Browse

OS OS

  • More...

Category Category

License License

Translations Translations

  • More...

Programming Language Programming Language

  • More...

Status Status

Audience Audience

User Interface User Interface

Top Apps

  • Identify and respond to threats before damage is done Identify and respond to threats before damage is done Icon
    Identify and respond to threats before damage is done Icon

    A SIEM that makes it easy to use logs for security, compliance, and troubleshooting.

    SolarWinds® Log & Event Manager (LEM) delivers comprehensive Security Information and Event Management (SIEM) capabilities in a highly affordable, easy-to-use, and quick-to-deploy virtual appliance. LEM provides the visibility, security, and control that IT professionals need to alert on and respond to security threats, and assist in meeting the regulatory compliance guidelines of HIPAA, PCI DSS, SOX, and more. Try it free for 30 days!
  • Reduce risk. Improve quality. Reimagine your QMS. Reduce risk. Improve quality. Reimagine your QMS. Icon
    Reduce risk. Improve quality. Reimagine your QMS. Icon

    Ensuring high quality and compliance for your products can be difficult. Not with BPA Quality on Office 365: a leading integrated QMS system.

    • Use a software-based approach that replaces manual processes and inefficient paper-based systems
    • Get pre-built templates that simplify quality and risk management and certificate renewals
    • Automate document approval and publishing, problem-solving, and continuous improvement workflows
    Is your organization under 1000 employees?
    Download a free trial
  • Shilosh OS

    Provide secure and stable OS, based on highly modified Linux Kernel, own package system, like "BSD Ports". Compatible with x86, Power PC. Easy to use of any level users. Complete Documentantion in many languages. 99% compatible with Windows.

  • Seguro Distributor

    Seguro Distributor aims the design of an efficient algorithm that allows the safe distribution of public files, i.g., executables and source code. Files are decryptable with a public key, which is generated by a private key.

    Downloads: 0 This Week Last Update: See Project
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you