Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Airlock Digital - Application Control (Allowlisting) Made Simple
Airlock Digital delivers an easy-to-manage and scalable application control solution to protect endpoints with confidence.
For organizations seeking the most effective way to prevent malware and ransomware in their environments. It has been designed to provide scalable, efficient endpoint security for organizations with even the most diverse architectures and rigorous compliance requirements. Built by practitioners for the world’s largest and most secure organizations, Airlock Digital delivers precision Application Control & Allowlisting for the modern enterprise.
htc is a tool which lets you create your website in an easier way. A collection of php scripts takes an XML file and converts this XML file into HTML documents.
Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
ClearTaskMan is a Task Manager plugin for Jive Software's Clearspace. This plugin allows you to create tasks with dependencies and link documents to these tasks thus making Project Management more streamlined.
xGen is to creating XML what XPath is to reading XML.
The string
/html/body/div#container/div.menu/ul/li[5]
Can be used to create XML.
This saves a lot of boilerplate code when generating XML and a templating mechanism is not a good fit for your project.
For enterprise IT security teams and network administrators looking to safeguard their networks against the latest and more severe DDoS threats
The standalone SaaS-based DDoS intelligence solution proactively combats the increasing volume and complexity of DDoS threats, reducing operational costs and improving DDoS detection while safeguarding system availability— no dedicated DDoS equipment needed.