Alternatives to SSProtect
Compare SSProtect alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SSProtect in 2026. Compare features, ratings, user reviews, pricing, and more from SSProtect competitors and alternatives in order to make an informed decision for your business.
-
1
Bitdefender Ultimate Small Business Security
Bitdefender
Bitdefender Small Business Security delivers enterprise-grade, layered cyber-protection designed specifically for small organizations. It covers Windows, macOS, iOS, and Android devices with centralized, easy-to-use management, so businesses without a dedicated IT staff can deploy and monitor security from one dashboard. Key features include multi-layered endpoint protection (machine learning, behavioral analytics, real-time monitoring, process termination, and rollback) to prevent known and unknown threats. It offers ransomware prevention and mitigation (detecting abnormal encryption attempts and restoring files from backups), fileless attack protection (memory/back-injection interference, script blocking), phishing & fraud prevention (blocking deceptive sites and warning users), and advanced exploit protection (real-time shield of browsers, Office apps, Adobe Reader) for comprehensive endpoint defense. -
2
Cloudflare
Cloudflare
Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and more shift online, ensuring these resources are secure, performant and reliable is a business imperative. Cloudflare for Infrastructure is a complete solution to enable this for anything connected to the Internet. Behind-the-firewall applications and devices are foundational to the work of your internal teams. The recent surge in remote work is testing the limits of many organizations’ VPN and other hardware solutions. -
3
Proton VPN
Proton AG
Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure. -
4
Adversus
Adversus
Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency. Adversus was born in 2015 after our founders experienced a lack of flexibility with the solution they worked with. The dream was to build an outbound solution that would change the game․ We believe in user-driven innovation, and we acknowledge that every single user has different needs and demands. We provide a solution that incorporates flexibility and customization to every aspect of the workflow. At Adversus, our primary focus is to have a future-proof solution that never falls behind. We do not just want to adapt to the market but instead push the boundaries of what is possible. Adversus is used by businesses in a wide range of industries, with the common goal to make their outbound call activities more efficient. The size ranges from one to several hundred end-users. -
5
ManageEngine EventLog Analyzer
ManageEngine
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats. -
6
BackBox
BackBox
BackBox offers a simple way to intelligently automate the backup, restoration, and management of all devices on a network by providing centralized management of devices such as firewalls, routers, switches, and load balancers. Each of these devices plays a critical role in the availability and security of an organization’s network, and BackBox ensures they all continue to function effectively and effortlessly, streamlining operations for optimal performance. BackBox provides a foundation to harmonize the configuration between multiple devices, enabling seamless integration, and assuring compliance to organization or industry security policies, standards, or guidelines. IT administrators can easily employ BackBox to track configuration changes and see the deviation with the baseline for compliance validation and remediation. -
7
JumpCloud
JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.Starting Price: $9/user -
8
Infiltrator
Infiltration Systems
Infiltrator is a free easy to use, intuitive network security scanner that can quickly audit your network computers for vulnerabilities, exploits, and information enumerations. Infiltrator can reveal and catalog a plethora of information on scanned computers - such as installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more! Infiltrator can audit each computer's password and security policies, alerting you when changes should be made to increase security. All results can be generated into sleek, easy to read report by the report generator. Infiltrator also comes with over 15 powerful network utilities for footprinting, scanning, enumerating and gaining access to machines. Included utilities are ping sweep, whois lookups, email tracing, brute force cracking tools, share scanning, network enumerating, and many more! -
9
OpenMRS
OpenMRS
Improve healthcare delivery in resource-constrained environments by coordinating a global community that creates and sustains a robust, scalable, user-driven and open-source medical record platform. We are a global community of truly dedicated, talented, and generous contributors who build and maintain the OpenMRS platform and other, foundational OpenMRS technical products. We maintain a platform that countries and implementers use to create a customized EMR system in response to needs on the ground. A common platform maintained by the OpenMRS community, OpenMRS is the foundation for implementations that touch and help millions of patients throughout the world. OpenMRS gives implementers the freedom to focus on creating innovative solutions that respond to local needs. Without reliable medical record systems, improving the health of millions of people throughout the developing world is impossible. -
10
Symfonium
Symfonium
Play and cast music from Plex, Emby, Jellyfin, Subsonic, Kodi, or your Android device. Symfonium is a simple, modern, beautiful, and highly configurable music player, with a unique vision to be the central control point of your music. Add one or multiple media providers (Your local Android device, Plex, Emby, Jellyfin, Subsonic, Kodi) then listen to your music on any supported player (Your local device, Chromecast, UPnP, DLNA, Kodi). The application is under constant development and fully user-driven, if you have feature requests or any issues just post a message on the support forum. Cache your media for offline playback (Manual or automatic with custom rules). Advanced Android auto support. Advanced custom tag parser for the local device (Support more files, more tags, multiple values, separators, cue files). Many functions for audio books like playback speed, skip silence, and resume points. Smart filters and smart playlists to organize and play your media.Starting Price: Free -
11
DriveCrypt
Securstar
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having to think about security. Any organization, from a small company to a large international firm with thousands of users in the field, can effectively protect business plans, client lists, product specifications, confidential corporate memos, stock information, and much more with this disk encryption product. As data is read from the hard disk, DRIVECRYPT automatically decrypts the data before it is loaded into memory. When data is written back to the hard disk, it is automatically re-encrypted. The disk encryption/decryption process is completely transparent to the user or any application program because the data is processed by an operating system extension, "on the fly" as it transfers back and forth between the hard disk and memory. Consequently, users don't need to remember to decrypt or re-encrypt their data, or change the normal operation of the PC.Starting Price: $59.95 -
12
Ridgeback
Ridgeback Network Defense
Ridgeback disrupts attacks and eliminates intruders before their exploits can succeed. When an attacker attempts to gather information about your network, Ridgeback steps in to shape their behavior, deny them benefits, and impose costs for them. Ridgeback actively engages and frustrates them, freezing them or expelling them from your network in real time. Attackers can’t enumerate network resources, like IP addresses and ports. Attackers find that network discovery vulnerabilities to exploit are closed off. Attackers have their communications inside and outside the network frozen. Attackers experience their illicit movement getting locked up. Ridgeback is the only security software that acts according to the principles of cyber defense proposed by the United States of America Cyberspace Solarium Commission. Ensure that the cost of attack on a network running Ridgeback is very high and is not worth their time, which also dramatically reduces the cost of defense. -
13
StealthDisk Mobile
Security Group Six
StealthDisk Mobile uses Virtual Disk Technology to easily and securely store all your important files and documents. Using industry-leading encryption algorithms, StealthDisk Mobile creates an encrypted virtual disk that encrypts and decrypts all data on-the-fly as you work. When you are done, simply dismount the StealthDisk volume and all your important files and documents will be instantly hidden and encrypted. There is no need to encrypt each and every file or each and every every folder like other file encryption applications. All our algorithms are optimized and blazing fast! Our software processes data on-the-fly meaning data only gets decrypted when it is accessed. Other file encryption software encrypts or decrypts the entire file before you can use it. StealthDisk Mobile does this automatically and only to the data that you access saving valuable time and resources.Starting Price: $49.95 one-time payment -
14
Enumerate
Enumerate
Enumerate is community accounting management, communications, engagement, and reporting together. Free up valuable time and spend more of it connecting with your community. From empowering your resident-facing staff to being a part of your back office, Enumerate helps community management with end-to-end solutions. Get peace of mind knowing you can easily engage with your residents, keep compliant, and manage the day-to-day without burning out from administrative burden. Enumerate’s community management software and services are designed with one goal: to make your life easier. We’ve got you covered with end-to-end accounting, board and resident engagement, field operations, AP or AR payment processing, and vendor integration. -
15
YesUsers
YesUsers
YesUsers is an AI-powered platform designed to centralize, manage, and act on user feedback effortlessly. It collects feedback from multiple channels like email, Slack, and social media, then organizes it with AI-driven tagging and categorization. Features include AI-powered impact scoring for prioritizing requests, intelligent product roadmaps, and a smart changelog to keep users informed. YesUsers saves teams 15+ hours weekly, boosts user engagement with voting and collaboration tools, and improves customer satisfaction with real-time updates. Ideal for building user-driven products, fostering loyalty, and driving business growth. -
16
AdRestore
Microsoft
Windows Server 2003 introduces the ability to restore deleted ("tombstoned") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code is based on sample code in the Microsoft Platform SDK. ADInsight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. Use its detailed tracing of Active Directory client-server communications to solve Windows authentication, Exchange, DNS, and other problems. ADInsight uses DLL injection techniques to intercept calls that applications make in the Wldap32.dll library, which is the standard library underlying Active Directory APIs such ldap and ADSI. Unlike network monitoring tools, ADInsight intercepts and interprets all client-side APIs, including those that do not result in transmission to a server. -
17
GASTAR
ENSYTE Energy Software
Whether Upstream, Midstream, or Downstream–whatever sector of the oil and gas industry you work in, ENSYTE’s GASTAR™ software will help streamline your operations to save you time and money. Designed for users by users, our natural gas transaction management software will provide you with the flexibility, user control, and functionality needed to leverage data from across your organization into one streamlined business process. Check out our GASTAR™ solutions below to learn more about how our software seamlessly integrates with your nat-gas business processes to optimize revenue and deliver value. GASTAR™ is the most flexible, user-driven software solution for managing natural gas business transactions from wellhead to burner tip – giving our clients the power to leverage data from across an organization into one streamlined business process. -
18
SecureZIP
PKWARE
Large-scale data breaches continue to expose the weaknesses in traditional information security strategies. Network and device protection is clearly not enough. Full-disk or volume encryption is a single-use-case approach that leaves information exposed at the data level. Persistent data-level encryption has become a necessity, especially in highly regulated industries. Files are compressed using PKWARE’s industry-best technology, reducing file sizes by up to 95%. Encrypted files can be shared and decrypted by authorized users on any enterprise operating platform. Sensitive data can be protected using a variety of methods, including password-based encryption and certificate-based encryption. Enables organization-wide control and consistent policy enforcement. -
19
Perfecto Encryptor
Black Bird Cleaner Software
This unique program will help you to keep any of your files and folders in encrypted form. And only you will can decrypt your files. With our software your information will be completely protected from other users and you will feel yourself completely safe. -
20
XcelPros BI
XcelPros
Power BI is Microsoft's powerful business analytics service that delivers insights to enable fast, informed decisions. Transform data into stunning visuals and share them with colleagues on any device. Visually explore and analyze data on premises and in the cloud, all in one view. Collaborate on and share customized dashboards and interactive reports. Scale across your organization with built-in governance and security. Meet your self-service and enterprise analytics needs with one of the largest business intelligence clouds in the world. Explore how industry-leading AI and continuous user-driven innovation help you turn data into insights across your organization at scale. Quickly go from data to insight to action. Connect to hundreds of sources, prep data with ease, and create beautiful reports, all in minutes. Simplify management, achieve compliance, and keep data secure while giving people access to the insights they need. -
21
Santoku
Santoku
Santoku is dedicated to mobile forensics, analysis, and security, and packaged in an easy to use, Open Source platform. Scripts to automate decrypting binaries, deploying apps, enumerating app details, and more. Scripts to detect common issues in mobile applications. Utilities to simulate network services for dynamic analysis. Useful scripts and utilities specifically designed for mobile forensics. Firmware flashing tools for multiple manufacturers. GUI tools for easy deployment and control of mobile apps. -
22
Pallyy
Pallyy
Pallyy is an intuitive social-media management platform that lets you plan, schedule, and publish content across all major networks from a single dashboard. Its powerful scheduler supports bulk uploads, visual calendars, and queueing, while built-in Analytics drill down into post performance, engagement, and follower growth. A unified Inbox aggregates comments, messages, and reviews for streamlined community management, and a customizable Bio Link landing page turns your social profile into a multi-link hub. Pallyy also includes free creative tools to simplify content creation. Designed with feedback from over 100,000 brands and agencies, it combines user-driven features with an approachable interface that scales from solo creators to multi-client teams, all accessible via web or API.Starting Price: $25 per month -
23
Secure My Files
SecuSimple
Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script into the page. You can encrypt or decrypt a file, providing a password. Source code is available on Github for everyone to inspect. Anyone can detect issues and contribute, improving security. We and our servers are based in Europe. Build and host your own flavor of Secure My Files. Reuse as a library in your own application.Starting Price: $14.99 one-time payment -
24
modusCloud
Vircom
Vircom’s modusCloud is a cloud email security product providing real-time threat protection spam and phishing detection, advanced multi-layer anti-virus and email archiving. Users receive comprehensive protection against unwanted and malicious email. while administrators can easily tailor service to users’ needs and policies. modusCloud gives clients access to an enterprise security technology and infrastructure that is used by some of the world’s largest and most security conscious companies. We combine this with expert knowledge and understanding of the needs that smaller businesses have. Along with our email threat protection, we provide a hosted email security product with a robust filter-rules engine, email continuity with Emergency Inbox, policy-enforced encryption and a cloud-based email archive. All of which is managed in a simple and intuitive user interface. -
25
Direct3D
Microsoft
Direct3D is a low-level API for drawing primitives with the rendering pipeline, or for performing parallel operations with the compute shader. See the content below for more information. Direct3D 12 provides an API and platform that allows your application to take advantage of the graphics and computing capabilities of PCs equipped with one or more Direct3D 12-compatible GPUs. You can use Microsoft Direct3D 11 graphics to create 3-D graphics for games and scientific and desktop applications. DXGI handles enumerating graphics adapters, enumerating display modes, selecting buffer formats, sharing resources between processes, and presenting rendered frames to a window or monitor for display. HLSL is the high-level shader language for DirectX. Using HLSL, you can create C-like programmable shaders for the Direct3D pipeline. The DirectDraw surface file format (DDS) supports uncompressed and compressed (DXTn) textures, mipmaps, cube maps, and volume maps. -
26
Red Hat Virtualization
Red Hat
Red Hat® Virtualization is an enterprise virtualization platform that supports key virtualization workloads including resource-intensive and critical applications, built on Red Hat Enterprise Linux® and KVM and fully supported by Red Hat. Virtualize your resources, processes, and applications with a stable foundation for a cloud-native and containerized future. Automate, manage, and modernize your virtualization workloads. Whether automating daily operations or managing your VMs in Red Hat OpenShift, Red Hat Virtualization uses the Linux® skills your team knows and will build upon for future business needs. Built on an ecosystem of platform and partner solutions and integrated with Red Hat Enterprise Linux, Red Hat Ansible Automation Platform, Red Hat OpenStack® Platform, and Red Hat OpenShift to improve overall IT productivity and drive a higher return on investment. -
27
Infiot ZETO
Infiot
Infiot ZETO is a new way to deliver Application assurance, Zero trust security and Edge intelligence with AI-driven operations to every remote user, every site and every device enabling a Borderless enterprise. Legacy ‘fat’ first-generation point products with manual operations and poor SLAs just won’t cut it. Achieve boundless reach for all remote users, sites and IoT devices with a secure reliable access to enterprise and cloud resources. Secure your business using a ZTNA service that grants authorized users access to apps and not the network. One-click, on-demand service marketplace ensures rapid deployment of services closer to user, sites, devices or in the cloud with Infiot Edge Intelligence. Improve end-user service level experience and IT operations by rapid root cause analysis and automation of problem resolution. -
28
Yosh.AI
Yosh.AI
Yosh.AI is an official global Google Cloud Partner. After numerous international, successful implementations of AI solutions for international enterprises, Google recognized advanced and high quality solutions provided by Yosh.AI with a global partnership. The mission of Yosh.AI is to revolutionize the communication between retailers and the users through the use of AI-powered Virtual Voice Assistants and deliver a more pleasurable, effortless shopping experience. Thanks to innovative AI technology supporting both voice and text conversations, brands for the first time in history are now able to seamlessly communicate with users, allowing for more meaningful, user-driven, personalized one-to-one communications. Our mission is to empower e-commerce with AI solutions and drive user engagement and sales through delivering pleasurable, effortless fashion shopping experience with voice. -
29
CloudEye
Cloudnosys
Unified view of all risks built from machine data and contextual analysis that delivers Security and Compliance Solutions for modern public clouds. Cloudnosys best practice rules track and monitor your AWS and Azure services for security and compliance violations. Dashboard and reports keep you fully informed of any risks which are identified by region. Ensure that you have policy guardrails in place to meet security and compliance. Rapidly detect and remediate risks across your resource configurations, network architecture, IAM policies and more. For instance, you can actively track and monitor publicly exposed S3, and EBS volumes. Providing complete governance, and risk management functions for the cloud assets. Cloudnosys platform delivers security, compliance, and DevOps automation. Continually scan your entire AWS, Azure & GCP services for security and compliance violations for Network Security, IAM Policies, VPC, S3, Cloudtrail etc.Starting Price: $75.00/month -
30
ACI Digital Business Banking
ACI Worldwide
Our cloud based solution incorporates industry leading security, reducing your expenses and giving you peace of mind. This single platform promotes organic growth through our vast library of open APIs, feature rich functionality and extensive reporting capabilities. For over 40 years, ACI has powered electronic payments for companies around the globe serving more than 5,000 banks and businesses in more than 80 countries. Our digital channels solution Universal Online Banker processes: Allows banks to make domestic and international payments, as well as receive payments of any type. New payments types added frequently to future proof payment functionality. Information is available how and when your customers need it, including user-driven balance and transaction information reports. Capabilities include panel authorization, cash pooling and extensive global payment types. -
31
Stamus Networks
Stamus Networks
Network-based threat detection and response solutions from Stamus Networks. Expose serious threats and unauthorized activity lurking in your network. We tap into the inherent power of network traffic to uncover critical threats to your organization. We offer the best possible asset-oriented visibility and automated detection to help practitioners cut through the clutter and focus on serious and imminent threats. Stamus Security Platform (SSP) is an open network detection and response solution built on a Suricata foundation that delivers actionable network visibility and powerful threat detection. Stamus Security Platform is trusted by some of the world’s most targeted organizations, including government CERTs, central banks, insurance providers, managed security service providers, financial service providers, multinational government institutions, broadcasters, travel and hospitality companies, and even a market-leading cybersecurity SaaS vendor. -
32
Knova
IgniteTech
Knova is built on a simple design philosophy: streamlining the help desk agent’s job means higher productivity, happier customers and happier staff. Help users resolve issues themselves on-demand, and proactively deliver information about known issues to targeted customers. Your best product experts are often your own customers. Knova incorporates forums to build user-driven knowledge communities. Let users find exactly what they're looking for through intelligent search that speeds issue resolution, whether they're your internal employees or your external customers. It's a much more user-friendly approach than basic enterprise search, FAQs and traditional content management solutions. Knova goes beyond basic search, getting smarter every time you use it. Star ratings and feedback on article quality help ensure users are getting the best advice. -
33
IntraOne WMS
Hy-Tek Intralogistics
Hy-Tek is a leading provider of supply chain and distribution technology and services. Our IntraOne platform encompasses a broad set of capabilities, services, and technologies to optimize the execution of activities and the flow of information, materials, and resources within their operations. Our full-stack software unifies the control, execution, and management of all resources, whether human or mechanical while delivering a complete set of functionality. The consulting team integrates the clients’ strategic objectives with data-driven analysis and operational expertise to create the foundation for long-term operational success. A neutral approach to robotic technology selection and years of experience ensure that the right combination of technologies are selected to meet the objectives. Optimize warehouse operations with efficient MHE and automation coordination, leading design, and easy reconfigurations for future growth. -
34
Digital Defense
Fortra
Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core. -
35
Axeptio
Agilitation
We know the services you offer on your website are useful or even essential for your users! To collect consent (cookies, newsletter, phoning ...), we offer a fun, user-driven experience that enhances compliance and help boost your opt-in rates. Solution tested by thousands of customers, hundreds of DPOs and European regulators. Discreet and customizable widget, educational editorials, micro-animations. Pre-configured cookies, advanced personalization, Google Tag Manager sync. Identify in a few seconds the services and solutions you use. Since there are different types of consent, Axeptio offers an intuitive editor which will enable you to set up a solution that is adapted to your needs. Designing a cookie banner has never been this easy. Texts, pictures, fonts, sizes: everything is customizable on Axeptio, so that the widget can perfectly adapt to your website.Starting Price: $30 per month -
36
XML Notepad
Microsoft
XML Notepad provides a simple intuitive User Interface for browsing and editing XML documents. Tree View synchronized with Node Text View for quick editing of node names and values. Drag/drop support for easy manipulation of the tree, even across different instances of XML Notepad and from the file system. Good performance on large XML documents, loading a 3mb document in about one second. Instant XML schema validation while you edit with errors and warnings shown in the task list window. Intellisense based on expected elements and attributes and enumerated simple type values. Support for custom editors for date, dateTime and time datatypes and other types like color. Handy nudge tool bar buttons for quick movement of nodes up and down the tree. Handy "XML statistics" tool to summarize info about your XML documents.Starting Price: Free -
37
Ivanti Connect Secure
Ivanti
Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance. -
38
AML Watcher
AML Watcher
Our philosophy of ‘People, Product, and Company’ reflects our priorities as a user-driven organization. People: Our story is about people—those who innovate daily, those who've worked with us, and YOU! We're proud to unite a global, diverse team of creators, innovators, and investigators under one brand, all driven by our shared vision to transform compliance. Product: We’re innovators, not aggregators! AML Watcher adapts to your needs with flexible datasets, features, and pricing. Whether you’re a startup or a large corporation, our proprietary database has you covered. Frustrated by other solutions, we built AML Watcher from scratch, ensuring it solves the challenges you face daily. Company: Join us in our journey to innovate and launch new features as your ultimate AML Data & Screening Partner. We are AML Watchers, a force to be reckoned with! -
39
Pixelsilk
Pixelsilk
Pixelsilk multisite can help you manage user accounts and site elements across an entire client channel, as well as enable content and resources of one site to be leveraged and updated to more sites at the same time. Look at our multisite CMS as your “ace in the hole” and much-needed pressure reducer. Every new project in your queue will benefit from having our multisite CMS. You can use a single core template that has everything you need, or strategically build a series of foundation sites for different customers or site types. Our Copy Site functionality, for instance, lets you effortlessly copy a site and utilize its resources elsewhere—with only the click of a button. No more limiting your growth potential because of not having enough man-hours in a day. With our multisite CMS, you can go ahead and commit to managing more websites for current clients while acquiring new ones too. -
40
Bowtie
Bowtie
Bowtie is a next-generation security platform that delivers a faster, smarter, and more resilient solution to enterprise network security. Our distributed overlay approach keeps your users more secure without slowing them down. Bowtie establishes encrypted connections directly from devices to private resources, removing the need to backhaul traffic through middlemen networks. The result is faster access with reduced attack surface and removed centralized points of failure risk. No more routing internet traffic through processing sites in the cloud. With Bowtie’s SWG in place, users still have direct access to the internet ensuring zero impact to the browsing experience. With enforcement occurring on device, we minimize the pitfalls of cloud processing sites. Bowtie’s user-invisible agents deliver authentication, encryption, and access enforcement without compromising user experience. One agent and administrative console deliver all functionality. -
41
TierOne Service Assurance
TIERONE OSS Technologies Inc
Welcome to TierOne, where we offer a platform with the unique ability to overcome any obstacle and empower communication service providers on their journey of assurance business transformation. We stand out for our comprehensive understanding of network failures across different domains and understand the impact on every affected customer in real-time. We ensure that every impacted customer receives a separate real-time, user-driven automated workflow for remediation. Over the years, we've assisted numerous organizations, including some of the world's largest and most diverse B2B service providers. Explore our real-world case studies to witness how TierOne has revolutionized their operations. Ready to experience the TierOne difference? Contact us today or simply navigate to Tieroneoss.com to get started. -
42
ProSoftXP
ProSoftXP
ProSoftXP provides full access to real-time logistics, contracts, and accruals. ProSoftXP offers exceptional risk management tools with lot control and traceability capabilities built-in. Our logistics management system will provide an advanced, and integrated level of efficiency in your logistic and accounting departments. Building off of 30 years of software solutions across the agri-business spectrum, ProSoftXP cannabis management software offers a robust solution, with full traceability and lot tracking for each plant, compliant with the Cannabis Act requirements. ProSoftXP offers unique modular solutions for all your agronomy needs including monitoring of process manufacturing and product costing. A supplemental plant food analysis module enables the formulation of blends of nutrients with user-driven specifications. Manages the inbound or outbound multimodal movement of product or bulk commodities. -
43
Themis
Cossack Labs
Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA / RSA + PSS + PKCS#7. Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.Starting Price: $0.01 -
44
EVA.ai
EVA.ai
EVA.ai HR Tech Automation Platform successfully optimises enterprise processes by personalising the experiences of Talent, Recruiters and Leaders at scale. The fourth industrial revolution applied to talent acquisition, management & engagement. EVA’s automation-first ethos helps organisations scale by combining exponential technologies with user-driven solutions that reduce waste and frustration across the HCM lifecycle. Drive personalised candidate experience at scale with EVABot – your people’s conversational assistant. Increase hiring teams productivity using ‘outcome-based’ automation, machine learning. Ensure hiring managers make the best decisions based on real-time process visibility. Give your talent acquisition function all the effectiveness tools required to deliver impactful experiences for candidates, HR executives and hiring managers at every touch-point across the hiring funnel. -
45
Hotelizer PMS
Hotelizer
Hotelizer PMS is a cloud-based software to manage your hotel anytime, from anywhere. By using cutting-edge technology, we are offering a flexible & robust tool for all sizes & types of hotels. City hotels or resorts, big or small, we cater to all. We have designed Hotelizer PMS in a user-driven way. As a hotelier, you will be able to operate your front office daily tasks in a fast, productive, and effortless way. By using cutting-edge technology, you rest assured that you use a cloud-native innovative web application that will automate your daily routine and help you grow your business! Our features keep growing. Multi-property users, unlimited users per property, access from any browser and device, cloud-based technology is here to help you, not to stress you. We use push data in real-time. That means that any change/addition anywhere in the platform is instantly visible to all users managing the hotel, in real-time. -
46
CIAgent
SNMP Research
CIAgent® is a ready-to-run SNMP agent that provides both Web-based and SNMP access to manage open systems and servers, including mission-critical Web servers, DNS servers, file servers, and print servers. CIAgent is a foundation for acquiring system status and for processing information from open systems and servers. CIAgent is built on the EMANATE® Master Agent and includes many subagent extensions for system and application management. agent may be configured to perform policy-based automated actions based on threshold events and commands from management applications. In addition, a powerful subagent development kit for building custom extensions can also be purchased as an option. This intelligent agent supports SNMPv1, SNMPv2c, SNMPv3, and HTTP. CIAgent is optionally available as an SNMPv3-Only Edition that supports SNMPv3 and HTTP. This is a special version of CIAgent that has been hardened for use in network environments having the most stringent security requirements to protec -
47
{g}grants
Jungle Lasers
As a customizable and configurable platform, {g}grants fits the needs, processes, and requirements of your foundation. From applications to reviews and progress reports, you influence the design and configuration. Our clients range from governments, municipalities, arts organizations to family foundations and community foundations including one of the nation’s top 20 grantmaking community foundations by asset size. We’re prepared to apply our knowledge working with these institutions to your organization’s needs, goals, and desires. Many foundations function with a small team and a small budget. With these slim resources, your organization must run efficiently. A paper-based grant process or installed software does not equal efficiency. Our cloud-based grants management software eliminates the need for paperwork, stores your data in one place, and you can access it anytime, anywhere. -
48
LibreELEC
LibreELEC
LibreELEC is a lightweight Linux distribution purpose-built for Kodi on current and popular media center hardware. We believe passionately in the long-term value of collaboration and upstreaming code instead of hoarding patches, and we participate actively with other Open Source projects and the ecosystem of regular and drive-by contributors that surround us. LibreELEC remains Kodi oriented but we too have been forked to provide the stable JeOS base for Plex Embedded, Lakka, and a number of single-purpose IoT and maker projects. The software output of LibreELEC will look familiar to OpenELEC users, on the surface we both run Kodi with much common code, but the projects differ on their core values. LibreELEC is governed by a project board elected from active team members to set project goals, priorities, and take executive decisions. The board ensures project tasks are distributed among volunteers. LibreELEC is free and Open Source software. -
49
CallerSmart
CallerSmart
Have a missed call or text from an unknown phone number? We make it fast and easy to trace a number right from your smartphone. Simply type the number into our free reverse phone lookup search bar. Then review information on who’s calling from where, alongside Trust Factor ratings and feedback from our user-driven community. Be sure to add your own feedback to help protect other users, and earn an instant boost in Caller I.Q. points! Annoyed by a persistent telemarketer, prankster or Tinder date gone wrong? We’ll help you take back the privacy of your phone number. To help protect other users against the same spammers and scammers, also leave useful feedback on untrustworthy phone numbers in the community phone book! Your input helps drive our user community’s efforts against mystery and risky callers. You’ll also unlock shareable Smart Badges, competing with other users to see how high you can climb in rank!Starting Price: $3.99 per month -
50
dbForge SQL Decryptor
Devart
dbForge SQL Decryptor is a highly functional free tool designed for decrypting database objects that were created with the WITH ENCRYPTION option. Key Features: - Connecting to multiple servers, both local and remote - Decryption of all types of objects, including stored procedures, functions, triggers, and views - Batch decryption wizard for bulk operations - Saving decrypted objects to a single T-SQL file or separate T-SQL files for each object - Decrypting objects directly on the server for further work in SSMS - Restoration of original T-SQL descriptions even if the original source file is unavailable - Support for all national characters - Search for encrypted objects and filtering them by object types - Syntax highlighting for both code and comments - No DAC (Dedicated Administrator Connection) mode required - No need for manual T-SQL coding dbForge SQL Decryptor, with its light and easy-to-operate user interface, is an essential tool forStarting Price: $0