Latka logo

Top ThreatSTOP, Inc. Alternatives, Competitors & Similar Software

Founded 2009

Find 20 competitors in the Other Process Automation Software. Compare other SaaS such as HackNotice, Medsender and Project Portfolio Office. These ThreatSTOP, Inc. competitors have raised $14M and together serve more than 60 customers and employ over 380 team members.

Compare ThreatSTOP, Inc. with Medsender
2
Medsender

Other Process Automation Software

Medsender is a healthcare technology company specializing in AI-powered solutions designed to streamline administrative workflows within medical practices. Their platform offers a range of services, including HIPAA-compliant digital faxing, AI-driven document automation, and seamless integration with Electronic Medical Records (EMR) systems.

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with Project Portfolio Office
3
Project Portfolio Office

Other Process Automation Software

Project Portfolio Office (PPO) helps organisations achieve greater project success by implementing and adopting a simple to use, cost effective, configurable yet enterprise scalable project portfolio management application to plan, manage, collaborate, execute and report on their projects, programmes and portfolios. With numerous offices and a global network of certified partners, PPO is available anywhere and anytime. Our happy users range from small consultancies to global Fortune 500 organisations, and no matter their methodology, we help them by ensuring PPO aligns to their way of work! By making use of one of our numerous pre-configured solutions, our free online trial, learning videos and legendary 24/7 support, you can self-implement within 30 days or request our awesome team to assist every step of the way. PPO is a cloud based application that is secure, immediately available with a robust API for configuring and integrating with other tools. With no long term contract required and tiered based pricing, you can be completing your projects on time and within budget tomorrow. PPO’s capabilities include: • methodology & governance alignment; • time & cost management; • planning & task management; • resource & capacity management; • issue & risk management; • change & quality management; • document & knowledge management; • reports & dashboards; • communication, collaboration & alerts; • portfolio management & prioritisation; • idea & innovation management; • online approvals & configurable workflow; • customisable & integratable; • secure, auditable & access controlled; and • online help & support.

Revenue
$2.1M
Customers
-
Year founded
2005
Funding
-
Team size
19
Location
United Kingdom
Compare ThreatSTOP, Inc. with WooHoo®
5
WooHoo®

Other Process Automation Software

WooHoo®, Menlo Park, California. WooHoo® is a silicon valley based startup and creator of an award-winning Voice AI Assistant for Enterprises. WooHoo® brings the convenience of voice AI technologies to enterprises through its Voice-as-a-Service ( VaaS), Facial Recognition & a Cloud-based AI Platform. WooHoo® is the worlds first integrated AI Assistant that combines the power of Voice AI Technologies with IOT, converting voice into actions and delivering the personalized and intuitive user experience with a strong focus on data privacy, unlike other consumer voice assistants. WooHoo®, designs AI-driven IoT products and platforms to solve real-world problems for Enterprises utilizing AI, deep learning, voice-based technologies (incl. NLP & acoustics), facial recognition, security & data encryption, and cloud connectivity.

Revenue
$2.1M
Customers
-
Year founded
2016
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with DigitalDots Inc
6
DigitalDots Inc

Other Process Automation Software

Digital Platform for Intuitive Enterprise - Our non-intrusive platform operates independently of enterprise systems that bring together business, technology, governance, process, and people empowered to move quickly in the emerging technology landscape. When assembled from our company's technology, its capability enables enterprises to innovate, accelerate, and scale business solutions.

Revenue
$2.1M
Customers
-
Year founded
-
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with AimBetter
7
AimBetter

Other Process Automation Software

AimBetter has been specializing in support of database systems for our customers from the very start, especially focusing on the most popular products running on SQL Server, such as Priority, SAP Business One, Microsoft Dynamics and many other corporate solutions. In partnership with Ryltech, we offer a complete solution for managing the corporate information platform, giving our customers complete confidence that their dependence on database is completely validated. No up-front costs or long-term contract. No need for long-term commitment. No infrastructure investment is needed – we offer month-by-month subscription that can be terminated any time. AimBetter database monitor requires no outlay for licenses or hardware on-site. As well, with our Expert Support team, we give you comprehensive management control over your whole enterprise, alerting to SQL Server issues such as bottlenecks, slow queries, database performance problems or code errors in real time. #DBA #SQL #Developer #SSIS #SSRS #sqlDBAposition #sqlserver #MSSQL #OPTIMIZATION #troubleshooting

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with Kondukto
8
Kondukto

Other Process Automation Software

Kondukto is an AppSec orchestration and posture management platform that helps AppSec teams achieve instant visibility into the overall security posture by integrating all security data into one crystal clear view. It also enables faster triage and remediation of vulnerabilities with its orchestration, automation and vulnerability management capabilities.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with E-SIGN (UK) LIMITED
9
E-SIGN (UK) LIMITED

Other Process Automation Software

At E-Sign, we make signing smarter. We provide a secure, eIDAS compliant, and easy-to-use electronic signature platform that helps businesses digitise document workflows, reduce paperwork, and improve productivity. Unlike other providers, E-Sign provides advanced electronic signatures as default, meaning you can sign with confidence that your signature is legally binding. Simple e-signatures without proper verification can be challenged in court. E-Sign ensures every signature is secure and legally compliant, so your documents hold up when it matters most. Our data centres are based in the UK and we also offer UK-based customer support. The price you see is the price you pay, no hidden fees, overages or bait-and-switch renewals. Our e-signatures meet global compliance standards and integrate seamlessly with your existing systems, helping you close deals faster and operate smarter. Our client portfolio includes the NHS, University of Oxford, UK Fuels, Somerset City Council, Mid Devon Council, Sureserve, the National Clinical Homecare Association and more. We’re accredited by ISO 27001, ISO 9001, Cyber Essentials Plus, FSQS and PSN and our product has approved Government status.

Revenue
$2.1M
Customers
-
Year founded
2012
Funding
-
Team size
19
Location
United Kingdom
Compare ThreatSTOP, Inc. with thatDot
10
thatDot

Other Process Automation Software

Powering the next generation of cybersecurity applications thatDot presents a highly scalable streaming graph event processing engine that spun out of a DARPA project for advanced persistent threat (APT) detection. Creators of the Quine open source project, with funding from Crowdstrike, thatDot is rapidly becoming the most critical infrastructure for cybersecurity applications. thatDot Streaming Graph, the commercial version, is an event stream processor that interprets multiple simultaneous data streams as a graph, so it can do instant complex pattern detection on categorical data without having to turn it into bloated, sparse numerical data first. Standing queries allow you to ask questions of the past, present, and future at once, letting those answers flow in over time, with no time window limitations. No matter how long bad actors remain dormant, the moment they act, if your application is powered by thatDot, you’ve caught them. thatDot Novelty is a further advance with a pattern learning AI built in, so it finds anomalous event patterns without you even knowing what to look for. This advanced shift left style of event stream processing can do a lot more than just take cybersecurity to the next level, from real-time risk analysis and fraud detection to super-efficient data pipelines to IoT infrastructure optimization. Come check out where data processing is going next.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with thatDot
11
thatDot

Other Process Automation Software

Powering the next generation of cybersecurity applications thatDot presents a highly scalable streaming graph event processing engine that spun out of a DARPA project for advanced persistent threat (APT) detection. Creators of the Quine open source project, with funding from Crowdstrike, thatDot is rapidly becoming the most critical infrastructure for cybersecurity applications. thatDot Streaming Graph, the commercial version, is an event stream processor that interprets multiple simultaneous data streams as a graph, so it can do instant complex pattern detection on categorical data without having to turn it into bloated, sparse numerical data first. Standing queries allow you to ask questions of the past, present, and future at once, letting those answers flow in over time, with no time window limitations. No matter how long bad actors remain dormant, the moment they act, if your application is powered by thatDot, you’ve caught them. thatDot Novelty is a further advance with a pattern learning AI built in, so it finds anomalous event patterns without you even knowing what to look for. This advanced shift left style of event stream processing can do a lot more than just take cybersecurity to the next level, from real-time risk analysis and fraud detection to super-efficient data pipelines to IoT infrastructure optimization. Come check out where data processing is going next.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with IntelliGRC
12
IntelliGRC

Other Process Automation Software

IntelliGRC is at the forefront of CMMC (Cybersecurity Maturity Model Certification) compliance solutions. Our intelligent Governance, Risk Management, and Compliance (GRC) platform is specifically designed to guide defense contractors and their suppliers through the complexities of CMMC certification. Our Mission: To efficiently and authentically implement and manage CMMC compliance, making it accessible for organizations and service providers within the Defense Industrial Base (DIB) to pass 3rd party assessments.

Revenue
$2.1M
Customers
-
Year founded
2016
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with endgame.com
13
endgame.com

Other Process Automation Software

Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, globally. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.

Revenue
$2.1M
Customers
-
Year founded
2008
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with Banyan Security
14
Banyan Security

Other Process Automation Software

Banyan Security provides secure, zero trust “work from anywhere” access to applications and resources for employees and third parties while protecting them from being phished, straying onto malicious web sites, or being exposed to ransomware. A Flexible Edge architecture enables rapid, incremental deployment on-premises or in the cloud without compromising privacy or data sovereignty. A unique device-centric approach intelligently routes traffic for optimal performance and security delivering a great end user experience. Banyan Security protects workers across multiple industries, including finance, healthcare, manufacturing, and technology.

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with CleanTalk
15
CleanTalk

Other Process Automation Software

CleanTalk is a SaaS spam protection service for Web sites. CleanTalk uses protection methods which are invisible for site visitors. Connecting to the service eliminates needs for CAPTCHA, questions and answers and other methods of protection, complicating the exchange of information on the site. Our solutions are reliable, easy and efficient. Algorithms CleanTalk evaluates visitor behavior on the site and parameters filled in forms, these multi-level checks allow CleanTalk achieve such high-performance protection against spam attacks. The module is completely invisible to the visitors and allows you to permanently abandon the ways of protection that impede the communication of visitors to the site (CAPTCHA, question-answer, etc.). CleanTalk allows you to automate protection against distributed from spam and registration spam bots. The team CleanTalk has been developing a cloud spam protection system for 5 years and has created a truly reliable anti-spam service designed for you to ensure your safety. CleanTalk has an extensive database of spam activity of IP addresses and emails. We understand that these IP addresses are used for other types of attacks, including for fraud in electronic commercial transactions. The use the database of CleanTalk will help you more accurately identify fraud risks and can be used by you as one of the factors, as a complement to the existing system for tracking fraudulent activity. Every day CleanTalk receives information about spam attacks from 40-60 thousands of IP addresses. The entire base of spam active IP is about 20 000 000 IP addresses. https://cleantalk.org/help/fraud-prevention

Revenue
$2.1M
Customers
-
Year founded
2014
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with DH Anticounterfeit
16
DH Anticounterfeit

Other Process Automation Software

We offer a world leading digital solution that empowers brand protection teams in their everyday work. Our clients are global owners of intellectual property and brand protection teams who want to streamline, digitalize and professionalize their operations, case & project management, intelligence & data analysis, collaboration, communication & reporting of anti-counterfeiting activities. With a strong team of experts in law, brand protection, anti-counterfeit and software development, we strive to be in the forefront of legal tech helping our clients by delivering constant value and innovations to make true impact and solve complex problems. Our vision is to be the number one legal tech solution for brand protection teams making insightful decisions.

Revenue
$2.1M
Customers
60
Year founded
1972
Funding
-
Team size
19
Location
Sweden
Compare ThreatSTOP, Inc. with Critical Design Associates
18
Critical Design Associates

Other Process Automation Software

Who is CDA? Established in December 2001, Critical Design Associates, Inc. (CDA) is an IT consulting firm that delivers custom solutions to resolve clients’ unique business challenges. We specialize in Integration, Automation, Security, and Compliance. Our success is measured by the success of our clients, and we are committed to providing the highest quality service. There is a common challenge imposed on IT departments today: Too much to do and not enough resources to handle the load. We have the answer. We will work with you to develop a comprehensive solution serviced by our team of qualified technical experts from System Architects, Senior Consultants and Consultant Analysts to meet your project goals, to fill a resource staffing need or even if a fully managed services solution is required to fulfill specific IT functions.

Revenue
$2.1M
Customers
-
Year founded
2001
Funding
-
Team size
19
Location
United States
Compare ThreatSTOP, Inc. with AKARION
19
AKARION

Other Process Automation Software

Experience compliance in a new way. Less 🤔. More 🎉. We are an ambitious team of compliance experts who started in 2017 with the aim of taking compliance management software to a new level - simple, intuitive and efficient at the highest technological standard. More than 130 customers and partners worldwide rely on the AKARION Compliance Cloud. Get be inspired by our practice-orientated approach. Whether it's data protection, information security, emergency management, audit, e-learning, whistleblowing or risk management - reduce complexity in your compliance management and automatically create your audit-proof documentation history thanks to our trust-by-design approach and our unique trust layer. Get what you are looking for: An efficient and modular management system at the highest technological level.

Revenue
$2.1M
Customers
-
Year founded
2017
Funding
-
Team size
19
Location
Germany
Compare ThreatSTOP, Inc. with Exivity
20
Exivity

Other Process Automation Software

Exivity is a cloud-agnostic metering and billing software solution for hybrid cloud environments. By retrieving data from any public and on-premises cloud, Exivity creates a 360-degree view across all IT consumption supporting any MSP/CSP customer billing or enterprise chargeback/showback use case. Exivity is a proud member of the FinOps Foundation and a FinOps Certified Platform.

Revenue
$2.1M
Customers
-
Year founded
2016
Funding
-
Team size
19
Location
Netherlands
Top ThreatSTOP, Inc. Alternatives, Competitors & Similar Software | GetLatka