Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Flow-Like is a locally-operated, open-source workflow automation engine that emphasizes strong typing and allows users to build and execute automation and AI workflows in environments that are self-hosted or offline. By integrating visual, graph-based workflows with deterministic execution, it simplifies the complexities often associated with system maintenance and validation. In contrast to various other tools that depend on untyped JSON, cloud-exclusive backends, or obscure runtime processes, Flow-Like prioritizes explicit and inspectable data flow and execution. This versatility enables workflows to function seamlessly on local machines, private servers, within containers, or on Kubernetes without altering their intended behavior. Built in Rust, the core runtime is optimized for safety, performance, and portability, ensuring it meets high standards. Flow-Like also accommodates event-driven automation, data processing, document ingestion, and AI pipelines, which include typed agent and retrieval-augmented generation (RAG) workflows, utilizing either local or cloud-based models. Ultimately, it is crafted for developers and organizations seeking dependable automation while maintaining comprehensive control over both their data and underlying infrastructure, thereby fostering an environment of transparency and reliability.
Description
The core of TecSec’s Constructive Key Management® (CKM®) system has undergone a rebranding! In a rapidly evolving market that is increasingly aware of security solutions, standards, and products, TecSec has decided to rename its foundational technology to prevent any potential confusion between the CKM standard and CKM® the product. The CKM® Runtime Environment (RTE) is now officially recognized as OpaqueVEIL®, which serves as the foundation for the VEIL® suite of products. Similar to its predecessor, the VEIL® suite utilizes patented and standards-compliant cryptographic key management technology, ensuring robust information security and access control through advanced cryptography. OpaqueVEIL®, which is integral to all CKM Enabled® products, consists of a set of software components necessary for implementing CKM technology effectively. By obscuring the intricate details of cryptography and key management, OpaqueVEIL® enables users to achieve straightforward and programmer-friendly results, thereby enhancing usability in security applications. This change aims to clarify the distinction between the product and the standard, reinforcing TecSec’s commitment to innovation and clarity in the ever-competitive security landscape.
API Access
Has API
API Access
Has API
Screenshots View All
No images available
Integrations
No details available.
Integrations
No details available.
Pricing Details
$9.99/month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
TM9657 GmbH
Website
great-co.de
Vendor Details
Company Name
TecSec
Country
United States
Website
www.tecsec.com
Product Features
Workflow Management
Access Controls/Permissions
Approval Process Control
Business Process Automation
Calendar Management
Compliance Tracking
Configurable Workflow
Customizable Dashboard
Document Management
Forms Management
Graphical Workflow Editor
Mobile Access
No-Code
Task Management
Third Party Integrations
Workflow Configuration
Product Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection