Simply solve complex auth. Easy for devs to set up. Easy for non-devs to use.
Transform user access with Frontegg CIAM: login box, SSO, MFA, multi-tenancy, and 99.99% uptime.
Custom auth drains 25% of dev time and risks 62% more breaches, stalling enterprise deals. Frontegg platform delivers a simple login box, seamless authentication (SSO, MFA, passwordless), robust multi-tenancy, and a customizable Admin Portal. Integrate fast with the React SDK, meet compliance needs, and focus on innovation.
Start for Free
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Logpecker is a tool for syslog files like /var/log/messages. More flexible than a simple regexp matcher, you can use syslog facility and priority. Messages that appear too often are sieved out. Generates root-tail tickers, reports, active event lists
This project offers a client/server tool to analyze the /var/log/auth.log in order to gather information about the login attempts. The information is sent to a server side where the datas are stored in a sqlite database.
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
Hatohol collects monitoring information from running monitoring systems and shows their integrated data on one screen. This feature enables to consolidate monitoring centers and the operators even when monitored devices are being used in different places or with different monitoring software.
Open source Penetration Testing Suite for IT professionals and penetration testers. SecTest automates the boring repetitive procedures of penetration testing.