Suggested Categories:

Keyword Research Tools
Keyword research tools are very useful for SEO professionals, bloggers, ecommerce retailers, content creators, and more. Keyword research tools let you research keywords that are trending, popular, or that your competitors are having success with so that you can create content around and optimize for these keywords.
Social Media Monitoring Software
Social media monitoring software helps businesses and organizations track, analyze, and respond to conversations about their brand, products, or relevant topics across social media platforms. These tools collect mentions, comments, and posts from social media sites like Twitter, Facebook, Instagram, and LinkedIn, providing real-time insights into public sentiment, trends, and audience engagement. Social media monitoring software often includes sentiment analysis to gauge positive, neutral, or negative mentions and provides actionable insights for marketing, customer service, and public relations teams. Additionally, it can track competitors' social media activity, measure campaign performance, and help manage online reputation. These tools are crucial for managing a brand’s presence and responding quickly to customer feedback and industry developments.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

22 Products for "keywords" with 1 filter applied:

  • 1
    Logically Intelligence
    ...As a result, Logically Intelligence provides analysts with the insights needed to detect, assess, and act on emerging threats. Monitor and analyze a specific information environment by creating a Situation Room using a simple keyword-based interface or advanced boolean queries. Identify and analyze narratives emerging in a specific Situation Room, including keywords driving the narrative, associated posts, and original poster data. Also, you can compare two narratives over time and measure the impact of counter-narratives. Boolean queries or keywords can be added in any language and the platform will display and translate data from all languages.
  • 2
    Bodi

    Bodi

    Pilixo

    ...Prevents users from accidentally clicking on a malicious link stopping malware in its tracks irrespective of the vector – email, Skype, attachments, websites, Slack, etc. Stop data theft with real-time alerts based on defined keywords, file actions, special formats such as SSN or credit card number, and unauthorized privilege change. Detailed analysis of application usage, web browsing, printing, etc. as well as time and length of usage. Full video recording and keyword searching of each device in case you need to review and analyze. Full remote control capabilities of the endpoint to correct device. ...
    Starting Price: $20 per month
  • 3
    LeakRadar

    LeakRadar

    LeakRadar.io

    LeakRadar.io monitors and detects data leaks related to your domains, email addresses, and keywords. It offers various plans suited for personal use, small companies, and large enterprises, with real-time alerts, an API, and advanced breach prevention tools.
    Starting Price: €9.99/month
  • 4
    NewsGuard

    NewsGuard

    NewsGuard

    Leveraging its bird’s eye view of the digital information environment, NewsGuard extracts and catalogs the top misinformation narratives spreading online. NewsGuard provides data about each narrative in machine-readable format—such as example language, links containing the false claim, and related keywords and hashtags. The Misinformation Fingerprints can be used as data seeds for existing AI/Social Listening tools to trace false claims across the internet and social media or can be used by human analysts to understand mis- and disinformation risks. Purpose-built for use by both human analysts and AI tools, NewsGuard’s Misinformation Fingerprints™ provides a continuously updated view of the digital information environment—and a powerful way to track narratives that are emerging and spreading online.
  • 5
    Logentries

    Logentries

    Logentries

    ...Whether your data is in structured JSON or mysterious plain text, it’s easy to send to Logentries for immediate search. Our search is now 300x faster than its previous generation. Whether you’re searching keywords, key value pairs or regex patterns, get results faster than ever. Organize logs from servers, applications, routers, containers and more in one central location. Create custom tags for spotting important events. View logs in raw format or in Table View for easy interpretation. Easily analyze logs from servers, network services, platforms, containers and more. ...
  • 6
    ACID Cyber Intelligence

    ACID Cyber Intelligence

    ACID Technologies

    ACID’s Cyber Intelligence solution is based on proprietary multiple designated robots that perform comprehensive, optimized, round-the-clock website monitoring of a large number of targeted sources, including: • Social networks • Criminal sites • IRC chats • Deep Web • Dark Net and more… The searches are conducted based on a virtually unlimited number of client-defined keywords, which are automatically translated into multiple languages. These searches cover multiple identifier that potentially places the organization at risk: • Leaked user names & passwords • E-mails • Domain names • Credit card data • Cyber operations • Intellectual property • Key personnel and more… Alerts are displayed in real-time on the smart, user-friendly ACID dashboard, and are also automatically sent to the client via e-mail, without delay. ...
  • 7
    ASGARD Management Center
    ...Its rich API facilitates interoperation with SOAR frameworks, sandboxes, antivirus systems, SIEM systems, CMDBs, IPS devices – or in other words: with literally any security device you may have in place. This short demo shows how easy it is to launch a scan with custom IOCs from a connected MISP. In the example we select all events with the keyword “Emotet”, add them to a new rule set and use that rule set in a new Group Scan with THOR.
  • 8
    Mailock

    Mailock

    Beyond Encryption

    ...It combines award-winning encryption technology with multi-factor identity authentication to protect confidential emails from cyber risk and keep customer information protected. Compose a secure email from your desktop, browser, or use rules and keywords to initiate the encryption. Set authentication challenges to verify your recipients’ identity so only the right people gain access. Keep audit trails for every message and track your recipients’ activity with real-time read notifications. Recipients can encrypt their replies for free. Empower your customers with a secure thread to your business. ...
    Starting Price: $9.30 per user per month
  • 9
    Canopy

    Canopy

    Canopy

    ...Whether you're dealing with PSTs, file shares, or servers, our machine-learning algorithms are trained to zero in on protected data. They've already detected billions of PII elements without the need for regex or keyword searches, and continue to improve with every completed project. Whether you're responding to a breach or you're proactively working to mitigate risk, Canopy's patented cybersecurity and data privacy technology has you covered. Fulfill regulatory and ethical obligations to notify quickly in the event of a data breach with streamlined data mining, PII review, and entity consolidation.
  • 10
    StaffCop

    StaffCop

    Atom Security

    ...Block Blocking access to "negative" sites, running applications and removable USB-storages to reduces the risk of malware infection and increase employee productivity. Review Search for all data for keywords and regular expressions, easy correlation & drilldown
    Starting Price: $69.00/one-time/user
  • 11
    Autopsy

    Autopsy

    Basis Technology

    ...Autopsy runs background tasks in parallel using multiple cores and provides results to you as soon as they are found. It may take hours to fully search the drive, but you will know in minutes if your keywords were found in the user's home folder. See the fast results page for more details.
  • 12
    Patch My PC

    Patch My PC

    Patch My PC

    Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. ...
    Starting Price: $2 per device per year
  • 13
    Skopenow

    Skopenow

    Skopenow

    ...Establish the digital footprint of your subject by collecting and collating relevant information and metadata into an automated report, enabling you to start your investigation as soon as your report is loaded. Automation of the search, collection, sorting, and analysis of open-source data. Use red flags, such as behaviors and keywords, to create a real-time digital footprint of publicly available data to make informed decisions. Establish connections between a subject’s associates and business affiliations through advanced scanning of social profiles, posts, and digital interactions.
  • 14
    Netwrix Endpoint Protector
    ...The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information.
  • 15
    NxFilter

    NxFilter

    NxFilter

    ...The software caches DNS responses from upstream servers, reducing DNS traffic and enhancing efficiency. It supports user authentication methods, including Active Directory integration, and offers URL keyword filtering to block specific search terms in search engines. NxFilter is known for its stability, often running for months without requiring restarts, and is scalable to accommodate several thousand users.
    Starting Price: Free
  • 16
    Takedown.co

    Takedown.co

    Takedown.co

    Takedown is a digital content protection service that specializes in swiftly detecting and removing unauthorized copies of videos and other content from across the internet. It helps creators, models, studios, and publishers reclaim lost revenue by preventing illegal distribution on platforms like OnlyFans, Patreon, YouTube, and adult entertainment sites. The service scans over 420,000 websites daily, including video streaming services, forums, and search engines, to identify infringements....
    Starting Price: $39/user/month
  • 17
    Cisdem AppCrypt
    ...Protect apps - Lock individual apps, such as Photos and WhatsApp - Allow access to your chosen apps only (on Mac only) Block websites - Block specific sites, such as facebook.com - Filter URLs including the keywords you specify - Restrict certain categories of sites, such as social media - Allow access to approved sites only Set schedules - Schedule app locking and website blocking to be active at all times or during specific times - Provide a General Schedule feature - Provide a Custom Schedule feature (on Mac and Windows only) Offer password protection - Require a password unlock apps, unblock sites, or change schedules - Require a password to quit Cisdem AppCrypt
    Starting Price: $19.99 per year
  • 18
    EncryptTitan
    ...Meet compliance requirements for protecting sensitive, private information. Providing data breach protection and avoiding costly fines and penalties. The outlook plug in can be used with our keyword encryption deployment, where the user can select which emails to be encrypted for the add in. EncryptTitan helps the safeguarding of private information & avoidance of litigation & bad press which can impact customer trust. Book your demo today and learn more about EncryptTitan.
  • 19
    Fasoo Data Radar
    Fasoo Data Radar (FDR) is a data discovery and classification solution that helps organizations locate, analyze, and manage sensitive unstructured data across on-premise servers, cloud storage, and endpoints. It scans and classifies files based on keywords, regex patterns, file formats, and other predefined policies, ensuring organizations maintain control over critical information. With real-time monitoring and centralized policy enforcement, FDR enhances data security by identifying risks, preventing unauthorized access, and assisting with compliance requirements such as GDPR, HIPAA, and CCPA. ...
  • 20
    Netwrix Data Classification
    ...Gain a better understanding of data patterns specific to your organization. With compound term processing and statistical analysis, you’ll get more relevant results than by relying on keywords and semantic analysis. Kick off your discovery in minutes with out-of-the-box rules that identify data protected by GDPR, PCI DSS, HIPAA and other regulations.
  • 21
    NexVision

    NexVision

    NexVision Lab

    ...NexVision's AI/ML-powered engine continuously collects, analyzes, and sorts big data from publicly available databases and the deep web, supporting multiple languages and equipped with natural language processing and steganography-decoding capabilities to detect hidden information used by advanced threat actors. The user-friendly dashboard allows for setting keyword alerts, conducting investigations, and analyzing results while maintaining user anonymity. NexVision enables organizations to proactively safeguard their assets and maintain a secure online environment.
    Starting Price: Free
  • 22
    Veriato Workforce Behavior Analytics
    ...Veriato’s AI-powered algorithm analyzes user behavior patterns and automatically alerts you to any abnormal or suspicious activity. Assign productivity scores to websites, programs, and applications. Select between three types of screenshots: Continuous, Keyword Triggered and Activity Triggered. Track activities on local, removable, and cloud storage, as well as print operations. See when files are created, edited, deleted, or renamed.
    Starting Price: $25 per user per month
  • Previous
  • You're on page 1
  • Next