Effortlessly manage macOS, iOS, iPadOS and tvOS devices across multiple clients and locations.
The Most Powerful Apple Device Management Tool for MSPs and IT Teams
Addigy solutions accelerate Apple adoption in any environment.
Learn More
OpManager the network monitoring software used by over 1 million IT admins
Network performance monitoring, uncomplicated.
ManageEngine OpManager is a powerful network monitoring software that provides deep visibility into the performance of your routers, switches, firewalls, load balancers, wireless LAN controllers, servers, VMs, printers, and storage devices. It is an easy-to-use and affordable network monitoring solution that allows you to drill down to the root cause of an issue and eliminate it.
Efficient Symbolic Tools package (EST) is a BDD based tool for the formal verification of concurrent systems. Its advantages are flexibility, portability and an efficient memory management. It runs under different OS, including Linux and Windows 2000/XP.
Multisetup is a networking application server that provides a multiple os, thin (multimedia) client based, legacy device friendly environment for home networks. Its an alternative to single OS networks and XP Media Center.
The goals of this project is to provide some networking tools written in TCL/tk for various platform like Windows 9x/NT/2k/XP , Linux/gnu. UNIX, BSD and MAC.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.