With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Powerful Website Security | Continuous Web Threat Platform
Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.
Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.
The Skype SourceForge project is the public repository for Skype-related open-source projects including SkypeWeb and Skype API implementations. Do you have a SkypeWeb or SkypeAPI project you'd like to share? Get in touch!
A light-weight, web-based event information tracking application implemented in Java and Ruby. Development is done using Extreme Programming (XP) practices and includes both jUnit & FitNesse testing.
Bring the web to your phone! Web Dog and Bone allows to send messages to groups, start calls or join conferences and retreive RSS feeds directly to their mobile phone through SMS. Feeds can be added in a plug and play like way enabling the app to grow!
JDisc Discovery supports the IT organizationss of medium-sized businesses and large-scale enterprises.
JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices.