Suggested Categories:

Zero Trust Security Software
Zero trust security software, also known as zero trust networking software, provides a security solution based on the zero trust methodology. Zero trust security solutions enable organizations to enforce security policies on a "zero trust" basis for both internal and external users, and allow security teams to track, monitor, and analyze user behavior and usage across the network to identify potential threats.
ZeroOps Software
ZeroOps solutions provide a unifying platform for automation and operations. It simplifies the process of managing cloud-native and hybrid IT environments, allowing users to automate regular tasks, streamline deployments, and more efficiently manage infrastructure. With comprehensive orchestration capabilities, ZeroOps makes it easy to create secure connections between services that span multiple cloud providers. Additionally, ZeroOps offers predictive analytics and machine learning techniques for improved visibility into system performance. By utilizing patterns of usage data, it can take preemptive or corrective measures to improve service availability and scalability.
Industry 4.0 Software
Industry 4.0 platforms are digital systems that facilitate industrial operations and production processes. They use data-based technologies such as artificial intelligence, the Internet of Things, cloud computing and analytics to monitor, analyze and optimize production activities. Automation is a key component of Industry 4.0 platforms, making it possible to reduce labor costs while increasing productivity and efficiency. These platforms offer increased flexibility in terms of process control and automation, allowing for changes to be implemented quickly in response to real-time market conditions.
Zero Trust Network Access (ZTNA) Software
Zero Trust Network Access (ZTNA) solutions are a type of security technology that verifies and enforces strict access controls for all users, devices, and applications attempting to connect to a network.
Emissions Management Software
Emissions management software helps organizations monitor, track, and report their greenhouse gas emissions and environmental impact to comply with regulations and support sustainability goals. It collects data from various sources such as energy use, transportation, and industrial processes, providing analytics to identify emission trends and reduction opportunities. The software often includes tools for regulatory reporting, carbon accounting, and scenario modeling to help businesses plan and implement emission reduction strategies. By automating data collection and reporting, it improves accuracy, transparency, and decision-making. Ultimately, emissions management software supports organizations in minimizing their carbon footprint and enhancing environmental responsibility.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
VPN Services
VPN services allow users to create a secure and private connection to the internet by encrypting their internet traffic and routing it through a remote server. This helps protect user data from hackers, especially on public Wi-Fi networks, and allows access to content restricted by geographical location. VPNs can also hide a user's IP address, offering greater anonymity while browsing. Many VPN services offer additional features such as kill switches, no-logging policies, and multiple server locations worldwide. VPNs are commonly used by individuals seeking privacy and businesses needing to secure remote connections for employees.
Currency Exchange Software
Currency exchange software helps businesses, financial institutions, and individuals manage currency conversions and foreign exchange transactions efficiently. These platforms typically include features for real-time exchange rate tracking, multi-currency management, transaction processing, and integration with payment systems. Currency exchange software often allows users to monitor market trends, set exchange rate alerts, and automate currency conversions for both international payments and trading. By using this software, organizations can optimize foreign exchange operations, reduce risks related to exchange rate fluctuations, and improve the efficiency of cross-border transactions.
Talent Management Software
Talent management software is a comprehensive tool designed to streamline and enhance the process of attracting, developing, and retaining employees. It helps organizations manage recruitment, onboarding, performance appraisals, training, and career development through an integrated platform. The software provides analytics and insights to assess employee performance, skills gaps, and potential, aiding in making data-driven decisions. It also supports succession planning, ensuring that the organization is prepared for future leadership needs. Overall, talent management software helps companies maximize their workforce's potential while improving employee engagement and retention.
Museum Software
Museum software is a type of software used to manage the operations and data associated with museums. It offers functionality such as tracking collections, recording detailed information about artifacts, managing visitor access to the museum premises, and creating various reports. This software can also be integrated with other technologies such as ticketing systems or interactive exhibits. Museum software is designed to help museum staff efficiently manage the data relating to their collections and visitors.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Working Capital Software
Working capital software helps businesses optimize their short-term financial health by managing the balance between current assets and liabilities. These platforms provide tools for tracking and managing cash flow, accounts payable and receivable, inventory, and other components of working capital. The software allows companies to forecast their liquidity, monitor financial performance, and ensure that there is sufficient capital available for day-to-day operations. It can also help businesses identify inefficiencies, improve cash flow management, and make data-driven decisions about funding, investments, and credit management. By using working capital software, organizations can enhance their financial flexibility, reduce the risk of cash shortfalls, and improve operational efficiency.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (14) for "flipper zero"

332 Products for "flipper zero" with 2 filters applied:

  • 1
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. ...
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 2
    ManageEngine Endpoint Central
    ...With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 3
    Venn

    Venn

    Venn

    Venn is the leader in BYOD Security. Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 4
    CloudZero

    CloudZero

    CloudZero

    CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7.
    View Software
    Visit Website
  • 5
    ZERO

    ZERO

    ZERO

    With predictive DMS filing, ZERO for Desktop easily fits into a knowledge worker’s daily workflow. Stay secure and remain compliant by keeping all data in the network and avoiding cloud vulnerabilities. Time saved by automating administrative tasks can be used on higher-value work and allow for a better work-life balance. Reduce the amount of non-billable time spent on administrative tasks.
  • 6
    UTunnel VPN and ZTNA
    ...ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
  • 7
    Keeper Security

    Keeper Security

    Keeper Security

    Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. ...
    Leader badge
    Starting Price: $2.00 per user, per month
  • 8
    Cloudbrink

    Cloudbrink

    Cloudbrink

    ...Built as a software-only service, Cloudbrink delivers sub-20ms latency and 1Gbps+ speeds per user using dynamically deployed FAST edges and a proprietary protocol that recovers packet loss before it impacts the app. Security isn’t bolted on—it’s built in. With mutual TLS 1.3, short-lived certs, and no exposed IPs, Cloudbrink provides real zero trust without making users suffer through poor connections or overloaded POPs. If you’ve been burned by “next-gen” solutions that still feel like 2008, it might be time for something new.
  • 9
    ManageEngine ADSelfService Plus
    ADSelfService Plus is an on-premises access management solution that caters to businesses across various industries, such as IT, banking, engineering, education, aviation, and telecommunications. Key features include: 1. Self-service password resets and account unlocks: Users can reset their passwords in AD and unlock their domain accounts from a web browser. 2. MFA: Machine logins, VPN and OWA logins, and cloud app logins can be secured using MFA. 3. Password synchronizer and SSO:...
    Starting Price: $595 for 500 domain users/year
  • 10
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor, Perimeter 81 is considered by industry leaders to be winning the “SASE space race". Network security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience!
    Starting Price: $8 per user per month
  • 11
    New Relic

    New Relic

    New Relic

    There are an estimated 25 million engineers in the world across dozens of distinct functions. As every company becomes a software company, engineers are using New Relic to gather real-time insights and trending data about the performance of their software so they can be more resilient and deliver exceptional customer experiences. Only New Relic provides an all-in-one platform that is built and sold as a unified experience. With New Relic, customers get access to a secure telemetry cloud for...
    Leader badge
    Starting Price: Free
  • 12
    Zero Incident Framework

    Zero Incident Framework

    GAVS Technologies

    ZIF for IT Operations. Shift from Reactive to Proactive IT Operations and Enable Frictionless IT.Features Single Pane of Command. Aggregates data from different monitoring tools and devices with 100+ plugins. Actionable insights on events. Reduces noise in the infrastructure through insightful event correlation and reduced false alarms. Identify Root Cause. Detects issues in the infrastructure faster with infrastructure and application heat maps. Predictive Analytics. Forecasts issues...
    Starting Price: $5 per user, per month
  • 13
    Cloudflare Zero Trust
    Stop data loss, malware and phishing with the most performant Zero Trust application access and Internet browsing platform. The traditional tools used to connect employees to corporate apps grant excessive trust, exposing you to potential data loss. The corporate perimeter has become more difficult to control with complex, conflicting configurations across your VPNs, firewalls, proxies, and identity providers.
    Starting Price: $7 per user per month
  • 14
    HiveMQ

    HiveMQ

    HiveMQ

    HiveMQ is the Industrial AI Platform helping enterprises move from connected devices to intelligent operations. Built on the MQTT standard and a distributed edge-to-cloud architecture, HiveMQ connects and governs industrial data in real time, enabling organizations to act with intelligence. With proven reliability, scalability, and interoperability, HiveMQ provides the foundation industrial companies need to operationalize AI, powering the next generation of intelligent industry. Global...
    Starting Price: $0.34/hour
    Partner badge
  • 15
    Fortinet

    Fortinet

    Fortinet

    Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility,...
  • 16
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules ...
    Leader badge
    Starting Price: $0/month
  • 17
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. ...
  • 18
    k0s

    k0s

    Mirantis

    Zero Cost - k0s is completely free for personal or commercial use, and it always will be. The source code is available on GitHub under Apache 2 license.
    Starting Price: $0
  • 19
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure...
  • 20
    Teleport

    Teleport

    Teleport

    ...Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 21
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity...
    Leader badge
    Starting Price: $3 per user per month
  • 22
    env0

    env0

    env0

    env0 is the best way to deploy and manage your IaC, including Terraform, Terragrunt, CloudFormation, Pulumi, Kubernetes, and others. The env0 platform enables users and teams to collaborate and provide self-service cloud deployments, all with advanced policies to meet governance and compliance. With env0, every engineer, from development, operations, and DevOps can deploy infrastructure simply, quickly and safely.
    Starting Price: $349 per month
  • 23
    ZeroBounce

    ZeroBounce

    ZeroBounce

    ...In 2020, ZeroBounce rose to no. 40 on the list. In 2021, ZeroBounce was number 9 on the Inc. 5000 Regionals list.
    Leader badge
    Starting Price: $18 - 2000 Validation Credits
  • 24
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity. Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline...
  • 25
    ZTX Platform

    ZTX Platform

    SecureTrust Cyber

    The ZTX Platform is a fully managed, engineer-led cybersecurity solution that delivers Zero Trust security in a streamlined, scalable package. It unifies SASE, XDR, SIEM, RMM, and micro-segmentation into a single platform installed and operational within one business day. ZTX is licensed per seat, making it cost-effective and flexible for growing organizations. The platform offers centralized monitoring, real-time threat detection, automated response, and strict policy enforcement. ...
    Starting Price: $30/month per device
  • 26
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise...
    Starting Price: Free Up to 3 Users
  • 27
    Netskope

    Netskope

    Netskope

    Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one of the world’s largest and fastest security networks, so you never have to sacrifice security for...
  • 28
    Anyscale

    Anyscale

    Anyscale

    ...Deployment options are flexible, supporting public clouds, on-premises clusters, and Kubernetes environments. Anyscale Jobs and Services enable reliable production-grade batch processing and scalable web services with features like job queuing, retries, observability, and zero-downtime upgrades. Security and compliance are ensured with private data environments, auditing, access controls, and SOC 2 Type II attestation.
    Starting Price: $0.00006 per minute
  • 29
    Labra

    Labra

    Labra.io

    Labra is a powerful platform that revolutionizes the Cloud go-to-market (GTM) process for businesses. It enables zero-engineering marketplace listings, letting companies launch in days—not months. Labra's CRM integration automates co-sell approvals, streamlines channel partner management, and helps scale your success on the Cloud with reduced effort. With AI-powered insights and advanced, real-time analytics, Labra helps teams drive smarter, faster decision-making, giving you a competitive edge. ...
    Starting Price: $415 per month
    Partner badge
  • 30
    GoodAccess

    GoodAccess

    GoodAccess

    GoodAccess is a cybersecurity platform (SASE/SSE) that empowers medium-sized enterprises to easily implement Zero Trust Architecture (ZTA) in their infrastructure, regardless of its complexity or scale. By leveraging a Low-Code/No-Code approach, GoodAccess delivers a hardware-free, rapid deployment solution within hours or days, allowing companies to enhance their security without the need for in-house IT experts. Our platform ensures seamless integration with modern SaaS/cloud applications as well as legacy systems, protecting critical assets for remote and hybrid workforces. ...
    Leader badge
    Starting Price: $7 per user/month
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next