With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Desktop and Mobile Device Management Software
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Your own mailing system (most easiest to use with zero configuration) for the entire world (available in almost all the languages of the world) which will include Mail User Agent and Mail Transfer Agent thus trying to give maximum speed while transferrin
A networking site on the lines of Orkut.Right now we plan to build it on Jboss seam and use a Java content management system like apache Jackrabbit as the backend. It would be more of a POC than an actual commercial app. Later on mabe it can be enhanced
Virtual Qmail - virtual domains management system for qmail. It is designed to be fast, reliable, and easy to use. Includes software allowing users to manage their accounts via WWW.
An email client which basically focuses on sorting incoming emails for better email management using classification algorithms. Implemented for windows platform.
The e-mail client focuses on inbox management, categorization of e-mails usig algorithms
Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time
Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.