Alternatives to Encryptik

Compare Encryptik alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Encryptik in 2026. Compare features, ratings, user reviews, pricing, and more from Encryptik competitors and alternatives in order to make an informed decision for your business.

  • 1
    Pepperi

    Pepperi

    Advantive

    The #1 B2B sales platform for medium, large and enterprise consumer goods manufacturers and distributors. Pepperi is a comprehensive, unified commerce platform to manage all aspects of your B2B sales. We combine a B2B eCommerce storefront, sales rep app for mobile order-taking (iOS/Android), Trade Promotions module, Retail Execution, Route Accounting / DSD & Inside Sales - in ONE UNIFIED cloud-based platform that runs online and offline to maximize in-person and online B2B sales. Thanks to its proprietary IPaaS (Integration Platform as a Service), Pepperi syncs seamlessly to your existing tech stack such as ERPs, Accounting software, Payment and Shipping gateways. Pepperi is the ONLY purpose-built mobile solution on the market and currently serves over 1000 companies in 65 countries.
  • 2
    Encrypted Data Gateway Engine
    Authora's Encrypted Data Gateway Engine "EDGE" is a command line designed for organizations that must securely exchange large volumes of information. EDGE protects business-critical data easily and with little impact on existing systems. EDGE can also be used to protect large volumes of information stored on servers and backup media from unauthorized access. From tape backup processes to batch FTP transfers and data distribution to partners, EDGE provides robust encryption capabilities for automated data processing applications. Adding EDGE's cryptographic functions to business applications and processes allows organizations to address risk mitigation and compliance standards. Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems.
  • 3
    zdaemon

    zdaemon

    Python Software Foundation

    zdaemon is a Unix (Unix, Linux, Mac OS X) Python program that wraps commands to make them behave as proper daemons. zdaemon provides a script, zdaemon, that can be used to run other programs as POSIX (Unix) daemons. (Of course, it is only usable on POSIX-complient systems.) Using zdaemon requires specifying a number of options, which can be given in a configuration file, or as command-line options. It also accepts commands teling it what to do. Start a process as a daemon. Stop a running daemon process. Stop and then restart a program. Find out if the program is running. Send a signal to the daemon process. Reopen the transcript log. Commands can be given on a command line, or can be given using an interactive interpreter. We can specify a program name and command-line options in the program command. Note, however, that the command-line parsing is pretty primitive.
  • 4
    Fink

    Fink

    Fink

    The Fink project wants to bring the full world of Unix open source software to Darwin and Mac OS X. We modify Unix software so that it compiles and runs on Mac OS X ("port" it) and make it available for download as a coherent distribution. Fink uses Debian tools like dpkg and apt-get to provide powerful binary package management. You can choose whether you want to download precompiled binary packages or build everything from source. The project offers precompiled binary packages as well as a fully automated build-from-source system. Mac OS X includes only a basic set of command-line tools. Fink brings you enhancements for these tools as well as a selection of graphical applications developed for Linux and other Unix variants. With Fink the compile process is fully automated; you'll never have to worry about Makefiles or configure scripts and their parameters again. The dependency system automatically takes care that all required libraries are present.
  • 5
    Certbot

    Certbot

    Certbot

    Certbot is a free, open source software tool for automatically using Let’s Encrypt certificates on manually-administrated websites to enable HTTPS. Use our instruction generator to find custom commands to get Certbot on your server's environment. Pick your server's software and system above. Certbot will fetch Let’s Encrypt certificates that will be standard Domain Validation certificates, so you can use them for any server that uses a domain name, like web servers. You can also use these certificates for other TLS applications such as IMAPS. A command line is a way of interacting with a computer by typing text-based commands to it and receiving text-based replies. Certbot is run from a command-line interface, usually on a Unix-like server. In order to use Certbot for most purposes, you’ll need to be able to install and run it on the command line of your web server, which is usually accessed over SSH.
  • 6
    Rclone

    Rclone

    Rclone

    Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection. It is used at the command line, in scripts, or via its API. Rclone really looks after your data. It preserves timestamps and verifies checksums at all times. Transfers over limited bandwidth; intermittent connections, or subject to quota can be restarted, from the last good file transferred. You can check the integrity of your files. Where possible, rclone employs server-side transfers to minimize local bandwidth use and transfers from one provider to another without using the local disk.
  • 7
    Label Flow

    Label Flow

    Jolly Technologies

    Get up and running in a matter of a few minutes with the step-by-step guided setup wizard. Directly pull data from any data source or execute barcode label printing directly from any existing software or web applications. Select from thousands of pre-defined industry standard label formats. Add 1D and 2D barcodes with extensive formatting and error-checking options. Encode RFID tags with EPC Gen 2 UHF chips. Automate printing by defining print conditions and linking the number of prints to the inventory count in the database. Print hundreds of labels in a few seconds by sending native commands to supported barcode printers. Directly connect to any existing database via a live connection and integrate with existing inventory systems without any import or export. Print barcode labels in the background from a third-party software or web application using the command-line utility.
    Starting Price: $275 one-time payment
  • 8
    Webmin

    Webmin

    Webmin

    Webmin is a web-based interface for system administration for Unix. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more. Webmin removes the need to manually edit Unix configuration files like /etc/passwd, and lets you manage a system from the console or remotely. Usermin also provides web interfaces for viewing and managing data in MySQL and PostgreSQL databases, editing Apache .htaccess configuration files, and running commands on the server. The administrator has full control over which of these modules are available to users.
  • 9
    Bash

    Bash

    Bash

    Bash is a free software Unix shell and command language. It has become the default login shell for most Linux distributions. In addition to being available on Linux systems, a version of Bash is also available for Windows through the Windows Subsystem for Linux. Bash is the default user shell in Solaris 11 and was the default shell in Apple macOS from version 10.3 until the release of macOS Catalina, which changed the default shell to zsh. Despite this change, Bash remains available as an alternative shell on macOS systems. As a command processor, Bash allows users to enter commands in a text window that are then executed by the system. Bash can also read and execute commands from a file, known as a shell script. It supports a number of features commonly found in Unix shells, including wildcard matching, piping, here documents, command substitution, variables, and control structures for condition testing and iteration. Bash is compliant with the POSIX shell standards.
  • 10
    openIndiana

    openIndiana

    openIndiana

    OpenIndiana is an operating system from and for the illumos community, it branches from the UNIX-derived family tree, and as such it can sometimes seem quite complex. But with a little help and information, once you know the basics, you will find it actually has some of the nicest and friendliest tools around. As most Unix-derived operating system, it can be completely controlled via a Command Line Interface shell, but it also supports a windowing GUI system. From the CLI, it supports a number of different shells, the two main ones being ksh93 and Bash. It also supports the original SunOS SVR4 commands, the command and syntax famiilar to BSD users, and a large portion of the GNU userland commands that most Linux users are familiar with. You can select any or all of those different commands from your shell configuration, giving you the environment you are most happy with.
  • 11
    COLMAP

    COLMAP

    COLMAP

    COLMAP is a general-purpose Structure-from-Motion (SfM) and Multi-View Stereo (MVS) pipeline with a graphical and command-line interface. It offers a wide range of features for reconstruction of ordered and unordered image collections. The software is licensed under the new BSD license. The latest source code is available at GitHub. COLMAP builds on top of existing works and when using specific algorithms within COLMAP, please also cite the original authors, as specified in the source code. For convenience, the pre-built binaries for Windows contain both the graphical and command-line interface executables. To start the COLMAP GUI, you can simply double-click the COLMAP.bat batch script or alternatively run it from the Windows command shell or Powershell. The command-line interface is also accessible through this batch script, which automatically sets the necessary library paths. To list the available COLMAP commands, run COLMAP.bat -h in the command shell cmd.exe or in Powershell.
  • 12
    tcpdump

    tcpdump

    tcpdump

    Tcpdump is a powerful command-line packet analyzer that allows users to display the contents of network packets transmitted or received over a network to which the computer is attached. It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.
  • 13
     OraDump-to-MySQL

    OraDump-to-MySQL

    Intelligent Converters

    OraDump-to-MySQL is a program to export data from Oracle dump files into MySQL, MariaDB or Percona database. The program does direct reading from the dump, so Oracle installation is not required. Command line support allows to script, automate and schedule the conversion process. Key features: All versions of Oracle dump files are supported (both EXP and EXPDP); All versions of Linux/Unix and Windows MySQL are supported with forks (MariaDB, Percona) and DBaaS variations; Option to merge Oracle data into an existing MySQL database; Parallel export Oracle dump files are supported; Option to convert Oracle data into MySQL dump file
  • 14
    Salesbeat

    Salesbeat

    Salesbeat

    You have the human power and we have the data. Together we can provide your sales department with new customers. To do this, we have developed a browser-based solution that you can use to search for companies and contact persons easily and without much effort. The result can be seen and you can go directly to personal acquisition. Don't waste time. In this way you not only increase the quality of your customer discussions but also increase the satisfaction of your conversation partners. Expand your existing database, clean up outdated data records or use the latest information for further use in your existing system. A dynamic and flexible search enables you to carry out queries tailored to your company. If you want to keep an eye on hundreds of existing customers, prospects and business partners at the same time and on a daily basis, you will quickly get lost in the flood of data.
  • 15
    Shell Assistant

    Shell Assistant

    Shell Assistant

    •SSH and SFTP client •Shell Terminal •SFTP File manager •SFTP code editor •Custom tab & split window layouts •Switch between workspaces •Connection, key & password management •Stream audio and video, view images and pdf's, edit code over SFTP •Tunnel network ports •Text editor-like command editing •Paste history •Free & ad-free •Respects your privacy Connect to remote hosts over SSH, including Amazon Web Service EC2, Linodes, Digital Ocean or Raspberry Pis. Connect to local unix-like installations running Mac OS, Linux, MinGW, Cygwin, Git-bash and Windows Subsystem for Linux. A great tool for your toolbox if you work with Unix, Linux, Mac Command Line, Raspberry Pi's or anything that uses a Command Line Interface. To download the latest version, please visit shellassistant.com.
  • 16
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 17
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 18
    REVE Secure

    REVE Secure

    REVE Secure

    Dual authentication check of login’s credibility via user’s registered credential (Password) and security token generated at authorized user end only. Passwords are incompetent in securing your logins. Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. Blocks unauthorized login attempts made using passwords. Supports a multitude of platforms and devices.
  • 19
    WatchWave

    WatchWave

    ScanWave CTS

    WatchWave Security operations center provides a complete view of all the relevant data from the organization's systems, devices, and their interactions with real-time security insights for immediate action that scales the resources and reduces exposure to risk. WatchWave provides security professionals with comprehensive capabilities that accelerate threat detection, investigation, and response — modernizing security operations and strengthening cyber defenses. WatchWave Security operations center uses a universal agent, which is a small program installed on the enterprise customer systems to be monitored. The agent provides the necessary monitoring and response capabilities, while the WatchWave server provides the security intelligence and performs data analysis. In addition, WatchWave also uses an agentless approach for systems that an agent cannot be installed on (firewalls, routers and even Unix systems etc.).
  • 20
    Removal.AI

    Removal.AI

    Removal.AI

    Create a transparent background instantly and turn your images into art, stunning banners, visual presentations, product catalogs, and graphics. Fully customizable to your needs. Get images in transparent, white, or customized background in 3 seconds or less for free. Automatically detect subjects on photos. Neat, clear & smooth cutout edges. Capable of handling hair or any other fur edges. Process over 1,000 images in a single upload. Our photo editor tool is a great added value to our innovative AI technology. Quickly remove and change the background. Add texts and effects. Edit foreground manually using the background eraser tool. Presets to fit in different marketplaces. Integrate our API to your existing systems in just a few lines of code. Reliable, efficient & scaleable. Optimized for different purposes and use-case. 99% uptime guarantee. 100% GDPR compliant file storage. Dedicated customer support.
    Starting Price: $0.13 per image
  • 21
    Trigger.dev

    Trigger.dev

    Trigger.dev

    Write normal async code and we'll handle the rest, from deployment to elastic scaling. No timeouts, real-time monitoring, and zero infrastructure to manage. Trigger.dev is an open source platform and SDK that enables developers to create long-running background jobs without timeouts, directly within their existing codebase. It supports JavaScript and TypeScript, allowing for the writing of reliable asynchronous code that integrates seamlessly with existing workflows. The platform offers features such as API integrations, webhooks, scheduling, delays, and control over concurrency, all without the need to manage servers. Trigger.dev provides built-in monitoring and observability tools, including real-time run status updates, advanced filtering, and custom alerts via email, Slack, or webhooks. Its architecture ensures elastic scaling to handle varying workloads efficiently. Developers can deploy tasks using a command-line interface, with the platform handling scaling management.
    Starting Price: $10 per month
  • 22
    HP-UX

    HP-UX

    Hewlett Packard Enterprise

    Highly integrated UNIX operating system and tools that deliver the highest availability, reliability, and security on mission-critical HPE Integrity servers. Streamline your operations using a highly integrated UNIX operating system with tools that delivers the highest reliability, availability, and security on mission-critical HPE Integrity servers. HP-UX gives you a dynamic, secure, and unified environment and comes pre-integrated on mission-critical HPE Integrity servers. Meet your specific UNIX mission-critical requirements. HP-UX offers four operating environments tailored to specific needs. Holistic server security and system management that includes HPE Systems Insight Manager functionality with power management, health check, and deployment tools. It also provides full performance analysis tools for kernel processes and applications. Protect your business’s most critical applications and services to keep your business on target.
  • 23
    GhostBSD

    GhostBSD

    GhostBSD

    GhostBSD provides a simple desktop-oriented operating system based on FreeBSD with MATE, OpenRC and OS packages for simplicity. GhostBSD has a selection of commonly used software preinstalled and required to start using it to its full potential. GhostBSD uses the GTK environment to provide a beautiful looks and a comfortable experience on the modern BSD platform offering a natural and native Unix work environment. GhostBSD is built on top of FreeBSD code, and its roots go back to the University of California Berkeley Unix Research. Historically it was referred to as "BSD Unix" or "Berkeley Unix." However, today it is called BSD for Berkeley Software Distribution. The project goal is to combine security, privacy, stability, usability, openness, freedom and to be available for everybody free of charge. The user experience is further enhanced by tools like the Networkmgr which are developed as part of the GhostBSD project.
  • 24
    Aseprite

    Aseprite

    Aseprite

    Aseprite lets you create 2D animations for video games. From sprites, to pixel-art, retro style graphics, and whatever you like about the 8-bit and 16-bit era. It has a color mode, which tell you how many colors the image can handle. All images in the sprite are in one specific mode, you cannot mix RGB images with Indexed images in the same sprite. It contains a set of layers. You can see them in the Timeline. The most important concept here is that there are two kind of layers: the background layer for opaque sprites, and transparent layers. A sprite can contain only one background layer, but several transparent layers. It contains animation frames. Each frame has a duration, i.e. how many milliseconds the frame must be on screen when the animation is being played. Integrate Aseprite in your assets pipeline with the command-line interface (CLI). Store several animations in one texture atlas.
    Starting Price: $19.99 one-time payment
  • 25
    Magit

    Magit

    Magit

    Magit is a complete text-based user interface to Git. It fills the glaring gap between the Git command-line interface and various GUIs, letting you perform trivial as well as elaborate version control tasks with just a couple of mnemonic key presses. Magit looks like a prettified version of what you get after running a few Git commands but in Magit every bit of visible information is also actionable to an extent that goes far beyond what any Git GUI provides and it takes care of automatically refreshing this output when it becomes outdated. In the background Magit just runs Git commands and if you wish you can see what exactly is being run, making it possible for you to learn the git command-line by using Magit. Using Magit for a while will make you a more effective version control user. Magit supports and streamlines the use of Git features that most users and developers of other Git clients apparently thought could not be reasonably mapped to a non-command-line interface.
  • 26
    Kaspersky Security for Internet Gateway
    Working with the World Wide Web is critical to the majority of today's businesses. Your corporate internet gateway doesn't just give access to internet resources for your employees - it also provides an entry point for cyberthreats out to target them through social engineering, and to attack your endpoints with sophisticated malware. Kaspersky Security for Internet Gateways offers significant risk reduction in areas including infection, data leaks and internet distractions. Provides multi-layered gateway-level protection against the latest web-based threats. Blocks infections before they can reach your endpoints. Negates the effects of social engineering. Readily complements your existing gateway-level defenses. Reduces your exposure to attack by controlling internet resource usage. Supports and assists regulatory compliance initiatives.
  • 27
    Entire Connection
    Terminal emulation software that connects Windows® users to applications on the mainframe, UNIX®, Linux®, OpenVMS, and BS2000 platforms. Available for Natural on the mainframe. Connect thousands of concurrent Microsoft® Windows® users to applications running on the mainframe, UNIX, Linux, OpenVMS, and BS2000 platforms with highly scalable terminal emulation software, Entire Connection. Protect your application from desktop access by requiring a user ID and password to open a terminal session with Entire Connection. Implement SSO by storing the host user credentials encrypted in the share file and using the Entire Connection script language to log onto the host.
  • 28
    pkgsrc

    pkgsrc

    pkgsrc

    pkgsrc is a framework for managing third-party software on UNIX-like systems, currently containing over 17,900 packages. It is the default package manager of NetBSD and SmartOS and can be used to enable freely available software to be built easily on a large number of other UNIX-like platforms. The binary packages that are produced by pkgsrc can be used without having to compile anything from the source. It can be easily used to complement the software on an existing system. pkgsrc is very versatile and configurable, supporting building packages for an arbitrary installation prefix, allowing multiple branches to coexist on one machine, a build options framework, and a compiler transformation framework, among other advanced features. Unprivileged use and installation are also supported. NetBSD already contains the necessary tools for using pkgsrc; on other platforms, you need to bootstrap pkgsrc to get the package management tools installed.
  • 29
    PuTTY

    PuTTY

    PuTTY

    PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. PuTTY is a client program for the SSH, Telnet, Rlogin, and SUPDUP network protocols. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session, the end at which the session is displayed, rather than the end at which it runs. In really simple terms, you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else. All of PuTTY's settings can be saved in named session profiles. You can also change the default settings that are used for new sessions.
  • 30
    Silent Archer
    SRC’s Silent Archer technology delivers end-to-end counter-UAS capabilities to defeat hostile drones, whether a lone target or a UAS swarm. Detects, tracks, classifies, identifies, and engages hostile UAS threats. Electronically disrupts groups 1-5 UAS, including UAS swarms. Complements kinetic weapon systems for layered defense. Solution of choice for VIP protection and events, and by the U.S. Army and Air Force for force protection. The open architecture and sensor-agnostic design of Silent Archer technologies allow for integration with virtually any command and control system, kinetic weapon system, or additional sensor platforms for added functionality. The Silent Archer system can leverage a variety of proven SRC systems while remaining flexible enough to integrate with almost any existing solution. The Silent Archer system is available in multiple configurations to support any mission.
  • 31
    Retoucher Online

    Retoucher Online

    Retoucher Online

    Just upload an image and let artificial intelligence do the job for you. The algorithm analyzes an image, instantly identifies the foreground and the background, and separates it background image After the original background image is removed, you can choose to leave white background, or add a custom or transparent background. Then check the preview, apply changes to the original picture and add a new image if you want to use the automatic removing service again background remove Background remover provides maximum quality in seconds even with difficult objects in the image (for example, hair or any other fur edges).
  • 32
    Vifm

    Vifm

    Vifm

    Vifm is a file manager with a curses interface, which provides a Vim-like environment for managing objects within file systems, extended with some useful ideas from mutt. If you use vi, Vifm gives you complete keyboard control over your files without having to learn a new set of commands. Vim-like user mappings. Vim-like command-line mode with ranges and abbreviations. Vim-like marks and registers. Directory tree comparison. Operation undoing/redoing/backgrounding. FUSE file systems support. Color schemes can also be applied to specific sub-trees. File decorations are customizable according to their type and/or name. Named bookmarks (tags) Less-like preview mode with customizable viewers. Advanced file filtering and renaming capabilities. One or two pane views within tabs. Shell-like and external command-line editing. Table/grid/tree/miller views of files. Built-in integration with GNU Screen and tmux. Multi-block selection. Cross-platform (GNU/Linux, BSD, Solaris, Windows, Mac OS)
  • 33
    Vim

    Vim

    Vim

    Vim is a highly configurable text editor built for creating and changing any kind of text efficiently. It is included as "vi" with most UNIX systems and with Apple OS X. Vim is rock stable and is continuously being developed to become even better. Vim is persistent, multi-level, with an extensive plugin system, support for hundreds of programming languages and file formats, powerful search and replace feature, and it integrates with many tools. Vim online is a central place for the Vim community to store useful Vim tips and tools. Vim has a scripting language that allows for plugin like extensions to enable IDE behavior, syntax highlighting, colorization as well as other advanced features. These scripts can be uploaded and maintained using Vim online. Vim stands for Vi IMproved. It used to be Vi IMitation, but there are so many improvements that a name change was appropriate. Vim is a text editor which includes almost all the commands from the Unix program "Vi".
  • 34
    F5 BIG-IP Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
  • 35
    Postfix

    Postfix

    Postfix

    What is Postfix? It is Wietse Venema's mail server that started life at IBM research as an alternative to the widely-used Sendmail program. Now at Google, Wietse continues to support Postfix. Postfix runs (or has run) on AIX, BSD, HP-UX, IRIX, LINUX, MacOS X, Solaris, Tru64 UNIX, and other UNIX systems. It requires ANSI C, a POSIX.1 library, and BSD sockets. Postfix attempts to be fast, easy to administer, and secure. The outside has a definite Sendmail-ish flavor, but the inside is completely different. Multiple SMTP deliveries over the same TLS-encrypted connection. This reuses the existing tlsproxy(8) and scache(8) services. MySQL stored procedure support. Gradual degradation: in many cases a Postfix daemon will log a warning and continue providing the services that are still available, instead of immediately terminating with a fatal error. Postfix can set the execute bit on a queue file. If this does not work, then no mail will ever be delivered.
  • 36
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ESET PROTECT Elite provides robust email security, including anti-phishing, anti-malware, and anti-spam technologies, along with cloud app protection for Microsoft 365 and Google Workspace. Vulnerability and patch management capabilities allow for automatic tracking and patching of vulnerabilities across all endpoints.
    Starting Price: $275 one-time payment
  • 37
    Ask Command

    Ask Command

    Ask Command

    A tiny app to remind you about those commands you always forget. The app will send your query to a server, where it uses OpenAI's GPT-3 to come up with the best command for you. Don't trust anything it returns, always verify, and never run any command you don't understand. Use it as a quick way to remind you of a command you forgot, so that you don't have to waste time finding it on Google. Every questions and answers are recorded on the server side to improve the app, definitely don't put your sensitive data in there. Use simple, generic questions; don't involve too complicated logic and conditions; questions that have answers available on Google or Stack Overflow are more likely to get a good answer. Don't trust anything the app returns, always verify, and never run any command you don't understand. The app works well when with popular Unix commands. It understands some basic logic and conditions.
  • 38
    Graphweaver
    Turn multiple data sources into a single GraphQL API. Features: 📝 Code-first GraphQL API: Save time and code efficiently with our code-first approach. 🚀 Built for Node in Typescript: The power of Typescript combined with the flexibility of Node.js. 🔗 Connect to Multiple Datasources: Seamlessly integrate Postgres, MySql, Sqlite, REST, and more. 🎯 Instant GraphQL API: Get your API up and running quickly with automatic queries and mutations. 🔄 One Command Import: Easily import an existing database with a simple command-line tool.
  • 39
    Kakoune

    Kakoune

    Kakoune

    Kakoune is a highly efficient, modal text editor that focuses on real-time feedback and powerful, intuitive multi-selection capabilities. Inspired by Vim but offering its own distinct approach to modal editing, Kakoune prioritizes a selection-based workflow that makes text manipulation feel natural and fluid. Instead of commands operating on cursors, commands operate on selections, allowing users to edit and navigate with precision and speed. Kakoune features robust multi-caret editing, context-aware autocompletion, and extensive language support, with performance optimized for working with large files and complex codebases. Designed to be scriptable and extendable with shell commands, Kakoune integrates smoothly with UNIX tools, giving users flexibility in customization. Known for its responsiveness and adaptability, Kakoune is ideal for developers who prefer a keyboard-driven interface and appreciate real-time, immediate feedback in their editing workflow.
  • 40
    Remover

    Remover

    Remover

    Generate a realistic, studio-quality background with one click, which matches the lighting of the original foreground and boosts conversion. Remove anything unwanted in seconds, so you can easily fix any defects-generated images. Create a transparent background instantly and explore various background generation filters. Our tool automatically removes the background from your image. Next, you can choose a background color. Our most popular options are white and transparent backgrounds, but you can pick any color you like.
  • 41
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 42
    WZSysGuard

    WZSysGuard

    WZIS Software Pty Ltd

    It's for Linux/AIX/Solaris/MacOS/FreeBSD, has the more reliable FIM function, and more effective Intrusion Detection, plus commands execution protection against software-based key-stealing attacks. WZSysGuard is a robust UNIX/Linux intrusion detection and file integrity verification software that offers advanced protection for your system. Unlike other tools, it reduces false alarms and ensures complete coverage of security-sensitive files. WZSysGuard uses a SHA 384-bit checksum algorithm to detect file changes, even those made through non-filesystem interfaces, such as during maintenance when the system is booted from a DVD or network. It not only detects critical file changes but also identifies new filesystem mounts, network services, and kernel module loads. With a web-based security trap detection interface, WZSysGuard provides a comprehensive security solution that works with minimal overhead and maximum accuracy.
  • 43
    ClamAV

    ClamAV

    ClamAV

    ClamAV® is the open-source standard for mail gateway-scanning software. ClamAV includes a multi-threaded scanner daemon, command-line utilities for on-demand file scanning, and automatic signature updates. ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. It provides many utilities for users, including a flexible and scalable multi-threaded daemon, a command-line scanner, and an advanced tool for automatic database updates. Built-in support for various archive formats, including ZIP, RAR, Dmg, Tar, GZIP, BZIP2, OLE2, Cabinet, CHM, BinHex, SIS, and others.
  • 44
    Plixer FlowPro
    Arm yourself with Plixer FlowPro and transform network data into a frontline defense. With precise insights into applications, DNS activities, and more, you won’t just respond, you’ll preempt and neutralize threats. Arm yourself with Plixer FlowPro and transform network data into a frontline defense. Tap into advanced analytics for a comprehensive view of applications and DNS activities, enabling you to respond to and predict potential threats with greater precision. Elevate your defenses against malware, data exfiltration, and DDoS attacks. FlowPro’s specialized monitoring and analysis tools spot anomalous DNS protocol behaviors, providing layers of preventive security. Stop ransomware and malware in their tracks. Actively monitor, detect, and sever links to command and control servers, safeguarding your infrastructure from compromise. Gain insight into encrypted network traffic. See clearly, act decisively, and ensure your network remains uncompromised.
  • 45
    PixCleaner

    PixCleaner

    PixCleaner

    PixCleaner is a web service for creating stunning visual effects and editing images using AI PixCleaner provide many tools. -Remove backgrounds using AI -Change background by generating new one with ai suitable to the foreground -Generate image from prompt -Enhance quality of your images -Interactive segmentation for manually refine automatic background remover -Batch processing by defining a workflow and applying it to many images -Design tool a photo editor like integrated with AI tools Many new tools are coming soon Pixcleaner provide 2 pricing plans PAY AS YOU GO: plan based on credit each credit allow you to do AI process (its start from 4$ for 20 credits) or SUBSCRIPTION: illimited credits using pixcleaner.com (additional price are applied for api calls)
    Starting Price: $7/month
  • 46
    IBM Netezza Performance Server
    100% compatible with Netezza. Single command-line upgrade path. Available on premises, on cloud or hybrid. IBM® Netezza® Performance Server for IBM Cloud Pak® for Data is an advanced data warehouse and analytics platform available both on premises and on cloud. With enhancements to in-database analytics capabilities, this next generation of Netezza enables you to do data science and machine learning with data volumes scaling into the petabytes. Failure detection and fast failure recovery. Single command-line upgrade to existing systems. Ability to query many systems as one. Choose the data center or availability zone closest to you, set the number of compute units and amount of storage required to run, and go. IBM® Netezza® Performance Server for IBM Cloud Pak® for Data is available on IBM Cloud®, Amazon Web Services (AWS) and Microsoft Azure. Deployable on a private cloud, Netezza is powered by IBM Cloud Pak for Data System.
  • 47
    OpenText Exceed
    OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software.
  • 48
    Silverfort

    Silverfort

    Silverfort

    Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies.
  • 49
    Image Upscaler

    Image Upscaler

    Image Upscaler

    Image Upscaler is an online service to enlarge images without losing quality. It is based on deep learning convolutional neural networks. Image Upscaler is an online service that upscales images and photos in 4 times. It uses Artificial Intelligence, which makes images bigger without making them blurry saving their quality at the same time. The second option is deblurring, It often becomes a situation where you have an image and its size is appropriate but the image has blur. It could be motion blur, defocus, or just manual blur. In this case, you need to unblur the image. This solution is also based on deep learning CNN. AI background remover gives a chance to save your time in comparison with manual foreground/background selection. Just upload your image and the AI puts the foreground on white background. First, enhance intensity. It is a good solution if your photo has been made in bad lighting conditions with a lack of light. The second is color enhancement.
    Starting Price: $9 per month
  • 50
    Evercontact

    Evercontact

    One More Company

    Let Evercontact keep your address book up-to-date, magically creating new contacts and updating existing ones. More than 40% of the average address book changes within 3 months. Evercontact ensures you always have the latest contact info. Evercontact extracts contact info from the email signatures in your incoming email. Our service creates new contacts for you and also auto-updates any changes to your existing contacts. Our subscription plans allow for unlimited contact updates, multiple email accounts, centralized address books, CSV downloads and CRM integration. Your personal information belongs to you and you alone. Evercontact is GDPR compliant when it comes to user security and data privacy. Our service is available for Gmail, Outlook and Office 365.
    Starting Price: $5.00/month/user