With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Desktop and Mobile Device Management Software
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
CaTer is a terminal programm for the C64. It is intended to connect the C64 via a serial RS-232 connection to a Linux or Unix host.
It is possible to make either a CaTer auto start cartridge, or to load it with a BASIC loader.
OS NeXt... The next best thing since Linux! This operating system is unique. It is nothing like Windows or Linux. It has it's own easy scripting and programming langauge so that users can totally customize it. It has crash recovery and so much more!
WinMac is attempt to clone Mac OS X for the intel platform using the Apple Darwin 1.2 kernel. There are currently two teams working on the project. The kernel team is working on the basic compiling of Darwin on Intel. The GUI team is researching the Aqua
Log360 is a one-stop solution for all your log management and network security challenges.
For IT teams looking for an advanced Log Management solution
Log360 is a unified SIEM solution with integrated DLP and CASB capabilities that detects, prioritizes, investigates, and responds to security threats. It combines threat intelligence, machine learning-based anomaly detection, and rule-based attack detection techniques to detect sophisticated attacks, and offers an incident management console for effectively remediating detected threats. Log360 provides holistic security visibility across on-premises, cloud, and hybrid networks with its intuitive and advanced security analytics and monitoring capabilities.