Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Velo is an open Identity and Access Management platform, with many IDM services such as provisioning, access control, password synchronization, audit & compliance, self service interfaces and much more.
Liberatio is open source systems management built on the Java platform. Liberatio currently collects an asset inventory and communicates via JXTA - allowing communication regardless of network obstacles.
A software solution for managing Cybercafes,register users,define a network,log client's internet traffic,define custom services and block client workstations according to the antiterror laws of Italy (Legge Pisanu 155/05) and of other countries.
AtomicDate is a Simple Network Time Protocol (SNTP) implementation in Java, as described by RFC 2030. It's composed by a client/server framework and works as an extension to java.util.Date class.
MACOW is a formal and scalable mandatory access implementation suitable on open worlds such as the provided on Semantic Web, Autonomic Computing and Coaltions and Federations scenarios. It is able to access control on distributed systems.
FOAFRealm (also called D-FOAF in version 2.0) is a distributed user profile management system based on FOAF. FOAFRealm is a set of tools that enables to manipulate FOAF (Friend-of-a-Friend) information within J2EE application and provides Realm implement
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
TightVNC is an improved version of VNC, great free remote-desktop tool. The improvements include bandwidth-friendly "Tight" encoding, file transfers in the Windows version, enhanced GUI, many bugfixes, and more.
DREK stands for Directory REpliKator; replicates one LDAP (sub)tree into another. Replaces attributes (base DN) to match the destination tree. Generates LDIF file which can be reviewed and imported by other means, like ldapmodify.
As in Pretty Good Privacy, this is a Pretty Good Incremental Backup tool. Inspired in rsync, jnSynch provides a basic file synchronization engine written in JAVA and so executable from either Java-compatible computer.
The Qualdev Security Server integrates the security services for the tools that support the Qualdev Group. It gives the necessary infrastructure to offer services that adjust to the necessities of Authentication, Authorization and Administration.
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
An easy-to-use generator for large numbers of passwords.
Originally for my school's IT Department, I have now released the source code under the GNU GPL. It supports the random generation of huge numbers of passwords that can be determined in a variety of ways.
System monitor is a Java library for monitoring system resources like memory and CPU consumption. The library provides unified cross-platform API for accessing system information. Currently Linux and Windows are supported via Java Native Interface (JNI).
Archive files by date. Scans the folders, and archive them by dates. Features: 1. Simulation -- allows user to see what will happen before it commits 2. Progress bar -- a separate thread running a progress bar.
Acelet-Scheduler with SuperScheduler and SuperWatchdog is a Java task scheduler with daemon and GUI for system and application job scheduling, can schedule tasks in a distributed environment. Holiday adjustable. Works out-box. See http://www.acelet.com
Configuration managment utility enables a Java application to read and manage configuration data from a variety of sources: property files, XML, database, JNDI, Log4J. Web client provided. JMX enabled.
Nessconnect is a GUI, CLI and API client for Nessus and Nessus compatible servers. With an improved user interface, it provides local session management, scan templates, report generation through XSLT, charts and graphs, and vulnerability trending.
The main purpose of this project is to develop a Graphic policy definition editor implemented in Java language and based on the XACML standard which manages access control policies