Alternatives to Multi-Domain Security Management

Compare Multi-Domain Security Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Multi-Domain Security Management in 2026. Compare features, ratings, user reviews, pricing, and more from Multi-Domain Security Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    CheapSSLsecurity

    CheapSSLsecurity

    CheapSSLsecurity

    CheapSSLSecurity offers SSL certificates and other security products at low prices. These certificates can protect a single domain, sub-domains, or multiple domains, even if they are on different web servers. For example, CheapSSLSecurity's Multi-Domain SSL certificates can secure up to 250 websites, while their Multi-Domain Wildcard SSL certificates can secure up to 250 domains and their subdomains.
  • 2
    PrimeSSL

    PrimeSSL

    PrimeSSL

    PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions. Its offerings include Domain Validated (DV) SSL, Wildcard, Multi-Domain (SAN), and Multi-Domain Wildcard, tailored to the needs of personal websites, blogs, and small businesses. It's fast domain validation and instant issuance process makes SSL setup effortless, often taking just minutes. Featuring 256-bit encryption and cutting-edge cryptographic algorithms, PrimeSSL delivers strong security and builds trust through recognizable browser security indicators.
  • 3
    NethServer

    NethServer

    NethServer

    Analyzes all web traffic and blocks selected websites via HTTP and even HTTPS using Squid proxy. Integrated with ClamAV antivirus and site blacklists. Multi-domain web server with ready LAMP stack. Virtual hosting allows to host multiple domain names on a single server. Based on NextCloud provides universal access to your files via the web, your computer or your mobile devices, wherever you are. Provide a private Slack-alternative with Mattermost. Open source messaging platform that enables secure team collaboration. Modern and powerful web interface based on Cockpit that simplifies common administration tasks, very easy and fast installation. Based on CentOS/RHEL, a widespread and popular server distribution, trusted by routine security updates, and rock solid stability.
  • 4
    Hillstone Security Management Platform
    Hillstone’s Security Manager enhances network security by allowing businesses to segment their networks into multiple virtual domains. Domains can be based on geography, business unit or security function. It provides the versatility needed to manage Hillstone’s infrastructure while simplifying configuration, accelerating deployment cycles, and reducing management overhead. Most companies face security challenges when their business spans offices located in several regions or countries. Multiple security gateways, multiple sites requiring different security policies and multiple administrators can quickly create a complex security environment. Organizations need the tools to manage global security policies while allowing regional administrators to manage devices and users in their geographic location or business division. Hillstone’s Security Manager allows the primary administrator to segment security management into multiple virtual domains.
  • 5
    MAK ONE

    MAK ONE

    MAK Technologies

    A powerful and flexible Computer Generated Forces (CGF) platform to fill your synthetic environments with urban, battlefield, maritime, and airspace activity. VR-Engage lets users play the role of a first-person human character; a ground vehicle driver, gunner, or commander; or the pilot of a fixed-wing aircraft or helicopter. Game-like visual quality in a high-performance image generator. Designed by modeling & simulation experts for training and simulation projects. Physically accurate sensors, model the physics of light in any wavelength to represent electro-optical, night-vision, and infrared sensors. Applications that let you model, simulate, visualize, and participate in whole-earth multi-domain simulations. Multi-domain computer-generated forces. Multi-role virtual simulator. Image generator & battlefield visualization. EO, IR, and NVG imaging sensors. Synthetic aperture radar simulation.
  • 6
    METANET

    METANET

    METANET

    In the business for 21 years, we have been concentrating on Swiss Internet services in the areas of web hosting, web servers and domains. We host more than 1,000 server systems and look after 50,000 customers. SMEs as well as private individuals get enough space for their internet presence and their e-mail traffic, we take care of the complete server administration. You always have the option of using various popular CMS/applications such as WordPress, Joomla, Typo3, Drupal etc. The server's data is backed up in a separate data center, i.e. disaster-proof, so to speak. Allow your data to do so, at no extra charge! Treat yourself to real multi-domain hosting, which allows you to manage an unlimited number of domains on the same platform. The virtual cloud server systems allow easier and cost-effective entry into an isolated server environment, without having to forego scalability.
  • 7
    MSP360 Backup for M365/GW
    MSP360 Backup for Microsoft 365 and Google Workspace is a cloud-to-cloud backup solution that supports all components of both platforms including Exchange Online, Mail, OneDrive, Contacts, SharePoint, and Teams for Microsoft 365, as well as Gmail, Google Drive, Contacts, Calendar, and Shared Drives for Google Workspace. MSP360 offers 2 editions: Backup for Microsoft 365 and Google Workspace as a SaaS Backup solution for single domain users to ensure comprehensive data protection, featuring unified management and support for all core Microsoft 365 and Google Workspace components. For multi-domain users there is a dedicated edition "MSP360 Managed backup for Microsoft 365 and Google Workspace." It allows MSPs to manage backups for multiple clients and domains within a single, centralized console. With flexible licensing, scalability, and seamless restore options, it simplifies cloud data protection and streamlines operations, making it ideal for MSPs and organizations.
  • 8
    Falcon XDR

    Falcon XDR

    CrowdStrike

    Supercharge detection and response across your security stack with Falcon XDR. With industry-leading endpoint protection at its core, Falcon XDR synthesizes multi-domain telemetry to provide security teams with one unified, threat-centric command console. Take EDR to the next level with consolidated, multi-platform telemetry that dramatically enhances threat correlation and speeds response times against sophisticated attacks. Accelerate threat analysis and hunting by transforming previously siloed, disconnected data into strong, cross-platform attack indicators, insights, and alerts. Turn XDR insight into orchestrated action. Empower security teams to design and automate multi-stage, multi-platform response workflows for surgical, full-stack remediation.
  • 9
    Blue Planet
    The Blue Planet Intelligent Automation Portfolio is a comprehensive, open software suite that empowers service providers with deep insights about the network to optimize business processes that span IT and Network functions, accelerating your digital transformation. IT and Network operations are no longer constrained in legacy, manually intensive silos. Blue Planet powers closed-loop automation through multi-domain, multi-layer orchestration combined with inventory federation, analytics, and route optimization and assurance, unlocking network potential and business agility. Working across multi-vendor domains, including Ciena’s domain controlled by Manage, Control and Plan (MCP), Blue Planet intelligent automation enables the delivery of a range of end-to-end services with fast time to market and exceptional performance, at reduced operational costs.
  • 10
    CheapSSLShop

    CheapSSLShop

    Cheap SSL Shop

    Leading SSL provider, Cheap SSL Shop offer a range of SSL certificates, including DV (domain validation), OV (organization validation), EV (extended validation) SSL, Wildcard SSL, and Multi-Domain SSL, starting as low as $3.00. Cheap SSL Shop services are geared towards ensuring secure online transactions and enhancing website security. The platform boasts competitive pricing, easy certificate management, and responsive customer support. Additionally, CheapSSLShop caters to different needs by offering various SSL brands such as Comodo, GeoTrust, Thawte, Digicert, and Globalsign. CheapSSLShop places a high priority on its customers’ privacy and maintains a safe website environment. All of its products include 256-bit encryption, which is the industry standard, and have a 30-day, no-questions-asked, money-back policy.
  • 11
    Session

    Session

    Hopin

    The easiest way to host interactive webinars and meetings. Create fully customized video experiences your audience will show up for. Host your next all hands, AMA, webinar, or training in minutes with Session. With easy to use design features, update your Session background, colors, and logos. Invite co-hosts, grant production controls, customize layouts and stage. Set up security with domain whitelisting, multi-domain authentication, secure URLs and more. Interact in new ways with confetti bursts, emojis, polls, Q+A, music, timers, chat banners, and more. With full participant lists, individual engagement scores, and overall participation metrics, tap into data you can act on. Record the entire experience from the video to your chat transcripts. Easy to share with automatic upload to a branded microsite to match your event.
  • 12
    Active Directory Reports (AD Reports)
    Active Directory Reports Lite is the free edition of MaxPowerSoft's Active Diretory Reports (AD Reports). The most intuitive Active Directory reporting product. Within 2 easy clicks you can be off and running reports. AD Reports was built around an intuitive easy to use user interface. Update any existing or create your own custom reports. Include predefined or any Active Directory LDAP attribute and build your own LDAP filter. Accurately reports real time information of your Active Directory Servers. It is the most accurate on the market. In a multi-domain controller environment simply compare our results to any of the competitors. Simply stated, if you have administrator rights on your computer and are able to see the domain, our product just works. No messy database setup, no MSMQ problems, no bloated web server setup. We built everything internal and no we don't use a web server.
  • 13
    CloudVision
    CloudVision is a modern, multi-domain network management plane built on cloud networking principles for telemetry, analytics, and automation. Designed for use in data centers, wired and wireless campuses, multi-cloud, and routing use-cases, CloudVision provides a consistent operational model across domains, helping enterprises to simplify network operations by breaking down traditional network management silos. CloudVision’s abstraction of the physical network to this broader, network-wide perspective allows for a more efficient approach for several operational and network telemetry capabilities. Turn-key automation with CloudVision Studios for initial and ongoing provisioning, ZTP as-a-Service, configuration management, and network-wide change control, including automated upgrades, network rollback, and network snapshots. Real-time state streaming for network telemetry and analytics - a modern approach to replace legacy polling per device.
  • 14
    AD Tidy

    AD Tidy

    CJWDEV

    Search your Active Directory domain for user/computer accounts that are no longer in use by filtering based on last logon time, DNS record timestamp, and much more. You can then perform a number of actions on the accounts that were found, such as moving them to another OU, disabling them, setting a random password, removing them from all groups, and much more. Identify and clean up inactive user and computer accounts in your Active Directory domain. Report on both user and computer accounts. Search the entire domain or select a specific OU. Multi-domain friendly, specify any domain and optionally use alternate credentials to connect to it. Get account last logon information from all DCs or select specific DCs (using either lastLogon attribute or lastLogonTimeStamp attribute). Choose to only find accounts that have not logged on for a specified number of days. Confirm whether or not computer accounts are still active by using the Ping test and DNS record timestamp check.
    Starting Price: $99 one-time payment
  • 15
    Informatica MDM

    Informatica MDM

    Informatica

    Our market-leading, multidomain solution supports any master data domain, implementation style, and use case, in the cloud or on premises. Integrates best-in-class data integration, data quality, business process management, and data privacy. Tackle complex issues head-on with trusted views of business-critical master data. Automatically link master, transaction, and interaction data relationships across master data domains. Increase accuracy of data records with contact data verification, B2B, and B2C enrichment services. Update multiple master data records, dynamic data models, and collaborative workflows with one click. Reduce maintenance costs and speed deployment with AI-powered match tuning and rule recommendations. Increase productivity using search and pre-configured, highly granular charts and dashboards. Create high-quality data that helps you improve business outcomes with trusted, relevant information.
  • 16
    SerpDino

    SerpDino

    SerpDino

    SerpDino is built by a real SEO who tracks keywords daily — full-featured SERP checker with unlimited options and full control. 📌 Basic plan - designed for solo specialists and small businesses. You get unlimited projects, unlimited keywords, and unlimited domains under a fair usage policy. 🏢 Enterprise plan - for agencies and corporations that need more power. ✨ What you get with SerpDino - Unlimited keywords, projects, and domains - Unlimited SERP updates (fair usage applies) - AI Overview tracking - Similarweb data integration - Competitor monitoring - Keyword cannibalization detection - Google Lighthouse monitoring - SERP snapshots - Track 185 Google regions and 45 languages - Shareable reports - CTR-based visibility metrics - Scheduled updates (daily / every 3 days / weekly) - Instant manual rechecks - Color-coded position changes - Project folders & multi-domain tracking - Date-based notes for SEO tests and updates
  • 17
    Vultron

    Vultron

    Vultron

    Compress proposal production timeframes from weeks into days. Vultron’s proprietary multi-domain models are preferred 94% of the time. Foundation models produce generic content that presents several risks, such as intellectual property and confidentiality issues, hallucinations, and the creation of redundant content. Fine-tuned models generate content specific and unique to organizations but often produce content with low responsiveness, substantiation, and explanation, frequently necessitating substantial rewrites and multiple iterations. Custom-built models, unique to each organization and designed for proposal development, are embedded into every workflow. The models incorporate organizational capabilities and brand voice throughout, delivering high-quality results faster. Supercharge revenue by driving new business and on-contract growth. Increase proposal speed and quality. Vultron is built to the highest security standards, so your organization's data is always protected.
  • 18
    DATAROCKET

    DATAROCKET

    innoscale AG

    DATAROCKET's innovative technology powers a slim integration with your IT landscape. DATAROCKET's intuitive user interface enables an easy operation and inclusion of all departments. DATAROCKET's smart licensing model is transparent and easy. One price – unlimited possibilities. DATAROCKET is our multi-domain master data management software that merges and cleans up your data. Simple operation and clear design ensure a sustainably improved data quality throughout your whole organization. With our solution, you can optimize your data management across all domains. Whether customer data, material data, creditor data or other master data, with DATAROCKET you can manage your data streams in a structured manner. The departments can easily set up their data quality rules in the data pipeline and thus perform data quality measurements for all existing databases in real time. The results are pushed to dynamic web reports.
  • 19
    Tenancy

    Tenancy

    Tenancy

    Tenancy for Laravel is an application skeleton designed to streamline the development of multi-tenant SaaS platforms. It offers a comprehensive sign-up flow, including tenant registration and user authentication from a central domain. Integrated with Laravel Cashier, it facilitates seamless billing, allowing tenants to select and modify their plans. The boilerplate incorporates a Nova admin panel for efficient tenant and domain management, with ready-to-use Nova resources. Customers can manage subdomains and add custom second-level domains, with integration to ploi.io enabling the automatic creation of virtual hosts and HTTPS certificates upon domain addition. The tenant-aware test suite is structured to separate central and tenant tests, ensuring smooth multi-tenancy operations without additional complexity. Tests structured for separate central and tenant tests. The tenant test suite works so smoothly that you don't even have to think about multi-tenancy when writing the tests.
    Starting Price: $199 one-time payment
  • 20
    FortiPortal

    FortiPortal

    Fortinet

    FortiPortal provides a comprehensive set of security management and analytics within a multi-tenant, multi-tier management framework. This enables MSSPs to give their customers controlled access to configuration and analytics. Enterprises and Education can use FortiPortal to delegate a limited set of management and analytic capabilities to business units, departments, colleges, etc. Ability to customize wireless and security management to individual end-user needs. Next-generation firewall capabilities: content filtering, application control, antivirus, IPS this full working demo of a FortiPortal, you’ll be able to explore the system dashboard, intuitive GUI, global settings, and security policy profiles to see for yourself how comprehensive, yet easy it is to for MSSPs to set up tiered revenue-generating services and for enterprises and education to delegate control.
  • 21
    Core Privileged Access Manager (BoKS)
    Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
  • 22
    AnyData

    AnyData

    AnyData

    Cleanse, categorize & visualize all your supplier data. Bolt-on contract Management, On-boarding & ESG solutions to track and manage spend against risk. Build a trusted single source of the truth of enterprise supplier data to accelerate your business. Multi-domain master data management platform. Write-Back. Option to Push back to Source systems. The data you need faster than you thought possible. Now you have your single version of the truth. Plug into our library of “Ready to Go” data-driven apps. Integrated security, machine learning, AI & visualization (AnyDATA’s or Power Bi). The visibility and answers you need faster than you thought possible. For global enterprise teams or lone consultants. ”Ready to Go” SaaS analytical solutions. Business users easily hook into data asking questions immediately. Truly democratizing citizen data science, uniquely integrates data, documents & compliance Information. Import, manage, report, create advanced (continuous) analytics.
  • 23
    IBM Cloud Network Security
    Firewalls and security groups are important in securing your cloud environment and the information stored in it, as well as preventing malicious activity from reaching your servers or users. With security groups, easily define security policies at the instance level for virtual firewall protection. Quickly and easily accommodate your security needs with a variety of hardware-based firewalls and scalable security groups. Maintain your essential layer of protection and provision your firewalls on the fly without interrupting your service — when you need to and how you prefer. Single-tenant bare metal servers are dedicated to the customer. Running workloads in an isolated environment adds an extra level of security for your workloads, but not all compute severs are the same when it comes to security. Be sure the solution is truly single tenant and dedicated solely to your organization so you get complete isolation.
  • 24
    Junos Security Director

    Junos Security Director

    Juniper Networks

    Security Director is your portal to SASE, bridging your current security deployments with your future SASE rollout. Security Director enables organizations to manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever they go. Policies can be created once and applied everywhere. Customers can use both Security Director Cloud and on-premises instances simultaneously to securely transition to a SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enforces policies across physical, virtual, and containerized firewalls on-premises and across multiple clouds simultaneously. Quickly manage all phases of the security policy lifecycle for firewalls, including zero-touch provisioning and configuration, and gain insight into sources of risk across your network.
  • 25
    LiteX

    LiteX

    Jedis Singapore Pte. Ltd

    LiteX is offered in two components : Windows [ Client ] Linux Server [ LiteServer ]. The *standalone* Client functionality has : - SFTP capability, - File System Management (local and remote). - Remote Proxy FSM (PFSM). Remote system(s) to system(s) copy etc transparently via the Client. - SSH [2] [ SSL ] supported. In addition Client has an Server peer [ LiteServer ] available on Linux which gives DB maintenance and multi-domain bit level, Merge/Compare [ Client geared ] functionality. Full Client and Server Documentation is available. LiteServer examples and toolkit available. LiteX client is licensed free for SFTP and FSM. LiteServer is POA for license and Commercial use.
  • 26
    Infinera Transcend Software Suite
    Transcend Software Suite, accessible, modular, application-based network automation. Transcend the current boundaries of your network's capabilities with Infinera's multi-layer, multi-domain, multi-vendor software suite. The Infinera Transcend Software Suite is a comprehensive software platform, offering network automation solutions that support operational simplification, resource optimization, and fast service delivery, enabling network transformation. Built on cloud-native technologies, Transcend unleashes the power of network automation through applications ranging from network discovery and path computation to closed-loop automation and analytics. Industry-proven open and modular solutions that are easy to deploy. Infinera is a global supplier of innovative networking solutions that enable enterprises, governments, carriers, and cloud operators to scale network bandwidth, accelerate service innovation, and automate network operations.
  • 27
    Altair Compose

    Altair Compose

    Altair Engineering

    Analyzing data, developing algorithms, or creating models - Altair Compose is designed to bring your ideas forward. Altair Compose is an environment for doing math calculations, manipulating, and visualizing data, programming, and debugging scripts useful for repeated computations and process automation. Altair Compose allows users to perform a wide variety of math operations including linear algebra and matrix manipulations, statistics, differential equations, signal processing, control systems, polynomial fitting, and optimization. The broad set of native CAE and test result readers accelerates system understanding and works with Altair Activate® to support model-based development, for multi-domain and system of systems simulations. Altair Embed® completes the model-based design portfolio with automated code generation, allowing for the testing and verification of embedded systems.
  • 28
    Opinnate

    Opinnate

    Opinnate

    As opposed to incumbent technologies, the intelligent and lightweight Opinnate platform makes automated network security policy management attainable for enterprises of all sizes. We offer numerous benefits that can help organizations improve their security posture, streamline operations, and comply with regulatory requirements. Every enterprise must keep its firewalls compliant with best practices and standards. Eliminate boundaries in network security policy management. Analyze, optimize, automate & audit your security policies easily. Rule optimization stands as a vital aspect in the maintenance and management of firewalls. Policy change automation becomes necessary when multiple firewalls, each from different vendors, are in place and there is a high volume of policy change requests. In multi-vendor topologies, the firewall policies may not be centrally managed since each vendor has its own management system.
  • 29
    20-sim

    20-sim

    20-sim

    20-sim is a modeling and simulation software package for mechatronic systems. With 20-sim you can enter models graphically, similar to drawing an engineering scheme. With these models, you can simulate and analyze the behavior of multi-domain dynamic systems and create control systems. You can even generate C-code and run this code on hardware for rapid prototyping and HIL-simulation. 20-sim provides you with features that allow you to create models very quickly and intuitively. You can create models using equations, block diagrams, physics blocks and bond graphs. Various features help you to build your models, simulate them and analyze their performance. Models are built in the 20-sim editor. This editor contains a large model library with building blocks to help you to construct models. The model library contains many components such as block diagrams and bond graphs.
    Starting Price: €108 one-time payment
  • 30
    Synopsys Saber
    Synopsys Saber is a solution of high-precision virtual prototyping tools for multi-domain power electronics design that consists of SaberEXP, SaberRD, and SaberES Designer. Saber allows an engineer to run complex simulations with varying component tolerances, generate best and worst-case results, and easily conduct “what-if” studies. Industry-leading accuracy lowers development costs by reducing the number of prototypes required. SaberEXP is a piecewise linear (PWL) quick converging simulator for power electronics, with seamless export into SaberRD. SaberRD adds an integrated design and simulation environment for mechatronic systems, with best-in-class analysis for power electronics validation. SaberES Designer is a wiring harness tool for optimizing wiring layout, materials, and costs, and can be integrated with industry CAD systems. Utilize systematic robust design methods to meet aggressive performance and reliability goals in compressed schedules.
  • 31
    Wolfram System Modeler
    Using drag and drop from the large selection of built-in and expandable modeling libraries, you can build industrial-strength, multidomain models of your complete system. Adding the power of the Wolfram Language gives you a fully integrated environment for analyzing, understanding and quickly iterating system designs. Driving insight, innovation and results. Real-world machines and systems are rarely confined to a single physical domain. Models can contain any combination of interconnected components from any number of domains mimicking real-world topology. Exploration is immediate; at the click of a button, you have access to all values from every component in your model. Zoom in to a region of interest and choose from built-in plot styles with a point-and-click interface. Perform your own symbolic and numerical computations by accessing the full model equations and simulation results of your models. Bring the full power of the Wolfram Language to your model analysis.
  • 32
    Cayosoft Administrator
    Purpose-built for hybrid and cloud Microsoft environments, Cayosoft Administrator secures, automates, and streamlines day-to-day IT administration. Cayosoft Administrator is the only complete management solution for your entire cloud IT journey, from on-premises to hybrid, to the cloud. Every step of the way, Cayosoft Administrator improves security, efficiency, and compliance in the day-to-day management of Active Directory, Exchange, Office 365, and beyond! Role-based delegation provides complete control of what day-to-day administrators and help desk staff can see and do. Cayosoft allows you to delegate across and between systems with one unified set of easy-to-configure Roles enforce a granular, least-privileged administrative model over all of the systems being managed, even in complex hybrid environments. Roles do not require the user to hold native permissions, dramatically reducing the number of individuals requiring Domain, Enterprise, or Global Admin access.
  • 33
    Baidu AI Cloud CDN
    Baidu AI Cloud CDN (Content Delivery Network) has nearby content distribution and smart scheduling, with high availability and high stability; relies on Baidu's self-built 1000+ high-quality nodes, 100T bandwidth, single node 80G-160G, and support for IPV6 and other high-quality features, it makes your website as fast as Baidu search. Baidu AI Cloud CDN releases website content to the edge node closest to the user so that netizens can obtain the desired content nearby, thus improving the response speed and success rate of netizens' access, and protecting the origin server. It solves the problems of high access delay caused by issues such as region, bandwidth, and ISP access, and effectively helps the site to increase the access speed. Multi-domain and multi-service acceleration, whole site acceleration on dynamic and static pages, providing continuous and stable acceleration services. Intelligent DNS scheduling algorithm, requesting to assign the best node services nearby.
  • 34
    Markmonitor

    Markmonitor

    Markmonitor

    Markmonitor is a global leader in enterprise domain management and online brand protection, trusted by many of the world’s most-visited websites. With over two decades of experience, the platform helps organizations secure, manage, and optimize their domain portfolios with industry-leading precision and reliability. From corporate domain registration to DNS security and dotBrand gTLD management, Markmonitor provides a unified, secure ecosystem for protecting online assets. Its team of dedicated advisors offers personalized 24/7 guidance to ensure every brand maintains full control of its digital identity. With advanced tools like proprietary domain scoring and global TLD expertise, Markmonitor simplifies complex domain operations at scale. Backed by white-glove service and cutting-edge technology, it empowers enterprises to safeguard reputation, reduce risk, and strengthen online trust.
  • 35
    Abion

    Abion

    Abion

    Abion Core is a cloud-based, one-stop platform designed to bring together, organize and manage all your brand’s intellectual property assets, including domain names, trademarks, DNS records and web-security services. On a single platform you can gain a complete overview of your holdings across jurisdictions, administer renewals, set up workflows and document management, and integrate monitoring tools that trigger alerts when infringements or risks are detected. The system supports self-service ordering and automation (domains, certificates, enforcement actions), strong access security (2FA, SAML/SSO, user-rights control), and extensibility via REST APIs for tasks such as DNS and zone-file management. Operationally, the platform gives you dashboards and reports, centralised records, role-based user access and customised views, helping reduce administration, enhance transparency, boost efficiency and counter brand risk proactively.
  • 36
    SSL For Free

    SSL For Free

    SSL For Free

    Never pay for SSL again. Powered by ZeroSSL with free 90-day certificates. Our free SSL certificates are trusted in 99.9% of all major browsers worldwide. Protect user information, generate trust and improve search engine ranking. Wildcard certificates allow you to secure any sub-domains under a domain. If you want to secure any sub-domains of example.org that you have now or in the future you can make a wildcard certificate. To generate wildcard certificates, add an asterisk to the beginning of the domain(s) followed by a period. Wildcard certificates will also secure the root domain, so there is no need to re-enter the root domain in the process. For example, to create a wildcard domain for example.org, enter *.example.org. If you need certificates for multiple domains, such as example.org and example.com, you will need to create a separate wildcard certificate for each domain. Domain verification will be required for each domain.
  • 37
    OPTIMICA Compiler Toolkit
    Modelon’s OPTIMICA Compiler Toolkit, the most advanced Modelica-based mathematical engine on the market, offers users a powerful solution for the automation, simulation and optimization of system behaviors throughout the model-based design cycle. Trusted as the compiler for Modelon Impact, OPTIMICA enables users to build multi-domain physical systems by choosing from thousands of available model components. OPTIMICA’s state-of-the-art solvers empower evaluation of complex physical systems – supporting transient simulations as well as steady-state computations and dynamic optimization. The sophisticated mathematical engine can manipulate and simplify models to improve performance and robustness, serving industries and applications ranging from automotive and active safety to energy and power plant optimization. To meet the increased need for regulating power in today’s energy market, start-up optimization of thermal power plants is a key industrial need.
  • 38
    Trellix ePolicy Orchestrator (ePO)
    Benefit from a centralized security management platform that helps orchestrate and manage all your endpoints, from a single console. Unify defense strategy, bring together different endpoints with native controls and reduce security operations dependency on multiple tools. Comprehensive platform, helps security operations teams to plan and scale their operations model all while benefiting from true API integrations. Threat Intelligence Exchange (TIE) and Advanced Threat Defense (ATP) integrations helps in effective sandboxing and thus identifying and stopping cyber attacks beforehand. At the forefront of the XDR revolution, we’ve pioneered a brand new unified experience. At the forefront of the XDR revolution, we’ve pioneered a brand new unified experience. Create open partnerships to automate security policy orchestration.
  • 39
    Netwrix Privilege Secure for Endpoints
    Netwrix Privilege Secure for Endpoints is an endpoint privilege management solution designed to enforce the principle of least privilege across diverse environments, including domain-joined, MDM-enrolled, and non-domain-joined systems. It enables organizations to remove local administrative rights from end-users while providing controlled elevation for specific applications and tasks as needed. Key features include granular elevation of admin rights for designated executables, delegation of privileged access to settings typically requiring local admin rights, and management of PowerShell usage to prevent unauthorized script execution. The solution also offers user request and admin approval workflows, allowing end-users to request elevated privileges with secure approval processes. By implementing these controls, Netwrix Privilege Secure for Endpoints mitigates the attack surface on endpoints, reducing the risk of breaches from compromised credentials or poorly managed access.
  • 40
    Com.bot

    Com.bot

    Com.bot

    Com.bot is a unified automation and chatbot platform designed to manage multi-channel conversations, build bots visually, and integrate with messaging platforms such as WhatsApp, Facebook, and Instagram. The system provides a visual bot-builder where users can create workflows, conversation flows, and business logic without coding, while supporting native payments, rich media messaging, and enterprise-grade security. As an official Meta Business Partner, it is trusted by over 23,000 customers and handles millions of messages per day. It offers multi-channel support with a single interface, native integration with WhatsApp’s API, Facebook, Instagram, and SMS, and comes with built-in connectors, webhooks, and APIs to link to CRMs, ecommerce systems, and payment gateways. For agencies or resellers, Com.bot includes a multi-tenant SaaS edition with isolated tenant workspaces, custom domains, usage metering, and white-label branding to launch their own chatbot platform.
  • 41
    Precisely Enforcive
    Precisely’s Enforcive Enterprise Security Suite is a comprehensive, easy-to-use security and compliance solution for IBM i. With over 20 fully integrated, GUI-controlled modules, the suite enables system administrators and security officers to manage security and compliance tasks efficiently and effectively – even managing multiple systems at a single time. In today’s world of privacy breaches, complex regulatory requirements and evolving threats, the Enforcive Enterprise Security Suite enables a comprehensive ‘hardening’ of your company’s IBM i defenses against unauthorized access. Enforcive Enterprise Security Suite modules cover network security, authority swap, security monitoring, IBM i log transfer, and regulatory compliance. Additional modules can be added to tailor the solution to best meet the needs of your environment. Add a comprehensive layer of protection around IBM i systems and data while supporting compliance with security regulations.
  • 42
    Simulink

    Simulink

    MathWorks

    Design and simulate your system in Simulink before moving to hardware. Explore and implement designs that you wouldn’t otherwise consider – without having to write C, C++, or HDL code. Explore a wide design space by modeling the system under test and the physical plant. Your entire team can use one multi-domain environment to simulate how all parts of the system behave. Package and share your simulations with collaborators, suppliers, and clients. Reduce expensive prototypes by testing your system under conditions that are otherwise too risky or time-consuming to consider. Validate your design with hardware-in-the-loop testing and rapid prototyping. Maintain traceability from requirements to design to code. Instead of writing thousands of lines of code by hand, automatically generate production-quality C and HDL code that behaves the same way as the model you created in Simulink. Then deploy it directly onto your embedded processor or FPGA/ASIC.
  • 43
    AhnLab CPS PLUS
    AhnLab CPS PLUS is a unified “CPS protection” platform engineered to secure cyber-physical systems, covering operational-technology endpoints and networks as well as IT systems connected to OT. It addresses how OT environments, historically isolated and stable, have increasingly become intertwined with IT networks, increasing attack surfaces and risk for industrial operations. CPS PLUS offers extensive coverage across both IT and OT domains using a platform-centric architecture wherein multiple security modules interoperate under a central management console, AhnLab ICM. It implements a systematic threat-management workflow of identify, detect, and respond, enabling continuous asset visibility, network monitoring, vulnerability assessment, and threat detection without compromising system stability. Its multi-layered defense incorporates firewall, intrusion prevention (IPS), DDoS mitigation, sandboxing, and other protective modules.
  • 44
    Webnames Corporate
    Webnames Corporate is a Canadian full-service corporate domain name registrar. Co-founded by the team behind the launch of the .CA domain, Webnames is the choice of thousands of businesses across retail, banking, law, and government. Headquartered in Vancouver, Webnames provides concierge-style solutions for domain names, SSL certificates, business email and enterprise DNS and web hosting for mid-large firms. Our clients enjoy hands-on support from a dedicated account manager with an average of 10 years of domain industry experience. Webnames Corporate offers security features and tools such as Account and Domain Locks, TMCH, Domain blocks (DPML), Domain monitoring, SSL monitoring, SSL cloning and revocation, account multi-user functions, parent-child accounts with access controls and much more to mitigate risk. Certified as a WBE and CAMSC business, Webnames is women-owned and led and is proud to help businesses meet their procurement diversity goals in the IT space.
  • 45
    Hushmesh

    Hushmesh

    Hushmesh

    ​Identity theft is a consequence of the disjointed, domain-centric architecture of the Web. Without a global unified namespace, the Web requires each domain to manage identity independently. This “every domain for itself” model makes global identity security impossible. In contrast, the cryptographic namespace of the Mesh enables the creation of individual keychains for each person and non-person entity. Domains can then lock their users’ accounts with unique keys on their users’ keychains. ​Data breaches are symptoms of the domain-centric data security model of the Web. Without built-in cryptographic security at the person or non-person entity level, the Web requires each domain to secure data on its own. This approach increases the global attack surface and puts “domain insiders in the middle”, creating vulnerabilities and liability along with it.
  • 46
    WebCrossing

    WebCrossing

    Elliptics

    WebCrossing Community gives you the parts you need to create an infinitely flexible online community. Create any structure you need, with dozens of plug-ins and applications available to customize and add functionality to your site. WebCrossing Core is a full-featured multi-domain web server including HTTP, SMTP, IMAP, XML-RPC, FTP, NNTP and more. User objects, folders, discussions and messages are all native features. The scriptable, integrated objected-oriented NoSQL database is what you are looking for if you need to handle complex data structures. Webcrossing Neighbors group tools include blogs, discussion forums, calendars, wikis, custom pages, file stores and more. Each group can have a custom landing page. Public, private and hidden groups are supported. Since all WebCrossing servers have a built-in mail server, your members can post by email or the web, so your online forums can also be used as interactive mailing lists with an online archive.
  • 47
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 48
    Palo Alto Networks DNS Security Service
    Automatically secure your DNS traffic by using Palo Alto Networks DNS Security service, a cloud-based analytics platform providing your firewall with access to DNS signatures generated using advanced predictive analysis and machine learning, with malicious domain data from a growing threat intelligence sharing community. Maximize your protections against threats using DNS with the DNS Security subscription service. The DNS Security service now features individually configurable and extensible DNS Security Signature Categories, which allows you to create discrete security policies based on the risk factors associated with certain types of DNS traffic. DNS Security now protects you from additional DNS-based threats, including those that rely on dynamic DNS hosted domains, recently registered domains, and phishing domains.
  • 49
    Suped

    Suped

    Suped

    Suped is a DMARC monitoring platform that helps startups and enterprises secure their email. We provide clear analytics, instant threat alerts for spoofing attempts, and step-by-step guidance to strengthen your domain's security. Stop phishing, improve your domain reputation, and make sure your emails hit the inbox every time. DMARC Report Analysis: Automatically processes complex aggregate (RUA) and forensic (RUF) reports into a simple dashboard. Real-Time Threat Alerts: Instant notifications for potential domain spoofing and phishing attempts. Guided Policy Enforcement: Step-by-step guidance to safely strengthen your DMARC policy to p=reject without blocking legitimate email. SPF & DKIM Monitoring: Track authentication alignment across all your sending services to diagnose delivery issues. Domain Health Score: At-a-glance score based on your compliance, reputation, and blocklist status. Unlimited Domains: Monitor DMARC for all your domains from a single account.
  • 50
    Host Bomb

    Host Bomb

    Host Bomb

    Host Bomb is a web hosting service provider offering a range of solutions, including domain registration, shared web hosting, and reseller hosting. Host Bomb: Reseller Hosting – Affordable reseller hosting plans with free lifetime domains, making it easy to start your own hosting business. Domain Registration – Secure .com domains starting at $8.99/year with a simple registration process. VPS Hosting – Scalable and high-performance virtual private servers tailored for businesses needing more control and flexibility. SSL Certificates – Protect your website with SSL encryption for secure data transmission. Email Hosting – Professional email accounts with custom domain support for business communications. Website Security – Advanced security features to safeguard your website from threats. Host Bomb provides reliable hosting solutions with 24/7 support.