Other Useful Business Software
Desktop and Mobile Device Management Software Icon
Desktop and Mobile Device Management Software

It's a modern take on desktop management that can be scaled as per organizational needs.

Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Learn More
Cloud-based help desk software with ServoDesk Icon
Cloud-based help desk software with ServoDesk

Full access to Enterprise features. No credit card required.

What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
Try ServoDesk for free
G-P - Global EOR Solution Icon
G-P - Global EOR Solution

Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world

With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
Learn More
Secure Your Containers with Chainguard Icon
Secure Your Containers with Chainguard

1,400+ trusted container images to eliminate your vulnerabilities and mitigate malware

Chainguard Secure Containers — Spend less time patching vulnerabilities and more time building software that innovates. Secure, CVE-free OSS that empowers teams to build the future instead of patch the past.
Learn More
Powerful, all-in-one identity verification, fraud prevention and compliance platform. Icon
Powerful, all-in-one identity verification, fraud prevention and compliance platform.

For businesses needing an automated identity verification to defeat fraud while processing customers' data quickly and securely

iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud.
Learn More

Additional Details for ISIS

Operating Systems

BSD, Linux, Mac, Windows

Languages

English

Intended Audience

Developers, End Users/Desktop

User Interface

Web-based, Win32 (MS Windows), X Window System (X11)

Programming Language

C, Java, Perl, PHP, Tcl

Registered

2000-09-11

Last Updated

Categories

Database Engines/Servers, Internet

Maintainers

bsolano, erikisis, franck, kripke, mawag, thansen

Keep Me Updated!