Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Data Science Software
Data science software is a collection of tools and platforms designed to facilitate the analysis, interpretation, and visualization of large datasets, helping data scientists derive insights and build predictive models. These tools support various data science processes, including data cleaning, statistical analysis, machine learning, deep learning, and data visualization. Common features of data science software include data manipulation, algorithm libraries, model training environments, and integration with big data solutions. Data science software is widely used across industries like finance, healthcare, marketing, and technology to improve decision-making, optimize processes, and predict trends.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Computer Vision Software
Computer vision software allows machines to interpret and analyze visual data from images or videos, enabling applications like object detection, image recognition, and video analysis. It utilizes advanced algorithms and deep learning techniques to understand and classify visual information, often mimicking human vision processes. These tools are essential in fields like autonomous vehicles, facial recognition, medical imaging, and augmented reality, where accurate interpretation of visual input is crucial. Computer vision software often includes features for image preprocessing, feature extraction, and model training to improve the accuracy of visual analysis. Overall, it enables machines to "see" and make informed decisions based on visual data, revolutionizing industries with automation and intelligence.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (15) for "python linux"
  • 1
    1Password

    1Password

    1Password

    ...Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up.
    Leader badge
    Starting Price: $3.99/month/user
    View Software
    Visit Website
  • 2
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. ...
    Leader badge
    View Software
    Visit Website
  • 3
    LoginID

    LoginID

    LoginID

    ...Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 4
    Vault Vision

    Vault Vision

    Vault Vision

    Vault Vision is the leading user authentication platform for modern web and mobile apps, built with privacy-first security and passwordless login convenience for end users. Vault Vision's low code platform enables applications to completely secure user logins on React, Python, Go, Node, Webflow and more. Vault Vision protects end user privacy from password breaches by eliminating use of third-party scripts, sdk's and trackers. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
    Starting Price: $25/month for 10k users
  • 5
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ...Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. Analytics to understand usage behavior. ...
    Leader badge
    Starting Price: $200 one-time payment
  • 6
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
  • 7
    DriveStrike

    DriveStrike

    DriveStrike

    DriveStrike is easy to use, implement and manage. With DriveStrike you can execute secure remote wipe, remote lock, and remote locate commands on any platform. Integrated drive encryption support as well as mobile device management MDM for mobile platforms. Our professional support team is always available to answer your questions and help you install our services or manage your account and devices. Protecting your data and devices has never been easier or more cost effective. If you have...
    Starting Price: $0.99 per month
    Partner badge
    View Software
    Visit Website
  • 8
    Control D

    Control D

    Control D

    Control D is a customizable DNS filtering and traffic redirection platform that leverages Secure DNS protocols like DNS-over-HTTPS, DNS-over-TLS and DNS-over-QUIC, with support for Legacy DNS. - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with...
    Leader badge
    Starting Price: $2/month
  • 9
    Files.com

    Files.com

    Files.com

    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal...
  • 10
    KernelCare Enterprise
    Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates.
    Starting Price: $3.95 per month
  • 11
    Cuckoo Sandbox
    ...In these evolving times, detecting and removing malware artifacts is not enough: it's vitally important to understand how they operate in order to understand the context, the motivations, and the goals of a breach. Cuckoo Sandbox is free software that automated the task of analyzing any malicious file under Windows, macOS, Linux, and Android. Cuckoo Sandbox is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities. Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
  • 12
    Swif

    Swif

    Swif

    Swif is the ultimate AI-powered MDM platform, seamlessly managing your macOS, Windows, and Linux devices. Ensure compliance with SOC 2, HIPAA, and ISO 27001 standards while automating your onboarding and offboarding processes.
  • 13
    Atera

    Atera

    Atera

    Atera, the first and only Agentic AI platform for IT management, offers IT teams and MSPs a digital workforce of AI agents to preemptively and autonomously manage their entire IT operations. Its all-in-one platform combines RMM, helpdesk, ticketing, and automation to reduce downtime, improve SLAs, and free IT teams to focus on strategic work over mundane tasks. At the core of Atera’s platform are two powerful AI agents built to enhance every layer of IT operations. AI Copilot helps...
    Leader badge
    Starting Price: 30-DAY FREE TRIAL
  • 14
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne unifies IT to simplify work for 35,000+ customers in 140+ countries. The NinjaOne Unified IT Operations Platform delivers endpoint management, autonomous patching, backup, and remote access in a single console to improve efficiency, increase resilience, and reduce spend. By automating IT and managing all endpoints, organizations give employees a great technology experience to work faster, smarter, and easier while IT teams modernize and improve efficiency. NinjaOne is a Leader...
  • 15
    ManageEngine Firewall Analyzer
    Firewall Analyzer helps manage and optimize firewall policies, automates firewall rule administration, tracks configuration, rule changes, helps schedule configuration backup, executes regular compliance audit checks, performs periodic security audits, generates real-time alerts for security events, tracks VPN usage, generates VPN reports, displays the current security status of firewalls, tracks employee internet usage, monitors to generate live, historical bandwidth reports, alerts when...
    Leader badge
    Starting Price: $395
  • 16
    AD Enterprise

    AD Enterprise

    AccessData

    ...Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.
  • 17
    ANY.RUN

    ANY.RUN

    ANY.RUN

    ...The effectiveness of the solution has been proven by over 500,000 active users who find new threats with ANY.RUN daily. ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC teams accelerate monitoring, triage, DFIR, and threat hunting — enabling them to analyze more threats in a team and process more alerts in less time. Learn more at ANY.RUN's website.
  • 18
    Site24x7

    Site24x7

    ManageEngine

    ManageEngine Site24x7 is a comprehensive observability and monitoring solution designed to help organizations effectively manage their IT environments. It offers monitoring for back-end IT infrastructure deployed on-premises, in the cloud, in containers, and on virtual machines. It ensures a superior digital experience for end users by tracking application performance and providing synthetic and real user insights. It also analyzes network performance, traffic flow, and configuration...
    Leader badge
    Starting Price: $9.00/month
  • 19
    XplicitTrust Network Access
    ...The platform includes real-time network diagnostics and centralized asset management for better oversight. Clients require no configuration and the solution is compatible with platforms including Windows, MacOS and Linux. XplicitTrust uses strong encryption, end-to-end protection, automatic key rotation and context-aware authentication to provide robust security. It also supports scalable application access and secure connections for IoT, legacy applications and remote desktops, making it versatile for today's security needs.
    Starting Price: $5/month/user
  • 20
    10Duke Enterprise
    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution enabling software vendors to easily configure, manage and monetize the licenses they provide to their customers in real-time. 10Duke enables you to gain a single point of license control for desktop, SaaS, and mobile apps, APIs, VMs and devices. It’s cloud-native, supports all license models, integrates with CRM & Ecommerce, has a built-in Customer Identity Management solution, and supports offline...
    Starting Price: $199/month
    Partner badge
  • 21
    ARGOS Identity

    ARGOS Identity

    ARGOS Identity

    ARGOS is an AI-powered Identity Platform. We revolutionize how the world experiences identity. We create essential identity services for people and businesses to ensure a secure digital ecosystem worldwide. We provide services to help you identify Anyone Anywhere Anytime! ARGOS’s ID check enables seamless remote identity verification for blockchain, gaming, virtual assets, e-commerce, and fintech. With 99.996%+ accuracy, it delivers facial recognition within a day, minimizing verification...
    Starting Price: $0.11 per submission
    Partner badge
  • 22
    Passwork

    Passwork

    Passwork

    ...All data is encrypted using the AES-256 algorithm while being securely stored on your server and managed solely by system administrators. Passwork runs on PHP and MongoDB and can be installed on Windows and Linux, with or without Docker. Key features: - Set custom permissions for vaults and folders - Store passwords in a structured way - Use the search bar, tags and color labels for quick and easy access - Eliminate unsecured, old, weak or compromised passwords - Track all activities and review previously used passwords - Invite teammates to vaults and shared folders - Role-based access control - Integration with AD, Azure AD and LDAP - Custom settings for individual users and roles - Import and export effortlessly
    Starting Price: $480 one-time
  • 23
    ManageEngine Network Configuration Manager
    Network Configuration Manager is a multi-vendor network change, configuration and compliance management (NCCM) solution for switches, routers, firewalls and other network devices. NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent...
    Leader badge
    Starting Price: $238
  • 24
    RECOGNITO

    RECOGNITO

    RECOGNITO

    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions that are fully optimized for usability, security, and privacy. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID,...
    Leader badge
    Starting Price: Free
  • 25
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and...
    Leader badge
    Starting Price: $2.00 per user, per month
  • 26
    SpamTitan

    SpamTitan

    TitanHQ

    SpamTitan email security is an email spam filter for businesses, smbs, MSPs, and schools. SpamTitan email security blocks spam as well as phishing and day-zero attacks, viruses, malware, ransomware, and other email threats. Helps control mail flow, clean it, and protect against unwanted email. We provide easy-to-use yet advanced email security for businesses, smbs and MSPs that are Office365 friendly. SpamTitan - Premium functionality included: • CEO Impersonation...
    Leader badge
    Starting Price: $2.14/user/month
  • 27
    Scalefusion

    Scalefusion

    ProMobi Technologies

    ...The platform provides seamless device deployment, real-time compliance checks, and remote support across all major operating systems, including Windows, macOS, Android, iOS, Linux, and ChromeOS. Scalefusion enables organizations to streamline operations, minimize security risks, and enhance productivity with AI-powered automation and customizable workflows, making it a go-to solution for modern enterprises.
    Starting Price: $24.00 per device per year
  • 28
    Sumsub

    Sumsub

    Sumsub

    Sumsub is a full-cycle verification platform that secures every step of the user journey. With Sumsub’s customizable KYC, KYB, AML, Transaction Monitoring and Fraud Prevention solutions, you can orchestrate your verification process, welcome more customers worldwide, meet compliance requirements, reduce costs and protect your business. Sumsub achieves the highest conversion rates in the industry—91.64% in the US, 95.86% in the UK, and 97.89% in Hong Kong—while verifying users in less than...
    Starting Price: $1.35 per verification
  • 29
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can...
    Leader badge
    Starting Price: $0 Free Community Edition
    Partner badge
  • 30
    Hexnode UEM

    Hexnode UEM

    Mitsogo Inc

    Hexnode, the enterprise software division of Mitsogo Inc., is a Unified Endpoint Management solution with cross-platform functionalities. Hexnode supports all major operating systems, including iOS, iPadOS, Android, Windows, macOS, tvOS, Linux, ChromeOS, visionOS, Apple TV, Android TV, and fireOS, and offers out-of-the-box enrollment methods. The entire device lifecycle, starting from enrollment to device retirement, can be monitored and managed from a unified console. Features such as automated device enrollment, geofencing, Remote Monitoring and Management, patch management, and a simple and intuitive UI makes it the perfect tool for device management. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next