Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.
When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
Untangle is a Linux-based network gateway with pluggable modules for network applications like spam blocking, web filtering, anti-virus, anti-spyware, intrusion prevention, bandwidth control, captive portal, VPN, firewall, and more. Visit http://untangle.com
Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.
Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance.
To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
Log Searcher provided full indexed search engine for log files on each servers. It supported many powerful query types such as phrase queries, wildcard queries, proximity queries, range queries and more with Lucene and Solr technology. It comes with Web interface to search and generate chart accordingly. This project is Open Source project with Apache 2.0 license for allowing you to extra development on top of Log Searcher project. The initial configuration was written on readme.txt before...
Get a unified timekeeping, scheduling, payroll, HR and benefits portal with WorkforceHub.
WorkforceHub is the instantly useful, delightfully simple to use, small business solution for tracking time, scheduling and hiring. It scales as your business grows while delivering the mission-critical features an organization needs. It is tailored to, built for, and priced for small business employers.
Photo Searcher is under Apache 2.0 license. It's using photo to search the photo in the database. You should upload and save the photo by using Photo Searcher feature in order to build the database.
This web based application user can view the log file.
This is a web application, using thing application user can see the log file with multiple search critria.
This application supports Log4J and log4Net.
This tool is used to filter the log file, based on multiple criteria. Admin user can configure multiple applications and group the application up to three levels. Application name will be displayed in tree structure based upon grouping. Application will be displayed based on roles.
System will allow the user to filter the log file not only...
DAD is a Windows event log and syslog management tool that allows you to aggregate logs from hundreds to thousands of systems in real time. DAD requires no agents on the servers or workstations. Correlation and analysis is driven through a web front end.
A log player for "The Fourth Coming" ("T4C", http://www.the4thcoming.com).
Given a log-file, this tool will replay a T4C game you've played before.
It will have built-in functionnalities like : merging log files
together, searching and cleaning
a java based monitoring tool,logs all the user actions and errors with runtime data, displays execution performance and executed method lines. It doesnt modifiy class source files and no need for coding, just put it in your class path and see the mir
From desk booking and visitor management, to space planning and office utilization data, Eptura Workplace helps your entire organization work smarter.
With the world of work changed forever, it’s essential to manage your workplace and assets together to effectively create a high-performing environment. The Eptura experience combines the power of workplace management software with asset management, enabling you to effectively operate your building and facilitate hybrid work.
An easy-to-use Java desktop application to centrally monitor resources from a variety of environments, including the ability to dynamically set up rules to trigger actions based on monitoring. Clients connect via simple and efficient UDP based protocol.
PlayBilling is a webbased billing system for internet cafe and wireless hotspot provider mostly written in Java featured with: tariff management, prepaid, postpaid and discounts, user management and extensive reporting system
The Internet Censor is a multi-platform, Internet clustering program, for which the resulting data will be used in the creation of a non-profit content-filtering Internet Search Engine for children.
Big-Brother is a collection of J2EE filters and servlets that provide custom monitoring and auditing of web-applications, keeping track of who does what, when, and how often. It makes use of the jakarta-apache Struts framework for the interface GUI.
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
Cross-language and cross-platform user's action tracking framework,enabling researchers to respect user's privacy through visual controls which allow users to start/stop/pause data recording,view logged data and opt out of a research study.