Suggested Categories:

Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
ZeroOps Software
ZeroOps solutions provide a unifying platform for automation and operations. It simplifies the process of managing cloud-native and hybrid IT environments, allowing users to automate regular tasks, streamline deployments, and more efficiently manage infrastructure. With comprehensive orchestration capabilities, ZeroOps makes it easy to create secure connections between services that span multiple cloud providers. Additionally, ZeroOps offers predictive analytics and machine learning techniques for improved visibility into system performance. By utilizing patterns of usage data, it can take preemptive or corrective measures to improve service availability and scalability.
Industry 4.0 Software
Industry 4.0 platforms are digital systems that facilitate industrial operations and production processes. They use data-based technologies such as artificial intelligence, the Internet of Things, cloud computing and analytics to monitor, analyze and optimize production activities. Automation is a key component of Industry 4.0 platforms, making it possible to reduce labor costs while increasing productivity and efficiency. These platforms offer increased flexibility in terms of process control and automation, allowing for changes to be implemented quickly in response to real-time market conditions.
Zero Trust Network Access (ZTNA) Software
Zero Trust Network Access (ZTNA) solutions are a type of security technology that verifies and enforces strict access controls for all users, devices, and applications attempting to connect to a network.
Emissions Management Software
Emissions management software helps organizations monitor, track, and report their greenhouse gas emissions and environmental impact to comply with regulations and support sustainability goals. It collects data from various sources such as energy use, transportation, and industrial processes, providing analytics to identify emission trends and reduction opportunities. The software often includes tools for regulatory reporting, carbon accounting, and scenario modeling to help businesses plan and implement emission reduction strategies. By automating data collection and reporting, it improves accuracy, transparency, and decision-making. Ultimately, emissions management software supports organizations in minimizing their carbon footprint and enhancing environmental responsibility.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
VPN Services
VPN services allow users to create a secure and private connection to the internet by encrypting their internet traffic and routing it through a remote server. This helps protect user data from hackers, especially on public Wi-Fi networks, and allows access to content restricted by geographical location. VPNs can also hide a user's IP address, offering greater anonymity while browsing. Many VPN services offer additional features such as kill switches, no-logging policies, and multiple server locations worldwide. VPNs are commonly used by individuals seeking privacy and businesses needing to secure remote connections for employees.
Currency Exchange Software
Currency exchange software helps businesses, financial institutions, and individuals manage currency conversions and foreign exchange transactions efficiently. These platforms typically include features for real-time exchange rate tracking, multi-currency management, transaction processing, and integration with payment systems. Currency exchange software often allows users to monitor market trends, set exchange rate alerts, and automate currency conversions for both international payments and trading. By using this software, organizations can optimize foreign exchange operations, reduce risks related to exchange rate fluctuations, and improve the efficiency of cross-border transactions.
Talent Management Software
Talent management software is a comprehensive tool designed to streamline and enhance the process of attracting, developing, and retaining employees. It helps organizations manage recruitment, onboarding, performance appraisals, training, and career development through an integrated platform. The software provides analytics and insights to assess employee performance, skills gaps, and potential, aiding in making data-driven decisions. It also supports succession planning, ensuring that the organization is prepared for future leadership needs. Overall, talent management software helps companies maximize their workforce's potential while improving employee engagement and retention.
Museum Software
Museum software is a type of software used to manage the operations and data associated with museums. It offers functionality such as tracking collections, recording detailed information about artifacts, managing visitor access to the museum premises, and creating various reports. This software can also be integrated with other technologies such as ticketing systems or interactive exhibits. Museum software is designed to help museum staff efficiently manage the data relating to their collections and visitors.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (14) for "flipper zero"

773 Products for "flipper zero" with 1 filter applied:

  • 1
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. ...
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 2
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
    View Software
    Visit Website
  • 3
    ManageEngine Endpoint Central
    ...With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 4
    Google Chrome Enterprise
    Chrome Enterprise is a suite of business offerings that includes Chrome browser, Chrome's cloud management tool Chrome Enterprise Core, and the advanced security capabilities in Chrome Enterprise Premium. Chrome offers a dedicated enterprise download bundle, giving admins access to additional resources and policy templates for managing Chrome across desktop environments in their organization. Chrome Enterprise Core provides admins with simple, centralized management from the cloud. It...
    Starting Price: Free
  • 5
    Venn

    Venn

    Venn

    Venn is the leader in BYOD Security. Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 6
    CloudZero

    CloudZero

    CloudZero

    CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7.
    View Software
    Visit Website
  • 7
    ZERO

    ZERO

    ZERO

    With predictive DMS filing, ZERO for Desktop easily fits into a knowledge worker’s daily workflow. Stay secure and remain compliant by keeping all data in the network and avoiding cloud vulnerabilities. Time saved by automating administrative tasks can be used on higher-value work and allow for a better work-life balance. Reduce the amount of non-billable time spent on administrative tasks.
  • 8
    Zero

    Zero

    Zero

    Zero is an open source email application designed to prioritize user privacy and security, offering a customizable email experience. It allows users to manage their emails across various categories, such as primary, important, personal, updates, and promotions, enabling efficient organization and navigation. As an open source solution, Zero encourages community collaboration and transparency, inviting users to contribute to its development and enhancement.
    Starting Price: Free
  • 9
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can...
    Leader badge
    Starting Price: $0 Free Community Edition
    Partner badge
  • 10
    DriveLock

    DriveLock

    DriveLock

    ...With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.
  • 11
    UTunnel VPN and ZTNA
    ...ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
  • 12
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. ...
    Leader badge
    Starting Price: $2.00 per user, per month
  • 13
    Cloudbrink

    Cloudbrink

    Cloudbrink

    ...Built as a software-only service, Cloudbrink delivers sub-20ms latency and 1Gbps+ speeds per user using dynamically deployed FAST edges and a proprietary protocol that recovers packet loss before it impacts the app. Security isn’t bolted on—it’s built in. With mutual TLS 1.3, short-lived certs, and no exposed IPs, Cloudbrink provides real zero trust without making users suffer through poor connections or overloaded POPs. If you’ve been burned by “next-gen” solutions that still feel like 2008, it might be time for something new.
  • 14
    ManageEngine ADSelfService Plus
    ADSelfService Plus is an on-premises access management solution that caters to businesses across various industries, such as IT, banking, engineering, education, aviation, and telecommunications. Key features include: 1. Self-service password resets and account unlocks: Users can reset their passwords in AD and unlock their domain accounts from a web browser. 2. MFA: Machine logins, VPN and OWA logins, and cloud app logins can be secured using MFA. 3. Password synchronizer and SSO:...
    Starting Price: $595 for 500 domain users/year
  • 15
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 16
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
  • 17
    TinyPNG

    TinyPNG

    Tinify

    TinyPNG (by Tinify) is a free image optimization tool trusted by developers and designers worldwide. It uses smart lossy compression to compress JPEG, PNG, WebP, and AVIF files by up to 80% without visible quality loss - boosting speed, SEO, and reducing bandwidth. Compress, convert, and resize images via our intuitive web app or powerful API. SDKs are available for Python, Node.js, PHP, Java, Ruby, and .NET. Includes an official WordPress plugin and a growing ecosystem of community-built...
    Starting Price: $0
  • 18
    QA Wolf

    QA Wolf

    QA Wolf

    ...We build automated end-to-end tests for 80% of your user flows in weeks, maintain them 24 hours a day, and provide unlimited parallel test runs on our infrastructure. Did we mention that we guarantee zero flakes? We do that too. Here's a helpful list of everything you get out of the box — whether it's 100 tests or 100,000. • End-to-end tests for 80% of user flows automated in weeks, not years • Tests are written in open-source Playwright and Appium (no vendor lock-in) • Unlimited, parallel test runs on any environment you choose • 100% parallel run infrastructure that we host and maintain • 24-hour maintenance of flaky or broken tests • Guaranteed 100% reliable results — zero flakes • Human-verified bug reports • CI/CD integration with your deployment pipeline and issue trackers • 24-hour access to full-time QA engineers at QA Wolf ... it's the QA solution you've always wanted.
  • 19
    Zero Incident Framework

    Zero Incident Framework

    GAVS Technologies

    ZIF for IT Operations. Shift from Reactive to Proactive IT Operations and Enable Frictionless IT.Features Single Pane of Command. Aggregates data from different monitoring tools and devices with 100+ plugins. Actionable insights on events. Reduces noise in the infrastructure through insightful event correlation and reduced false alarms. Identify Root Cause. Detects issues in the infrastructure faster with infrastructure and application heat maps. Predictive Analytics. Forecasts issues...
    Starting Price: $5 per user, per month
  • 20
    Cloudflare Zero Trust
    Stop data loss, malware and phishing with the most performant Zero Trust application access and Internet browsing platform. The traditional tools used to connect employees to corporate apps grant excessive trust, exposing you to potential data loss. The corporate perimeter has become more difficult to control with complex, conflicting configurations across your VPNs, firewalls, proxies, and identity providers.
    Starting Price: $7 per user per month
  • 21
    Planfix

    Planfix

    Planfix

    The Planfix platform allows organizations to manage their entire business online. Regardless of company size and industry, Planfix has something to offer as an excellent project and work management tool. With Planfix, your company gets a fully customizable management system, from process design to appearance. The integrated Planfix platform allows users to manage tasks and projects, CRM, sales, marketing, production, logistics, support services, finance, and human resources all at once....
    Leader badge
    Starting Price: $0 per user per month
    Partner badge
  • 22
    HiveMQ

    HiveMQ

    HiveMQ

    HiveMQ is the Industrial AI Platform helping enterprises move from connected devices to intelligent operations. Built on the MQTT standard and a distributed edge-to-cloud architecture, HiveMQ connects and governs industrial data in real time, enabling organizations to act with intelligence. With proven reliability, scalability, and interoperability, HiveMQ provides the foundation industrial companies need to operationalize AI, powering the next generation of intelligent industry. Global...
    Starting Price: $0.34/hour
    Partner badge
  • 23
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize...
  • 24
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility,...
  • 25
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • 26
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. ...
  • 27
    k0s

    k0s

    Mirantis

    Zero Cost - k0s is completely free for personal or commercial use, and it always will be. The source code is available on GitHub under Apache 2 license.
    Starting Price: $0
  • 28
    ZeroTier

    ZeroTier

    ZeroTier

    ZeroTier simplifies global networking with a secure network overlay that connects and manages all your resources as if they were on the same LAN. Deployable in minutes from anywhere, our software-defined solution scales effortlessly, whether you’re connecting a handful of devices or an entire global network. With ZeroTier, you can: Establish private global networks for IoT deployments.
    Starting Price: $2/device per month
  • 29
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure...
  • 30
    Teleport

    Teleport

    Teleport

    ...Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next