Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Try for free
MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.
Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.
MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
Secure Storage service is a set of tools to store in a secure way and in an encrypted format confidential data on the grid storage elements. The service has been designed for the grid Middleware of the EGEE infrastructure, gLite.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.
Another open sourced crypto library. Unlike Crypto++ and cryptix, we're language independent. We originate in 'C', add wrappers for C++ and Objective-C. When that works, we provide a JNI wrapper for Java. Following this, we seek out Python,
Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the...
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.