Other Useful Business Software
Grafana: The open and composable observability platform Icon
Grafana: The open and composable observability platform

Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

Grafana is the open source analytics & monitoring solution for every database.
Learn More
Build Securely on AWS with Proven Frameworks Icon
Build Securely on AWS with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
AI-powered conversation intelligence software Icon
AI-powered conversation intelligence software

Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not.

Every customer interaction is vital to your business success and revenue growth. With Jiminny’s AI-powered conversation intelligence software, we take recording, capturing, and meticulous analysis of call recordings to the next level. Unlock call analytics that provide actionable insights with our call tracking software, empowering you to identify what's working and what's not. Seamlessly support your biggest objectives across the entire business landscape with our innovative call tracking system.
Learn More
Comet Backup - Fast, Secure Backup Software for MSPs Icon
Comet Backup - Fast, Secure Backup Software for MSPs

Fast, Secure Backup Software for Businesses and IT Providers

Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Learn More
SIEM | API Security | Log Management Software Icon
SIEM | API Security | Log Management Software

AI-Powered Security and IT Operations Without Compromise.

Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More

Additional Details for Mutation Mapper

Operating Systems

Linux, Mac, Windows

Intended Audience

End Users/Desktop

User Interface

JavaFX

Programming Language

Java

Registered

2012-04-30

Last Updated

Categories

Bio-Informatics

Maintainers

gantzgraf

Keep Me Updated!