[go: up one dir, main page]

Suggested Categories:

Call Accounting Software
Call accounting software tracks, records, and analyzes telephone usage within an organization to help manage costs and improve communication efficiency. It captures details such as call duration, destination, extensions used, and associated costs across VoIP, PBX, or unified communications systems. The software provides reports that help businesses identify misuse, allocate expenses to departments, and optimize telecom spending. Many platforms also include security features like fraud detection and alerts for unusual calling patterns. Overall, call accounting software gives organizations greater visibility into their phone systems while reducing unnecessary costs.
Facility Management Software
Facility management software provides companies and facility managers with the means to track, supervise, schedule and optimize building maintenance operations. Facility management is also known as CAFM (computer-assisted facility management) software.
Issue Tracking Software
Issue tracking software provides the tools to track, record, manage and follow the progress of issues and tickets in order to resolve problems across different departments such as customer service, help desk, IT, financials, and more.
Word Processors
Word processors are software applications that allow users to create, edit, and format written documents. They offer a variety of tools and features, such as spell check, font styles, and page layout options. Word processors are commonly used for tasks such as writing essays, creating business reports, or composing emails. They can also save documents in various file formats for easy sharing and printing. Overall, word processors provide a user-friendly platform for creating and managing written content.
Construction Design Software
Construction design software enables builders and construction firms to design construction projects and plans for new construction including homes, buildings, remodels, and more. Construction design software, also known as construction drawing software, can include 3D and architectural CAD tools as well as drawing tools for construction plans.
HVAC Estimating Software
HVAC estimating software assists in the management of resources and costs involved in air conditioning, heating and ventilation projects.
Capacity Planning Software
Capacity planning software is designed to help businesses plan for their future growth and handle the demands of their customers. It provides a predictive analysis of customer requirements, allowing companies to take proactive steps to meet demand. This software usually includes features such as automated alerts, analytics capabilities, forecasting tools, and performance management tools. It can be used for both short-term and long-term planning and helps organizations identify potential problems before they occur.
Donation Management Software
Donation management software (sometimes called donor management software) helps nonprofit organizations collect, process, track, and analyze contributions from supporters while managing donor relationships. It stores donor profiles, tracks giving histories (one-time, recurring, pledged), and automates acknowledgments, receipts, and tax-related reports. These platforms also enable segmentation of donors for targeted communications, campaign tracking, and performance reporting to optimize fundraising efforts. With integrations to payment gateways, event registration, CRM and email tools, they streamline operations and reduce manual effort. Ultimately, donation management software empowers organizations to deepen donor engagement, improve retention, and increase fundraising efficiency.
Infographic Makers
Infographic makers are software tools that allow users to create visually engaging and easy-to-understand graphics that present data, information, or stories. They offer drag-and-drop interfaces, customizable templates, icons, charts, and design elements to simplify the infographic creation process. These tools help users transform complex data into compelling visuals that enhance communication and audience engagement. Many infographic makers support exporting in various formats and integration with social media or presentation platforms. Ultimately, infographic makers empower individuals and businesses to convey messages clearly and attractively without needing advanced design skills.
KPI Software
KPI software is designed to optimize the tracking, monitoring and management of key performance indicators through automation processes.
Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Hot Desk Booking Software
Hot desk booking software, also known as desk booking systems, are software tools that enable organizations with a hybrid workforce to book a physical desk in the office when and where they need it. Hot desk booking software is useful for companies that have remote and hybrid workforces and need a system to allow team members to book desks when they need them rather than having a dedicated desk.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Text Editors
Text editors are software applications that allow users to create, edit, and manipulate plain text files. They are essential for writing and editing code, documentation, notes, and other types of text-based content. Text editors typically offer basic features like syntax highlighting, search and replace, and line numbering for developers, as well as more advanced features like version control integration, autocomplete, and code folding. While simple text editors allow basic editing, more advanced versions are widely used for their versatility and customization options, especially in programming and content creation.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

483 Products for "simple" with 1 filter applied:

  • 1
    Simple Malware Protector

    Simple Malware Protector

    Simplestar Software

    Simple Malware Protector identifies threats and vulnerabilities on your PC and will neutralize them quickly and easily. It then constantly monitors your PC to ensure you’re protected against future infection. Simple Malware Protector is continuously updated to ensure you’re protected against the latest threats and vulnerabilities. You can schedule Simple Malware Protector to run at startup or any other time of day, ensuring you are in control of your protection. ...
    Starting Price: $3.03 per month
  • 2
    SimpleDMARC

    SimpleDMARC

    SimpleDMARC

    ...These features include: • Easy deployment: SimpleDMARC is easy to deploy and configure, and it can be integrated with existing email systems. • Real-time monitoring: SimpleDMARC provides real-time monitoring of email traffic and alerts organizations when suspicious activity is detected. • Detailed reporting: SimpleDMARC provides detailed reports on email traffic, including information on the origin and authenticity of the email.
    Starting Price: $99 per month
  • 3
    New Relic

    New Relic

    New Relic

    ...Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for all metrics, events, logs, and traces; powerful full-stack analysis tools; and simple, transparent usage-based pricing with only 2 key metrics. New Relic has also curated one of the industry’s largest ecosystems of open source integrations, making it easy for every engineer to get started with observability and use New Relic alongside their other favorite applications.
    Leader badge">
    Starting Price: Free
  • 4
    Guardz

    Guardz

    Guardz

    ...With 24/7 AI + human-led MDR, Guardz utilizes agentic AI to triage at machine speed while expert analysts validate, mitigate, and guide response, giving MSPs scalable protection without adding headcount. Our mission is simple: give MSPs the scale, confidence, and clarity they need to stay ahead of attackers and deliver protection to every SMB they serve.
  • 5
    Google Chrome Enterprise
    ...Chrome offers a dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It allows admins to manage their enterprise browser deployment across platforms all from the same place. Chrome Enterprise Premium enables secure access to applications and resources, and offers integrated threat and data protection in the browser. It adds an extra layer of security to safeguard your Chrome browser environment, including DLP, real-time URL and file scanning, and context aware access for SaaS and web apps.
    Starting Price: Free
  • 6
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering...
    Leader badge">
    Starting Price: Free
  • 7
    RapidPhish

    RapidPhish

    RapidPhish

    RapidPhish is a fast, flexible, and contract-free phishing simulation platform designed for businesses and MSPs supporting organisations with up to 1,000 users. Built to make security awareness testing simple and effective, RapidPhish lets you launch realistic phishing tests in minutes using modern templates, custom landing pages, and clear reporting. With pay-as-you-go pricing, no per-user licensing, and full white-labelling for MSPs, it offers an easier, more affordable way to strengthen your human firewall and improve cybersecurity resilience.
    Starting Price: $59
  • 8
    TextCaptcha

    TextCaptcha

    TextCaptcha

    ...The problem with text CAPTCHAs is that they provide inherently more information than a distorted image. They are parseable, under the right conditions solveable. With the advent of contextual parsing tools such as Wolfram Alpha, such simple logic puzzles have become easier to solve programatically.
    Starting Price: Free
  • 9
    GREENLIGHT
    Automated Password Management. Available 24 hours a day, 7 days a week, simple and reliable. Greenlight is the italian solution, simple and GDPR compliant that drastically reduces the number of tickets sent to the service desk, consequently significantly reduces the costs associated with requests for assistance (also in outsourcing), eliminating waiting times for technical assistance. Why use Greenlight? People who forget a password.
  • 10
    Hyperledger Iroha
    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain with Crash fault-tolerant consensus. ...
  • 11
    Xvirus Firewall
    ...Xvirus Firewall allows you to control what programs run on your computer. With its simple rules list, you can manage which program should be allowed to run or block.
    Starting Price: €19.99 per year
  • 12
    SimpleMDM
    Apple device management that's simple, secure, and pretty damn quick. Effortless account creation and setup — Enroll, configure, and monitor any number of Apple devices in a matter of minutes. Our user-friendly interface makes the onboarding experience a piece of cake for admins and users alike. Rapid device enrollment options — Quickly add iOS and macOS devices with automated enrollment through Apple Business Manager, enrollment by link for BYOD, and more.
    Starting Price: $2.50 per month
  • 13
    Secuve Q Authentication
    SECUVE Q Authentication is a unique and simple mobile authentication technology that can be applied to a wide range of applications including identification services, Fintech, online banking, etc. Authenticates users with secure authentication code generated by the combined operation of both one-time secure random value transmitted over the additional secure channel, and 'QR code'.
  • 14
    EasyDMARC

    EasyDMARC

    EasyDMARC

    EasyDMARC is a B2B SaaS solution that makes email authentication simple for small, medium, and enterprise businesses. In short, we secure domain and email infrastructure, protecting you and your business from phishing (email spoofing) attacks and increasing email deliverability. EasyDMARC’s deliverability tool, EasySender, covers all the aspects of email deliverability. The variety of features on the platform cover email list verification, mailbox warmup, and inbox placement. ...
  • 15
    Source Defense

    Source Defense

    Source Defense

    Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. ...
  • 16
    INFIMA

    INFIMA

    INFIMA Cyber Security

    ...So we provide our Partners with a fully automated platform - sync new clients (Office 365 and Google Workspaces) and you're all set! End the tasks. Satisfy regulators and insurance requirements. Make your program a success with automation that performs. Partnership Counts: Simple, straightforward pricing and Partnership cut your risks. Get rid of the sticky, minimum seat contracts. Only pay for what you need. Simple Onboarding: Onboard new clients in minutes. (Yep - we know it's hard to believe.)
  • 17
    Webroot Security for Chromebook
    ...It features a password manager to keep logins and payment information secure and organized. Specifically built for Chromebook, it addresses security gaps not covered by built-in protections. Webroot Security for Chromebook is simple to use and offers affordable protection with a 70-day money-back guarantee.
    Starting Price: $14.99 per year
  • 18
    Baidu AI Cloud Log Service
    ...It can compress the log data for transmission, and supports multiple compression formats, effectively reducing the storage cost and saving the transmission bandwidth. It provides the simple and easy-to-use installation, management, and upgrading features of the collector to ensure stable operation. It provides the hosted service mode, which can be easily used with a simple deployment without the investment in development and operations.
  • 19
    Deep Freeze

    Deep Freeze

    Faronics

    ...With an instant reboot, any unwelcome or unwanted changes are removed from the system, restoring it to its pristine Frozen state. Freeze your endpoints to the desired state. Restore from any unexpected changes with a simple reboot. Provide users with unrestricted access and avoid restrictive computer lockdown for maintaining security. Reverse configuration drifts with a simple reboot while allowing users to save their work. Reverse malicious changes on reboot and protect computers from phishing scams. Only approved software stays and unauthorized software is removed thereby achieving license compliance. ...
  • 20
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 21
    Kivera

    Kivera

    Kivera

    ...With a single click, enable out-of-the-box non-negotiables that target the most common causes of cloud breaches - simple misconfigurations.
  • 22
    Core Impact
    Simple enough for your first test, powerful enough for the rest. Core Impact is designed to enable security teams to conduct advanced penetration tests with ease. With guided automation and certified exploits, the powerful penetration testing software enables you to safely test your environment using the same techniques as today's adversaries.
  • 23
    PentestBox

    PentestBox

    PentestBox

    ...To make PentestBox more awesome we have also included HTTPie, HTTPie is a command line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as possible. It provides a simple http command that allows for sending arbitrary HTTP requests using a simple and natural syntax, and displays colorized output. HTTPie can be used for testing, debugging, and generally interacting with HTTP servers. PentestBox also contains a modified version of Mozilla Firefox with all the security addons pre installed in it.
  • 24
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities.
  • 25
    Privafy

    Privafy

    Privafy

    ...For telecommunications service providers, there is CarrierEdge. Built to help carriers deliver managed security services to their customers through the cloud, enabling rapid scalability through simple, flexible licensing models. CarrierEdge provides a complete, enterprise-class security stack that protects data-in-motion as it moves between the enterprise, the carrier network, and the cloud. For IoT device manufacturers, there is MicroEdge. Designed for rapid, simple integration into existing IoT chipsets, MicroEdge delivers embedded security capabilities for data-in-motion as it moves from devices through hybrid cloud environments, allowing IoT device manufacturers to provide data security assurance to their customers at a lower price per device.
  • 26
    K7 Ultimate Security
    ...It's the only Antivirus company in the world to be led by a coder. Complete multi-layer Endpoint Protection and Unified Threat Management for businesses of all sizes - simple to use, easy to manage, on-premises or in the cloud. Comprehensive, multi-layered Endpoint Security and Network Security for businesses that are not limited by time or location. K7's enterprise cybersecurity solutions are quick to deploy, simple to use, easy to manage, and support businesses of all sizes.
  • 27
    Civic

    Civic

    Civic Technologies

    Civic is redefining how teams sign in and get work done with its two core solutions: Civic Auth and Civic Nexus. Civic Auth delivers a simple, secure sign-in experience that works across apps, servers, and assistants, combining Web2 ease with Web3 readiness. Civic Nexus unifies data, SaaS apps, and AI tools into intelligent workflows that automate everything from simple tasks to complex business processes. Together, they create a foundation of trust and efficiency, reducing friction at every step. ...
    Starting Price: $37.50 per month
  • 28
    HAProxy ALOHA

    HAProxy ALOHA

    HAProxy Technologies

    ...The modern enterprise demands reliable performance, ease of integration, advanced security and extensible features. HAProxy ALOHA Hardware Load Balancer gives enterprises an incredibly powerful, plug and play, appliance that can be deployed in any environment. HAProxy ALOHA’s simple graphical interface coupled with an advanced templating system makes it painless to deploy and configure.
  • 29
    Cypherix Secure IT

    Cypherix Secure IT

    Cypherix Software

    ...This strong encryption software ensures that it is statistically impossible for an unauthorized person to access the encrypted data. It includes virtual keyboard and privilege mode option that can help to prevent a keylogger from capturing keystrokes. SecureIT is so simple to use. SIT is designed to meet the growing security and privacy needs of all computer users. The software combines ease of use with state of the art technology to ensure total security with a zero learning curve and maximum convenience. It runs on all version of Windows.
    Starting Price: $29.95
  • 30
    Recast Software Privilege Manager
    Privilege Manager offers simple, secure, and centralized access rights management. Improved user productivity– by not having to wait for a simple task to be authorized by a service desk, users no longer need to wait and can continue to work on the task at hand. That’s just one more way our Privileged Access Management (PAM) services ultimately improve user productivity and reduce the need for a service desk.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next