Other Useful Business Software
Our Free Plans just got better! | Auth0
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Criminal IP: Cybersecurity Search Engine
Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.
Never misplace a package or lose track of a delivery.
Simply "snap, notify and sign." PackageX is a simple yet powerful last-yard solution that will streamline the way you manage inbound deliveries, saving you from manually notifying the recipients and ultimately improving workplace productivity. The app uses Machine Learning and state of the art AI algorithms to extract information from package labels (even handwritten labels), and to match and route deliveries to the correct recipients. Lastly, the app collects signatures and notifies the recipient when the package is picked up, keeping everyone in the loop.
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server
Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
Centralized Workload Automation and Job Scheduling
Orchestrates any process from a single point of control. Build reliable, low-code workflows in half the time. Develop end-to-end business and IT processes faster with hundreds of drag-and-drop actions. Coordinate enterprise-wide MFT processes using dozens of prebuilt actions for common file operations.
