Choose category
-
Clear All
-
DevOps
-
Backup and Recovery
-
Cloud Computing
-
Developer Tools
-
Application Development
-
Monitoring
-
Virtualization
-
-
Data Management and Analytics
-
Database
-
Data Analytics
-
Machine Learning
-
Analytics
-
-
Project and Agile Management
-
Project Management
-
IT Business Management
-
-
Infrastructure and Network
-
Networking
-
Operating Systems
-
Storage
-
Security
-
-
Communication and Collaboration
-
Utility
-
Communication
-
-
Specialized Software
-
Graphic Design
-
Educational
-
-
Business and Enterprise Solutions
-
Productivity
-
ERP
-
CMS
-
Customer Service
-
E-commerce
-
Marketing Automation
-
CRM
-
AUT
Authentik
Authentik is an open-source Identity Provider focused on flexibility and versatility.
DB
Databunker
Databunker provides strong, serious, real personal-data protection for your customer records without expensive custom coding.
FIP
FreeIPA
FreeIPA – Identity, Policy, Audit.
JWT
JWT (Json Web Token)
JWT (JSON Web Token) is an open standard for creating secure, compact tokens for transmitting information between parties. It's widely used for authentication and authorization in APIs and web applications.
KYC
Keycloak
Keycloak, secured and supported by Hossted.
NKT
Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated versions of over 1250 servers, and version specific problems on over 270 servers.
OLDAP
OpenLDAP
penLDAP is an open-source implementation of the Lightweight Directory Access Protocol (LDAP), a directory service protocol for managing user authentication and authorization information.
OVA
OpenVAS
OpenVAS is a vulnerability scanner.
VPN
OpenVPN
OpenVPN implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
OSS
Ossec
OSSEC is an open-source host-based intrusion detection and prevention system (HIDS/HIPS) used to monitor system integrity and detect malicious activity.
Not sure what you need?
Speak with our experts who will help you to understand the capacities and functionalities of the dashboard.