For IT Teams and MSPs in need of a solution to simplify, optimize and secure their SaaS, file, and device management operations
Define governance policies, manage access, and optimize licenses with unified visibility across every identity, app, and file.
Learn More
Self-hosted password manager
Developed and headquartered in Europe (Barcelona, Spain), Passwork meets GDPR, NIS2, ENS and other European regulatory requirements by design.
On-premise solution with double encryption and certified development processes for maximum protection of corporate data. Zero‑knowledge architecture ensures your passwords never leave your infrastructure.
The AXEL framework extends XML and HTML, adding "xml actions" that perform tasks during page processing. Goto http://xmlactions.org for a full description of how it works.
Actions can be as simple as inserting a page, to as complex as building query results from external data sources.
The Axel Framework project consists of different components:
* axel-actions (core framework)
* axel-mapping (a mapping tool built on axel-actions)
* axel-pager (a web page builder built on...
jPersist is an object-relational persistence API with automatic mapping, and based on the ActiveRecord and DataMapper patterns. jWebApp is an MVC web application framework. Both are configuration and annotation free and can be learned in minutes
IVY Framework is a full stack web application framework. The framework takes away the need to reproduce html, styles, database connections, data validation etc and concentrate on the Business rules of the system.
Assembly of classe to help asp.net 2.0 web designer.
Developer can inherits from this assembly for building page.
Error handling, translation, standard workflow (search, list, detail) must be implemented in framework.
Developer just override function
Giving you complete control to help you manage your applications and better protect your endpoints.
The Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.