Results for: protocol - Page 3

Suggested Categories:

Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
NFT Liquidity Protocols Software
NFT liquidity protocols are decentralized financial (DeFi) platforms that aim to increase the liquidity of non-fungible tokens (NFTs) by facilitating their buying, selling, and trading in a more efficient and seamless manner. These protocols typically enable NFT owners to access liquidity by offering services such as fractionalization, NFT-backed loans, or secondary markets for NFT assets. The goal of these protocols is to make NFTs more accessible and tradable by lowering the barriers to entry and providing more opportunities for investors, creators, and collectors.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cross Chain Bridges
Cross-chain bridges are platforms or protocols that enable the transfer of assets and data between different blockchain networks, facilitating interoperability across otherwise isolated blockchains. These bridges allow users to move tokens, cryptocurrencies, or other digital assets seamlessly between two distinct blockchains without relying on a central intermediary. By unlocking cross-chain capabilities, users can leverage the unique features of each blockchain, such as different consensus mechanisms or specialized use cases, while maintaining the security and decentralization of both networks. Cross-chain bridges often use wrapped tokens or smart contracts to facilitate the exchange of assets across chains, improving liquidity and expanding the potential for decentralized applications (dApps). This technology is crucial for advancing the adoption and scalability of decentralized finance (DeFi) and other blockchain-based applications.
IoT Device Management Software
IoT device management software helps businesses monitor, control, and maintain Internet of Things (IoT) devices within a network. These tools enable organizations to efficiently manage a wide array of IoT devices, from smart sensors and wearables to industrial machines, by providing features such as device provisioning, configuration, monitoring, diagnostics, and firmware updates. IoT device management software helps ensure the security, performance, and reliability of connected devices by tracking device health, detecting anomalies, and enforcing compliance with security policies. It is essential for businesses that rely on large numbers of IoT devices, particularly in industries such as manufacturing, healthcare, transportation, and smart cities.
  • 1
    AS2 Gateway

    AS2 Gateway

    Aayu Technologies LLC

    Assured Trading with AS2 to Digitalize your Business. AS2 Gateway provides a B2B trading platform for organizations trading over the AS2 protocol, with a simplified and intuitive interface concealing the underlying complexities from end users. AS2 Gateway is fully compliant with the AS2 specification published by Drummond and Morberg, while ensuring the security of exchanged data via encryption, digital signature validation and guaranteed integrity through MIC (Message Integrity Check) hashing...
    Starting Price: $59 per month
  • 2
    KeepSolid VPN Unlimited
    ... hide your real IP address. KeepSolid VPN Unlimited ensures your online activity remains anonymous. Our team of professionals has been on the cyber security market since 2013. Through the years, we’ve built on our experience in the security field to enhance our application for you. KeepSolid VPN Unlimited team uses only state-of-the-art technologies and the latest security protocols. You can be sure our app supports your current operating system.
    Starting Price: $2.78 per month
  • 3
    FlexiHub

    FlexiHub

    Electronic Team, Inc.

    FlexiHub is a software as a service for redirecting all types of USB devices over the network and accessing remote USB devices over the Internet. It is a subdivision of Electronic Team, Inc. and has remained the flagship product since it was presented in 2014. FlexiHub is a convenient software service for individuals, small teams, and major organizations that supports all of the major connection protocols: * TCP/IP * UDP * RDP FlexiHub is a cross-platform solution that is capable...
    Leader badge
    Starting Price: $159.99 per year
  • 4
    RainLoop

    RainLoop

    RainLoop

    Modest system requirements, decent performance, simple installation and upgrade, no database required - all these make RainLoop Webmail a perfect choice for your email solution. Modern user interface. Complete support of IMAP and SMTP protocols including SSL and STARTTLS. Sieve scripts (Filters and vacation message). Minimalistic resources requirements. Direct access to mail server is used (mails are not stored locally on web server). Allows for adding multiple accounts to primary one...
    Starting Price: $95 per year
  • 5
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which...
  • 6
    Forcepoint Trusted Gateway System
    Forcepoint Trusted Gateway System Secure data transfers for your mission-critical files, every time. Reliably transfer unstructured files transfer. PDF and Microsoft Office files between and within different classification levels for international, federal, state, and local entities. Comply with Raise the Bar initiatives Achieve breach-resilient, mission-safe architectural design that meets the U.S. Government’s Raise the Bar requirements. Streamline file transfer processes and eliminate air...
  • 7
    Kamzan

    Kamzan

    Kamzan

    .... The encrypted communication protocol uses a unique TLS 1.3 certificate for each customer. A uniquely European supply chain and a contract in which we make it clear that profiling will never be carried out, that no data will ever be sold or transferred to third parties and that the intellectual and physical property of the data in their entirety is held by the client company.
  • 8
    Raysync

    Raysync

    Raysync

    ..., transfer distance, and network conditions. The transfer protocol independently developed by Raysync can make full use of network bandwidth resources and increase the transfer speed by 100 times, enabling the safe and fast transfer of files to any place.
    Starting Price: $699/year
  • 9
    Intel Server Management
    ...-users to monitor and manage servers either through management software they build on their own, existing solutions such as Intel® Data Center Manager and Intel® Server Utilities, or by third-party tools. Extensive Redfish schemas available to manage, update firmware and view asset inventory. Legacy protocols like IPMI, SNMP, SMTP are fully supported on the platform. IPMI is 2.0 compliant with several additional OEM commands included, as well.
  • 10
    Azure NetApp Files
    ..., and enterprise web-applications. Support for multiple protocols enables “lift & shift” of both Linux & Windows applications to run seamlessly in Azure. Multiple performance tiers allow for close alignment with workload performance requirements. Deep integration into Azure enables a seamless & secure Azure experience, with no learning or management overhead. Leading certifications including SAP HANA, GDPR, and HIPAA enables migration of the most demanding workloads to Azure.
    Starting Price: $0.14746
  • 11
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides...
  • 12
    Blokada

    Blokada

    Blokada

    ... protocol, to encrypt your network activity and hide your IP address. Blokada Slim is a lightweight version of the app, and it only contains features allowed by the Google Play policy. Blokada is not only the privacy app. It is also the community of people who care about their digital privacy and wellbeing. You will find us on our forum, where you can ask any questions you may have. We are also present on other social media and chats.
  • 13
    SUSE Linux Enterprise Real Time
    ..., distributed systems need time accuracy not only within a server but across all servers. The Precision Time Protocol (PTP) synchronizes servers via the high-speed network, up to sub-microsecond accuracy. Includes support for device interrupt threads, enabling tuning at the device level, and hardware latency detectors to ensure predictability of application behavior. SUSE Linux Enterprise Real Time gives you the time advantage you need to beat the competition.
    Starting Price: $2,199 per year
  • 14
    HULFT 8

    HULFT 8

    HULFT

    HULFT 8 is next-generation managed file transfer (MFT) middleware used by leading enterprises for sending mission-critical data reliably, securely, and efficiently. Robust and powerful enough to be used as the foundation of your business infrastructure, HULFT can handle character code conversions, connecting with different operating environments, and dealing with a range of file and code system types. By using industry-standard TCP / IP protocol security, HULFT delivers your data faster and won...
  • 15
    SecureFX

    SecureFX

    VanDyke Software

    ... and authentication mechanism of Secure Shell protocol to your data-in-transit. SecureFX assures recovery when transfers are interrupted, automatically resuming multi-file transfers. Relentless file transfer automatically reconnects and resumes transfer after a broken connection. Transfer files across networks and the internet with a choice of SSH2 SFTP, FTPS (FTP/TLS), HTTPS (WebDAV and Amazon S3), SCP, or FTP and HTTP for access to legacy systems for access to legacy systems.
  • 16
    VitalQIP

    VitalQIP

    Cygna Labs

    VitalQIP is the industry’s proven, open and scalable DDI solution (domain name system (DNS), Dynamic Host Configuration Protocol (DHCP) and IP address management (IPAM)). VitalQIP removes the complexity associated with IPAM while reducing the costs of managing IP addresses within the enterprise. With industry-proven reliability, VitalQIP allows the enterprise to manage hundreds of DNS and DHCP servers supporting millions of IP addresses. VitalQIP also provides IPv6 support and makes use...
  • 17
    QNX Neutrino RTOS
    Since 1980, thousands of companies have deployed QNX’s real-time operating systems to ensure the ideal combination of performance, security and reliability in mission-critical systems. At the core of QNX technology is the QNX Neutrino® Real-time Operating System (RTOS), a full-featured RTOS enabling next-generation products in every industry where reliability matters, including automotive, medical devices, robotics, transportation, and industrial embedded systems. With the QNX microkernel...
  • 18
    Getscreen.me

    Getscreen.me

    Getscreen.me

    ... safe. All transmitted data is encrypted by default with 128-bit AES algorithm inside WebRTC and SSL protocols. Integration with popular platforms like Google Chrome Extension, Telegram and Jira Service Desk, as well as with HTTP API.
    Starting Price: $5
  • 19
    PandaVPN

    PandaVPN

    Wildfire Inc.

    PandaVPN is a quality and cross-platform VPN application trusted by 40 million users worldwide. By offering 0-log policy, OpenVPN protocol, 256-bit ECC Encryption, random digital accounts, bitcoin payment, built-in ad blocker, etc., PandaVPN proves itself to be secure, private, and easy to use on mainstream devices! Safeguarding the online privacy is the top concern of PandaVPN. With PandaVPN, no matter you are working with safe networks or less secure public Wifi hotspots, you are enabled...
    Starting Price: $2.77 per month
  • 20
    FileZilla Pro

    FileZilla Pro

    FileZilla

    Transfer files from your computer via FTP/SFTP/FTPS, Amazon S3, Backblaze B2, Box, Dropbox, Google Cloud, Google Drive, Microsoft Azure, Microsoft OneDrive, Microsoft OneDrive for Business, Microsoft SharePoint, OpenStack Swift and WebDAV. One tool to find, transfer and download all of your files. FileZilla Pro, the professional tool for file transfers, allows you to focus on getting your job done. Choose the platform of your choice and buy it with confidence! Need to run commands via...
    Starting Price: $19.99
  • 21
    Duplicati

    Duplicati

    Duplicati

    Free backup software to store encrypted backups online For Windows, macOS and Linux. Duplicati works with standard protocols like FTP, SSH, and WebDAV as well as popular services like Backblaze B2, Tardigrade, Microsoft OneDrive, Amazon S3, Google Drive, box.com, Mega, hubiC, and many others. Backup files and folders with strong AES-256 encryption. Save space with incremental backups and data deduplication. Run backups on any machine through the web-based interface or via a command...
    Starting Price: Free
  • 22
    Rclone

    Rclone

    Rclone

    Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection...
    Starting Price: Free
  • 23
    InfiConnector

    InfiConnector

    Infilock Inc.

    A middleware that is installed on a range of gateways and connects equipment to InfiIoT and popular Internet of Things(IoT) or Industrial Internet of Things (IIoT) clouds. It securely connects various devices (e.g., PV panels, battery energy storage, HVACs, EV stations, compressors, and boilers) through industrial protocols (Modbus, OPC UA, BACnet) and cellular networks (LTE and 5G). InfiConnector is configurable from cloud services to collect data from devices and sensors and prepare data...
    Starting Price: $10/month/license
  • 24
    Bastillion

    Bastillion

    Bastillion

    ... across shells to make patching easier and eliminate redundant command execution. Bastillion layers TLS/SSL on top of SSH and acts as a bastion host for administration. Protocols are stacked (TLS/SSL + SSH) so infrastructure cannot be exposed through tunneling/port forwarding. Also, SSH key management is enabled by default to prevent unmanaged public keys and enforce best practices. Bastillion is available for free use under the Prosperity Public License.
    Starting Price: $0.015 per hour
  • 25
    AirVPN

    AirVPN

    AirVPN

    ... the type of traffic or protocol you are using, even for your ISP. Connect to any wireless network without risking data eavesdropping between your computer and the WiFi hotspot. Hide your IP - Get a new IP address, so that nobody can discover your identity through it. Optional block lists protecting you from ads, adware, trackers and malicious sources.
    Starting Price: $2.08 per 3 days
  • 26
    owlVPN

    owlVPN

    owlVPN

    When you connect to owlVPN.com servers you are protected by advanced 256-bit encryption and complex data protocols. owlVPN.com utilizes state-of-the-art high-performance servers on gigabit networks for fast, unlimited, and anonymous downloads. With owlVPN.com, you don’t have to worry about technical problems. Our 24/7 technical support team is available any time you need help. We want you to have the utmost security when going online and that’s why we have a strict zero-logging policy on all...
    Starting Price: $9.50 per month
  • 27
    Prefix

    Prefix

    Stackify

    It’s easy to maximize app performance with your FREE preview trial of Prefix featuring OpenTelemetry. With the latest open-source observability protocol, OTel Prefix streamlines application development with universal telemetry data ingestion, unmatched observability, and extended language support. OTel Prefix puts the power of OpenTelemetry in the hands of developers, supercharging performance optimization for your entire DevOps team. With unmatched observability across user environments, new...
    Starting Price: $99 per month
  • 28
    PFLB

    PFLB

    PFLB

    ...-powered performance insights. Discovering load testing results with Grafana dashboards. Protocols: HTTP, HTTPS, gRPC, JDBC, JMS, AMQP, MQTT, Kafka.
    Starting Price: $50/month
  • 29
    Courier

    Courier

    Double Precision, Inc.

    The Courier mail transfer agent (MTA) is an integrated mail/groupware server based on open commodity protocols, such as ESMTP, IMAP, POP3, LDAP, SSL, and HTTP. Courier provides ESMTP, IMAP, POP3, webmail, and mailing list services within a single, consistent, framework. Individual components can be enabled or disabled at will. The Courier mail server now implements basic web-based calendaring and scheduling services integrated in the webmail module. Advanced groupware calendaring services...
    Starting Price: Free
  • 30
    Coreflux

    Coreflux

    Coreflux

    Coreflux: A next-gen IoT platform emphasizing seamless integration, scalability, and security. At its core: MQTT Broker: The platform's backbone, facilitating real-time data management and communication between diverse devices, irrespective of protocols or manufacturers. Flux DSL: A proprietary domain-specific language enabling users to craft event-driven workflows, orchestrating sophisticated IoT scenarios. Asset Management (Flux Assets): Manages a wide array of IoT assets, from...
    Starting Price: €0