Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Data Science Software
Data science software is a collection of tools and platforms designed to facilitate the analysis, interpretation, and visualization of large datasets, helping data scientists derive insights and build predictive models. These tools support various data science processes, including data cleaning, statistical analysis, machine learning, deep learning, and data visualization. Common features of data science software include data manipulation, algorithm libraries, model training environments, and integration with big data solutions. Data science software is widely used across industries like finance, healthcare, marketing, and technology to improve decision-making, optimize processes, and predict trends.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Computer Vision Software
Computer vision software allows machines to interpret and analyze visual data from images or videos, enabling applications like object detection, image recognition, and video analysis. It utilizes advanced algorithms and deep learning techniques to understand and classify visual information, often mimicking human vision processes. These tools are essential in fields like autonomous vehicles, facial recognition, medical imaging, and augmented reality, where accurate interpretation of visual input is crucial. Computer vision software often includes features for image preprocessing, feature extraction, and model training to improve the accuracy of visual analysis. Overall, it enables machines to "see" and make informed decisions based on visual data, revolutionizing industries with automation and intelligence.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (15) for "python linux"

17 Products for "python linux" with 1 filter applied:

  • 1
    Golf

    Golf

    Golf

    GolfMCP is an open source framework designed to streamline the creation and deployment of production-ready Model Context Protocol (MCP) servers, enabling organizations to build secure, scalable AI-agent infrastructure without worrying about boilerplate. It allows developers to define tools, prompts, and resources as simple Python files, after which Golf handles routing, authentication, telemetry, and observability, so you focus on logic, not plumbing. The platform supports enterprise authentication (JWT, OAuth Server, API key), automatic telemetry, and a file-based structure that eliminates decorators or manual schema wiring. With built-in utilities for LLM interactions, error logging, OpenTelemetry integration, and deployment tools (such as a CLI with golf init, golf build dev, golf run), Golf provides a full stack for agent-native services. ...
    Starting Price: Free
  • 2
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 3
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 4
    IPFire

    IPFire

    IPFire

    IPFire is a hardened, versatile, state-of-the-art Open Source firewall based on Linux. Its ease of use, high performance in any scenario, and extensibility make it usable for everyone. Security is the highest priority in IPFire. It is hardened to protect itself from attacks from the Internet and prevents attacks on your network. Its powerful firewall engine and intrusion prevention system protect your network against attacks from the Internet and denial-of-service attacks.
    Starting Price: Free
  • 5
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the...
  • 6
    ditno

    ditno

    ditno

    ditno. has taken the complexity out of IT security. We provide a single web portal to control access to all of an organization's servers whether they are in the cloud or internally hosted. We solve the problem of consistent and high-performance security across mixed environments. Using a PAYG model we remove the need for upfront investment and allow our customers to pay for exactly what they need at the time. We have a variety of customers across a number of verticals including law, energy,...
    Starting Price: $25/endpoint/year
  • 7
    FortiClient

    FortiClient

    Fortinet

    Multilayered endpoint security with behavior based analysis for prevention against known and unknown threats. Complete real-time visibility of all your global software inventory. Here, there, anywhere. Cloud-delivered FortiClient endpoint protection service designed for small and medium-sized business. Integrated endpoint protection platform that provides automated next-generation threat protection, visibility and control of your software and hardware inventory across the entire security...
  • 8
    enforza

    enforza

    enforza

    ...With easy cloud management at its core, enforza is truly multi-cloud, enabling you to apply consistent security policies across multiple clouds and regions. - Install the agent on *your* linux instance (cloud or on-prem) with one command. - Claim your device on the portal. - Manage your policies.
    Starting Price: $39/month/gateway
  • 9
    AP Lens

    AP Lens

    AP Lens

    AP Lens is a Sandbox Browser that isolates networks using DNS Whitelisting. We stop the attack before it reaches the network. What does AP Lens provide? - Web Filtering: Flexible and user-friendly content blocking. - Anti-Phishing: Stop look-alike domains with 100% accuracy. - Ransomware Protection: Isolate the network without affecting business applications. - Secure Remote Work: Enforce internet usage policies without VPN slowness. - No More 0-Day Attacks: Escape the limits of...
    Starting Price: $5
  • 10
    OPNsense

    OPNsense

    OPNsense

    Simple packet filters are becoming a thing of the past. Even the open-source domain is moving towards Next-Generation Firewalls. And OPNsense is a top player when it comes to intrusion detection, application control, web filtering, and anti-virus. No network is too insignificant to be spared by an attacker. Even home networks, washing machines, and smartwatches are threatened and require a secure environment. Firewalls are a component of the security concept. They protect against known and...
    Starting Price: Free
  • 11
    Kamatera

    Kamatera

    Kamatera

    With our comprehensive suite of scalable cloud services, you can build your cloud server, your way. Kamatera’s infrastructure specializes in VPS hosting, with a choice of 24 data centers worldwide, including 8 data centers across the US as well as locations in Europe, Asia, and the Middle East. Our enterprise-grade cloud servers can meet your needs at every stage. We use cutting-edge hardware, such as Ice Lake Processors and NVMe SSD, to deliver consistent speed and 99.95%...
    Starting Price: $4 per month
  • 12
    VyOS

    VyOS

    VyOS Networks

    Democratizing how we access networks through a universal router and open source software. Our vision at VyOS is to dramatically change how we access networks so that we can all build the solutions we always dreamed of, without restrictions, limitations, or prohibitive costs. We fundamentally believe that internet access is as vital to our human development as air, food, water, and healthcare. Built by engineers for engineers, VyOS is an open source software company that democratizes how we...
    Starting Price: $1000
  • 13
    NextDNS

    NextDNS

    NextDNS

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in...
    Starting Price: $39 per month
  • 14
    CrowdSec

    CrowdSec

    CrowdSec

    CrowdSec is a free, open-source and collaborative IPS to analyze behaviors, respond to attacks & share signals across the community, outnumbering cybercriminals all together. Set up your own intrusion detection system. Apply behavior scenarios to identify cyber threats. Share and benefit from a crowdsourced and curated cyber threat intelligence system. Define the type of remediation you want to apply and where. Leverage the community’s IP blocklist and automate your security. CrowdSec is...
  • 15
    Akamai Cloud
    Akamai Cloud (formerly Linode) is the world’s most distributed cloud computing platform, designed to help businesses deploy low-latency, high-performance applications anywhere. It delivers GPU acceleration, managed Kubernetes, object storage, and compute instances optimized for AI, media, and SaaS workloads. With flat, predictable pricing and low egress fees, Akamai Cloud offers a transparent and cost-effective alternative to traditional hyperscalers. Its global infrastructure ensures faster...
  • 16
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • 17
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility,...
  • Previous
  • You're on page 1
  • Next