Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.
Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
Essayez Auth0 gratuitement
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
A programming language AL-IV (ALFOUR) is a
high-level imperative object oriented programming language with minimal introduction level, easy porting to any platform claiming a very high level of safety and stability, with a controllable level of code protection, high efficiency of an executable code,
full independence from a target platform, minimal enter level.
iceB - free and opensource accounting software for Linux and Windows
IceB is personal and corporate financial accounting (bookkeeping) software that can manage multiple accounts, multiple bases, and multiple users. It manages third parties, expenditures, and receipts categories, and also budgetary lines, financial years, and other. Support multiplatform - Linux/Unix and MS Windows (include Windows7)
Powerful Website Security | Continuous Web Threat Platform
Continuously detect, prioritize, and validate web threats to quickly mitigate security, privacy, and compliance risks.
Reflectiz is a comprehensive web exposure management platform that helps organizations proactively identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. Designed to address the growing complexity of modern websites, Reflectiz provides full visibility and control over first, third, and even fourth-party components, such as scripts, trackers, and open-source libraries that often evade traditional security tools.