Wiz: #1 Cloud Security Software for Modern Cloud Protection
Protect Everything You Build and Run in the Cloud
Use the Wiz Cloud Security Platform to build faster in the cloud, enabling security, dev and devops to work together in a self-service model built for the scale and speed of your cloud development.
Learn More
Project Planning and Management Software | Planview
For Enterprise PMOs
Planview® ProjectAdvantage (formerly Sciforma) is an enterprise-centric project and portfolio management (PPM) software designed to enable change, drive innovation, and lead in a company's digital transformation. With ProjectAdvantage, teams can strategically track and monitor project data in order to make relevant decisions. It offers multiple features focused on strategic management, functional management, and execution management. A highly scalable and cost-effective solution, ProjectAdvantage is available in various deployment models.
Strokey is a small hardware keyboard logger saving all keystrokes into an EEPROM memory for later investigation. The device may get attached to any PS/2-keyboard by intercepting the cable, or get placed directly inside for maximum invisibility.
We provide a mechanism to trace the NPTL Library as few intrusive as possible for the application dynamics. The post-mortem analysis then allows measurements (contension,...) and understanding of hangs or bugs. No change in kernel or user application.
From quote to cash and with AI in mind, our ERP software will become the most valuable asset at your company.
Global Shop Solutions AI-integrated ERP software provides the applications needed to deliver a quality part on time, every time from quote to cash and everything in between, including shop management, scheduling, inventory, accounting, quality control, CRM and 25 more.
Cam is written in C++/asm for FreeDOS. It allows users to take a screen shot of the monitor in text-mode, which is saved to a file of their choice. The output file can be displayed by simply using the "type" command with the Cam file as the parameter.
Immune Security Architecture For your Enterprise --
Host-Based Intrusion detection for UNIX based systems, at the process level.
Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.