Results for: unix linux

Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (10) for "unix linux"

28 Products for "unix linux" with 2 filters applied:

  • 1
    JAMS

    JAMS

    JAMS Software

    ...Run, monitor, and manage critical IT processes—from simple batch jobs to cross-platform workflows—from a single pane of glass. JAMS can automate jobs on any platform - Windows, Linux, UNIX, IBM i, zOS, and OpenVMS and includes native application integrations to run jobs specific to databases, BI tools, and ERP systems. Its extensive automation features enable you to run jobs on any schedule, as well as trigger off the completion of other events. JAMS centrally monitors the status of all jobs, provides notifications of failure (or success), and maintains a detailed audit trail and log of every execution.
    Starting Price: $833/month
    View Software
    Visit Website
  • 2
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. ...
  • 3
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. ...
  • 4
    TD/OMS

    TD/OMS

    Remain Software

    TD/OMS supports IBM i (Power) Windows and Unix/Linux. It incorporates fundamental IT business process support to manage software changes, software development, deployment and modernization projects. TD/OMS enables development teams to work in a collaborative way and to share any information at various development stages in any environment (Development, Test, Acceptance, and Deployment).
  • 5
    Fudo Security

    Fudo Security

    Fudo Security

    With Fudo, users can get access to Unix/Windows servers, applications, and devices quickly and easily. Users will not have to change their habits and can continue to use native clients like Unix Terminals, RDCMan, or Putty. They can also connect through the Fudo Web Client which only needs a web browser for access. Using the JIT feature, you can create access workflows that adhere to the zero-trust approach. Through the request management section, you can easily define and schedule when a...
    Starting Price: Free
  • 6
    Time Machine

    Time Machine

    Solution-Soft

    ...Time Machine eliminates the need to reset the system clock, which is time-consuming, error-prone, and not possible under Active Directory or in a Kerberos secured environment. Mitigate risks for mission-critical application failures. Ensure large-scale software projects finish on time and under budget. Windows, Linux, Unix, Mainframe zLinux, Dockerized, Virtualized, On-Iron, or in the Cloud. Time Machine runs everywhere you need it.
  • 7
    OpenLM

    OpenLM

    OpenLM.com

    ...OpenLM software provides monitoring, auditing, reporting and management capabilities for engineering software running under all the leading license managers, such as FLEXlm, Sentinel RMS/HASP, Reprise RLM, IBM LUM, DSLS, MathLM, ArcGis etc. Also supports cloud licenses Office 365, Adobe Cloud, Autodesk Cloud and ESRI Online. OpenLM software is compatible with license managers running on Unix, Linux, MacOS, and Windows Operating systems. Infrastructure minimal hardware requirements • Dual core CPU • 4 GB memory (Recommended – 8 GB) • .NET Framework 4.7.2 or higher • Static MAC address (Cloud based servers must use ENI) The OpenLM Server can be installed on a Windows’ machine only.
    Starting Price: $1980.00/one-time
  • 8
    REVE Secure

    REVE Secure

    REVE Secure

    ...Adding 2nd-factor authentication will not only deliver dual authentication security but also ensure safe & secure login & protected account access. With Two Factor Authentication, secure your remote logins and access to Linux/UNIX servers from security breaches and malicious attacks. Integrate a second layer of authentication to existing Windows password-based security to ensure the all-round protection of your enterprise data. Secure & protect logins and access to each different web application and service to avoid unauthorized access and cyber-attacks. ...
  • 9
    HostAccess

    HostAccess

    Perforce

    HostAccess is PC terminal emulation software. It offers a suite of terminal emulation tools for Microsoft Windows users. This allows secure access to various platforms, including Linux, Unix, IBM, Windows, etc. The main usage of the HostAccess is to connect to PICK (multivalue) system, such as UniVerse, UniData, D3, ONware, etc., and use own package of programs written in PICK Basic. These programs provide APIs for data exchange and expansive GUI capabilities. Produce reports quickly and integrate data with Windows applications. ...
  • 10
    OpenSVC

    OpenSVC

    OpenSVC

    ...The agent functions as a supervisor, clusterware, container orchestrator, and configuration manager, facilitating the deployment, management, and scaling of services across diverse environments, including on-premises, virtual machines, and cloud instances. It supports various operating systems such as Unix, Linux, BSD, macOS, and Windows, and offers features like cluster DNS, backend networks, ingress gateways, and scalers. The collector aggregates data reported by agents and fetches information from the site's infrastructure, including networks, SANs, storage arrays, backup servers, and asset managers. It serves as a reliable, flexible, and secure data store.
    Starting Price: Free
  • 11
    CSII 2000

    CSII 2000

    Logical System Approaches

    ...We are unique in that we operate on over 600 operating system platforms, allowing us to handle low to medium volume business using Microsoft Windows and medium to large volume business utilizing UNIX and LINUX operating systems. Our design concept has always been to provide application software that is user friendly and built for speed. Active companies must process large volumes of sales, payments, commissions, coupons, statements and reports; therefore, they require software designed and written to handle their volume. You owe it to yourself to give CSII 2000 a try. ...
  • 12
    OneStep-JV

    OneStep-JV

    Business Control Systems

    ...The use of Java enables the operation of OneStep-JV™ POS systems on single-user computers, small and very large-scale networks and portable devices like Palm Tops running over a multitude of operating systems such as Windows and Windows Networks, Novell, Unix and Linux. The stability of Oracle gives OneStep-JV™ POS systems a resilient database foundation designed with auto-recovery features to enable database and inventory control software integrity.
  • 13
    Automate Schedule
    Powerful workload automation for centralized Linux job scheduling. When you’re able to automate all your workflows across your Windows, UNIX, Linux, and IBM i systems with a job scheduler, your IT team has more time to tackle more strategic projects that impact the bottom line. Bring isolated job schedules from cron or Windows Task Scheduler enterprise-wide. When your job scheduler integrates with your other key software applications, it’s easier to see the whole picture, leverage data across the organization, and unify your job schedules. ...
  • 14
    IBM Sterling Connect:Direct
    ...IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 15
    HULFT 8

    HULFT 8

    HULFT

    ...By using industry-standard TCP / IP protocol security, HULFT delivers your data faster and won't over-burden your network. As would be expected, HULFT is compatible with UNIX, Linux, and Windows. It also supports mainframe operating systems such as z/OS, MSP, and VOS. HULFT even works with mid-sized systems running i5/OS. With HULFT, seamless data integration between a wide variety of business applications is possible. Transfer files between your enterprises' different locations, or with external organizations. ...
  • 16
    GMS ITEC
    The ITEC (International Trade & Electronic Commerce) System is a robust, integrated software system for efficient handling of all phases of a shipment's movement and customs clearance from origin to final delivery. Typically purchased and used by the customs broker, international air or sea freight forwarder, deconsolidator or NVOCC, it can also be used by an importer or exporter who process their own shipments. The application software is written in the PROGRESS 4GL database language. It is...
  • 17
    rkt

    rkt

    Red Hat

    rkt is an application container engine developed for modern production cloud-native environments. It features a pod-native approach, a pluggable execution environment, and a well-defined surface area that makes it ideal for integration with other systems. The core execution unit of rkt is the pod, a collection of one or more applications executing in a shared context (rkt's pods are synonymous with the concept in the Kubernetes orchestration system). rkt allows users to apply different...
  • 18
    Forth

    Forth

    Forth

    Forth, the computer language was created for programming embedded and real-time applications. Today, it is available for developing applications on Windows, DOS, and variants of Unix that include macOS. Additionally, commercial-grade Forth cross-compilers generate highly optimized code that runs on a variety of microprocessors and microcontrollers and proves themselves very capable in custom-hardware environments. Forth is a high-level programming language, although most versions include an...
    Starting Price: $399 one-time payment
  • 19
    R4

    R4

    Royal 4 Systems

    ...Built-in scalability lets you add users, products, production sites, or warehouses and make other changes as the business grows. The application runs on any popular hardware platform, which includes Windows, IBM, Linux, Unix, etc. Royal 4 Systems has hundreds of installations on 6 continents, which include the US, Latin America, Canada, Australia, Europe, and Africa. Our ERP System adapts to your unique business requirements and ensures a smooth, efficient process execution.
  • 20
    Certero for Enterprise ITAM
    ...And it’s better at capturing and analyzing inventory data on all hardware and software, so you can do more with the insights Certero for Enterprise ITAM has to offer. Discover and collect inventory data across all your platforms, from Windows desktops & servers to Linux and Unix, on-premises and in the cloud, as well as Android and iOS mobile devices. What’s more, you can also discover and inventory assets like printers, routers, infrastructure and much more. Includes Software Distribution, Patching, Reporting & can integrate with any Service Desk CMDB. Certero are fully ISO27001 Certified for Information Management Security peace of mind.
  • 21
    WebSmart

    WebSmart

    Fresche

    ...Use WebSmart’s API templates to quickly and seamlessly integrate your Db2 files and RPG programs with other web services. The PHP Edition helps you produce open source PHP applications that run on multiple platforms (IBM i, Windows, Linux, or Unix). The ILE edition is the fastest way for IBM i programmers to develop new RPG web applications that leverage existing code. Uses PHP, a popular and proven open-source language explicitly developed to create web applications.
  • 22
    PowerTerm InterConnect
    The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal...
  • 23
    SpectX

    SpectX

    SpectX

    SpectX is a powerful log analyzer for incident investigation and data exploration. It does not ingest or index data but runs queries directly on log files stored in file systems or blob storage. Local log servers, cloud storage, Hadoop clusters, JDBC-databases, production servers, Elastic clusters, or anything that speaks HTTP - SpectX turns any text-based log files into structured virtual views. SpectX query language is inspired by piping in Unix. An extensive library of built-in query...
    Starting Price: $79/month
  • 24
    Canonical Juju
    Better operators for enterprise apps with a full application graph and declarative integration for both Kubernetes and legacy estate. Juju operator integration allows us to keep each operator as simple as possible, then compose them to create rich application graph topologies that support complex scenarios with a simple, consistent experience and much less YAML. The UNIX philosophy of ‘doing one thing well’ applies to large-scale operations code too, and the benefits of clarity and reuse are...
  • 25
    Flynet Viewer TE
    Flynet Viewer™ TE (Terminal Emulation) provides a browser based, terminal emulator to access key business systems. Access Mainframe, iSeries, Unix, VMS or MultiValue systems, on any device with zero client software. The terminal emulator is installed in a server environment, either on-premise or in the cloud, and centrally managed via the Flynet Viewer administration centre. Flynet Viewer works on all browsers and devices with no Java or ActiveX plugins. Flynet Viewer has all the features...
  • 26
    Web-hosters

    Web-hosters

    Web-hosters

    Most hosting companies make it very difficult to determine exactly what their fees are. Our competitors frequently advertise one price, but by the time you tack on their fees and follow the trail of asterisks and fine print, you end up nickel-and-dimed into a higher price. It’s also common for our competitors to advertise low prices to get you in the door, but then hit you with hidden setup fees and extra fees just to finish the checkout process for basic features every website needs. At...
  • 27
    T-Plan Robot
    T-Plan Robot automates scripted user actions for Test Automation or Robotic Process Automation (RPA) on Mac, Windows Linux & Mobile. T-Plan develops and sells two main toolsets. 1) Test Automation and 2) Robotic Process Automation (RPA). T-Plan Robot is a highly flexible, easy to use, image-based black box GUI automation tool that creates robust automated scripts and exercises applications in the same way as would an end-user. T-Plan Robot is platform-independent (Java) and runs on, and automates all major systems such as Windows, Mac, Linux and Unix plus mobile platforms. ...
    Starting Price: $400/month/user
  • 28
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. The platform’s scalable architecture, with features like zero data loss and long-term compliance storage, ensures that businesses can maintain high security standards while optimizing performance.
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next