Suggested Categories:

Git GUI Clients
Git GUI clients are tools that provide a graphical user interface to interact with Git repositories. They simplify version control tasks, such as committing changes, branching, merging, and resolving conflicts, by offering visual workflows instead of command-line operations. These clients are designed to enhance productivity by making complex Git operations more intuitive, even for users without extensive Git expertise. They support collaboration by visually tracking changes and showing repository history in an organized way. By bridging the gap between Git’s functionality and user accessibility, Git GUI clients are valuable for both novice and experienced developers.
GUI Testing Tools
GUI testing tools help developers and QA teams verify that a software application's graphical user interface works correctly and looks as intended. These tools simulate user interactions such as clicks, inputs, and navigation to ensure buttons, menus, forms, and other elements respond properly. They can detect layout inconsistencies, broken links, and visual regressions across different devices, screen sizes, and browsers. Many modern GUI testing platforms use automation, AI, and record-and-playback features to reduce manual testing time and improve accuracy. Ultimately, GUI testing tools ensure a seamless, consistent, and user-friendly experience across all interfaces.
Embedded GUI Design Software
Embedded GUI design software is an application used to create user interfaces for embedded systems. It allows users to develop simple user interfaces for a range of tasks, from basic forms and menus to more complex graphics. The software typically consists of a library of GUI components, such as buttons, check boxes, radio boxes, sliders, and other custom controls. Additionally, it includes the ability to set up event handlers that will respond to events triggered by the user’s interaction with the interface.
MongoDB GUI Clients
MongoDB GUI clients are graphical user interface tools used to administer MongoDB databases. These clients provide visual data management, allowing users to manage their databases and collections in an intuitive manner. They are typically web-based applications, supported on both desktop and mobile platforms. Users can access features such as query editor, user management, real-time server monitoring and more.
MySQL GUI Clients
MySQL GUI clients are software applications used to provide a graphical interface for users to interact with MySQL databases. They enable users to view, create and modify tables, rows, columns and other database objects without having to write SQL queries. Common features of MySQL GUI clients include query builder tools and the ability to export data into various formats. Additionally, some MySQL GUI clients offer advanced options such as visual design tools and support for multiple languages.
PostgreSQL GUI Clients
PostgreSQL GUI clients are tools used to easily manage and manipulate databases from a graphical user interface. They provide an intuitive interface that allows users to create and edit elements like tables, views, functions and more. Popular PostgreSQL GUI clients include pgAdmin, DBeaver, TablePlus and Navicat Premium. These clients support a variety of database operations through graphical tools or embedded SQL text editors for full control over query execution.
UX Software
UX software helps designers and product teams research, design, test, and improve user experiences across websites, mobile apps, and digital products. It supports activities such as wireframing, prototyping, user testing, and usability analysis to create intuitive and engaging interfaces. The software often includes collaboration features that allow teams to share feedback and iterate quickly on designs. Many UX tools integrate with product management and development platforms to streamline the design-to-development workflow. By focusing on user needs and behavior, UX software helps organizations build products that are more effective, accessible, and user-friendly.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

42 Products for "rvc-gui" with 2 filters applied:

  • 1
    Immunity Debugger

    Immunity Debugger

    Immunity Debugger

    ...Users can go back to previously entered commands, or just click in the dropdown menu and see all the recently used commands. Immunity Debugger's interfaces include the GUI and a command line. The command line is always available at the bottom of the GUI. It allows the user to type shortcuts as if they were in a typical text-based debugger, such as WinDBG or GDB.
  • 2
    Atomicorp Enterprise OSSEC
    ...OSSEC is the world’s most popular open source host-based intrusion detection system (HIDS) used by tens of thousands of organizations. Atomicorp extends OSSEC with a management console (OSSEC GUI), advanced file integrity management (FIM), PCI compliance auditing and reporting, expert support and more. - Intrusion Detection - File Integrity Monitoring - Log Management - Active Response - OSSEC GUI and Management - OSSEC Compliance Reporting - PCI, GDPR, HIPAA, and NIST compliance - Expert OSSEC Support Get expert support for OSSEC servers and agents as well as help developing OSSEC rules. ...
  • 3
    JackDB

    JackDB

    JackDB

    Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very...
    Starting Price: $49 per user per month
  • 4
    ManageEngine Network Configuration Manager
    ...NCM helps automate and take total control of the entire life cycle of device configuration management. Schedule device configuration backups, track user activity and spot changes by comparing configuration versions all from a centralized web GUI. Monitor configuration changes, get instant notifications and prevent unauthorized changes to make your networking environment secure, stable and compliant. Define standard practices and policies, check device configurations for violations and readily apply remedial measures to ensure device compliance. Save time by automating repetitive, time-consuming configuration management tasks and also by centrally applying configuration changes to devices in bulk.
    Leader badge
    Starting Price: $238
  • 5
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. ...
    Starting Price: $595 per year
  • 6
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle,...
    Starting Price: $99.00/month/user
  • 7
    Global Learning Systems

    Global Learning Systems

    Global Learning Systems

    ...Online security awareness training from GLS drives positive employee behavior changes. This helps protect your organization. Your workforce is your first line of defense against the bad guys. Therefore they must take personal responsibility so as to safeguard the organization and its information assets. GLS provides engaging and varied training program materials that reach learners in different ways.
  • 8
    Maxava HA
    Maxava HA is designed for complex IBM i environments and organizations, provides real-time replication, virtually unlimited concurrent apply processes, constant data checking and an easy-to-use GUI and mobile monitoring system. Maxava HA takes advantage of the latest technology and has proven itself to be extremely fast, easy to implement and uncomplicated to run. Capability allows admins to perform a role swap (in either direction) on command from a mobile device. Simulated Role Swap (SRS) enables users to test their Disaster Recovery plan without downtime during a normal working day. ...
  • 9
    Keysight Application Threat Intelligence
    ...Understandably, when Ponemon Research finds that the average malicious hack takes an astonishing 256 days to discover (and pegs the average cost of a data breach at $4 million). The aim is clearly to get in front of these bad guys and, if attacked, quickly identify the issue and contain the damage. As new security threats surface every week, staying on top of today’s threat landscape is a full-time job, requiring constant vigilance and in-depth research. It is an expensive and time-consuming proposition, but no enterprise manager, government agency, or service provider wants to be caught unprepared. ...
  • 10
    Vega

    Vega

    Subgraph

    Vega can help you find and validate SQL Injection, cross-site scripting, inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. Vega can help you find vulnerabilities such as: reflected cross-site scripting, stored cross-site scripting, blind SQL injection, remote file include, shell injection, and others. Vega also probes for TLS / SSL security settings and identifies opportunities for improving the security of your TLS servers. ...
  • 11
    FortiPortal

    FortiPortal

    Fortinet

    ...Next-generation firewall capabilities: content filtering, application control, antivirus, IPS this full working demo of a FortiPortal, you’ll be able to explore the system dashboard, intuitive GUI, global settings, and security policy profiles to see for yourself how comprehensive, yet easy it is to for MSSPs to set up tiered revenue-generating services and for enterprises and education to delegate control.
  • 12
    OSSEC

    OSSEC

    OSSEC

    ...The Atomic OSSEC open source-based detection and response system adds thousands of enhanced OSSEC rules, real-time FIM, frequent updates and software integrations, built-in active response, a graphical user interface (GUI), compliance tools, and expert professional support. It’s a versatile XDR and compliance all-in-one security solution.
  • 13
    ALog SMASH
    ...Also equipped with a log translation function unique to the ALog series. You no longer have to spend time decrypting the event log. You can flexibly search the collected logs with an intuitive GUI. Designed for long-term log storage. Logs are automatically compressed up to about 1/4000. You can rest assured that you have ALog SMASH.
    Starting Price: $1740.00/one-time/user
  • 14
    OSForensics

    OSForensics

    PassMark Software

    ...Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.
    Starting Price: $799 per user per year
  • 15
    XyLoc Security Server

    XyLoc Security Server

    Ensure Technologies

    The XyLoc® Security Server (XSS) is a server-based software platform, with a web-based GUI, that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. XSS allows IT managers to easily implement and administer XyLoc across multiple network segments and user groups, and also enables detailed reporting and compliance auditing. Simplifies the administration, reporting, and management of XyLoc user environments.
  • 16
    authID.ai

    authID.ai

    authID.ai

    Launch the power of mobile facial biometrics to deliver seamless identity fraud protection across the digital identity lifecycle. Onboard customers with ease. Weed out the bad guys early. Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. ...
  • 17
    Powertech Policy Minder
    ...By automating security administration, Policy Minder saves time and eliminates labor-intensive manual tasks usually required to administer the details of security. Policy Minder for IBM i features a graphical user interface (GUI) in addition to the traditional green screen. Policy Minder provides an easy way to define your security policy on IBM i, whether you want to customize a security policy based on your organization's unique requirements or use a template based on cybersecurity best practices. Comparing your security policy to your system's current configuration is simple and automated. ...
  • 18
    TruSTAR

    TruSTAR

    TruSTAR

    ...TruSTAR normalizes and prepares intelligence for orchestration, significantly reducing playbook complexity. Spend less time wrangling data, and more time catching bad guys. The TruSTAR platform has been designed to provide maximum flexibility.
  • 19
    Zenmap

    Zenmap

    Zenmap

    Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines.
  • 20
    Vulkyrie

    Vulkyrie

    Vulkyrie

    ...In 2019 alone, more than 22,000 were reported and 1 out of 3 was given a High or Critical severity rating. Our free vulnerability scanning can help find your security issues before the bad guys do. Our Free plan comes with no limits on the number of IP addresses and URLs, and no limits on the number of vulnerability scans you can run. Unlike free trials, free versions or community editions of other vulnerability assessment tools, you no longer have to choose between your web servers, Windows servers, network devices or virtual machines. ...
    Starting Price: $99 per month
  • 21
    BlackArch Linux

    BlackArch Linux

    BlackArch Linux

    ...BlackArch Linux is compatible with existing/normal Arch installations. It acts as an unofficial user repository. You can install BlackArch Linux using the Slim medium which features GUI installer.
  • 22
    Emsisoft Emergency Kit
    ...If your PC has at least 1 GB of RAM, this will be perfect. In the right hands, Emsisoft Free Emergency Kit can bring powerful tools to bear on a wide range of PC troubles. If you’re the security go-to guy (or gal) in your family, workplace, or neighborhood, stick a copy of Emsisoft Emergency Kit on a USB drive and keep it with you. The malware Emergency Kit for infected PCs. Award-winning dual-scanner to clean infections. 100% portable, ideal for USB flash drives.
    Starting Price: $19.99 per year
  • 23
    DataPatrol

    DataPatrol

    DataPatrol

    ...We provide you with a full set of features to help you protect your data and sensitive information. All secured communication between agent/administrator and server side. All administration tasks are done through the web interface (GUI). By applying digital watermarks on the screens, you make a statement that any data belongs to the company only. Having permanent watermarks on the screens, you assure and alert all insiders that these data are confidential, and any exfiltration will be tracked.
  • 24
    4n6 DBX Forensics Wizard
    ...The software provides DBX file preview in 4 different modes: Content, Attributes, Message Headers, and Hexadecimal View Attributes. To explore DBX files with the software GUI, the software provides two modules: Folder Selection and File Selection. Select File allows you to search only a single file, while Select Folder allows you to search a folder containing multiple DBX files. This DBX Forensics Software can save evidence of DBX files to multiple destinations like email files (DBX files can be preserved as PST files EML files and MBOX files), document files (DBX files can be preserved as PDF, HTML text and emails). ...
    Starting Price: $49
  • 25
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 26
    Javascript Obfuscator

    Javascript Obfuscator

    Javascript Obfuscator

    ...It includes powerful features such as minification and compression for reduced file size and faster load times, dead code insertion to confuse static analysis, and domain- or IP-based locking to disable code execution outside authorized environments. The tool provides GUI-driven desktop batch processing that allows users to protect JavaScript embedded in HTML, PHP, JSP, or similar files with just a few clicks, and supports keeping initial comments or inserting custom headers into output files. Advanced controls let you exclude certain names from obfuscation and ensure consistent symbol renaming across multiple files.
    Starting Price: Free
  • 27
    Semperis

    Semperis

    Semperis

    ...Identity-driven cyber resilience for the hybrid enterprise. With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital future. For 90% of enterprises, Active Directory is the primary source of trust for identity and access. But it’s also the cyber kill chain’s weakest link – exploited in virtually every modern attack. ...
  • 28
    SISA ProACT

    SISA ProACT

    SISA Information Security

    ...SISA’s Managed detection and response solution is scalable and adaptable to the everchanging threat landscape and delivers 10x value by accelerating time to investigation and optimizing total operational costs. The platform offers a unified experience through integrated portals: GUI interface, Client site appliance, and Agent for resource monitoring. The indigenous algorithm, a “conscious” one, continuously reviews security events to decrease the dwell time from ticket to resolution. From breach investigations to damage assessments and remediation, take advantage of timely and actionable information through digital forensics. ...
  • 29
    AppViewX ADC+
    ...Complicated processes, the need for technical expertise, lack of centralized management, and long ticket queues have traditionally caused service delivery delays and the TCO (total cost of ownership) to go up. AppViewX ADC+ provides GUI-based, API-driven, out-of-the-box solutions that simplify and speed up ADC lifecycle automation. ADC+ pushes all the technical nitty-gritty of diverse infrastructures under the hood and provides standardized, highly abstracted solutions that can be self-serviced by business users as well. The application delivery services have evolved exponentially over a while, demanding LBaaS fulfillment to abstract the underlying infrastructure complexity by automating load-balancer (ADC instances) provisioning end-to-end, which traditional solutions cannot do independently.
  • 30
    Precisely Enforcive
    Precisely’s Enforcive Enterprise Security Suite is a comprehensive, easy-to-use security and compliance solution for IBM i. With over 20 fully integrated, GUI-controlled modules, the suite enables system administrators and security officers to manage security and compliance tasks efficiently and effectively – even managing multiple systems at a single time. In today’s world of privacy breaches, complex regulatory requirements and evolving threats, the Enforcive Enterprise Security Suite enables a comprehensive ‘hardening’ of your company’s IBM i defenses against unauthorized access. ...
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB