Alternatives to OS-Easy MMS

Compare OS-Easy MMS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to OS-Easy MMS in 2026. Compare features, ratings, user reviews, pricing, and more from OS-Easy MMS competitors and alternatives in order to make an informed decision for your business.

  • 1
    ConnectWise SIEM

    ConnectWise SIEM

    ConnectWise

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
    Starting Price: $10 per month
  • 2
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve compliance without resorting to rigid management. Get a bird's eye view of your environment, then drill down into the nitty gritty to gain critical insights into your fleet's health and hygiene. A single device in your fleet can produce thousands of unique data points. This data is often intended to be read by programs and systems, not people. Kolide interpets and visualizes the data we collect so you can quickly understand the state of your devices.
    Starting Price: $6 per month
  • 3
    USB-LOCK-RP

    USB-LOCK-RP

    Advanced Systems International

    USB Control & Lockdown Software to Block USB Devices Access and Lock USB Ports in Windows Systems. Centralized USB Device Management, Monitoring and Whitelisting to Protect Computers in a Network. USB Device Control is an important part of Endpoint Security Management and focuses in the protection of computer systems and data assets from threats posed by unauthorized USB device usage. Controlling USB devices access to endpoints is required to secure networks that control machinery or store sensitive information. - Centralized USB Device Management. - Secures Groups of Computer or Specific Computers. - Whitelists Specific Devices by Hardware ID and Blocks the rest. -Automatically apply Group 1 protection settings to unassigned clients. NEW! - Receives Alerts & Logs Device Connections in the Network Automatically. -Export Status and Alerts Reports to csv format (Comma-separated value)NEW! -Automatic Authorizations Mode, Whitelist USB devices across the network automatically. NEW
    Starting Price: $20 per client/one-time
  • 4
    Splashtop Remote Support
    Remotely support internal and client computers with unattended remote access and provide users with remote access. Whether you’re just getting started with remote support tools, or looking to find an alternative to another product due to high prices, Splashtop Remote Support is the solution for you. Splashtop Remote Support is a best-in-class remote support tool that gives you the freedom to remote into your managed computers from any device, at any time, thanks to our fast, high definition connections.
    Starting Price: $40/month for 25 computers
  • 5
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 6
    Deep Freeze Reboot to Restore
    Reboot to Restore Technology by Faronics makes Endpoints indestructible. Deep Freeze is the ultimate workstation protection solution. With its Reboot to Restore technology, our solution secures configuration files and core operating systems on a server or a workstation. Once installed, the software establishes a baseline which is essentially the point to which the computer would revert to once the reboot is completed. The application leverages patented technology to redirect cloned data from the hard drive to an allocation table while the original data continues to remain as is. Reboot to Restore has grown out of the necessity for a user- and time-friendly alternative to other solutions. Computers shared by various users, such as those used in schools, libraries, hospitals, public kiosks, and so on, are prone to system and security-related risks. Users end up with unwanted files or malware infection while attempting to install a program.
  • 7
    IONOS Cloud GPU Servers
    IONOS GPU Servers provide an accelerated computing infrastructure designed to handle workloads that require significantly more processing power than traditional CPU-based systems. It integrates enterprise-grade NVIDIA GPUs such as the H100, H200, and L40s, as well as specialized AI accelerators like Intel Gaudi, enabling massive parallel processing for compute-intensive applications. GPU-accelerated instances extend cloud infrastructure with dedicated graphics processors so virtual machines can perform complex calculations and data-heavy operations much faster than conventional servers. It is particularly suitable for artificial intelligence, deep learning, and data science tasks that involve training models on large datasets or performing high-speed inference operations. It also supports big data analytics, scientific simulations, and visualization workloads such as 3D rendering or modeling that require high computational throughput.
    Starting Price: $3,990 per month
  • 8
    Nero AI

    Nero AI

    Nero AI

    Nero AI's mission is to provide you with more solutions using AI to help you enlarge photos and manage your files. We also offer PC benchmarks that are comparable to the operating state of the real world. Use artificial intelligence to increase image resolution without losing quality. Try it out to see how fast and easy to use it is. Now supported on 12th generation Intel® Core™ processors, Intel OpenVINO lets Nero AI Photo Tagger use lightning-fast AI technology to sort your photos and organize your creativity by identifying content based on more than 160 categories. The real-world PC benchmark measures your processor’s (CPU) multi-core power and pushes your graphics card (GPU) to its maximum limit with real-world multimedia use cases. We invest in AI because we are convinced that artificial intelligence will help shape the future. Discover with Nero what AI can do for you. We recommend using the latest Intel processors to unlock the full potential of your computer.
    Starting Price: $19.95 per month
  • 9
    RocksDB

    RocksDB

    RocksDB

    RocksDB uses a log structured database engine, written entirely in C++, for maximum performance. Keys and values are just arbitrarily-sized byte streams. RocksDB is optimized for fast, low latency storage such as flash drives and high-speed disk drives. RocksDB exploits the full potential of high read/write rates offered by flash or RAM. RocksDB provides basic operations such as opening and closing a database, reading and writing to more advanced operations such as merging and compaction filters. RocksDB is adaptable to different workloads. From database storage engines such as MyRocks to application data caching to embedded workloads, RocksDB can be used for a variety of data needs.
  • 10
    Intel Server System D50TNP Family
    Extraordinary performance, capacity and versatility, combined with four distinct, purpose-built modules for computing, management, storage, and acceleration, make the Intel® Server System D50TNP Family the easy server choice for your HPC and AI workloads. Compute performance is delivered by 3rd Gen Intel® Xeon® Scalable processors, with up to 40%1 higher performance than the previous generation. The new accelerator module supports up to four 300W PCIe accelerator cards. And the storage module provides high-speed storage with up to 1PB capacity in a single 2U chassis. Intel® Server System D50TNP Family combined with four distinct, purpose-built modules for computing, management, storage, and acceleration for your HPC and AI workloads. Deliver outstanding per-core performance, with up to 40 cores per processor. Delivers up to 40% higher performance (SPECrate2017_int_base) versus the previous generation.
  • 11
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a data loss prevention and USB device control software that provides a proactive solution for preventing data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
    Starting Price: $6 PUPM
  • 12
    Net Protector

    Net Protector

    Net Protector

    Net Protector defends your office network from all viruses, worm and spyware attacks and keeps your business lifeline, network and PCs, running smoothly and securely. Win10Boost is one of the software from Net Protector Antivirus Lab, which will enhance the performance of your Windows 10 PC. This improves the speed and performance of your Win10 PC and uses very little memory. Detects system model, processor type, processing speed, RAM and disk details, O/S edition and version details. Detects Antivirus related details. Check for the processes and services consuming high CPU utility. It helps to find processes and services which are not useful for users. Significantly increases the speed of the system. It monitors all background applications and detects applications that are in suspended mode. Background applications that are taking high CPU utility and are lowering system performance are monitored. Tunes up the system extensively.
    Starting Price: $9.33 per year
  • 13
    Pogo Linux

    Pogo Linux

    Pogo Linux

    Our best-selling Intel® Modular Servers and AMD Epyc™ Servers deliver next-generation 3rd Gen Intel® Xeon® Scalable, Intel Core i9®, and AMD Epyc™ processor innovations for cloud computing, virtualization, big data, highly-transactional workloads, and more. High-density space and energy-efficient HPC servers make the most of your available rack space. NVIDIA® GPU servers provide an immense quantity of compute cores to take on massively multithreaded next-generation workloads. Ready for the latest 3rd Gen Intel® Xeon® Scalable processors and Optane™ DC persistent memory, our new line of Intrepid Servers takes full advantage of Intel’s latest innovations. Intrepid servers deliver exceptional versatility and modularity along with the hardware quality and longevity you’ve come to expect from Intel. Built on the industry’s first 7nm architecture, this 3rd generation AMD EPYC™ Servers are designed for the data center of tomorrow.
  • 14
    XRCLOUD

    XRCLOUD

    XRCLOUD

    GPU cloud computing is a GPU-based computing service with real-time, high-speed parallel computing and floating-point computing capacity. It is ideal for various scenarios such as 3D graphics applications, video decoding, deep learning, and scientific computing. GPU instances can be managed just like a standard ECS with speed and ease, which effectively relieves computing pressures. RTX6000 GPU contains thousands of computing units and shows substantial advantages in parallel computing. For optimized deep learning, massive computing can be completed in a short time. GPU Direct seamlessly supports the transmission of big data among networks. Built-in acceleration framework, it can focus on the core tasks by quick deployment and fast instance distribution. We offer optimal cloud performance at a transparent price. The price of our cloud solution is open and cost-effective. You may choose to charge on-demand, and you can also get more discounts by subscribing to resources.
    Starting Price: $4.13 per month
  • 15
    SafeConsole

    SafeConsole

    DataLocker

    Central Management Server Software. Instantly gain complete and granular control over all of your encrypted USB flash drives and portable hard drives with the SafeConsole central management server software: Achieve compliance for USB storage usage, with full control and audit. Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. See which files are saved to or deleted from your encrypted drives at any given moment.
    Starting Price: $28 per device per year
  • 16
    Intel Server System D50DNP Family
    Breakthrough performance and innovation for HPC and AI workloads. If you want to accelerate your HPC workloads, the Intel® Server D50DNP Family is the right platform for you. Powered by 4th Gen Intel® Xeon® Scalable processors or the Intel® Xeon® CPU Max Series, the Intel® Server D50DNP Family delivers exceptional compute performance, enhanced AI and in-memory analytics acceleration built into the processor, and increased I/O throughout versus previous generation servers. Delivers breakthrough memory bandwidth (1TB/sec) with on-chip, High Bandwidth Memory (HBM2e) for memory-intensive workloads. You can deploy and adapt the Intel® Server D50DNP Family to meet your ever-changing needs. Compute, management, and accelerator modules enable you to easily scale cluster resources to fit workload demands. Advanced, next-generation AI and in-memory analytics accelerators are built into the processor to speed up HPC workloads.
  • 17
    Intel Server System M50FCP Family
    With powerful compute, built-in accelerators, and high-speed I/O and memory bandwidth, the Intel® Server System M50FCP Family is an ideal choice for your data-intensive mainstream workloads. The Intel® Server M50FCP Family has been validated and certified by industry-leading OEM partners like Nutanix Enterprise Cloud and Microsoft Azure Stack HCI—and made available as Intel® Data Center Systems. Intel® Data Center Systems greatly simplify and accelerate private and hybrid cloud infrastructure deployment and time to value, while reducing effort and risk. Data-intensive applications have rapidly moved from being niche to mainstream workloads. The Intel® Server M50FCP Family delivers the compute, memory, and I/O performance required from a mainstream server to get the most out of those workloads.
  • 18
    BigObject

    BigObject

    BigObject

    At the heart of our innovation is in-data computing, a technology designed to process large amounts of data efficiently. Our flagship product, BigObject, embodies this core technology; it’s a time series database developed with the goal of high-speed storage and handling of massive data. With our core technology of in-data computing, we launched BigObject, which can quickly and continuously handle non-stop and all aspects of data streams. BigObject is a time series database developed with the goal of high-speed storage and analysis of massive data. It boasts excellent performance and powerful complex query capabilities. Extending the relational data structure to a time-series model structure, it utilizes in-data computing to optimize the database’s performance. Our core technology is an abstract model in which all data is kept in an infinite and persistent memory space for both storage and computing.
  • 19
    BrowseControl

    BrowseControl

    CurrentWare Inc.

    BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements - no matter where their users are located. With BrowseControl you can… - Ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites - Improve network performance by blocking bandwidth hogs, and... - Prevent users from using unsanctioned applications and software-as-a-service providers BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site. The Category Filtering feature is regularly updated with new websites; it allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.
    Starting Price: $6 PUPM
  • 20
    Gemini 2.0 Flash
    The Gemini 2.0 Flash AI model represents the next generation of high-speed, intelligent computing, designed to set new benchmarks in real-time language processing and decision-making. Building on the robust foundation of its predecessor, it incorporates enhanced neural architecture and breakthrough advancements in optimization, enabling even faster and more accurate responses. Gemini 2.0 Flash is designed for applications requiring instantaneous processing and adaptability, such as live virtual assistants, automated trading systems, and real-time analytics. Its lightweight, efficient design ensures seamless deployment across cloud, edge, and hybrid environments, while its improved contextual understanding and multitasking capabilities make it a versatile tool for tackling complex, dynamic workflows with precision and speed.
  • 21
    NeuShield Data Sentinel
    The War on Ransomware is Over. NeuShield Data Sentinel does more than just detecting and blocking ransomware attacks. We’re the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup. Data Sentinel uses Mirror Shielding™ to protect files ensuring that you can instantly recover your important data from any ransomware attack. Patented technology that adds a barrier to protected files preventing them from being modified. Mirror Shielding™ makes an attacker believe they have access to a computer’s original data files, but they are in fact only seeing a mirror image of them. Restores operating system files and settings back to a known good state allowing you to quickly regain access to your computer after a ransomware attack. One-Click Restore also removes both known and unknown malware. Protects the boot portion of a drive to prevent aggressive types of ransomware from taking over the boot process.
  • 22
    Intel Server System S2600BPR Family
    Intel® Server Board S2600BPR-based systems are a purpose built, rack-optimized server board ideal for use in hyper-converged, data analytics, storage, cloud, and high performance computing (HPC) applications. Designed to support the 2nd Generation Intel® Xeon® processor Scalable family and up to 16 DDR4 DIMM slots per server board (eight DIMMs per processor), the S2600BPR family maximizes memory and processor bandwidth to meet demanding compute use requirements.
  • 23
    MicroSale

    MicroSale

    KIS Software

    Improve efficiency with expertly designed screens that help users fly through orders. Increase the bottom line with better cash control and advanced security access. Track employee activity down each button pushed. Attract more customers during slow hours/days with automatic happy hour pricing. Experience better customer service with MicroSale’s 24/7 call center. The MicroSale’s Emerge all-in-one POS system combines high performance and ultimate reliability. Designed for fast-paced, harsh restaurant environments, the Emerge features an Intel Core i3 processor encased in a scratch-resistant, rock-solid shell resting on an ultra-slim yet sturdy aluminum alloy base. Get the dependability of the Windows platform and the convenience of the cloud; running locally at the restaurant so you are never dependent on the internet while accessing real-time data from your smartphone or internet-enabled device.
    Starting Price: $99 per month
  • 24
    OS-Easy

    OS-Easy

    OS-Easy

    Committed to the research and development of cutting-edge technologies such as cloud computing, desktop virtualization, smart desktop, edge computing for users in education, government, enterprise, medical, energy and other industries. Virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine (VM) running on a centralized server. Virtual Desktops (VDI) will speed up the desktop processing by moving the software off of the desktops and onto a central server in the data center. With this model, one software image is created which contains all software titles for the labs and classrooms. This image can be accessed by any computer in any lab or classroom. Featuring the first of it’s kind in the industry, “Add-Clone” function helps you in its mass installation and deployment abilities with efficiency and stability. “Add-clone” enables incremental and differential capturing of data changes made since your last transfer.
    Starting Price: $19 one-time payment
  • 25
    Emsisoft Anti-Malware
    They turn your PC into a remote-controlled zombie. Your computing power is collectively sold on the black market to send spam, attack others or store illegal content. Potentially Unwanted Programs that mess up your computer with useless browser toolbars, tons of commercials and other bulk that slows down the PC. Emsisoft Anti-Malware Home not only detects more because it uses the full power of two major antivirus- and anti-malware technologies, it also scans quicker because of the efficient combination of the scanners. Any unnecessary duplicates in detection are avoided, enabling the least impact on memory and overall hardware resources. If a user attempts to access a malicious website, Emsisoft Anti-Malware Home will immediately block the connection and prevent access. Leading privacy-conscious filtering without SSL exploitation.
    Starting Price: $19.99 per device per year
  • 26
    Velmie

    Velmie

    Velmie

    We’re Velmie, a tech company that builds the kind of banking infrastructure legacy systems have nightmares about. Our platform helps financial institutions launch and scale digital products without the headaches. We focus on real-world needs: smooth integrations, rock-solid security, and tech that grows with you—not against you. If every change to your system feels like a high-risk operation, we’re here to make it routine.
  • 27
    Adept Secure

    Adept Secure

    Adept Technologies

    The rush to be first to market in application development, and the leveraging of open-source technology has created a hacker’s paradise. The Unites States of America and its allies are the target of an unprecedented amount of cyber terror attacks. Hacking, cracking, kill chains, zero-day attacks, ransomware, denial of service and other cyberattacks have reached levels of sophistication surpassing the capabilities of most organizations to defend against. On December 23, 2015, Ukrainian power companies experienced unscheduled power outages impacting a large number of customers in Ukraine. In addition, there have also been reports of malware found in Ukrainian companies in a variety of critical infrastructure sectors. Public reports indicate that the Black Energy (BE) malware has been discovered on numerous power companies’ computer networks.
  • 28
    Huddle01 Cloud
    Huddle01 Cloud is a developer-focused cloud platform that delivers high-performance infrastructure at up to 70% lower costs, without the complexity of hyperscalers or the compromises of budget providers. We see the market split between hyperscalers with 100+ services you don't need and local providers cutting corners where it matters. We’re occupying that middle ground, providing the rock-solid reliability of the giants with the lean economics of on-prem. The platform runs on AMD EPYC processors, DDR4 ECC memory, and NVMe storage across all regions. Unlimited egress is included by default, so bandwidth never becomes a billing surprise. Core services include Compute Instances, Managed Kubernetes and Docker, Load Balancers, and Elastic Block Storage, with more on the roadmap. Every region ships with SOC 2 compliance, and the Mumbai region offers sub-20ms latency and full DPDPA compliance for teams with Indian data residency requirements.
    Starting Price: Free [$250 in free credits]
  • 29
    Safely Open

    Safely Open

    Safely Open

    When you receive emails, web links and files you don’t trust, Safely Open it. The suspicious item will be opened in our disposable cloud environments so you can examine what you have received, without opening it on your computer. Think of us as an isolation or quarantine service where you look at potentially worrisome items far away from your computer.
  • 30
    FonePaw Video Converter Ultimate
    Multifunctional software makes it possible for you to convert, edit and play videos, DVD and audios. In addition, you can also create you own videos or GIF image freely with it. You can convert one video at a time or add several video files for converting simultaneously. It can decode and encode videos on a CUDA-enabled graphics card, leading to your fast and high quality HD and SD video conversion. Your video will not be quality loss. Equipped with NVIDIA's CUDA and AMD APP acceleration technology, you're able to experience 6X faster conversion speed and supports multi-core processor completely. Supported with NVIDIA® CUDA™, AMD®, etc. technologies, FonePaw Video Converter Ultimate can decode and encode videos on a CUDA-enabled graphics card, leading to your fast and high quality HD and SD video conversion. This all-in-one video converter is capable of converting video, audio and DVD files efficiently and even editing them with better effect.
    Starting Price: $39 one-time payment
  • 31
    BroShield

    BroShield

    BroShield

    If you want to free your system with unwanted snoop ware then BroShield should be your 1st choice as this provides you a great anti snooping and detection of harmful viruses from your computer. Protect your computer with BroShield protection. BroShield helps you to get full authority over the internet. You can keep an eye on what kind of content your kid is exposed to. Restriction of adult websites and harmful content is in your hand. Allows you to control the internet access time. There are a lot of illegal websites that still run on the internet. We need to restrict our kids from getting exposed to sites like porn, gambling, and inappropriate sites. Visiting such sites may bring in viruses and other unwanted things with it. BroShield runs 24/7 to look for viruses and threats and keep the computer in full monitoring, to block the potential threats. The smart feature of BroShield fail-safe is designed to look for all the remote snooping activities to prevent getting compromised.
    Starting Price: $49.95 per year
  • 32
    OpenText Exceed
    OpenText™ Exceed™ is a Windows remote access solution for graphically demanding Linux and UNIX software solutions, such as CAD and CAM. Exceed integrates Windows desktop with UNIX, Linux, VMS, X Window System and IBM iSeries and z/OS system environments. A secure, high-performance X Window server, Exceed offers secure and reliable access to X Window applications from Microsoft Windows and Citrix virtual desktops over the LAN. Many engineering, architectural and product design software solutions are implemented on Linux and UNIX, using Linux X Window (X11) graphics technology. A Windows X Server runs these graphical UNIX and X11 applications on Microsoft Windows, rather than costly high-end graphical Linux and UNIX workstations. In order to access the graphically demanding software from Windows, organizations require high performance remote access LAN to LAN software.
  • 33
    Becrypt

    Becrypt

    Becrypt

    For endpoint devices you can't afford to have compromised. High Assurance products and services for organizations that face elevated threat. High assurance solutions for desktops, laptops and thin clients. Architectures based on government-backed research and development. From managed services and security monitoring to specialist R&D. Zero trust architectures provide enhanced protection for cloud and online services, combining device health and identity measurements fo service access. Allowing access to corporate services from unmanaged endpoints remains a frequent source of supply chain vulnerabilities. Robust device health and identity management can transform 3rd party IT risks. Proven cloud and mobile architectures delivered through managed service to simplify secure 3rd party collaboration.
  • 34
    Supermicro Max IO
    Supermicro Max IO solutions are resource optimized, cost-effective, and ideal for space-constrained applications. Supermicro's highly dense yet compact server designs provide excellent computing, networking, storage and I/O expansion. These servers utilize Supermicro optimized thermal designs to save energy, operate at lower decibels and minimize system power consumption. Several models provide redundant power and cooling options and run at an extended temperature range. Supermicro's high quality assures reliable, long life and uninterrupted operation. Supermicro Max IO solutions support a range of Intel® technologies for a diverse portfolio of use cases. Support for high-performance enterprise-level Socket P processors enables customers to meet the requirements of applications including industrial automation (IPC), medical imaging, intelligent transport, digital signage, digital security and surveillance, networks, storage appliances, edge computing and more.
  • 35
    ArtistShare

    ArtistShare

    ArtistShare

    ArtistShare, founded in 2001, is widely recognized as the Internet's first "fan-funding" platform which later became the blueprint for many of today's crowdfunding websites such as KickStarter, IndieGoGo and PledgeMusic. Today we provide a rock-solid platform and award-winning professional services for the entrepreneurial artist. ArtistShare connects artists with fans in order to share the excitement and beauty of the creative process, document the work of today's most exciting creators and allow fans to participate directly by funding and observing the creation of new artistic works. ArtistShare is the ultimate expression of freedom for a creative artist as well as the ultimate expression of appreciation for a fan of that artist. ArtistShare's unique approach to the documentation of the creative process combined with the opportunity for fans to follow that process (and sometimes even be involved) preserves the precious relationship between artists and fans.
  • 36
    LogMeIn Central
    LogMeIn Central is a powerful remote monitoring and management (RMM) platform designed to help IT teams maintain and secure their infrastructure from anywhere. It offers fast, reliable remote access for both PCs and Macs via mobile devices or desktops, enabling seamless support regardless of location. The platform provides features such as user management with group permissions, two-factor authentication, and computer grouping by location or function. LogMeIn Central integrates antivirus management powered by Bitdefender and a security center to help mitigate risks and prevent unauthorized data access. It also monitors computer health to detect critical issues and ensure smooth operation. Suitable for internal IT teams and managed service providers, it enables efficient management of endpoints through a single dashboard.
  • 37
    IRIS

    IRIS

    Global Market Solutions

    IRIS workflow handles the global challenge of active counterparty credit risk management, from trading data acquisition to trade re-booking including curve stripping, consistent pricing, exhaustive aggregation module, hedge requirement computation and What-if scenarios. IRIS is a parallel distributed application permitting efficient utilization of multi-core systems. An HPC solution based on GPU and Multicore processors is also available to accelerate pricing and Greeks computation. The ability to plug IRIS engines into existing complex systems is a major design goal. The choice of .NET development framework ensures interoperability and integration with other languages. IRIS fully supports FpML and market data providers including Reuters, Bloomberg, Markit which ensures smooth data stream integration. IRIS internal data are fully accessible making computation details auditable.
  • 38
    Synergetic

    Synergetic

    Education Horizons Group

    Synergetic is a flexible, one-stop-shop with everything you need to run your school. Imagine having a solution that saves your people time, connects your community, and gives you actionable insights with its powerful reporting capabilities. Synergetic provides one system for Finance, Administration, Student Records, Fundraising, Community Engagement and Property. It is your single source of truth helping optimise your entire school. Synergetic is a solution by the Education Horizons Group. With over 40 years’ experience providing software solutions for schools, our company has grown alongside our school communities. Synergetic provides a rock-solid data foundation for managing administration, finance, fundraising and student records. The ‘one source of truth’, this truly relational database handles complex family structures, historic, current and future data, all in a secure and robust environment. Synergetic offers the full toolkit a school needs.
  • 39
    Vidcode

    Vidcode

    Vidcode

    Students begin by creating and modifying video and image objects, adding filters, text, and other graphics. As projects become more complex, the lessons cover complex object properties with user interactions, creating games and simulations. Teach computer science, computational thinking, web programming, and hardware all in one place. Vidcode is used by upper elementary, middle, and high schools to provide in-depth, research-backed, and culturally relevant computer science courses that are built with today’s tweens and teens in mind. Vidcode’s self-guided coding curriculum is easy for kids and teachers to start using right away. Our scaffolded tutorials guide students to create a diverse portfolio of work and to be prepared for college-level computer science. Vidcode’s courses are interdisciplinary and teach more than just coding; students gain proficiency in computer science, computational thinking, web development, game design, and hardware.
    Starting Price: $5.99 per month
  • 40
    GLM-4.7-FlashX
    GLM-4.7 FlashX is a lightweight, high-speed version of the GLM-4.7 large language model created by Z.ai that balances efficiency and performance for real-time AI tasks across English and Chinese while offering the core capabilities of the broader GLM-4.7 family in a more resource-friendly package. It is positioned alongside GLM-4.7 and GLM-4.7 Flash, delivering optimized agentic coding and general language understanding with faster response times and lower resource needs, making it suitable for applications that require rapid inference without heavy infrastructure. As part of the GLM-4.7 model series, it inherits the model’s strengths in programming, multi-step reasoning, and robust conversational understanding, and it supports long contexts for complex tasks while remaining lightweight enough for deployment with constrained compute budgets.
    Starting Price: $0.07 per 1M tokens
  • 41
    Bitdefender Antivirus Plus
    Choose a lightweight antivirus that offers essential protection for your computer or device. You get the most innovative technologies that predict, prevent, detect and remediate even the latest cyber-threats, anywhere in the world. Bitdefender Antivirus Plus packs the next-gen cybersecurity that won the “Product of the Year” award from AV-Comparatives. It protects computers against all online threats, and includes privacy tools such as Bitdefender VPN and Bitdefender Safepay. Bitdefender's unbeatable multi-layered protection keeps your devices safe from all new and existing threats. Bitdefender Antivirus Plus reacts instantly to e-threats with no compromise to your system’s performance. Bitdefender Antivirus Plus takes care of your online privacy and personal information. Compare our award-winning products and get the best real-world protection, so you can keep doing the things that matter while we handle security.
    Starting Price: $17.38 first year
  • 42
    GTZHost

    GTZHost

    GTZHost

    GTZHost offers high-performance GPU-accelerated bare metal servers, ideal for gaming, 3D rendering, and AI workloads. Our Netherlands-based (Almere) infrastructure features the Intel Xeon E3-1230 v5 with dedicated RTX 2080Ti GPU power, 16GB DDR4 RAM, and high-speed SSD storage. Designed for low-latency performance, our gaming servers include 10Gbps DDoS protection and customizable bandwidth options. Whether you are hosting high-end game servers or running complex computational tasks, GTZHost provides the dedicated power and global connectivity your projects demand.
    Starting Price: $311.00
  • 43
    Master Zhuan Zhuan

    Master Zhuan Zhuan

    Yinlemo Information Technology

    Master Zhuan Zhuan data recovery software supports computer recycling bin recovery, computer mistakenly deleted file recovery, USB flash drive file recovery, USB flash drive formatting recovery, SD card mistakenly deleted file recovery, disk hard drive damage recovery, damaged files recovery, support recovery of commonly used formats such as Word, PPT, Excel, CAD, video and audio, batch recovery of mistakenly deleted files, preview first and then restore, safe and efficient.
    Starting Price: $58/month/user
  • 44
    Depot

    Depot

    Depot

    Depot is a cloud-based build acceleration platform designed to speed up software development workflows by dramatically reducing the time required to build container images and run continuous integration pipelines. It replaces traditional local or CI-based Docker builds with remote container builds executed on powerful cloud infrastructure, allowing developers to run the same build commands while offloading compute-intensive tasks to optimized remote machines. Using the Depot CLI, developers can simply replace docker build with depot build to execute builds on Depot’s infrastructure, which includes fast CPUs, high-speed networking, and persistent storage optimized for build workloads. It supports native multi-platform builds for both Intel and ARM architectures without relying on slow emulation, enabling teams to produce container images for multiple environments more efficiently.
    Starting Price: $20 per month
  • 45
    SPACE GASS

    SPACE GASS

    SPACE GASS

    SPACE GASS is a multi-purpose 3D analysis and design program for structural engineers. Its extensive range of features make it suitable for anything from beams, trusses and frames to buildings, towers, tanks, cable structures and bridges. Capabilities include a 64-bit multi-core solver, silky smooth 3D rendered graphics, plate finite elements, frame elements, cable elements, tension/compression-only elements, moving loads and links to many CAD and building management programs. Why SPACE GASS Save time, money, and get a safe and efficient design. Silky smooth graphical interface that lets you see your changes visually as you go. A fast sparse matrix solver that fully utilizes the parallel processing power of multi-core computers. A wide range of structural modeling tools, analysis options and design modules. Comprehensive video tutorials to walk you through some of the tricky stuff. Configurable for stand-alone or floating network systems.
    Starting Price: $600 per month
  • 46
    HPE Moonshot
    High-performance, energy-efficient, workload-optimized infrastructure that is ideal for virtualized desktop applications. Deliver secure desktops and virtual applications for trader workstations and environments across the banking industry using a converged blade system. Customers can now support employee growth and significantly improve productivity with industry-leading automation, security, and remote management capabilities that run on faster, energy-efficient systems and are delivered as-a-service. Moonshot is built on an energy-efficient system-on-chip design that optimizes performance for the most demanding financial services needs. Replace traditional general-purpose processors with highly efficient processors tailored to deliver virtual desktops and applications to your remote workforce. Super-fast Intel Xeon CPU, an integrated workstation GPU, and up to 128GB of high-speed memory result in 32% more Citrix XenApp users per server.
  • 47
    Ivanti Endpoint Manager
    From Windows to macOS, from iOS to Android and beyond to IoT—one place to manage all devices—plus user profiles. Do more than keep your business up and running. Consolidate your endpoint and workspace management, satisfy growing user expectations, and simplify your management processes through a single, unified endpoint management suite. Ivanti Endpoint Manager is proven, reliable endpoint and user-profile management software that is core to: 1) discovering everything that touches your network; 2) automating software delivery; 3) reducing headaches with login performance; and 4) integrating actions with multiple IT solutions. Experience UEM today. Discover, inventory, and configure all devices—PCs, laptops, servers, tablets, and smartphones. Also remote control Windows and Mac devices.
  • 48
    eSchool

    eSchool

    Mushroom Softech

    School Management Software System is a compact package, designed to provide a sophisticated, state of the art web technology, aimed at bringing about total quality in Education management. The system focuses on excellent coordination between School and students, making e-education scenario "a reality". eSchool- School ERP provides, online integrated information of Students to the School administrators, enabling transactions with trading partners through seamless connectivity with robust security and privacy features. The technology, solutions and features are aimed at providing unlimited "scalability". eSchool- School Software provides various type of School management related service, operations and high level of efficiency in recording and information dissemination thus reducing errors. eSchool- School Software can be installed on Internal server or web server for use through network of multiple computers.
  • 49
    GIGABYTE Rack Server
    Scalable rack servers have a high level of flexibility and are optimized for demanding applications in the data center. Rack density from 1U to 5U, servers are designed for single and multi-socket options for x86 processors from AMD and Intel as well as for ARM processors from Ampere. For Big Data, high-performance computing, hyper-converged infrastructure, software-defined storage, and virtualization.
  • 50
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.