Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
G-P - Global EOR Solution
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
Master/node to gather and graph "everything" on your systems using Tobi Oetiker's rrdtool. It can optionally warn your surveillance software. This software package was originally called LRRD. The project. Please see http://munin-monitoring.org/
OneLDAP is a limited LDAP server that is a proxy to other common protocols, such as POP3 and IMAP. It provides basic SEARCH and BIND functions for standard LDAP authentication. It is based on the shell backend function of OpenLDAP. Release files are available at the project website.
vEMan - [v]Mware [E]SX [Man]ager provides a GUI for managing ESX servers natively from within your Linux desktop without the need to use Windows vSphere® anymore!
Support vEMan development for v2.0 by gofundme!
http://www.gofundme.com/vEMan
Why I started vEMan? Because I hate it to start my Windows VM to manage ESX(i) servers ;o)
vEMan is (maybe) not needed if you use vCenter 5.x: http://kb.vmware.com/kb/2005377
--> vSphere >= v5 has a "web client"
BUT keep in mind that there are...
BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Naraio is LAMP like software. It contains Apache, MySQL, PHP, Perl, Openssl, Phpmyadmin, OpenLDAP, Subversion, Ruby, Python, Phpldapadmin, and Trac. Trac and Subversion are authenticates user with integrated ldap. Naraio is easy, secure and flexible.
It is a Process Monitoring Toolkit with the ability of Extend.
E.g. You can use it to monitor a specified process.
And set a triger like (over 50MB mem use) then do something like (report to DB).
OpenDCM is an Open Source Data Center Management project. System audits, rapid file/software deployment, os provisioning, reporting and more. Automate repetitive tasks and simplify the work of sysadmins in large scale data centers.
Our new software release will dramatically improve your medspa business performance while enhancing the customer experience
AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
SSS-OSCAR is an integrated release of the SciDAC:Scalable System Software (SSS) suite using the OSCAR cluster installation framework. The SSS project seeks to provide a standard interface for effective management and utilization of terascale systems.
Jail Chroot Project is an attempt of write a tool that builds a chrooted environment. The main goal of Jail is to be as simple as possible, and highly portable. The most difficult step when building a chrooted environment is to set up the right libraries