Cerb is a fast and flexible Web-based platform for business collaboration and automation. It helps you remember anything about anyone, collaborate from anywhere, deftly reply to a flood of email, automate, stay informed, capture feedback, track time, flag opportunities, manage tasks, share expert knowledge, and otherwise execute efficiently.
Joget Workflow is a platform to easily build enterprise Web apps for cloud and mobile. Build full-fledged apps, e.g. CRM, HR, Healthcare, etc. Drag and drop forms, lists, and UI elements. Add workflows to automate processes. Extend via plugins. Apps are mobile optimized and cloud ready. Download ready made apps from the Joget Marketplace.
Arkeia Network Backup is designed for organizations that require fast, easy-to-use, and affordable data protection. It backs up critical data to disk, tape, and cloud storage. Arkeia protects all major virtual platforms including VMware, Hyper-V, XenServer, and more than 200 physical platforms including Windows, Mac OS X, Linux, Netware, most UNIX flavors, and BSDs. The company’s source-side Progressive Deduplication technology helps users realize better performance at a lower cost by reducing data volumes. Arkeia’s deduplication is crucial to accelerating replication of on-premise backups to private or public clouds.
PDF OCR is a simple drag-and-drop utility that converts PDFs and images into text documents. It uses advanced OCR (optical character recognition) technology to extract the text of the PDF or image. This is particularly useful for dealing with PDFs and images that were created via a scan-to-PDF function in a scanner or photo copier. It uses the Tesseract engine to perform OCR, and currently supports over 20 languages for OCR.
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to logs, merge, translate, and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA, or ScreenOS commands. It is all contained in one file. It can read policy and logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), and Cisco ASA (show run / syslog format). It uses both inclusive and exclusive CIDR and text filters, permitting you to split large policies into smaller ones for virutalization at the same time as removing unused connectivity. It supports policy to log association, object translation, rulebase reordering and simplification, rule moves, and duplicate matching automatically. It allows you to seamlessly move rules to where you need them. 'print' mode creates a spreadsheet for your audit needs with one command.
CensorNet Professional is a Web filtering and Internet management tool that is designed to protect, control, and monitor individuals accessing Internet resources on a local area network. It features the ability to control users and machines, group policies, time quotas, realtime content filters (by file extension or image/MIME type), modules, comprehensive reporting with audit trails and management reports, access schedules, and bandwidth limitations. Transparent authentication with Active Directory is available for ease of deployment. Administration can been done using a Web interface.
PolarSSL is a light-weight cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose coupling of the components inside the library means that it is easy to separate the parts that are needed, without needing to include the total library. PolarSSL is written with embedded systems in mind and has been ported on a number of architectures, including ARM, PowerPC, MIPS, and Motorola 68000. The source is written to have very loose coupling, enabling easy integration of parts in other software projects. Very loosely coupled cryptographic algorithms for MD2, MD4, MD5, SHA1, SHA-256, SHA-512, AES, Camellia, DES, Triple DES, ARC3, and RSA are included.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.