Categories Tags Platforms Collections Comparisons

Alternatives to Qualitas Technologies

Shield AI
Shield AIShield AI's Hivemind platform enables autonomous drone and aircraft operations in GPS-denied and contested environments. Explore EdgeOS, ViDAR, Tracker, V-BAT, and X-BAT.
(0)
Microavia Anti-Poaching
Microavia Anti-PoachingMicroavia's drone-in-a-box UAV system delivers 24/7 autonomous anti-poaching surveillance with thermal imaging, real-time tracking, and automatic battery swapping for national parks and wildlife reserves.
(0)
Shield AI V-BAT
Shield AI V-BATShield AI's V-BAT is a combat-proven VTOL unmanned aerial system delivering superior ISR and targeting capabilities in GNSS-denied and communications-contested environments.
(0)
Ferretly AI Social Screen
Ferretly AI Social ScreenFerretly uses AI to analyze online behavior and flag 13 behavioral risks—like hate speech, threats, and self-harm—for safer hiring and brand partnerships. FCRA, EEOC, GDPR, and DPF compliant.
(0)
ShelfWatch
ShelfWatchShelfWatch uses AI and computer vision to deliver real-time shelf intelligence, planogram compliance, and retail execution analytics for CPG brands at scale.
(0)
Hailo AI
Hailo AIHailo designs high-performance, low-power AI accelerators and vision processors for edge devices, enabling real-time deep learning inference in robotics, automotive, security, and industrial applications.
(0)
Mazor X
Mazor XMazor X Stealth Edition by Medtronic combines robotic arm control with real-time Stealth Navigation for precise, AI-guided spine surgery.
(0)
QYSEA
QYSEAQYSEA develops AI-powered underwater ROVs, subsea hardware, and intelligent software for industrial inspection, marine research, offshore surveys, and more.
(0)
Tractable AI Claims
Tractable AI ClaimsTractable automates auto appraisal and claims workflows with AI-driven vehicle damage detection, image analysis, and part identification for insurers, repairers, and fleet operators.
(0)
Noetic Cyber AI Asset
Noetic Cyber AI AssetNoetic Cyber AI Asset provides AI-powered CAASM and EASM with continuous asset discovery, risk prioritization, and attack surface visibility from endpoint to cloud.
(0)

Top Product Categories

Writing

AI Writing AssistantsBlog Writing ToolsCopywriting Tools

Image Generation

AI Image GeneratorsPhoto EditorsBackground Removers

Video

AI Video GeneratorsVideo EditorsVideo Avatar Generators
See All Categories >>
© 2026 Tossom
Terms of ServicePrivacy Policy