Alternatives to ConfigOS

Compare ConfigOS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ConfigOS in 2026. Compare features, ratings, user reviews, pricing, and more from ConfigOS competitors and alternatives in order to make an informed decision for your business.

  • 1
    Flagsmith

    Flagsmith

    Flagsmith

    Flagsmith is a fully supported open source Feature Flag, Remote Config, and A/B testing service. Use our hosted API, deploy to your own private cloud, or run on-premise. Flagsmith makes it easy to create and manage features flags across web, mobile, and server side applications. Just wrap a section of code with a flag, and then use Flagsmith to toggle that feature on or off for different environments, users or user segments. Feature flags - Release features with confidence through phased rollouts. Remote config - Easily toggle individual features on and off, and make changes without deploying new code. A/B and Multivariate Testing - Use segments to run A/B and multivariate tests on new features. With segments, you can also introduce beta programs to get early user feedback. Organization Management - Organizations, projects, and roles for team members help keep your deployment organized. Integrations - Easily enhance Flagsmith with your favourite tools.
  • 2
    Runecast

    Runecast

    Runecast Solutions

    Runecast is an enterprise CNAPP platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It automates vulnerability assessment, configuration drift management and continuous compliance – for VMware, Cloud and Containers. By proactively using our agentless scanning in real-time admins discover potential risks and remediation solutions before any issues can develop into a major outage. It provides continuous audits against vendor best practices, common security standards, and frameworks such as BSI IT-Grundschutz, CIS, Cyber Essentials, DISA STIG, DORA, Essential 8, GDPR, HIPAA, ISO 27001, KVKK, NIST, PCI DSS, TISAX, VMware Security Hardening Guidelines, and the CISA KEVs catalog. Detect and assess risks and be fully compliant across your hybrid cloud in minutes. Runecast has been recognized with Frost & Sullivan's 2023 European New Product Innovation Award in the CNAPP industry.
  • 3
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 4
    rConfig

    rConfig

    rConfig

    rConfig is an open source network device configuration management utility that takes frequent configuration snapshots of devices. Open source, and built by Network Architects. We know what you need! rConfig is completely open source. Event the professional version. Built on top of world class open source software (Laravel & Vuejs), It is extensible, and you can participate in its development. Take snapshots of your routing table, mac, arp tables, as well as running configs and any other show commands. Get your network device's status for any point in time. rConfig allows you to deliver configs much faster throughv intuative, and simple automation capabilties. rConfig has implemented enhanced security to protect your assets with more coming in future releases. Such as SSO, config encryption & MFA. Add customizations, contribbute to rConfig, or purchase support for priority feature addition to your rConfig installations.
    Starting Price: €499 per year
  • 5
    ConfigCobra

    ConfigCobra

    ConfigCobra

    ConfigCobra is a CIS-certified SaaS that automates security compliance assessments for Microsoft 365 using the CIS Microsoft 365 Foundations Benchmark. It scans your tenant against CIS controls, detects configuration drift, and provides clear, actionable remediation guidance for every finding. Customers can run on-demand assessments or schedule recurring scans for continuous compliance monitoring, and generate CIS-certified, audit-ready PDF reports with evidence. ConfigCobra integrates with Microsoft Entra ID for secure access and uses Microsoft APIs to evaluate tenant configuration without making changes.
    Starting Price: $2/user/month
  • 6
    AWS Config
    AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, change management, and operational troubleshooting. AWS Config is designed to be your primary tool to perform configuration audit and compliance verification of both your AWS and third-party resources. You can publish the configuration of third-party resources such as GitHub repositories, Microsoft Active Directory resources, or any on-premises server into AWS.
    Starting Price: $0.001 per rule evaluation
  • 7
    WeConfig

    WeConfig

    Westermo

    WeConfig makes network configuration and maintenance more efficient, simple and reliable. Many hours of work can be saved in the initial installation, as well as in ongoing maintenance throughout the life of the network. Time-consuming tasks can be automated and configuration updates can be deployed in bulk. WeConfig minimizes the risk of configuration errors and makes it simple to optimize network security. A properly configured and monitored network with simple and robust maintenance processes will minimize any risk of network downtime.Cyber security deployment and analysis. Simple deployment of system wide security features minimises the risk for unauthorized access. Security analysis lets you find and fix network vulnerabilities. WeConfig makes it easy to create and maintain a robust network security standard. Diagnostic tools for high network reliability. WeConfig makes your network transparent and gathers all information in one place.
  • 8
    SaleConfig

    SaleConfig

    SaleConfig

    Tasks such as creating offers, preparing pricing and calculating costs are very time consuming, but now they can be easily automated with SaleConfig. Configurator, the main component of SaleConfig, is used to store product information and sales data (cost and pricing). This significantly reduces the amount of work for product designers, cost and sales data administrators. The configurator algorithm allows you to create any dependencies between the parameters of your products. A simple interface allows you to easily and quickly prepare your product. SaleConfig helps you prepare your offer and shows you all available options, configurations and dependencies. This allows even less experienced salesmen to create an offer, as well as reducing the time needed for their training. Your salesmen can work on site and have access to SaleConfig, they just need access to the internet.
  • 9
    ConfigBox
    ConfigBox is a multi-functional Product Configurator for Joomla, WordPress and Magento with integrated Order Management and implements the whole order process from product configuration, request for quotation (RFQ), ordering and shipping. With a ConfigBox license, you do not need any additional software for a complete eCommerce solution. There are extra packages for integration with third-party systems and open interfaces to create adapters for other ERP or CRM systems. ConfigBox enables you to present complex products and services in a simple and professional fashion and prevents incompatibilities and calculates intelligent pricing automatically. All this comes in full integration with Joomla/Magento and soon for a broader range of content management and eCommerce systems. Product data entry is done with interfaces that are specifically designed for user-friendliness and intuitive handling.
  • 10
    Adaptiva OneSite Health
    Adaptiva OneSite Health automatically checks the configuration of endpoints, diagnoses any problems, and remediates any issues. And it does this at massive scale – hundreds of thousands of endpoints – without bandwidth throttling or disrupting business processes. Adaptiva OneSite Health is the fastest, most scalable solution to manage endpoint health at scale and includes over 100 pre-built checks and remediations. Our customers use Endpoint Health to ensure endpoints are functioning properly and securely. Over 100 built-in checks can ensure Bitlocker is turned on, or ConfigMgr is working as expected. A major national retailer ran Adaptiva OneSite Health on just over 11,000 live production endpoints. They found a 55% failure rate. Endpoint Health was able to automatically remediate 89% of failed endpoints, with an instant savings of over $1m.
  • 11
    ConfigCat

    ConfigCat

    ConfigCat

    10 minutes trainable feature flag and configuration management service with unlimited team size, awesome support and no surprises. Turn your features on/off using ConfigCat's dashboard even after your code is deployed. ConfigCat lets you target user segments based on region, email, subscription or any other custom user attribute. We support % rollouts, A/B testing and variations. ConfigCat is a hosted service for feature flag and configuration management. It enables you to decouple feature releases from code deployments. We provide open source SDKs to support easy integration with your Mobile, Desktop application, Website or any Backend system. Separate marketing releases from code deployments. This way you can deploy code anytime the development is done or even incomplete. And turn on the feature later when you are ready. Soft launch, just like the cool kids.
    Starting Price: €79 per month
  • 12
    Leanides Lab Station
    The Leanides Lab Station started out as a way to transfer Virtual GNS3 lab configs to Real Cisco devices. We have achieved that goal and it has developed into a complete Lab system that can now store all the Cisco lab configs that you do for easy retrieval and deployment. Not only that, it has emerged as a fast and easy way to transfer a text file config to a Cisco device that can change the way people prepare Cisco devices in a lab environment. After doing many Cisco Labs and setting up countless Cisco devices in the workplace from scratch, I could see the need for a tool that would be able to quickly roll out network configurations to Cisco devices. The idea of a multi-purpose tool that could be of use at all levels of Cisco study evolved with time and the purpose was to develop something that is both useful and easy to use.
    Starting Price: $49 per year
  • 13
    opConfig

    opConfig

    FirstWave

    opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPAA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant.
  • 14
    SupportXMR

    SupportXMR

    SupportXMR

    SupportXMR is a mining pool for Monero (XMR). SupportXMR helps Monero miners increase their mining yield. Getting started is easy and this pool has a large and friendly community that are happy to help you. SupportXMR recommends XMRig (CPU, Nvidia, AMD). It is very user-friendly and comes with their own Setup Wizard for easy config generation. Each mining software will have it's own config, but they will all ask for the same information. You can also set worker names or fixed difficulty through the configuration.
  • 15
    Fidelis Halo

    Fidelis Halo

    Fidelis Security

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!
    Starting Price: Free
  • 16
    SolarWinds Kiwi CatTools
    Powerful network automation and configuration management software. Affordable network configuration management for small business networks. Schedule automatic backup activities and roll out configuration changes to multiple devices at the same time. Pre-schedule changes to your network device configurations to occur only on the devices you choose, and only when you want them to. Get alerted on changes to your network equipment so you can head off any malicious activities. Quickly rollback configuration changes when needed to avoid issues before their impact is felt. Schedule automated backups of network device configuration from routers, switches, firewalls, etc. Managing one-off config changes isn’t easy, not to mention the impact a minor issue can have on your entire network. Simultaneously perform or schedule configuration changes across multiple network devices with great ease. Changes to config files, outside of your knowledge, could be a sign of something insidious.
    Starting Price: $811
  • 17
    Patch My PC

    Patch My PC

    Patch My PC

    Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.
    Starting Price: $2 per device per year
  • 18
    CloudBoost

    CloudBoost

    HackerBay

    You can install CloudBoost anywhere you like. We have a Docker Compose file that can help you get started with CloudBoost in few minutes and with just one command. You can use this compose file to install the service locally on your local dev machine, or you can install the service to Azure, AWS, DigitalOcean, Softlayer, Packet and more. Create a config folder in project root if it does not exist. You need to create a new file cloudboost.json under config folder and save that file with MongoDB and Redis configuration. Once the server is running. You'll see the ClusterKey and SecureKey on the console which means you've successfully started CloudBoost. If you don't see any of these keys, please raise a GitHub issue and let us know.
    Starting Price: $49 per month
  • 19
    Bitcanopy

    Bitcanopy

    Bitcanopy

    Automated AWS security. Hands-off AWS infrastructure insights and remediation. Ensure AWS Config is enabled in all regions. Identify and stop S3 public read/write/full control. Automatically enforce S3 objects and volumes encryption. Stop login from invalid IP address. Stop non-compliant dev resources. Delete unused elastic load balancers. Automatically apply IP restriction policy on AWS resources. Delete new internet-facing ELBs. Only keep certain port open based on pre-defined policy. RDS - Terminate unencrypted public instances. Monitor and remediate your infrastructure agains 100+ such rules that include compliance against AWS CIS benchmarks and AWS Best Practices.
    Starting Price: $75 per month
  • 20
    Ludwig

    Ludwig

    Uber AI

    Ludwig is a low-code framework for building custom AI models like LLMs and other deep neural networks. Build custom models with ease: a declarative YAML configuration file is all you need to train a state-of-the-art LLM on your data. Support for multi-task and multi-modality learning. Comprehensive config validation detects invalid parameter combinations and prevents runtime failures. Optimized for scale and efficiency: automatic batch size selection, distributed training (DDP, DeepSpeed), parameter efficient fine-tuning (PEFT), 4-bit quantization (QLoRA), and larger-than-memory datasets. Expert level control: retain full control of your models down to the activation functions. Support for hyperparameter optimization, explainability, and rich metric visualizations. Modular and extensible: experiment with different model architectures, tasks, features, and modalities with just a few parameter changes in the config. Think building blocks for deep learning.
  • 21
    Kooder

    Kooder

    Kooder

    Kooder is an open source code search project, offering code, repositories and issues search service for code hosting platforms including Gitee, GitLab and Gitea. There are two modules, gateway and indexer. Gateway is integrated inside gateway under default config.
  • 22
    SolarWinds Engineer's Toolset
    Network software that includes over 60 must-have tools. Automated network discovery. Real time monitoring and alerting. Powerful diagnostic capabilities. Enhanced network security. Configuration & log management. IP address and DHCP scope monitoring. The right network toolset designed to easily manage and troubleshoot your network. Discover your entire network, including equipment, MAC to IP address relationships, Switch Port mapping, and more. Monitor and receive alerts in real time on network availability and health. Perform robust network diagnostics for faster troubleshooting and quick resolution of complex network issues. Simulate attacks on your network to identify security vulnerabilities. Configure devices on your network and troubleshoot any config issues with specialized network engineer tools. Deploy an array of network discovery tools, including Port Scanner, Switch Port Mapper, SNMP sweep, IP Network Browser, MAC Address Discovery, Ping Sweep, and more.
  • 23
    Secure.com

    Secure.com

    Secure.com

    Secure.com is a cybersecurity platform that helps organizations operationalize security through governed workflows—covering SOC operations and incident response, exposure remediation (vulnerability/patch + cloud/config), and continuous compliance evidence. It’s built for CISOs and SOC/SecOps leaders who need consistent execution and accountability, CTOs/engineering leaders who want security embedded into operational workflows, GRC/compliance teams who need audit-ready evidence without scrambles, and fractional CISOs/consultants standardizing security programs.
  • 24
    Inferno Trading

    Inferno Trading

    Inferno Trading Inc.

    This is an algorithmic trading bot application that utilizes the Universal Portfolio algorithm developed by Thomas Cover. It is a console application that connects directly to Trader Workstation built by the brokerage Interactive Brokers. The bots works by utilizing previous prices of stocks to determine what the future portfolio should look like. It purchases (rebalances) the stocks only once per day according to the algorithm. The stocks and market that are utilized are entirely customizable through the config file.
    Starting Price: $100 CAD
  • 25
    TYCHON

    TYCHON

    TYCHON

    Tychon is an advanced endpoint analytics and remediation platform designed to provide comprehensive visibility and control over enterprise endpoints. It enables organizations to search, visualize, remediate, and monitor security compliance across all endpoints within a unified interface. Key features include real-time monitoring, historical data tracking, and rapid query capabilities, allowing for instant identification of threats and vulnerabilities. It offers dynamic dashboards that provide insights into critical cybersecurity violations and a centralized view of vital security areas. Tychon supports compliance with various standards, including STIG, CVE/IAVA, and endpoint protection, and integrates seamlessly with existing investments. It is lightweight and serverless, deploying through Intune/MECM, and is designed to operate in both cloud and on-premises environments.
  • 26
    CodeRifts

    CodeRifts

    CodeRifts

    CodeRifts is a zero-config GitHub App that detects breaking changes in OpenAPI schemas on every pull request. It scores risk across 4 dimensions, enforces governance policies before merge, and translates technical API changes into business impact — blast radius, affected clients, and estimated cost.
    Starting Price: $49/month
  • 27
    ConfigPay

    ConfigPay

    BNT Soft

    Serving small, medium, and large financial institutions for more than a decade, we offer custom-made solutions to our customers. Working alongside the client, we ensure our solutions are specific to their needs. Our solutions are further optimized and implemented using an agile method which fosters convenience and results. ConfigPay, an SAP Hybris Commerce application is an intelligent payment integration tool. A readymade payment gateway platform, the application is designed for easy and convenient integration with other SAP Hybris Commerce platforms. Our payment system provides payment data localization, payment service provider (PSP) integration, and data sync between SAP and Hybris eCommerce. ConfigPay can also be integrated with IoT, SAP (ERP, C4C) and non-SAP back-end systems, POS, SFDC, and back-end OMS. Integration with social media- Facebook, Twitter, third-party integration, payment gateway, email, SMS gateway, shipping, tracking, Sprinklr, and Google Analytics.
  • 28
    Blendin

    Blendin

    Blendin

    Blendin is the simplest workflow for integrating multilingual content into your app. We support a range of programming languages and use cases. Get started with just a few lines of code. Don't waste time wiring together your own localization setup. Blendin provides an opinionated service where the entire process can be managed from a single config file. Whether it's integrating your Github repo for continuous updates. Or uploading your documents from Docusaurus, Blendin makes it easy to work with the developer tools you already love. Blendin leverages state-of-the-art LLMs and is constantly improving translation quality. Save on tokens with our centralized database of translations. Blendin is a framework for managing multilingual content in your application. We provide both an opinionated white-glove service where an entire internationalization process can be managed from a single config file, and also a suite of developer tools to allow low-level customization.
    Starting Price: $9.99 per month
  • 29
    CudaText

    CudaText

    CudaText

    CudaText is a cross-platform text editor, written in Object Pascal. It is open source project and can be used free of charge, even for business. It starts quite fast on Linux on CPU Intel Core i3 3GHz. It is extensible by Python add-ons, plugins, linters, code tree parsers, external tools. Syntax parser is feature-rich, from EControl engine. Syntax highlight for lot of languages (270+ lexers). Code tree structure of functions/classes/etc, if lexer allows it. Code folding, multi-carets and multi-selections. Find/Replace with regular expressions. Configs in JSON format. Including lexer-specific configs. Tabbed UI, with a split view to primary/secondary, and a split window to 2/3/4/6 groups of tabs. Command palette, with fuzzy matching, minimap, and micromap. Shows unprinted whitespace and offers support for many encodings. Customizable hotkeys. Binary/Hex viewer for files of unlimited size (can show 10 Gb logs).
  • 30
    Lepton

    Lepton

    Lepton

    Lepton is an open-source project on GitHub. It's free and we don't accept donations. If you like, feel free to donate to Wikimedia Foundation, which helps sustain free knowledge through Wikipedia and its sister projects for people around the world. Lepton replies on GitHub APIs to detect the language. Leptonis a centralized configuration file for Lepton and is parsed at the app startup. The file is not auto-generated. Lepton is a pure desktop client of GitHub Gist without its own service. All data are either saved locally or in the GitHub Gist service. Create a GitHub token with gist enabled. Put the token and other configs in the enterprise section in the Lepton config file. Lepton provides a formatted description section with title and tag support. You can group your gists based on their languages and custom tags. Letpon supports Markdown rendering. As a bonus, you can use Lepton for markdown note-taking and access it everywhere.
    Starting Price: Free
  • 31
    XMRig

    XMRig

    XMRig

    High performance, open source, cross platform RandomX, KawPow, CryptoNight and AstroBWT CPU/GPU miner, RandomX benchmark and stratum proxy. The preferred way to configure XMRig is the JSON config file as it is more flexible and human friendly. The command line interface does not cover all features, such as mining profiles for different algorithms. Important options can be changed during runtime without miner restart by editing the config file or executing API calls. Wizard helps you create initial configuration for the miner. Workers helps manage your miners via HTTP API. Default donation 1% (1 minute in 100 minutes) can be increased via option donate-level or disabled in source code. XMRig source code available on GitHub under terms of GPLv3 license. Binary downloads and build instructions available for most popular platforms. We use a self hosted buildbot to create binaries for every commit.
  • 32
    Gunbot

    Gunbot

    Gunbot

    Automate your trading to get better and more consistent results. Get a life time license with free updates & awesome support. Generate profits by automatically executing your trading strategies. What sets Gunbot apart from other bots are the innovative strategies, speed, extreme flexibility and awesome user community. No need to trust a cloud service. Gunbot fully runs on your own system: Windows, macOS, Linux or Raspberry Pi. New to trading? Tried and tested trading strategy presets make it easy to get started. Unlimited bot instances, JSON based config, automated config changes. Gunbot allows you to go crazy. Gunbot software updates are free. No subscription, just a one time license fee. Gunbot is perfect when you want to accelerate your crypto trading. It allows you to trade profitably 24/7. It's likely the most privacy friendly trading bot out there, Gunbot collects no data at all about the trades users make. Unlike many other bots, this is not a cloud service.
  • 33
    RushHoster

    RushHoster

    RushHoster

    Need to demo a site ASAP? Try RushHoster. Upload your static files and go live in the time it takes to send a message. No accounts, no configs, no headaches. Your content is stored using end-to-end encryption and delivered over secure HTTPS. Use it for teaching, freelancing, or prototyping projects. And stay tuned for future upgrades like PHP and PDF hosting.
  • 34
    QuickDiff

    QuickDiff

    QuickDiff

    QuickDiff is a wrapper around the popular diff tool on Linux, designed to make viewing the changes between 2 blocks of texts more easy. This allows you to see the difference in text, lists, mails, and config files. It will graphically show you the differences between the 2 textareas by highlighting those areas that have changed. You can then generate a unique URL to share the results with anyone.
  • 35
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 36
    FTK

    FTK

    FTK

    The best work in education is between teachers and students directly, based on relationships, trust, and high expectations. A tool such as this should only and can only be used in conjunction with this student-teacher relationship. Decide configs such as whether responses should rely solely on your content or incorporate knowledge from the web. FTK can cater to each student by adapting responses to individual reading levels and leveraging interests for more engagement.
    Starting Price: Free
  • 37
    Shootmail

    Shootmail

    StoreBud Technologies LLP

    Shootmail is a template-first mail platform with scheduling and analytics. Shootmail has purpose built, growing list of email templates, that you can modify by passing JSON config and send using Shootmail's SDK. It is a complete mail platform where you can register your domain, send emails and track analytics. Not just opens, clicks and deliveries but also how your links are performing by region, devices, browsers etc.
    Starting Price: $5 per month
  • 38
    Netwrix Change Tracker
    Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.
  • 39
    Codehooks

    Codehooks

    Codehooks

    Codehooks is a new and simplified backend-as-a-service to create complete API backends with JavaScript / Node.JS. Enjoy smooth and fast backend development with ZERO config serverless JavaScript/TypeScript/Node.js with integrated NoSQL document Database, Key-Value store, CRON Jobs and Queue Workers. The document database is built with RocksDB and provides a MongoDB-ish query language.
  • 40
    Jitsi

    Jitsi

    Jitsi

    Multi-platform open-source video conferencing. At Jitsi, we believe every video chat should look and sound amazing, between two people or up to 75 participants. Whether you want to build your own massively multi-user video conference client, or use ours, all our tools are 100% free, open source, and WebRTC compatible. Web, Android, iOS, React-native, and Electron apps. Ubuntu and Debian Packages install in minutes. Customize with config files or change the code. Many of the world’s leading WebRTC companies are using Jitsi as part of their product ecosystems. Why? Because Jitsi Videobridge and the projects surrounding it are secure, reliable, lightweight and scalable.
  • 41
    Aviator

    Aviator

    Aviator

    Put your mundane, frustrating workflows on autopilot. Get access to a world-class developer experience every step of the way: from writing, testing and reviewing code, to merging, building and deploying. Promote a culture of smaller PRs, stabilize flaky tests, or protect important branches from build failure. Aviators automation connects with your existing toolchain. Integrate with any CI provider, any source-control system, and other tools. Aviator empowers you to automate across your developer toolchain seamlessly. Battle hardened, and comes with security, reliability and scalability built in. We support on-prem deployments, exports to data lakes/ data warehouses, SAML auth and are SOC2 certified. Aviator is highly configurable. Use our config rules, APIs and webhooks to perform automated actions across all your developer tools.
    Starting Price: $12 per user per month
  • 42
    SonarQube for IDE
    Easy to use, no configuration needed — just install from your favorite IDE marketplace and continue to code while SonarQube for IDE (formerly SonarLint) does its job. Your current linting tools may come with overhead – specialized tools for languages or longer setup and config time. With SonarQube for IDE, you can settle on a single solution to address your Code Quality and Code Security issues. We have you covered with hundreds of unique, language-specific rules to catch Bugs, Code Smells, and Security Vulnerabilities right in the IDE, as you code. From dangerous regex patterns to non-compliant coding standards, SonarQube for IDE is your true confidante in delivering error-free code. With an intelligent tool by your side, your mistakes are only visible to you so you can understand them, quickly remediate them, and learn along the way.
  • 43
    Diego

    Diego

    Tech Amigos

    Between Kubernetes, AWS, and observability tools, deploying new software has become nightmarishly complex. Diego offers a simpler way. Automate code-to-cloud setup and ship software faster with Diego: - Build with confidence on a well-architected cloud setup (ArgoCD, Kubernetes, Prometheus) - Ready-to-use environments and pipelines – no config required - Saves months of DevOps work and slashes cycle times Diego gives you everything you need to deploy secure, scalable, and resilient containerized applications – fast.
  • 44
    PivotData Microservice
    PivotData microservice is a simple way to add self-service analytics & BI reporting into your web application. Configure your data sources with JSON config and generate pivot tables and charts reports with web API. PivotData microservice is an analytics backend that translates reports defined in terms of the cube model (dimensions, metrics, parameters) into database queries. Reporting engine manages caching, queuing, calculations, DB connections and exports to various formats. Unique capabilility is a rendering of HTML pivot tables: they simply may be shown on any web page.
    Starting Price: $499 one-time payment
  • 45
    SDS IronSphere

    SDS IronSphere

    Software Diversified Services

    This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
  • 46
    Edka

    Edka

    Edka

    Edka automates the creation of a production‑ready Platform as a Service (PaaS) on top of standard cloud virtual machines and Kubernetes. It reduces the manual effort required to run applications on Kubernetes by providing preconfigured open source add-ons that turn a Kubernetes cluster into a full-fledged PaaS. Edka simplifies Kubernetes operations by organizing them into layers: Layer 1: Cluster provisioning – A simple UI to provision a k3s-based cluster. You can create a cluster in one click using the default values. Layer 2: Add-ons - One-click deploy for metrics-server, cert-manager, and various operators; preconfigured for Hetzner, no extra setup required. Layer 3: Applications - Minimal config UIs for apps built on top of add-ons. Layer 4: Deployments - Edka updates deployments automatically (with semantic versioning rules), supports instant rollbacks, autoscaling, persistent volumes, secrets/env imports, and quick public exposure.
    Starting Price: €0
  • 47
    SolarWinds Server Configuration Monitor
    Server configuration and change monitoring tool that's built to be easy to use. Don’t let unexpected or unauthorized configuration changes compromise your environment. Quickly understand if config changes line up with an outage or performance issue. Get a unified experience with other SolarWinds systems, servers, and network management products. Simple-to-understand, affordable licensing allows you to fully support multiple projects. Server Configuration Monitor supports change monitoring for both Windows and Linux servers and applications. SCM is built on Orion, so it can integrate with Server & Application Monitor (SAM), allowing you to correlate change configuration to performance. Server Configuration Monitor comes with out-of-the-box profiles made to monitor hardware and software configuration changes, changes to IIS, changes to sensitive files and groups in Linux, and changes to Linux files impacting operations.
  • 48
    Stream Security

    Stream Security

    Stream Security

    Stay ahead of exposure risks & threat actors with real-time detection of config change impacts and automated threat investigations fused to posture and all activities. Track all changes, and detect critical exposure and toxic combinations before attackers do. Leverage AI to effectively address and fix issues using your preferred methods. Utilize any of your preferred SOAR tools to respond in real time or use our suggested code snippets. Harden and prevent external exposure & lateral movement risks, focus on risks that are truly exploitable. Detect toxic combinations of posture and vulnerabilities. Detect gaps from segmentation intent and implement zero-trust. Answer any cloud-related question fast with context. Maintain compliance, and prevent deviation from taking hold. We integrate with your existing investment. We can share more about our security policies and work with your security teams to deliver any specific requirements for your organization.
    Starting Price: $8,000 per year
  • 49
    Homie

    Homie

    Homie

    Homie helps your team overcome timezone struggles, context switching, stale project boards, knowledge silos, and many more issues that can slow down team software development. Out the box, with zero config, Homie can: - act as a search engine for your project & code - create tasks in Slack - generate good PR summaries in GitHub/Gitlab - Provide code help, by explaining PRs, and bug fixes - write changelogs, and documentation - notify of potential duplicate tasks - Send weekly progress summaries for PRs, and contributors Everything to help speed up software development.
  • 50
    Easy2Patch
    Easy2Patch is a software that enables centralized updating of third-party products running on computers within IT ınfrastructures. It works integrated with WSUS, ConfigMgr, and Intune. Its scope is limited to third-party Updates on Windows Operating System Platforms. Easy2Patch does not allow the archiving of updates or the archiving of setup processes. This design ensures that your updating and installing processes are automatically on time. Updates for third-party products are securely provided with the original site link. With the Defender feature, Easy2Patch can automatically send third-party applications to the computers within the group the system administrators determined. These are on the CVE score to be determined but forgotten or not configured to be sent via Easy2Patch. *Stay up to date *Extensive application pool for wide use *Automatic protection of computers with Microsoft Defender feature