. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Learn More
The ultimate digital workspace.
Axero Intranet is an award-winning intranet and employee experience platform.
Hundreds of companies and millions of employees use Axero’s intranet software to communicate, collaborate, manage tasks and events, organize content, and develop their company culture.
Agena is an interpreted procedural programminglanguage.
Agena is an easy-to-learn procedural programminglanguage designed for science, scripting, and many other applications. Binaries are available for Windows, Linux, Solaris, OS/2, Mac OS X, Raspberry Pi and DOS.
X11-Basic is a dialect of the BASIC programminglanguage with graphics capability that integrates features like shell scripting, cgi-Programming and full graphical visualisation into the easy to learn basic language on modern computers.
This is an interpreted programminglanguage that is designed to teach young children the fundamentals of programming, hiding away from students the complex concepts of programming, such as parentheses, quotes, data types, arrays, while allowing them to understand the basic concepts of programming, and, move to a more advanced language.
It also serves as an exapmle on how to create an interpreter with QBASIC.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: