Alternatives to VerifyTool

Compare VerifyTool alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to VerifyTool in 2026. Compare features, ratings, user reviews, pricing, and more from VerifyTool competitors and alternatives in order to make an informed decision for your business.

  • 1
    JDisc Discovery
    JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices. One of the standout features of JDisc Discovery is its agentless discovery process, meaning it does not require the installation of any software on individual devices, reducing deployment time and minimizing network impact. It supports a wide range of protocols (e.g., SNMP, SSH, WMI) to gather data, making it compatible with diverse IT environments, whether they are Windows, Linux, or Unix-based.
    Compare vs. VerifyTool View Software
    Visit Website
  • 2
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.
    Compare vs. VerifyTool View Software
    Visit Website
  • 3
    Cerberus FTP Server

    Cerberus FTP Server

    Redwood Software

    Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations. - FTP/S, SCP, SFTP, HTTPS - SAML SSO - Active Directory & LDAP - Secure SSL Encryption - Two-Factor Authentication - IP Auto-Banning and Geoblocking - HIPAA Compliant - FIPS 140-2 Validated - Advanced Reporting - Comprehensive Auditing - Web File Transfer Client - Email Notifications - Event Support & Automation - File Retention Policies -Unlimited Connections -Virtual Directories -Users & Groups -Detailed Logs -Full IPv6 Support -FTP with TLS/SSL -SOAP control API -Web Administration -SSH2 SFTP and SCP -Public Key Authentication
    Compare vs. VerifyTool View Software
    Visit Website
  • 4
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 5
    Octopus Deploy

    Octopus Deploy

    Octopus Deploy

    Founded in 2012, Octopus Deploy enables successful deployments for over 25,000 companies around the world. Prior to Octopus Deploy, release orchestration and DevOps automation tools were clunky, limited to large enterprises and didn't deliver what they promised. Octopus Deploy was the first release automation tool to gain popular adoption by software teams, and we continue to invent new ways for Dev & Ops teams to automate releases and deliver working software to production. Runbook automation in Octopus sits side-by-side with your deployments and gives you control over your infrastructure and applications. Automate operations tasks like routine maintenance and emergency incident recovery. Flexible, role-based access control lets you manage who can deploy to production, change your deployment process, infrastructure, and more.
  • 6
    SaltStack

    SaltStack

    SaltStack

    SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems.
  • 7
    IBM Rational ClearCase
    IBM Rational ClearCase provides controlled access to software assets, including code, requirements, design documents, models, test plans and test results. It features parallel development support, automated workspace management, baseline management, secure version management, reliable build auditing, and flexible access virtually anytime, anywhere. Allows you to delete previous versions, create and delete branches, list version histories, and compare and merge versions. Provides development and integration models, private workspaces and public integration areas. Includes user authentication and audit trails to help meet compliance requirements with minimal administrative hassle. Allows you to control personal workspaces and provides access to the file and directory versions you need.
  • 8
    SmartSynchronize
    Comparing directories the smart way. SmartSynchronize is an advanced file and directory comparison tool. SmartSynchronize is a multi-platform file and directory compare tool. It allows you to compare files or perform a 3-way-merges, both with the ability to edit the file contents. SmartSynchronize is optimized for comparing directory structures (for example, of software projects), and can keep them synchronized. Comfortable editing and transfer of changes from one file to the other. Configurable filter for customized directory scanning (inclusion and exclusion). Easy transfer of changes from one directory structure to another. Automatic synchronization depending on file times and previous synchronization time. Ability to edit each of the three files. Command-line interface for easy invocation from other applications. Configurable font, colors and accelerators. Support for all major text file encodings.
    Starting Price: $49 one-time payment
  • 9
    FolderManifest

    FolderManifest

    ARCED International LLC

    FolderManifest is an offline Windows desktop tool for analyzing, documenting, and verifying folder contents. It scans any directory and generates a static, searchable HTML manifest that captures file structure, file types, sizes, timestamps, and checksums. Users rely on FolderManifest to detect duplicate files, validate backups, verify file integrity over time, and document folder states for audits or handovers. Because manifests are saved as static HTML, they remain searchable even if files are later moved, modified, or deleted. FolderManifest runs entirely offline—no cloud services, no accounts, and no data leaving the machine—making it suitable for sensitive, large, or regulated data environments. It is commonly used by researchers, developers, IT teams, and organizations managing large file collections who need transparency, traceability, and confidence in their file systems. FolderManifest is licensed as a one-time lifetime purchase and includes unlimited scans.
    Starting Price: $179 Lifetime License
  • 10
    Directory Report

    Directory Report

    AMB Software

    Show disk usage, directory printer, find duplicate files, rename files, and maintain your files - all in 1 tool Directory Report looks like the MS-Explorer but always shows the directory's size. This makes it easy to drill down to directories which are using all your disk space. Duplicate files are found by any combination of the same: Name, Size, Cyclic Redundancy Checksum (CRC32) or Comparing byte by byte Finds duplicate directories Multiple file rename Multiple file change date Multiple file change owner Powerful filters and report to many formats (Printer, Text file, Clipboard, Excel (CSV) file, Excel program, HTML file or XML file) Print a directory list and file list of an entire disk or a list of directories Prints DLL and EXE version information Prints AVI, MP3, MSI, WAV and MS-Office properties
  • 11
    TeraCopy

    TeraCopy

    Code Sector

    In case of a copy error TeraCopy will try to recover. If unable to recover in the worst case scenario it will simply skip the problematic file, not terminating the entire transfer. It can also wait for network or device reconnection. Unnecessary files can be skipped to reduce the transfer time. During the process, TeraCopy shows detected errors, and allows you to fix the problem by recopying only the problematic files. TeraCopy can verify files after they have been copied to ensure that they are identical. This is done by comparing hashes of source and target files. TeraCopy can optionally show a confirmation dialog on every drag and drop operation. It can prevent you from moving folders accidentally from one location to another. TeraCopy can keep history of recently used directories, as well as show folders which are open in Explorer and other file managers.
    Starting Price: $29.95 one-time payment
  • 12
    SUSE Manager
    SUSE Manager was designed to help your enterprise DevOps and IT Operations teams reduce complexity and regain control of your IT assets with a single tool to manage Linux systems across a variety of hardware architectures, hypervisors as well as container, IoT and cloud platforms. It automates Linux server and IoT device provisioning, patching and configuration for faster, consistent and repeatable server deployment helping to optimize operations and reduce costs. And with automated monitoring, tracking, auditing and reporting of your systems, VMs, and containers across your development, test and production environments, you can ensure compliance with internal security policies and external regulations.
  • 13
    Microsoft Configuration Manager
    ​Microsoft Configuration Manager is a comprehensive systems management solution that enhances IT productivity by automating tasks such as the secure deployment of applications, software updates, and operating systems across servers, desktops, and laptops. It offers real-time device management, cloud-powered analytics for both on-premises and internet-based devices and compliance settings management. It integrates seamlessly with Microsoft technologies including Intune for co-managing diverse mobile device platforms, Azure for hosting cloud services, and Windows Server Update Services (WSUS) for software update management. Additionally, it utilizes Active Directory Domain Services and Microsoft Entra ID for security and configuration, as well as SQL Server for database management, integrating with SQL Server Reporting Services (SSRS) for comprehensive reporting.
  • 14
    ExamDiff

    ExamDiff

    PrestoSoft

    There is no need to specify both file names, just enter a directory name for one of the files to be compared. ExamDiff will try to use an entered filename with a specified directory name. Remembers a user-specified number of last compared first and second files. This allows quick selection of the two files the user wishes to compare. One push re-compare function which attempts to leave the viewer's focus in the same place as before the re-compare. Allows the copying of text from the comparison panes via drag and drop, a hot key, or a right button pop up. Fully customizable file extension filter. The user can choose only .c and .cpp files or any other files he/she chooses to be displayed. Adjustable pane splitter with smooth synchronized scrolling. Allows easy toggling between horizontal and vertical splitter orientation as well as splitter centering and panes hiding.
    Starting Price: $34.99 one-time payment
  • 15
    Saint Security Suite

    Saint Security Suite

    Carson & SAINT

    This single, fully integrated solution conducts active, passive and agent-based assessments while its extensive flexibility evaluates risk according to each business. SAINT’s impressive, flexible and scalable scanning capabilities set it apart from many others in this space. SAINT has partnered with AWS, allowing its customers to take advantage of AWS’s efficient scanning. Should subscribers prefer, SAINT also offers a Windows scanning agent. Security teams can schedule scans easily, configure them with considerable occurrence flexibility and fine-tune them with advanced options. As a vulnerability management solution, SAINT Security Suite’s security research and development efforts focus on investigation, triage, prioritization, and coverage of vulnerabilities of the highest levels of severity and importance. Not willing to settle for just blanket coverage and raw data, our analysts focus on developing tools for what matters to our customers.
    Starting Price: $1500.00/year/user
  • 16
    AWS Config
    AWS Config is a service that enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. With Config, you can review changes in configurations and relationships between AWS resources, dive into detailed resource configuration histories, and determine your overall compliance against the configurations specified in your internal guidelines. This enables you to simplify compliance auditing, security analysis, change management, and operational troubleshooting. AWS Config is designed to be your primary tool to perform configuration audit and compliance verification of both your AWS and third-party resources. You can publish the configuration of third-party resources such as GitHub repositories, Microsoft Active Directory resources, or any on-premises server into AWS.
    Starting Price: $0.001 per rule evaluation
  • 17
    Vagrant

    Vagrant

    HashiCorp

    Vagrant is a tool for building and managing virtual machine environments in a single workflow. With an easy-to-use workflow and focus on automation, Vagrant lowers development environment setup time, increases production parity, and makes the "works on my machine" excuse a relic of the past. Mirror production environments by providing the same operating system, packages, users, and configurations, all while giving users the flexibility to use their favorite editor, IDE, and browser. Declarative configuration file describes all the requirements and builds them through a consistent workflow.
  • 18
    DMDE

    DMDE

    DMDE

    DMDE is a powerful tool for data searching, editing, and recovery on disks. It may recover directory structure and files in some complicated cases through the use of special algorithms when other software can't help. The application is listed, reviewed, and awarded in magazines and catalogs. DMDE has a number of freeware features such as a disk editor, a simple partition manager (e.g. allows partition undeleting), a tool to create disk images and clones, a RAID constructor, and file recovery from the current panel. Paid editions support file and directory recovery without the restriction, DMDE Professional Edition has additional features to recover data for clients (compare editions). Algorithms of thorough search and analysis effectively reconstruct directory structure and recover files after some complex file system damages (such as format, partition manager failure, and others). It is possible to find data quickly without a full scan in the case of minor filesystem damage.
    Starting Price: $20 per year
  • 19
    Quali CloudShell
    None of the bottlenecks, all the best practices. Automate multi-cloud provisioning and deployment, policy-driven compliance and cloud cost management. Torque is a SaaS platform delivering Infrastructure Automation at Scale for complex, application-centric environments on cloud technologies including AWS, Azure, and Kubernetes. IT leaders and DevOps innovators around the world trust Quali to enable self-service automation and governance to streamline application development, testing, and release to production. Seamlessly connect cloud automation, cost control, and security into your platform, and make the power of Environments as a Service accessible to any user through self-service, even if they are not cloud experts. Deliver the infrastructure & application resources your teams need with velocity and control. Give developers on-demand access to the application environments they need through their CI/CD tools, GUI, and CLI.
  • 20
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 21
    UVexplorer

    UVexplorer

    UV Networks

    UVexplorer PRO automatically and quickly discovers all of the information about the devices on your network and the connections between them. UVexplorer creates network maps for documentation, meetings, presentations, sharing with your boss, or hanging on the wall. Export UVexplorer's automated network maps to PRTG, LucidChart, Microsoft Visio™, PDF, and SVG file types. UVexplorer also backups and provides change notifications for configurations of your network devices, such as routers, switches, and firewalls. Track how device configurations change over time. With UVexplorer's PRTG Connector, add powerful network discovery, detailed device inventory, and automatic network maps to PRTG Network Monitor. Capture detailed device and network inventory information to help meet documentation requirements of governmental regulations like PCI, HIPAA, FISMA, SOX, etc. Analyze and solve network and device problems with UVexplorer's suite of diagnostic tools.
    Starting Price: $1,795 per year
  • 22
    IBM Verify Identity Protection
    IBM’s identity threat detection and response and identity security posture management solution provide you with end-to-end visibility into user activity across the hybrid landscape of siloed IAM tools used across cloud, SaaS, and on-prem applications. IBM Verify Identity Protection provides the ISPM and ITDR functionality to keep your organization safe. Easily deployed without any agents or clients and designed to work in any cloud or network, IBM Verify Identity Protection extends your existing cybersecurity solutions by analyzing and delivering actionable identity risk information that is critical for your security operations. Detects and enables remediation of identity-related blind spots such as shadow assets, unauthorized local accounts, missing multi-factor authentication, and usage of unauthorized SaaS apps across any cloud or platform. Detect vulnerable misconfigurations caused by human error, hazardous deviations from policy, and inadequate implementations of identity tools.
  • 23
    Red Hat OpenShift Dev Spaces
    Built on the open Eclipse Che project, Red Hat OpenShift Dev Spaces uses Kubernetes and containers to provide any member of the development or IT team with a consistent, secure, and zero-configuration development environment. The experience is as fast and familiar as an integrated development environment on your laptop. OpenShift Dev Spaces is included with your OpenShift subscription and is available in the Operator Hub. It provides development teams a faster and more reliable foundation on which to work, and it gives operations centralized control and peace of mind. Get coding today with our free Developer Sandbox for Red Hat OpenShift, which includes OpenShift Dev Spaces to try out at no cost. Developers can focus more on coding, with their application and development environment containerized and running on OpenShift - all without needing to understand the details of Kubernetes. Administrators can easily manage and monitor workspaces as any other Kubernetes resource.
    Starting Price: $30 per month
  • 24
    Terraform

    Terraform

    HashiCorp

    Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed.
  • 25
    SQL Workbench

    SQL Workbench

    SQL Workbench

    SQL Workbench/J is a free, DBMS-independent, cross-platform SQL query tool. It is written in Java and should run on any operating system that provides a Java Runtime Environment. Its main focus is on running SQL scripts (either interactively or as a batch) and export/import features. Graphical query building or more advanced DBA tasks are not the focus and are not planned. Powerful export command to write text files (aka "CSV"), XML, HTML or SQL (including BLOB data). All user tables can be exported into a directory with a single command. Export files can be compressed "on-the-fly". Powerful text, XML and spreadsheet import. A set of files (including compressed files) can be imported from a directory with a single command. Foreign key constraints are detected to insert the data in the correct order. Compare two database schemas for differences. The XML output can be transformed into the approriate SQL ALTER statements using XSLT.
  • 26
    Netwrix Strongpoint
    Netwrix Strongpoint helps organizations build smart controls that automate the hardest parts of SOX compliance management and audit reporting, access reviews and segregation of duties, data security, and change management. Netwrix Strongpoint works with NetSuite and Salesforce. With tight controls to track and protect what’s in scope, Strongpoint customers are able to produce airtight audit reporting on demand, greatly reducing the cost and time of SOX compliance prep. See what’s safe to change and what requires additional review. Then, use highly sophisticated impact analysis tools to streamline the discovery process. Not subject to SOX? Netwrix Strongpoint’s award-winning data security, configuration management, and change management tools help businesses running complex business systems maintain transparency and harden their business-critical applications against security risks.
    Starting Price: $1000/month
  • 27
    SlickStack

    SlickStack

    LittleBizzy

    SlickStack is a free LEMP stack automation script written in Bash designed to enhance and simplify WordPress provisioning, performance, and security. Our project empowers small businesses with marketing-leading technical SEO features for their WordPress stack. If you are a developer that's tired of bouncing from web hosting to web hosting, it's time to manage your own cloud servers and learn the basics of bash shell commands (SSH). It's very easy with our script and our community is here to help you learn and improve anytime! Outside of the so-called Application Layer, so much of the way computers and servers now work has been moved away from in-house teams and specialists and onto “the cloud” that terms like DevOps have become standard among recruiters, companies, and developers alike. Modern web development trends have begun to revolve entirely around concepts such as automation, APIs, cloud services, and beyond, a phenomenon we might refer to as Web 3.0.
  • 28
    GPOADmin
    Simplify Active Directory group policy management and governance. GPOADmin is a third-party group policy management and governance solution that allows you to search, administer, verify, compare, update, roll back and consolidate GPOs to ensure consistency and avoid long-term GPO proliferation. GPO comparison features combined with enhanced security and workflow capabilities means controlling and securing your Windows infrastructure while supporting governance initiatives. Getting GPOs right is critical, one wrong GPO with a seemingly innocuous setting can inflict massive detrimental effects to the security posture of thousands of systems in your network within minutes. With GPOADmin, you can automate critical Group Policy management and governance tasks to reduce risk and eliminate manual processes. Improve GPO auditing and verify setting consistency quickly and easily with advanced, side-by-side GPO version comparisons at various intervals.
  • 29
    Opsera

    Opsera

    Opsera

    You choose your tools, we take care of the rest. Put together the perfect CI/CD stack that fits your organization’s goals with zero vendor lock-in. ‍Eliminate manual scripts and stop building toolchain automation. Free your engineers to focus on your core business. Pipeline workflows follow a declarative model so you focus on what is required — not how it’s accomplished — including: software builds, security scans, unit testing, and deployments. With Blueprints, diagnose any failures from within Opsera using a console output of every step of your pipeline execution. Comprehensive software delivery analytics across your CI/CD process in a unified view — including Lead Time, Change Failure Rate, Deployment Frequency, and Time to Restore. ‍Contextualized logs for faster resolution and improved auditing and compliance.
    Starting Price: $3.60 per user , Min 300 devs
  • 30
    Red Hat Ansible Automation Platform
    Red Hat® Ansible® Automation Platform is a unified solution for strategic automation. It combines the security, features, integrations, and flexibility needed to scale automation across domains, orchestrate essential workflows, and optimize IT operations to successfully adopt enterprise AI. The path to fully optimized automation is a journey. Moving from manual Day 2 operations and ad hoc solutions to a comprehensive, integrated automation platform requires a strategic commitment. And it determines your current—and future—business success. With Red Hat Ansible Automation Platform, you can maximize efficiency, improve security, and overcome increasing IT challenges like skill gaps and tech sprawl. It helps you: Deliver consistent, reliable automation across domains and use cases. Maximize the value of the technology and resources you already have. Build a strong foundation for AI adoption.
    Starting Price: $5,000 per year
  • 31
    Hillstone Security Management Platform
    Hillstone’s Security Manager enhances network security by allowing businesses to segment their networks into multiple virtual domains. Domains can be based on geography, business unit or security function. It provides the versatility needed to manage Hillstone’s infrastructure while simplifying configuration, accelerating deployment cycles, and reducing management overhead. Most companies face security challenges when their business spans offices located in several regions or countries. Multiple security gateways, multiple sites requiring different security policies and multiple administrators can quickly create a complex security environment. Organizations need the tools to manage global security policies while allowing regional administrators to manage devices and users in their geographic location or business division. Hillstone’s Security Manager allows the primary administrator to segment security management into multiple virtual domains.
  • 32
    CA Panvalet

    CA Panvalet

    Broadcom

    It can reduce the complexity and overhead associated with maintaining business applications by offering a single repository that provides visibility to and control of your programming environment. CA Panvalet establishes, maintains and protects a control library of source programs, JCL and card-image data files. It provides immediate access for maintenance and processing and effective control and protection against theft, disaster or other loss. CA Panvalet can increase staff efficiency, enable reliable and powerful change management and improve machine performance by providing a central library on a direct access storage device (DASD) and automating resource-intensive manual processes. Streamlines application development by providing immediate access to application components. Protects against inadvertant loss of source code and other program assets. Reduces complexity and overhead of developing applications.
  • 33
    Chef

    Chef

    Progress Software

    Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility.
  • 34
    Open-AudIT

    Open-AudIT

    FirstWave

    ​Open-AudIT is a powerful network discovery and inventory software that intelligently scans an organization’s network and stores the configurations of the discovered devices. This provides immediate access to software licensing, configuration changes, non-authorized devices, capacity utilization, and hardware warranty status reports. Open-AudIT can collect significant amounts of data from large and varying networks that are cataloged and can easily be configured into meaningful reports. It enables users to easily create network discovery profiles for their organization and then run a discovery with a single click or even on an automated schedule. It audits the organization’s network daily without impacting the user experience and intelligently stores the configuration of every discovered component. Open-AudIT tracks and reports on IT asset configuration changes, software licensing, shadow IT, and hardware warranty status.
  • 35
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize risks effectively. Trusted by over 34,000 customers worldwide, including Conair and City of Seattle, Ivanti supports secure, flexible work environments. Their solutions enable businesses to boost productivity while maintaining strong security and operational visibility.
  • 36
    Kompare
    Kompare is a free software graphical computer application that helps the user to compare two different text files or two directories. Kompare does not actually compute the differences between the compared files itself, but is merely a graphical front end to the command line interface diff utility. However, the colour coding of changed lines makes them very easy to spot. Comparison of files or directories via a graphical interface. Bezier-based connection widget lets you see both source and destination as they really appear. Graphical viewing of patch files in normal, context, unified and diff formats. Graphical interface to commonly used diff command-line options. Easy navigation of multiple-file diffs with the dockable navigation tree. Ability to view plain-text diff output in the embedded viewer. Interactive application of differences. Provides full network transparency.
  • 37
    HTTPCS Cyber Vigilance
    HTTPCS solutions comparison vs the other automated tools on the cybersecurity market. The features of each HTTPCS solution have been compared to the features of alternative solutions available on the cybersecurity market. Click on a tab and discover HTTPCS, a complete alternative to other cybersecurity solutions. 4 tools have been compared to HTTPCS Cyber Vigilance, a darknet monitoring tool that warns you in real-time if your organization becomes the target of a cyberattack. 6 tools to scan and detect security breaches on websites have been compared to HTTPCS Security, the vulnerability scanner with a 0 false-positive guarantee. 4 web integrity monitoring products and viewing of changes have been compared to HTTPCS Integrity, a cybersecurity solution which detects malicious files, malware and internal errors. Request a demo or try a free 14-day trial for HTTPCS Integrity and see for yourself its features!
  • 38
    PowerAdmin Storage Monitor
    PA Storage Monitor runs as a service, so it is monitoring your system as soon as the computer is started, there is no need to log in or start a program manually. Powerful and flexible actions that run in response to your alert criteria. Report on file ages, types, owners, duplicates, etc. Scan and catalog terabytes of file information and predict when disks will run out of space. Monitor and alert on user and directory sizes. Reduce costs by finding files that aren't used. Alert on changed files, low disk space, etc. Centrally monitor and report on multiple servers. Disk space monitoring with disk full prediction report. Volume cataloger with powerful reporting, file, and directory change monitoring for intrusion detection or configuration management. Specific file size monitoring, user and directory quota monitoring. Create rich schedulable reports about what is stored. Many alert types and other configurable actions.
    Starting Price: $4 per year
  • 39
    RemoteExec

    RemoteExec

    IS Decisions

    RemoteExec remotely installs applications, executes programs/scripts and updates files and folders on Windows systems throughout the network. RemoteExec quickly and easily deploys applications packaged in .msi format to hundreds or (tens of) thousands of Windows systems. You simply need to specify the .msi path and the action to take (install/uninstall/repair/update), select the target computers, and launch the deployment in a click. RemoteExec allows remote execution of programs (.exe, .bat, .cmd), scripts (.vbs, .js) and files associated to executables (.txt, .doc, .wav, .reg, .inf, .msi, …). With RemoteExec, you can deploy Service Packs, updates, patches and hotfixes to all required Windows systems in minutes. RemoteExec allows remote modification of the registry on all Windows systems throughout the network, or of a specific subset of computers.
    Starting Price: $437.80 for 20 systems
  • 40
    Cruz Wireless Controller
    Cruz Wireless Controller lets IT departments view, monitor, and configure multi-vendor wireless IT infrastructures. It provides end-to-end visibility and control over the wireless devices on your network. With Cruz Wireless Controller, automate discovery, performance monitoring, configuration backup and restore, firmware management, scheduling, traffic flow analysis, configuration audit capabilities, scripting, reporting, and more, all from a single-pane-of-glass and an affordable price. --Performance statistics, real-time health monitoring, firmware/SW management, backup, restore, deploy, one-to-one or groups, enforce device security policies, push and monitor configurations to wireless controllers, APs, and network switches. --Trigger network health alerts, automate repetitive tasks, simplify live/remote troubleshooting, ensure service availability, and multi-vendor features. --IT departments can simplify deployment and management with a single tool to manage their operations
    Starting Price: $1350
  • 41
    OTbase

    OTbase

    Langner

    OTbase is a productivity and collaboration tool for your journey towards secure and resilient OT networks. It enables users in cyber security and engineering roles to stay on top of hyper-complex OT networks with hundreds of thousands of devices. OTbase not just inventories your OT systems automatically, it also acts as a plattform to streamline, plan, and document your digital transformation journey. OTbase provides full transparency on all aspects of your OT networks, from minute configuration details to high level KPIs in a CISO dashboard. OTbase enables cyber security experts, control engineers, maintenance experts, plant planners, process engineers, and SOC analysts to get the information they need in an instant.
  • 42
    Cisco Intersight
    Cisco Intersight is Cisco’s systems management platform that delivers intuitive computing through cloud-powered intelligence. This platform offers a more intelligent level of management that enables IT organizations to analyze, simplify, and automate their environments in ways that were not possible with prior generations of tools. This capability empowers organizations to achieve significant savings in Total Cost of Ownership (TCO) and to deliver applications faster in support of new business initiatives. Experience a customized one-on-one demo and see what simple, automated management can do. Simplify management with automated issue detection and support for analyzing and resolving issues.
  • 43
    Netwrix Threat Prevention
    Audit and block any ad changes, authentications, or requests. Monitor and prevent unwanted and unauthorized activities in real-time for Active Directory security and compliance. For years, organizations have struggled to obtain contextual, actionable intelligence from their critical Microsoft infrastructure to address security, compliance, and operational requirements. Even after filling SIEM and other log aggregation technologies with every event possible, critical details get lost in the noise or are missing altogether. As attackers continue to leverage more sophisticated methods to elude detection, the need for a better way to detect and control changes and activities that violate policy is vital to security and compliance. Without any reliance on native logging, Netwrix Threat Prevention is able to detect and optionally prevent any change, authentication, or request against Active Directory in real-time and with surgical accuracy.
  • 44
    HyScale

    HyScale

    HyScale

    HyScale transforms the way agile teams deploy software to modern IT infrastructures powered by cloud, containers and Kubernetes. It's open-source and vendor-neutral. Created and containerized apps for a microservice-based platform minimizing delays in application delivery. Migrated monolithic apps to K8s & set up a self-service process in a few weeks’ time for a leading insurance company from UK. Automated CI/CD pipeline and reduced time to market for a US-based transportation management company. Focus on your app & quickly implement app changes. Continuously deliver microservices to Kubernetes with self-service DevOps. Deliver apps to K8s running on multi-cloud environments. Streamline with left-shifted security & gain visibility over container sprawl.
  • 45
    Specops Secure Service Desk
    Password reset tickets at the service desk are a great vulnerability for hackers to exploit. In the absence of a self-service password reset solution to direct users to, it is up to the service desk agent to verify that the caller is the owner of the account, before issuing a new password. Secure Service Desk is a tool that enables organizations to enforce secure user verification at the service desk. Use the tool to reduce your social engineering vulnerability, and support your greater IT security infrastructure. User verification at the service desk often relies on static data in Active Directory. Security questions like “What’s your employee ID” are common, and can easily be sourced by cybercriminals in a targeted social engineering attack. With Secure Service Desk you can verify the accounts of users with existing data in Active Directory that can go beyond knowledge-based authentication.
  • 46
    Right Click Tools

    Right Click Tools

    Recast Software

    In every environment, there are potential vulnerabilities. Finding and addressing all of them is near impossible without the right tools. Right Click Tools helps to reduce overall enterprise risk, ensuring compliance of encryption, privileged access, software updates, and more. Plus, save hundreds of hours per year by automating tedious and error-prone tasks. Empower your team to surface critical intel, reveal vulnerabilities, quickly remediate issues, ensure compliance, enhance security, and maintain clear visibility across all devices. Some aspects of system management infrastructure can keep you up at night. Make sure what you intend to manage actually gets done. Reaching and maintaining your system management goals is easier and more reliable than ever with Right Click Tools.
  • 47
    NTFS Permissions Auditor
    NTFS permissions are used to manage access to the files and folders in NTFS file systems. NTFS Permissions Auditor allows you to quickly analyze, verify and review any NTFS folder permissions. Our free version provides you with deep and detailed audit results while the Pro version offers additional features such as powerful, customizable filtering, exports to various formats, and more. Select or import directories you want to audit, or search for other shares and add them to the audit settings. Configure additional audit settings if required or simply leave the default settings on. Press ‘Audit’ and wait for all folders and their NTFS permissions to be scanned. When the audit results are ready, you can view or export them to a file. Get up and running with just one installation – no other configuration is needed. The filters incorporate lots of factors – use ‘And’ and ‘Or’ to manage them and get the information you need.
    Starting Price: $199 one-time payment
  • 48
    SSH Secure Sign
    SalaX Secure Sign is a secure digital signature solution that enables users to electronically sign confidential documents with robust encryption, ensuring authenticity and compliance with legal standards. It allows for the signing of various file types, including PDFs, images, office documents, and source code files, with the capability to sign multiple documents simultaneously. The solution does not require end-user accounts or registration, simplifying the signing process. Users can verify, track, and audit all digital signatures, with e-signatures archived for easy auditing. Secure Sign offers flexible configuration options, including various authentication methods such as Active Directory, Signicat, or SMS OTP, and can be deployed on-premises or in the cloud, ensuring full control over data. As part of the SalaX Secure Collaboration suite, it integrates seamlessly with other applications like encrypted secure email, secure e-forms, and secure rooms for file sharing.
  • 49
    LuaCov

    LuaCov

    LuaCov

    LuaCov is a simple coverage analyzer for Lua scripts. When a Lua script is run with the luacov module loaded, it generates a stats file with the number of executions of each line of the script and its loaded modules. The luacov command-line script then processes this file generating a report file which allows one to visualize which code paths were not traversed, which is useful for verifying the effectiveness of a test suite. LuaCov includes several configuration options, which have their defaults stored in src/luacov/defaults.lua. These are the global defaults. To use project specific configuration, create a Lua script setting options as globals or returning a table with some options and store it as .luacov in the project directory from where luacov is being run. For example, this config informs LuaCov that only foo module and its submodules should be covered and that they are located inside src directory.
  • 50
    Amiqus

    Amiqus

    Amiqus Resolution

    The first step to engaging a client or hiring someone new is to check they are who they say they are. Turn hours of paperwork into minutes of frictionless and secure online activity. Compare client information against multiple government databases and sources for compliance with the latest UK and EU anti-money laundering requirements. Request document verification with face-match scanning to check the authenticity of documents from over 195 countries. Screen domestic and international, politically exposed persons (PEPs) and sanctions lists, as well as adverse media data from 500 million web pages, with option for ongoing monitoring. Securely verify balances, transactions, payees, income and affordability through FCA-regulated open banking technology. Instantly verify current address and date of birth against bank and credit providers' records in real time.
    Starting Price: $38.00/month