With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Keep company data safe with Chrome Enterprise
Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
TCSystem provides platform independent c++ framework for streams, templates, threading and networking. It also includes a FOX based MSN Messenger and a file syncronisation program. With version 1.4 an OpenAL based Audio module was started.
Java Instant Message (IM) Library, Client and Tools. Flexible framework to design your own. AIM, ICQ, Yahoo, MSN, Jabber, SMS, Nate, GoogleTalk. GUI, spell checking and more. Includes a web interface for remote/cell access. Mac, Win, Linux friendly
Ice Messenger is a small Chat, where you talk about something with your friends our other people.
Ice Messenger you can allready use at your office and other places.
It has written in Java and so you can use it one all platforms which can use Java.
Here are a few:
Windows, Linux, Unix, Solaris, Macintosh and more.
This application is in the first version and so it has much of errors and other bugs!
Describe your bugs and errors in the forum.
SimplissIM is a simple instant messenger for local networks where people want to chat, not tweak their software settings. Automatic presence, no server needed, no list of contact to maintain (people appear automatically), seamless file sending...
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.