|
|
Related Products
-
NinjaOne
NinjaOne automates the hardest parts of IT, empowering more than 17,000 IT teams with visibility, security, and control over all endpoints. The NinjaOne platform increases productivity while reducing risk and IT costs. Organizations use NinjaOne, including its wide range of IT and security integrations, for use cases including endpoint management, patch management, mobile device management, software deployment, remote access, endpoint backup, and more.
-
Google Cloud Platform
Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes.
New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits.
Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
-
ManageEngine Endpoint Central
ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
-
QVscribe
QVscribe, QRA's flagship product, unifies stakeholders by ensuring clear, concise artifacts. It automatically evaluates requirements, identifies risks, and guides engineers to address them.
QVscribe simplifies artifact management by eliminating errors and verifying compliance with quality and industry standards.
QVscribe Features:
Glossary Integration: QVscribe now adds a fourth dimension by ensuring consistency across teams using different authoring tools. Term definitions appear alongside Quality Alerts, Warnings, and EARS Conformance checks within the project context.
Customizable Configurations: Tailor QVscribe to meet specific verification needs for requirements, including business and system documents. This flexibility helps identify issues early before estimates or development progress.
Integrated Guidance: QVscribe offers real-time recommendations during the editing process, helping authors effortlessly correct problem requirements and improve their quality.
-
GitGuardian
GitGuardian is a code security platform that provides solutions for DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers.
GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development and define and enforce policies consistently and globally across all systems.
GitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations, and alert to allow investigation and quick remediation.
Additionally, GitGuardian's Honeytoken module exposes decoy resources like AWS credentials, increasing the odds of catching intrusion in the software delivery pipeline.
GitGuardian is trusted by leading companies, including 66 degrees, Snowflake, Orange, Iress, Maven Wave, DataDog, and PayFit. Used by more than 300K developers, it ranks #1 in the security category on GitHub Marketplace.
-
Windocks
Windocks is a leader in cloud native database DevOps, recognized by Gartner as a Cool Vendor, and as an innovator by Bloor research in Test Data Management. Novartis, DriveTime, American Family Insurance, and other enterprises rely on Windocks for on-demand database environments for development, testing, and DevOps. Windocks software is easily downloaded for evaluation on standard Linux and Windows servers, for use on-premises or cloud, and for data delivery of SQL Server, Oracle, PostgreSQL, and MySQL to Docker containers or conventional database instances.
Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management.
Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments.
-
JOpt.TourOptimizer
JOpt.TourOptimizer is an adaptable component to solve VRP, CVRP, and VRPTW class problems for any route optimization in logistics or similar fields.
JOpt.TourOptimizer gives full access to modern optimization strategies and already includes many useful functions and algorithms to model various tour optimization problems. The JOpt.TourOptimizer library is easily integrated into any product. It can be customized to meet special requirements or adapt to the industries’ specific needs in which your software products are used. JOpt.TourOptimizer – enables you to enhance your product or project by seamlessly integrating DNA’s tour and resource optimization engine. It comes as a Java library or in Docker Container utilizing the Spring Framework and Swagger.
-
Securden Password Vault
Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails.
• Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files.
• Enforce password security best practices like periodic password resets.
• Generate and assign unique & strong passwords to IT assets.
• Share resources with IT teams and collaborate seamlessly
• Eliminate hard-coded credentials with API-based application password management.
• Control ‘Who’ has access to ‘What’ with granular controls.
• One-click remote access to IT assets through native apps & web-based sessions.
• Track all privileged activities with comprehensive Audit trails.
• Demonstrate compliance with industry standards using customized reports on privileged access.
• Check for breached passwords through dark web monitoring.
• Auto-fill credentials on websites.
-
JS7 JobScheduler
JS7 JobScheduler is an Open Source workload automation system designed for performance, resilience and security. It provides unlimited performance for parallel execution of jobs and workflows. JS7 offers cross-platform job execution, managed file transfer, complex no-code job dependencies and a real REST API.
Platforms
- Cloud scheduling from Containers for Docker®, Kubernetes®, OpenShift® etc.
- True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc.
- Hybrid use for cloud and on premises
User Interface
- Modern, no-code GUI for inventory management, monitoring and control with web browsers
- Near real-time information brings immediate visibility of status changes and log output of jobs and workflows
- Multi-client capability, role based access management
High Availability
- Redundancy and Resilience based on asynchronous design and autonomous Agents
- Clustering for all JS7 products, automatic fail-over and manual switch-over
-
Securden Unified PAM
Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization.
• Enforce remote password resets on devices.
• Manage Windows domain, service, local admin accounts & their dependencies.
• Eliminate hardcoded-credentials from scripts and configuration files.
• Automate password access for non-human identities with APIs.
• Protect SSH keys, track usage & associate with UNIX devices.
• Share accounts with granular access controls.
• One-click remote access to assets without revealing passwords.
• Grant Just-In-Time access to privileged accounts.
• Shadow, Monitor & record live sessions.
• Endpoint privilege management with application controls.
• Integrate with AD, AzureAD for user provisioning.
• Integrate with solutions for MFA, SIEM, ITSM & SSO.
• Comply with regulations with audit trails & custom reports
|
|