Get 7,500 MAUs, 50 tenants, and 5 SSOs free – integrated into your app with just a few lines of code.
Frontegg powers modern businesses with a user management platform that’s fast to deploy and built to scale. Embed SSO, multi-tenancy, and a customer-facing admin portal using robust SDKs and APIs – no complex setup required. Designed for the Product-Led Growth era, it simplifies setup, secures your users, and frees your team to innovate. From startups to enterprises, Frontegg delivers enterprise-grade tools at zero cost to start. Kick off today.
Start for Free
One Unified Time Tracking Software For Projects, Billing, Pay and Compliance
For companies of all sizes looking for a Time Tracking software
Replicon's time-tracking platform is scalable and configurable to support the diverse needs of small, mid & large businesses with a remote and globally distributed workforce. Replicon’s Time Tracking is a cloud-based, enterprise-grade solution that tracks employee time across projects, tasks, presence, and absence to facilitate client billing, project costing, and compliant payroll processing. The scalable and configurable platform offers seamless integration with common business technology stacks, such as ERP, CRM, Accounting, and payroll solutions. With AI-powered time capture, mobile apps, and labor compliance as a service, Replicon makes time tracking hassle-free.
ZML, the Zeitung Markup Language, is a simple CMS for small newspapers. It was specifically designed to publish a student newspaper in print and on the Web. It uses LaTeX and XHTML. So far, it is documented in German only.
SciBook is a framework for xslt transformation from xhtml to html.
The transformation can be extended by adding plugins. The standard LaTeX plugin can convert
LaTeX code to images.
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.