For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
Automate Proposals with AI in Microsoft Word.
Streamline proposal creation with the smartest AI, the best content, seamless integration with Microsoft Word, and unmatched efficiency.
Automate your best practices, processes, and standards to guide your proposal writers, sales teams, and subject experts. And don’t worry, it’s so easy to use they will use it. We would love the opportunity to help you quantify the impact your business can expect from investing in Expedience Software. Click here to request a Return on Investment (ROI) calculation. In this 15-minute session, we will ask 20 simple questions to assess and grade your current proposal quality and scalability. Manual proposal processes are likely costing you far more than you realize. These models waste time and kill the productivity of proposal writers, sales team members, senior staff, and subject experts.
Generic Collectible Card Game is a multiplayer multiplatform implementation of a card game engine. The card game engine is designed to be of general purpose core for several modules each defining the game specific behaviour.
A MUD-Client for Windows (Win32) and KDE, featuring perl, python and ruby scripting, as well as multi-window output. The main focus is a very strong scripting engine (nearly everything is accessible from a script) while trying to stay user friendly.
The Fury² Game Creation System is a game development toolkit for the 32-bit Windows platform, designed to allow the creation of complex multimedia software and games with minimal unnecessary effort (i.e. reinventing the wheel.)
DeskTime is best for medium to large companies, as well as freelancers who want to boost productivity without overworking.
DeskTime is a high-performance, automated time tracking and workforce management solution for teams and freelancers. It runs silently in the background, logging computer activity from the moment of boot-up to ensure 100% accurate data without the need for manual timers.
A GTK+ MUD client with support for MCCP, MXP, support for the zChat and MudMaster peer-to-peer chat protocols, the MUD sound protocol (MSP), Telnet GA support, regexp trigger support, aliases, Perl and Python plugin support.
eCyberpunk is a Java version of the R Talsorian Games' Role playing system, Cyberpunk 2020 and it's supplements. Initially, the project will focus on GM aids, but may, in the future, be a full-blown game.
Yerushalem is a massive multiplayer 3D game set in Jerusalem Israel where Jews, Christians and Moslems fight for control of the city by political or military means. It will use Crystal Space. After a very long hiatus, as of February 2006, work on this pr
Eternal Warfare is turn driven, browser based game. It will have multiple realms to play through and eventually travel back to. Development will be focused mainly on community driven systems and will also create a flexible character development system.
Dynamic Work and Complex Project Management Platform | Quickbase
Quickbase is the leading application platform for dynamic work.
Our no-code platform lets you easily create, connect, and customize enterprise applications that fix visibility and workflow gaps without replacing a single system.