform legacy security into intelligent protection that pays for itself. Kognition AI integrates seamlessly with existing cameras and access control - no costly rip-and-replace required. Why Security Leaders Choose Us: ✓ 24/7 AI Guardian that never misses threats or calls in sick ✓ Works with Axis, Hanwha, Avigilon, Genetec, Milestone, and other popular platforms and devices
    Starting Price: $10,000
    Partner badge
    View Software
    Visit Website
  • 3
    Visec Security Software

    Visec Security Software

    Visec Security Software

    ...And did we mention that Visec is extremely easy to use, installation and configuration will take only 5 minutes, even at a novice or newbie's hands. All that for just a fraction of a regular security system price. Visec is the first company in the world to support rapid Quick Response (QR) Code reading and decoding directly from an analog or IP camera stream with no additional software or scanners to buy. As long as the QR code is visible, the Visec® software module can decode it from a surveillance camera stream.
  • 4
    Bettereye smarter-vision
    A powerful security software that helps you monitor your home, office or any other places using artificial intelligence. The software can detect people automatically in a camera feed and send you notifications via its complementary android app called Bettereye smarter-vision receptor .The software includes features that convert your computer into an autonomous security system that reduces manual monitoring.
    Starting Price: $30
  • 5
    Protectstar Camera Guard
    ...But not only hackers found ways to misuse the webcam without a warning signal to the user: Also, the latest malware is highly dangerous because it specifically targets control of the integrated device camera. Then, with just one click, protection is enabled, and Camera Guard blocks and monitors processes that try to access your device's camera. Any security breach is reported. You can easily choose which apps on your device can access your camera or webcam. With Deep Detective, we have created an intelligent and versatile detective that monitors all accesses of the macOS device.
    Starting Price: $8.90 per year
  • 6
    Criminal IP

    Criminal IP

    AI SPERA

    Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time and facilitates preemptive responses accordingly. Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth. ...
    Leader badge
    Starting Price: $0/month
    View Software
    Visit Website
  • 7
    Cisco Meraki MV
    Impossibly simple to deploy, configure, and manage, MV provides reliable security and valuable business insights to organizations of any scale. Secure monitoring and management of all your cameras from anywhere in the world, no extra software required. With video storage and powerful hardware, there’s no need for an NVR or extra analytics packages. Cameras automatically purchase publicly signed SSL certificates and all Meraki management data is always encrypted by default. ...
  • 8
    Remote Eyes

    Remote Eyes

    Remote Eyes

    ...This security camera system setup is the perfect combination of application, integration, and security - giving you the ultimate tool for managing your business, whether it is convenience stores, drug stores, discount stores, or bars and restaurants. Leading retail operators such as McDonald’s, Dunkin’ Donuts, and Subway are rapidly deploying Remote Eyes with POS Integration for their security cameras in their stores.
  • 9
    Athena Security
    Athena sends proactive alerts to the designated officials if an elevated temperature is detected. By integrating with VMS, access control, and office management software companies, Athena centralizes all relevant information. Athena works with reputable name brands to include the best hardware in our system, such as Apple, Dell, Texas Instruments, and more. Our neural networks have been developed from scratch by PhDs in the field of deep learning and computer vision. We designed our hardware...
  • 10
    Sentry AI

    Sentry AI

    Sentry AI

    ...Sentry AI is trained to work with security cameras in sub-optimal conditions. The core design of our product is based on security and safety use cases. Sentry AI optimizes performance down to the camera level by adjusting algorithms continuously, based on user feedback and self-learning.
  • 11
    Avira Security Antivirus & VPN
    ...The latest mobile antivirus software now combines ultimate protection with a phone cleaner and booster. Also, protect your privacy with a free VPN. Scan, block, and remove viruses, spyware, malware, etc. VPN secures your data, anonymizes your browsing, and unblocks geo-restricted websites. Check if your email addresses or accounts have been leaked by third parties. Helps you find, track, and recover your lost or stolen phone. Shows which apps request access to sensitive data. Camera and microphone protection prevents someone from listening and spying on you through your device's camera and microphone. ...
    Starting Price: Free
  • 12
    Turing Vision

    Turing Vision

    Turing Vision

    ...Instant AI-based alerts that can be configured by event type, camera, location, role or shifts. Intuitive search to filter all archived events. Securely transmitted from all your cameras with end-to-end encryption in transit and in rest. Web-based platform to manage them across all your sites. Access all live streams and recordings from anywhere. Manage and monitor your devices from the same platform.
    Starting Price: $149 per year
  • 13
    Blue Iris

    Blue Iris

    Blue Iris Security

    Keep an eye on your family, home, business, cars & valuables. Remotely view your live cameras & recorded videos. Robust alerts on cameras and other conditions. V5 features a new user interface with every element redesigned! Use up to 64 cameras (webcams, network IP cams, analog cards, or your Windows PC desktop). Capture JPEG snapshots or movies in standard MP4, AVI, advanced DVR, or Windows Media file formats. Use motion or audio sensing to trigger recording, or record continuously or...
    Starting Price: $34.95 one-time payment
  • 14
    Camlytics

    Camlytics

    Camlytics

    Camlytics combines camera monitoring, surveillance and space analytics solutions. Connect your EXISTING IP camera system and get instant real-time statistics on people counting, vehicle counting, location occupancy, queues, heatmaps and more. Human/vehicle classification is also supported. The most cost-efficient counting & VMS software on the market. No need to buy expensive sensors - Camlytics will work on your IP camera system or even on webcams! Camlytics is a software...
    Starting Price: $129.00/one-time/user
  • 15
    Viseum

    Viseum

    Viseum

    ...The strongest long-term CCTV deterrent, solving the many problems with limited manpower watching cameras, standalone CCTV security camera systems, and manned guarding security patrols. We are the technology arm of Viseum® Community SafetyWatch®. The international manufacturers of unique Intelligent CCTV Product Solutions. We solve our customers’ problems with security and surveillance.
  • 16
    IBM Intelligent Video Analytics
    IBM Intelligent Video Analytics has been helping agencies and organizations worldwide analyze video captured by fixed cameras, such as those used for physical security, closed-circuit television (CCTV), and monitoring traffic, to extract key information from streaming video to uncover insights and patterns within untold hours of camera footage. Real-time alerts to call attention to events. Rich content-based indexing to find critical images and patterns.
  • 17
    Bosch Video Management System
    ...It keeps operations up and running even when both, Management and Recording Servers fail. On edge intelligent Video Analyses and the unmatched recording technology managing up to 2000 cameras (including up to 500 ONVIF cameras) with a single server dramatically reduces the total cost of ownership. Single Management Server System 1 to 2000 cameras out of the box. Only this system supports Bosch VMS-BIS Connectivity. Supporting multi Management Server requirements for metro, airport and others.
  • 18
    Razberi

    Razberi

    Razberi

    ...All-in-one Windows appliances, server, switching, storage. Connect to 3rd party IP cameras and IoT devices. Appliances for a wide range of deployment options. Monitor™ for on-premise visibility or via the cloud. CameraDefense™ to defend IP cameras against cyber attacks. ApplianceDefense™ to defend against attacks on appliances. Get started with a free demo of our simple, secure video surveillance and IoT solutions.
  • 19
    IGZY

    IGZY

    IGZY Group

    IoT BASED SOLUTIONS IGZY is the IoT arm of KocharTech helping organizations in phygital transformation. We, at IGZY, deliver e-surveillance & security solutions that make your business premises intelligent, safe & secure using state of the art unified IoT platform. Retail IoT-enabled camera and sensors offer solutions like motion detection, real-time notifications, remote monitoring,, people counting, and unlimited camera additions using a single dashboard. Smart solutions for actionable intelligence to improve security and in-store experience of the customers. ...
  • 20
    AXIS Camera Station

    AXIS Camera Station

    Axis Communications

    AXIS Camera Station is a video and access management software for surveillance suitable for a wide range of businesses. Retail stores, hotels, schools and manufacturing industries are just some of the companies that enjoy full control and protection of their premises and can quickly take care of incidents. All to make businesses run more smoothly. AXIS Camera Station matches our other network video products and features to offer you a complete, flexible, safe and reliable system. AXIS Camera...
  • 21
    Omnilert

    Omnilert

    Omnilert

    Save lives through early threat detection and rapid response with visual gun detection. Our AI-powered Gun Detect software brings reliable, 24x7 monitoring to security cameras, creating a widely deployable early gun detection solution. Our Emergency Communications and Automation Platform shares needed intelligence through automatic activation of emergency response plans and safety systems. No matter the threat, from guns to severe weather, we help you maximize every critical second and keep your people from harm's way. ...
    View Software
    Visit Website
  • 22
    Cloudvue

    Cloudvue

    Johnson Controls

    ...Command an entire security system in one interface, on one map, and click on any camera or door worldwide. Easily control cameras, grant access to doors, and set intelligent alerts with centrally managed software and cloud-connected hardware. An unlimited number of cameras and access control points can be added. Custom floor plan views, map views, and powerful dashboards keep data organized as operations scale.
  • 23
    icetana

    icetana

    icetana

    Empowering the team behind the camera. To protect the people in front of the camera. Collecting video footage is one thing, but security professionals shine when they can act in the moment of need. Unfortunately, too many security teams are stuck in an endless cycle of watching monitors. The number of monitors one person has to manage is multiplying at an alarming speed.
    Starting Price: $650 per month
  • 24
    QVR Pro

    QVR Pro

    QNAP Systems

    ...Businesses can easily expand the number of monitoring channels by purchasing QVR Pro licenses to deploy a large-scale surveillance network. QVR Pro supports all of the standard fisheye cameras available on the market, and features Qdewarp technology that converts distorted parts of the original images into proportional ratios. QVR Pro also provides industry-leading functions, including allowing a single fisheye camera’s image to be simultaneously viewed in nine channels from different angles and cross-platform hardware-accelerated decoding for fisheye camera images. ...
  • 25
    Staqu JARVIS
    Get real-time alerts based on centralized monitoring for safety, security, and operations on your existing camera. JARVIS is an audio-video analytics and management technology platform that has changed how people think about security cameras. It is the new technique of creating meaningful information from long CCTV video footage with short and crisp real-time alerts utilizing AI and computer vision. Fueled with artificial intelligence, patented technologies, and unique capabilities, JARVIS offers innovation for security and the best possible solution for business. ...
    Starting Price: Free
  • 26
    Black.ai

    Black.ai

    Black.ai

    Respond to events and make better decisions with the help of AI and your existing IP camera infrastructure. Cameras are almost exclusively used for security and surveillance purposes. We add cutting-edge Machine Vision models to unlock a high-impact resource available to your team daily. We help you to improve operations for your staff and customers without compromising privacy. No facial recognition, or long-term tracking, no exceptions.
  • 27
    exacqVision
    ...With an Exacq video surveillance solution, you can connect cameras, add access points, and select the storage that fits your needs. Additionally, exacqVision software allows you to customize deep learning analytics to match your business needs. Keep your existing IP or analog cameras or upgrade to something new. From excellent quality video and cameras equipped with video intelligence and analytics to small, discreet devices.
    Starting Price: Free
  • 28
    Protectstar Micro Guard
    ...Additionally, it reports known, and thanks to modern heuristic methods, also unknown attack attempts. We developed the app Camera Guard to block and protect your camera easily.
    Starting Price: $8.90 per year
  • 29
    Arcules

    Arcules

    Arcules

    ...Arcules is rapidly growing and baking even more security, simplicity, and flexibility goodness into our product than ever before. Imagine your entire organization at your fingertips from one interface. It’s possible! Remotely access any camera, from any device, at any time. You shouldn’t have to rip and replace to gain the benefits of integrated cloud security. Use your existing IP cameras and network gear.
  • 30
    Hikvision

    Hikvision

    Hikvision

    Central Management products include the Blazer Pro and HikCentral, which are Windows-based devices designed for central management of distributed sites or a large pool of cameras recording on Hikvision NVRs, DVRs, and Hybrid-SAN storage products. Modern and sleek User Interface for live view and playback with seamless management of 3,000 cameras per single CMS. Remote Server Manager (RSM) can be added to centrally manage 100k+ cameras. Provides advanced user management, including Active Directory Integration. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next