Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Financial reporting cloud-based software.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
Cookie based web authentication and single sign on system for largish intranets under a single domain where many, untrusted, people run their own web services. The server uses a private cookie scoped only for the client browser and the idcheck webserver which is always protected with SSL.
In addition to the common practise of using SSL for everything (which idcheck supports). The idcheck system can also be used to provide authentication to websites where you merely want to hide content...
Embed and share articles or posts from your wordpress blog
Enables your wordpress blog posts to be sharable through an embedded interface as a service by http://embedarticles.com
Embed Articles is a viral content distribution plugin that enables your posts and articles to be embedable to other websites through a creative embed button interface. By installing this plugin into your blog, your blog will be automatically be added with proper Open Graph Protocol metadatas which are being respected and parsed by most search engines like Google, Bing,...
Tools to update all pages of a web site, at a command. Header and menu may be copied on each page. It is possible also to add a header to all source files of a project (a licence for example).
...All outputs of the queries are represented as XML data. This service can be placed in the DMZ of your server. Connect your application data layer to this service. Example in C# is bundled in the archive.
Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.
For healthcare Providers and Facilities
Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
VCD-db is an web based movie catalog software. It supports multiple users to collect, manage and work with their media catalog. New movies can easily be added through several methods, for example by fetching data straight from websites such as imdb.com
Tool (C) to split the WURFL XML mobile browser database into individual device files with symlinks (stubs for NTFS) to reduce access time and server load. Includes a simple PHP library/API as an example how to access the data and an example phtml file.
Justo is a set of internet oriented applications (rias) for developers and geeks: messaging, blog, repository, frameworks, cms, cmf, distributed database, p2p, dev utils. Based on: Ajax, XML, AS/Flex, PHP, C/С++, C#, .NET, WinApi, XUL, Unix/Shell script
daitrix is a secure os built on security, ease of use, and linux/unix based. verry fast to install with 4 setup types- dev, server, desktop and all. everything a normal linux distro has and then some.
High performance Node.js (with native C addons) mining pool for CryptoNote based coins such as Bytecoin, DuckNote, Monero, QuazarCoin, Boolberry, Dashcoin, etc.. Comes with lightweight example front-end script which uses the pool's AJAX API.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.