Results for: unix linux

Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
View more categories (10) for "unix linux"

19 Products for "unix linux" with 2 filters applied:

  • 1
    JAMS

    JAMS

    JAMS Software

    ...Run, monitor, and manage critical IT processes—from simple batch jobs to cross-platform workflows—from a single pane of glass. JAMS can automate jobs on any platform - Windows, Linux, UNIX, IBM i, zOS, and OpenVMS and includes native application integrations to run jobs specific to databases, BI tools, and ERP systems. Its extensive automation features enable you to run jobs on any schedule, as well as trigger off the completion of other events. JAMS centrally monitors the status of all jobs, provides notifications of failure (or success), and maintains a detailed audit trail and log of every execution.
    Starting Price: $833/month
    View Software
    Visit Website
  • 2
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. ...
  • 3
    zdaemon

    zdaemon

    Python Software Foundation

    zdaemon is a Unix (Unix, Linux, Mac OS X) Python program that wraps commands to make them behave as proper daemons. zdaemon provides a script, zdaemon, that can be used to run other programs as POSIX (Unix) daemons. (Of course, it is only usable on POSIX-complient systems.) Using zdaemon requires specifying a number of options, which can be given in a configuration file, or as command-line options.
    Starting Price: Free
  • 4
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. ...
  • 5
    TD/OMS

    TD/OMS

    Remain Software

    TD/OMS supports IBM i (Power) Windows and Unix/Linux. It incorporates fundamental IT business process support to manage software changes, software development, deployment and modernization projects. TD/OMS enables development teams to work in a collaborative way and to share any information at various development stages in any environment (Development, Test, Acceptance, and Deployment).
  • 6
    CleverView for TCP/IP on Linux
    ...One of the most important characteristics of the contemporary data center is that an ever-increasing amount of the traffic is between servers, and a majority of these servers are Linux or UNIX-based. As such, a critical goal of the next-generation data center is to facilitate high availability and performance-tuned server-to-server communications. IT staff need access to server performance and availability details from not only their browser desktops, but also their cell phones, and they need a more concise way to view server status. ...
  • 7
    OpenLM

    OpenLM

    OpenLM.com

    ...OpenLM software provides monitoring, auditing, reporting and management capabilities for engineering software running under all the leading license managers, such as FLEXlm, Sentinel RMS/HASP, Reprise RLM, IBM LUM, DSLS, MathLM, ArcGis etc. Also supports cloud licenses Office 365, Adobe Cloud, Autodesk Cloud and ESRI Online. OpenLM software is compatible with license managers running on Unix, Linux, MacOS, and Windows Operating systems. Infrastructure minimal hardware requirements • Dual core CPU • 4 GB memory (Recommended – 8 GB) • .NET Framework 4.7.2 or higher • Static MAC address (Cloud based servers must use ENI) The OpenLM Server can be installed on a Windows’ machine only.
    Starting Price: $1980.00/one-time
  • 8
    HostAccess

    HostAccess

    Perforce

    HostAccess is PC terminal emulation software. It offers a suite of terminal emulation tools for Microsoft Windows users. This allows secure access to various platforms, including Linux, Unix, IBM, Windows, etc. The main usage of the HostAccess is to connect to PICK (multivalue) system, such as UniVerse, UniData, D3, ONware, etc., and use own package of programs written in PICK Basic. These programs provide APIs for data exchange and expansive GUI capabilities. Produce reports quickly and integrate data with Windows applications. ...
  • 9
    SysUpTime Network Monitor
    ...Event de-duplication, automated actions and escalation help organizations identify potential problems faster. SysUpTime network monitor is easy to set up and use. It can monitor the availability and performance of your Windows and Linux/UNIX servers, workstations, software applications (SQL, Exchange, Web Servers, etc), and network devices (routers, switches, etc).
    Starting Price: $995
  • 10
    Automate Schedule
    Powerful workload automation for centralized Linux job scheduling. When you’re able to automate all your workflows across your Windows, UNIX, Linux, and IBM i systems with a job scheduler, your IT team has more time to tackle more strategic projects that impact the bottom line. Bring isolated job schedules from cron or Windows Task Scheduler enterprise-wide. When your job scheduler integrates with your other key software applications, it’s easier to see the whole picture, leverage data across the organization, and unify your job schedules. ...
  • 11
    IBM Sterling Connect:Direct
    ...IBM Certified Containers for Sterling Connect:Direct are enterprise-grade, security-rich product editions with integrated common software services for consistent deployment life-cycle management including easy install and configure options, management of upgrades and roll-back, scalability, and security. Supports a wide range of platforms including IBM z/OS, OpenVMS, i5/OS, HP NonStop, Microsoft Windows, UNIX and Linux.
  • 12
    ntopng
    ntopng is the next generation version of the original ntop, a network traffic probe that monitors network usage. ntopng is based on libpcap/PF_RING and it has been written in a portable way in order to virtually run on every Unix platform, MacOS and on Windows as well. Produce long-term reports for several network metrics including throughput and L7 application protocols. Monitor and report live throughput, network and application latencies, Round Trip Time (RTT), TCP statistics...
  • 13
    Certero for Enterprise ITAM
    ...And it’s better at capturing and analyzing inventory data on all hardware and software, so you can do more with the insights Certero for Enterprise ITAM has to offer. Discover and collect inventory data across all your platforms, from Windows desktops & servers to Linux and Unix, on-premises and in the cloud, as well as Android and iOS mobile devices. What’s more, you can also discover and inventory assets like printers, routers, infrastructure and much more. Includes Software Distribution, Patching, Reporting & can integrate with any Service Desk CMDB. Certero are fully ISO27001 Certified for Information Management Security peace of mind.
  • 14
    WebSmart

    WebSmart

    Fresche

    ...Use WebSmart’s API templates to quickly and seamlessly integrate your Db2 files and RPG programs with other web services. The PHP Edition helps you produce open source PHP applications that run on multiple platforms (IBM i, Windows, Linux, or Unix). The ILE edition is the fastest way for IBM i programmers to develop new RPG web applications that leverage existing code. Uses PHP, a popular and proven open-source language explicitly developed to create web applications.
  • 15
    Thinfinity Remote Desktop
    Thinfinity Remote Desktop allows you to securely deliver your Windows applications and desktops to any device with an HTML5 browser, no matter if they are hosted on the cloud, installed on-premises, or on hybrid architectures. Thinfinity Remote Desktop runs seamlessly on any public, private, or hybrid cloud. Build a flexible infrastructure mixing browser access to VDI, VMs, RemoteApps, and Unix machines. Allow users and clients to run your Windows applications anywhere and on any device.
  • 16
    PowerTerm InterConnect
    The PowerTerm InterConnect Series is comprised of several robust terminal emulation applications supporting the host access needs of large and small organizations. It allows enterprises to standardize on a single host access solution. PowerTerm InterConnect products provides fast and reliable access to data residing on the broadest range of hosts, such as IBM Mainframe zSeries, IBM AS/400 iSeries, UNIX, OpenVMS, Tandem, HP. Each of the PowerTerm InterConnect products enables terminal...
  • 17
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    VictoriaLogs, an open-source log database from VictoriaMetrics, is designed to be user-friendly. It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data...
    Starting Price: $0
  • 18
    T-Plan Robot
    T-Plan Robot automates scripted user actions for Test Automation or Robotic Process Automation (RPA) on Mac, Windows Linux & Mobile. T-Plan develops and sells two main toolsets. 1) Test Automation and 2) Robotic Process Automation (RPA). T-Plan Robot is a highly flexible, easy to use, image-based black box GUI automation tool that creates robust automated scripts and exercises applications in the same way as would an end-user. T-Plan Robot is platform-independent (Java) and runs on, and automates all major systems such as Windows, Mac, Linux and Unix plus mobile platforms. ...
    Starting Price: $400/month/user
  • 19
    VirtualMetric

    VirtualMetric

    VirtualMetric

    VirtualMetric is a powerful telemetry pipeline solution designed to enhance data collection, processing, and security monitoring across enterprise environments. Its core offering, DataStream, automatically collects and transforms security logs from a wide range of systems such as Windows, Linux, MacOS, and Unix, enriching data for further analysis. By reducing data volume and filtering out non-meaningful logs, VirtualMetric helps businesses lower SIEM ingestion costs, increase operational efficiency, and improve threat detection accuracy. The platform’s scalable architecture, with features like zero data loss and long-term compliance storage, ensures that businesses can maintain high security standards while optimizing performance.
    Starting Price: Free
  • Previous
  • You're on page 1
  • Next