DeskTime is best for medium to large companies, as well as freelancers who want to boost productivity without overworking.
DeskTime is a high-performance, automated time tracking and workforce management solution for teams and freelancers. It runs silently in the background, logging computer activity from the moment of boot-up to ensure 100% accurate data without the need for manual timers.
Learn More
Haystack is a modern, engaging, and intuitive intranet platform that employees actually use.
You Deserve the Best Intranet Experience
With customizable iOS and Android mobile apps, Slack and Microsoft Teams integrations, and an intuitive design employees love, Haystack brings an outstanding digital employee experience to your entire workforce, no matter where their work takes them.
DataSync Suite is an open source platform for integrating tools like Zimbra, SugarCRM, and Drupal. The tool is focused on a single sign-on, application data integration, and fast, flexible deployment.
A modular, class-based PHP program which manages basic EDI transactions using FTP. It is web-based, using a Smarty template interface and relies on ADODB database abstraction so it works with any major database and can be skinned as you please.
Gestión de pedidos, facturas, albaranes. Control de la tesoreria. Contabilidad. Nominas. SA es una aplicación libre de gestión global de la empresa, basada en web, altamente personalizable, multientorno (independiente al sistema operativo y al gestor
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.