Suggested Categories:

Version Control Systems
Version control software assists in the revision and management of the changes made to web sites, documents, programs and their source code.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
SPC Software
Statistical process control (SPC) software allows manufacturing companies to streamline the management, comparison and analysis of statistical data in order to optimize performance and make predictions.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
Application Delivery Controllers (ADC)
Application Delivery Controllers (ADCs) are software solutions designed to optimize the performance, security, and availability of applications delivered over the internet. They manage traffic between users and applications by distributing it across multiple servers, ensuring load balancing and preventing overloads. ADCs also provide security features like SSL offloading, DDoS protection, and web application firewalls to safeguard applications from attacks. By improving application response times and ensuring high availability, ADCs enhance user experience and help maintain service continuity. They are commonly used in data centers and cloud environments to ensure efficient and secure application delivery.
Advanced Process Control (APC) Systems
Advanced Process Control (APC) systems are computer-based systems that use mathematical models and algorithms to optimize the performance of industrial processes. APC systems aim to maintain a steady state operation with tight control over process variables such as temperature, pressure, flow rate, and composition. It incorporates feedback from sensors in the process to monitor performance and take corrective action when needed, in order to keep the process operating in the desired range. APC systems can help improve efficiency, reduce energy usage, increase throughput, and reduce product variability.
Model Predictive Control (MPC) Software
Model Predictive Control (MPC) software is a type of advanced process control algorithm used to optimize process performance. It uses mathematical models and predictive algorithms to anticipate future conditions and automate how a system should respond. MPC is often used in industrial settings to adjust variables in real time, such as temperature, pressure, and flow rate. It enables manufacturers to maintain desired process operations with greater efficiency than traditional methods.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Session Border Controllers (SBC)
Session Border Controllers (SBCs) are network devices or software solutions that manage and secure real-time communication sessions, such as Voice over IP (VoIP) calls, video conferencing, and other multimedia exchanges, particularly between different networks. SBCs are deployed at the borders of networks, typically between an enterprise and a service provider network, to protect the communication infrastructure and optimize traffic flow. Their primary functions include session signaling, traffic routing, encryption, and ensuring secure interconnection between different communication systems. SBCs handle tasks like ensuring high-quality service (QoS), mitigating security threats (such as denial-of-service (DoS) attacks and eavesdropping), and maintaining compliance with industry standards.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
CNC Software
CNC software is used to program and run CNC machines. It is designed to control the motion of the machine, as well as its cutting speeds, feed rates and other variables. The main components of a CNC control system are a computer numerical control (CNC) unit, a CNC controller program and an interface for manual data entry. Depending on the complexity of the machine, CNC programming can require knowledge in mathematics, geometry and trigonometry.
Change Management Software
Change management software is a tool used to coordinate changes and improve the effectiveness of varying processes. It enables organizations to track and manage change requests, assess impact, approve or reject change proposals, assign tasks to relevant personnel, and monitor progress until completion. Change management software also allows users to document all changes for audit and compliance purposes. Additionally, it provides notifications and automated workflows which simplify the process of adapting to organizational change. Finally, the software can enable collaboration between team members by providing them with access to data stored in one central repository.
View more categories (20) for "telescope control"

25 Products for "telescope control" with 1 filter applied:

  • 1
    EZO AssetSonar
    EZO AssetSonar is a comprehensive IT asset management platform that provides real-time visibility into your entire digital infrastructure. Track and optimize hardware, software, and license management to reduce risks, control IT spend, and improve compliance. With powerful features like software discovery, license tracking, and software normalization, EZO AssetSonar helps businesses overcome challenges such as SaaS sprawl, shadow IT, and redundant software licenses. Seamlessly...
    View Tool
    Visit Website
  • 2
    Device42

    Device42

    Device42, A Freshworks Company

    With customers across 70+ countries, organizations of all sizes rely on Device42 as the most trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT. With access to information that perfectly mirrors the reality of what is on the network, IT teams are able to run their operations more efficiently, solve problems faster, migrate and modernize with ease, and achieve compliance with flying colors. Device42 continuously discovers, maps, and...
    Leader badge
    Starting Price: $1499.00/year
    View Tool
    Visit Website
  • 3
    NinjaOne

    NinjaOne

    NinjaOne

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training...
    Leader badge
    View Tool
    Visit Website
  • 4
    Setyl

    Setyl

    Setyl

    Setyl is a cloud-based IT asset management platform (ITAM) that combines hardware and software asset management in one. The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more. Use Setyl to gain full visibility and control over your IT assets, SaaS applications and licenses, users, vendors and spend in one place — helping you: ✓ Streamline and scale your IT operations, including employee onboarding and offboarding...
  • 5
    Ampliphae

    Ampliphae

    Ampliphae

    Take back control of the cloud. Quickly find all the SaaS applications in use on your network, monitor adoption rates, see who is using what service, and — where necessary — migrate users from non-compliant services to approved ones. Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security, and compliance platform. Find shadow applications, stop SaaS costs from escalating out of control, and minimize data-compliance risks — with Ampliphae. With easy...
  • 6
    Torii

    Torii

    Torii Labs

    Torii is a SaaS management platform. It transforms the way companies operate by creating an Autonomous IT, enabling IT to increase velocity, agility and efficiency, using a SW that manages SW automatically. With the growing usage of SaaS tools within organizations, Torii enables IT professionals to discover, optimize and control the organization SaaS usage and cost and make better use of Software. Torii gives instant visibility and control, of all company-wide SaaS apps (across G Suite, Okta...
  • 7
    Zygon

    Zygon

    Zygon

    Efficient holistic SaaS Security Management. Scale your ability to control all applications with our flexible, automated workflow engine: usage justification, access requests, access reviews, security alerts,... they all become easier, faster with Zygon. Ditch the spreadsheet, Welcome collaborative SaaS Security Management. Zygon shows you every app every person in your organization is using and how they access it, at the granularity of individual accounts. Make access requests...
    Starting Price: $1 per user per month
  • 8
    Lansweeper

    Lansweeper

    Lansweeper

    ... 365 and AD User Data, get the netbios domain name, check for Windows updates and more. Discover all assets in your IT environment that you didn’t even knew about & take full control of your network. Download your free trial and start your IT asset management.
    Starting Price: $495.00/year
  • 9
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted...
  • 10
    Cloudflare Zero Trust
    Stop data loss, malware and phishing with the most performant Zero Trust application access and Internet browsing platform. The traditional tools used to connect employees to corporate apps grant excessive trust, exposing you to potential data loss. The corporate perimeter has become more difficult to control with complex, conflicting configurations across your VPNs, firewalls, proxies, and identity providers. It’s never been harder to parse out logs, and make sense of how users access...
    Starting Price: $7 per user per month
  • 11
    Microsoft Defender for Cloud Apps
    Modernize how you secure your apps, protect your data, and elevate your app posture with SaaS security. Get full visibility of your SaaS app landscape and help protect your apps with Defender for Cloud Apps. Discover, control, and configure apps to ensure employees are using trusted and compliant applications. Classify and protect sensitive information at rest, in use, and in motion. Enable your employees to safely access and view files in apps. Control how apps interact with each other. Gain...
  • 12
    Ivanti

    Ivanti

    Ivanti

    Ivanti offers integrated IT management solutions designed to automate and secure technology across organizations. Their Unified Endpoint Management platform provides intuitive control from a single console to manage any device from any location. Ivanti’s Enterprise Service Management delivers actionable insights to streamline IT operations and improve employee experiences. The company also provides comprehensive network security and exposure management tools to protect assets and prioritize...
  • 13
    InvGate Asset Management
    ... all endpoints through automated patch deployment, asset discovery, software license management, remote desktop control, change management, software blacklisting with automated removal, and more.
  • 14
    Snow Software

    Snow Software

    Snow Software

    We have brought together software asset management, cloud management and SaaS management so you can fully optimize all of your technology in one platform that seamlessly integrates with your enterprise ecosystem. Clearly see, understand and manage your entire technology landscape, both on-prem and in the cloud. Maximize the value of your technology investments with deep insights into usage, spend and vulnerabilities. Get the perspective and automation you need to anticipate and align with...
  • 15
    Kaseya VSA
    Kaseya VSA is a next-generation remote monitoring and management (RMM) software for Managed Service Providers (MSP) and IT enterprises. With VSA, users get access to the fastest remote control powerful discovery, reliable patch management, and monitoring and security tools in a single solution. Thus, helping to increase IT staff productivity, service reliability, and systems security. A Unified IT Management solution to not only deliver better service but to transform the business. Kaseya...
  • 16
    Netskope

    Netskope

    Netskope

    ... for performance. This is the new perimeter. This is the Netskope Security Cloud. Reimagine your perimeter. That’s the vision of Netskope. The organic adoption of cloud and mobile in the enterprise presents challenges for security teams when it comes to managing risk without slowing down the business. Security has traditionally managed risk by applying heavy-handed controls, but today’s business wants to move fast without having velocity throttled. Netskope is redefining cloud, network, and data security.
  • 17
    Armis

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset...
  • 18
    Flexera One
    Flexera One is a SaaS platform designed to optimize IT spend, compliance, and risk management across complex hybrid IT environments. It unifies visibility and control of hardware, software, SaaS, and cloud assets, leveraging data from the Technology Intelligence Platform and Technopedia®. By delivering actionable insights, Flexera One helps organizations reduce costs, improve security, and meet sustainability goals. It strengthens vendor negotiations through intelligent analytics and ensures...
  • 19
    Microsoft Intune
    ... with a highly scalable, globally distributed cloud service architecture. Leverage the intelligent cloud for insights and baselines for your security policies and configuration settings. Help safeguard data when you don’t manage devices used by employees or partners to access work files. Intune app protection policies provide granular control over Office 365 data on mobile devices.
  • 20
    Prisma SaaS

    Prisma SaaS

    Palo Alto Networks

    ..., user behavior monitoring and advanced threat prevention. Prisma SaaS provides unparalleled visibility and precise control of SaaS applications using an extensive library of application signatures. Easy-to-navigate dashboards and detailed reporting rein in shadow IT risk.
  • 21
    Augmentt

    Augmentt

    Augmentt

    Managing your customers’ SaaS ecosystem will save them money and give you greater visibility and control. Stop the guesswork, and start putting SaaS usage data to work for you! Easily track usage of unauthorized SaaS applications in order to enforce SaaS security policies. Quickly automate your SaaS provisioning, de-provisioning and approval processes. Complete SaaS usage reporting across the entire organization. Compare SaaS usage to licensing in order to identify areas of savings. Augmentt...
    Starting Price: $4 per user per month
  • 22
    Tenable OT Security
    Safeguard critical systems without disrupting operations. Unify the visibility of every asset in your converged environment from a single interface. Proactively identify weak points in your OT environment. Eradicate your high-risk exposures before they’re exploited. Automate asset discovery and create visual asset maps for a unified view of network assets, including workstations, servers, industrial controllers, and IoT devices. Use connector engines to specifically target applications...
  • 23
    Token Security

    Token Security

    Token Security

    Token Security accelerates secure enterprise adoption of Agentic AI by discovering, managing, and governing every AI agent and non-human identity across the organization. From continuous visibility to least-privilege enforcement and lifecycle management, Token Security provides complete control over AI and machine identities, eliminating blind spots, reducing risk, and ensuring compliance at scale.
  • 24
    Auvik

    Auvik

    Auvik Networks

    Auvik's cloud-based network monitroing and management software gives you instant insight into the networks you manage, and automates complex and time-consuming network tasks. You get complete network visibility and control. Real-time network mapping & inventory means you'll always know exactly whats where, even as your users move. Automated config backup & restore on network devices means you'll mitigate network risk with no manual effort. And deep network traffic insights is a game changer...
  • 25
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy...
  • Previous
  • You're on page 1
  • Next