Best Portus Alternatives in 2024
Find the top alternatives to Portus currently available. Compare ratings, reviews, pricing, and features of Portus alternatives in 2024. Slashdot lists the best Portus alternatives on the market that offer competing products that are similar to Portus. Sort through Portus alternatives below to make the best choice for your needs
-
1
Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
-
2
Securden Endpoint Privilege Manager
Securden
Identify and populate all local administrator accounts on endpoints across your IT network. Eliminate local administrators and prevent malware and ransomware propagation in your network. Replace privileges with a seamless permission based system for smooth employee experience. Discover and add applications that require elevated privileges to run automatically. Whitelist and blacklist applications using comprehensive application control policies. Enforce principle of least privilege and principle of zero-trust across the organization. Comply with industry regulations with complete audit trails and record all activities. Track application usage across the organization using comprehensive reports and gain insights that help you with creating policies for smoother experience. -
3
Container Registry
8gears
$49 per monthContainer Registry Service based in Harbor for individuals, teams, and Software Vendors looking for ways to distribute software in container images. -
4
Container Registry allows you to manage Docker images, perform vulnerability scanning and determine who has access to what resources. All this in one place. You can quickly set up fully automated Docker pipelines using existing CI / CD integrations. In minutes, you can access private and secure Docker image storage via Google Cloud Platform. You can control who can view, download and access images. Google security ensures consistent uptime for a secure infrastructure. When you commit code to Cloud Source Repositories (GitHub, Bitbucket, or Bitbucket, you can automatically build and push images to the private Registry. Cloud Build integration makes it easy to configure CI/CD pipelines or deploy directly via Google Kubernetes Engine or App Engine, Cloud Functions or Firebase.
-
5
Docker eliminates repetitive, tedious configuration tasks and is used throughout development lifecycle for easy, portable, desktop, and cloud application development. Docker's complete end-to-end platform, which includes UIs CLIs, APIs, and security, is designed to work together throughout the entire application delivery cycle. Docker images can be used to quickly create your own applications on Windows or Mac. Create your multi-container application using Docker Compose. Docker can be integrated with your favorite tools in your development pipeline. Docker is compatible with all development tools, including GitHub, CircleCI, and VS Code. To run applications in any environment, package them as portable containers images. Use Docker Trusted Content to get Docker Official Images, images from Docker Verified Publishings, and more.
-
6
Red Hat Quay
Red Hat
Red Hat® Quay container registry provides storage that allows you to build, distribute and deploy containers. Automated authentication, authorization, and authorization systems give you more control over your image repositories. Quay can be used with OpenShift as a standalone component or as an extension to OpenShift. Multiple identity and authentication providers can be used to control access to the registry, including support for organizations and teams. To map to your organization structure, use a fine-grained permissions scheme. Transport layer security encryption allows you to transit between Quay.io servers and Quay.io. Integrate with vulnerability detectors like Clair to automatically scan container images. Notifications will alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Track API and UI actions to audit your CI pipeline. -
7
Oracle Cloud Infrastructure Container Registry, an open-standards-based, Oracle-managed Docker registry service that securely stores and shares container images, is managed by Oracle. Engineers can easily push or pull Docker images using the familiar Docker Command Line Interface, (CLI), and API. Registry is able to support container lifecycles by working with Container Engine for Kubernetes Identity and Access Management (IAM), Visual Builder Studio and third-party developers and DevOps tools. Docker images and containers repositories can be managed using the familiar Docker CLI commands, and Docker HTTP API Version 2. Oracle manages the service's operation and patching so developers can concentrate on building and deploying containerized apps. Container Registry, which is built using object storage, provides high data durability and high service availability. It also supports automatic replication across fault domains. Oracle does not charge extra for this service. Users only pay for the storage and network resources they use.
-
8
Dist
Dist
$39 per monthHigh availability and super-fast artifact repositories, container registries, that keep your customers, developers, and operations teams productive and happy. Dist is the easiest and most reliable way for Docker containers images and Maven artifacts to be securely distributed across your team, systems, customers, and employees. Our edge network is purpose-built to ensure optimal performance wherever your customers and team are. Dist is completely managed in the cloud. We manage operations, maintenance, backups, so you can concentrate on your business. You can restrict access to repositories by users or groups. Access tokens allow each user to further compartmentalize their access. All artifacts, containers images, and metadata are encrypted in transit and at rest. -
9
Azure Container Registry
Microsoft
$0.167 per dayWith an OCI distribution fully managed and geo-replicated, you can create, store, secure and scan container images and artifacts. Connect across Azure services such as Azure Kubernetes Service, Azure Red Hat OpenShift and Batch. Geo-replication allows you to efficiently manage multiple registry locations. OCI artifact repository to add helm charts, singularity support and new OCI-supported formats. Automated container building, patching, and updates of base images. Task scheduling. Integrate security with Azure Active Directory (AzureAD) authentication, role-based control, Docker content trusted, and virtual network integration. Azure Container Registry Tasks streamlines the process of building, testing and pushing images to Azure. -
10
Yandex Container Registry
Yandex
$0.012240 per GBDocker images are stored in fault-tolerant storage. All data is replicated automatically. Each replica changes when Docker Images are edited, deleted, or created. The service offers containers for Linux and Windows OS. You can run them on your local machine, or on a Yandex Compute Cloud virtual machine. Docker image registry is hosted in the same data center as your cloud infrastructure. This allows for high-speed Docker operations without external traffic costs. Docker images are transmitted over HTTPS. You decide who can view, download, push or delete them. You use a Docker Image and we maintain the infrastructure where your registry runs. You only pay for space used by your Docker image. The service is available via the management interface, command line interface, API, or standard Docker CLI. It is compatible with the Docker Registry HTTP API V2. -
11
You can store and distribute container images in a private registry that is fully managed. Push private images to run them in the IBM Cloud®, Kubernetes Service or other runtime environments. Images are checked for security issues to help you make informed decisions about your deployments. To use the command line, install the IBM Cloud Container Registry CLI. This will allow you to manage your namespaces and Docker images in IBM Cloud®. The IBM Cloud console provides information about vulnerabilities and security of images in the IBM Cloud Container Registry private and public repositories. You can check the security status of container image that have been added to your registry namespace by third parties, IBM, or by your organization.
-
12
Tencent Container Registry
Tencent
Tencent Container Registry (TCR), offers high-performance, secure container image hosting and distribution services. To reduce bandwidth and time, you can create dedicated instances in multiple locations around the world and pull container images from your nearest region. TCR offers data security with granular permission management. Access control is also available. It supports P2P accelerated distributed to break the performance bottleneck caused by concurrent pulling large images by large-scale clusters. This will allow you to quickly expand and update your business. TCR can be customized to set up image synchronization rules. You can also use TCR with your existing CI/CD workflows to quickly implement container DevOps. TCR instance supports containerized deployment. To manage sudden spikes in business traffic, you can dynamically adjust your service capability based upon actual usage. -
13
JFrog Container Registry
JFrog
$98 per monthThe world's most powerful and advanced hybrid Docker/Helm registry. Your Docker world will be powered without limitations. The JFrog Container Registry supports Docker containers and Helm Chart repositories to support your Kubernetes deployments. It is your single point of access to manage and organize Docker images. JFrog integrates with your build ecosystem to provide reliable, consistent, and efficient access for remote Docker container registryies. You can develop and deploy your own way. Your current and future business models are supported with self-hosted, hybrid, multi-cloud, on-prem, self-hosted, hybrid, as well as multi-cloud environments. You can choose from AWS, Microsoft Azure, or Google Cloud. JFrog Artifactory's track record of reliability, power, and stability allows you to deploy Docker images easily and give your DevOps teams full control over access rights and permissions. -
14
Alibaba Cloud Container Registry
Alibaba Cloud
$113 per monthContainer Registry allows you manage images throughout their entire lifecycle. It allows for secure image management, stable image creation across global regions, as well as easy image permission management. This service makes it easy to create and maintain an image registry. It also supports image management in multiple locations. Container registry, when combined with other cloud services like container service, provides an optimized solution to using Docker in cloud. This URL provides an intranet URL to the image repository for each area. This URL can be accessed to download images without the need for traffic. It builds services automatically in areas outside of China and in stages. It allows you to scan images and generate multi-dimensional vulnerability reports. It provides a Docker-based continuous integration solution and continuous delivery. The service is easy to use and requires little maintenance. -
15
Mirantis Secure Registry
Mirantis
Public container registries are hosted out in the open, while many private registries operate from providers’ clouds. Mirantis Secure Registry works where you need it—including on your clusters themselves, putting you back in control. Mirantis Secure Registry is an enterprise-grade container registry that can be easily integrated with standard Kubernetes distributions to provide the core of an effective secure software supply chain. Role-based access control Integrate with internal user directories to implement fine-grained access policies. Synchronize multiple repositories for separation of concerns from development through production. Image scanning Continuously scan images at the binary level and check against a regularly updated CVE vulnerability database. Image signing Developers and CI tools can digitally sign contents and publishers of images, so downstream users and automation tools can verify image authenticity before running. Caching and mirroring Mirror and cache container image repositories to avoid network bottlenecks and make images available across multiple sites for distributed teams and production environments. Image lifecycle Automatically clean up images based on policy controls. -
16
You can easily store, share, or deploy container software anywhere. You can push container images to Amazon ECR, without having to install or scale infrastructure, and you can pull images from any management tool. Hypertext Transfer Protocol Secure (HTTPS), which provides access controls and automatic encryption, allows you to share and download images securely. You can access and distribute your images quicker, reduce download times, improve availability, and use a scalable and durable architecture to increase availability. Amazon ECR is a fully managed container registry that allows you to reliably deploy artifacts and application images anywhere. You can meet your organization's image compliance security needs using insights from the Common Vulnerability Scoring System and Common Vulnerability Exposures (CVEs). You can publish containerized applications using a single command. This will allow you to easily integrate your self-managed environments.
-
17
Harbor
Harbor
Harbor is an open-source container registry that focuses on security and compliance. It enhances the basic functionality of a Docker registry by adding features like: Vulnerability Scanning: Checks images for known security weaknesses before deployment. Role-Based Access Control: Manages who can access and modify images based on roles and permissions. Image Signing: Digitally signs images to ensure authenticity and prevent tampering. Replication: Enables syncing images between multiple Harbor instances for disaster recovery or distributed deployment. Harbor is not a silver bullet for all container security challenges, but it addresses a crucial aspect: protecting your images from vulnerabilities and ensuring they're used in a controlled manner. It's particularly beneficial for organizations with strict security and compliance requirements. -
18
Nexus Repository Pro
Sonatype
Manage binaries and create artifacts throughout your software supply chain. All components, binaries and artifacts are available from one source. Distribute parts and containers efficiently to developers. More than 100,000 organizations worldwide have used this product. Distribute Maven/Java components, npm and NuGet, Helm and Docker, OBR, APT and GO, R components, and many more. From dev to delivery, manage components: binaries and containers, assemblies, and finished products. Advanced support for Java Virtual Machine (JVM), including Gradle, Ant and Maven, as well as Ivy. Compatible with Eclipse, IntelliJ and Hudson, Jenkins, Puppets, Puppets, Chef, Docker and many other popular tools. High availability and innovation available 24x7x365. One source of truth for all components throughout your software development lifecycle, including QA, staging, operations. Integrate with existing user access provisioning systems such as LDAP, Atlassian Crowd and more. -
19
Slim.AI
Slim.AI
Connect your private registries easily and share images with the team. To find the right container image to fit your project, browse the largest public registries in the world. Software security is impossible if you don't know what's inside your containers. The Slim platform removes the veil from container internals, allowing you to analyze, optimize, compare, and compare changes across multiple versions or containers. DockerSlim is an open-source project that automatically optimizes container images. You can eliminate dangerous or bulky packages so that you only ship what you need. Learn how the Slim platform can help you and your team automatically improve security and software supply chain security, tune containers to ensure development, testing, production, and shipping secure container-based apps to cloud. The platform is free to use and accounts are available for no cost. We are container enthusiasts, not salespeople. Therefore, we understand that privacy and security are fundamental principles of our business. -
20
The Cloud that makes sense. Scaleway is the foundation for digital success. Cloud platform for developers and growing companies. Everything you need to build, deploy, and scale your cloud infrastructure. You can compute, GPU, bare metal, and containers. Managed & Evolutive Storage. Network. IoT. You have the largest selection of dedicated servers available to help you succeed in the most challenging projects. Web Hosting with high-end dedicated servers. Domain Names Services. Our cutting-edge expertise allows you to host your hardware at our high-performance, secure data centers. Private Suite & Cage Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway has 6 data centers in Europe, and offers cloud solutions for customers in over 160 countries. Our Excellence team: Experts at your side 24/7. Learn how we can help our customers tune, optimize and use their platforms with skilled experts
-
21
JFrog Platform
JFrog
$98 per monthFully automated DevOps platform to distribute trusted software releases, from code to production. DevOps projects can be onboarded with users, resources, and permissions to speed up deployment frequency. Fearlessly update by proactive identification of open-source vulnerabilities and violations of license compliance. Your enterprise can achieve zero downtime in its DevOps pipeline by using High Availability and active/active Clustering. You can manage your DevOps environment using out-of-the box ecosystem and native integrations. Enterprise ready with a choice of cloud, multi-cloud, hybrid, and on-prem deployments that scale with you. You can ensure speed, reliability, and security for IoT software updates. Device management at scale. You can create new DevOps project in minutes. And you can easily onboard resources, team members and storage quotas to code faster. -
22
Wise Registry Cleaner
WiseCleaner
$29.95 one-time paymentRegistry junks can be removed, Windows registry errors fixed, and Windows registry defragmentation performed regularly to keep your computer running at its best. This feature is great for computers that are used daily by multiple people, such as computers at home that are shared with family members and public computers in public places. Administrators can scan and clean all user's registries at once. To scan and fix registry problems, you don't need to log in for each account. Windows keeps growing, so the registry becomes more complex. This could lead to performance degradation or even a crash. Wise Registry Cleaner scans your Windows registry to find errors and residual items and then cleans and defrags them. Your system will run more smoothly and faster if you fix corrupted or residual items in the Windows Registry. -
23
GitLab
GitLab
$29 per user per month 14 RatingsGitLab is a complete DevOps platform. GitLab gives you a complete CI/CD toolchain right out of the box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered in one application. It fundamentally changes the way Security, Development, and Ops teams collaborate. GitLab reduces development time and costs, reduces application vulnerabilities, and speeds up software delivery. It also increases developer productivity. Source code management allows for collaboration, sharing, and coordination across the entire software development team. To accelerate software delivery, track and merge branches, audit changes, and enable concurrent work. Code can be reviewed, discussed, shared knowledge, and identified defects among distributed teams through asynchronous review. Automate, track, and report code reviews. -
24
Auslogics Registry Cleaner
Auslogics
$29.95 per yearRegistry Cleaner removes invalid entries from Windows® registry with just one click. Registry Cleaner will clean, optimize, and repair your Windows registry. This will eliminate errors and crashes and restore smooth and stable operation so your computer will no longer give you headaches. It could not be your fault, as often poorly written software code causes problems that do not allow for uninstalls. Auslogics Registry Cleaner can be used to remove registry keys left behind by uninstalled programs. The program will allow you to review corrupt registry entries and remove any that you do not want to keep. The exclusive Auslogics technology has been tested in multiple ways and is recommended by experts. Leading IT magazines and online resources have recognized Auslogics software. -
25
Amazon Verified Permissions
Amazon
$0.00015 per requestAmazon Verified Permissions, a fully-managed authorization service, uses the Cedar policy language that is proven to be correct. This allows you to build more secure applications. Verified Permissions allows developers to build applications faster through the centralization of policy management and externalization of authorization. They can also align authorization in the application with Zero trust principles. Teams from security and audit can better audit and analyze who has access to which applications. Decouple authorization from business logic to accelerate application development. Protect application resources, and manage user access according to the principle of least priviledge. Amazon Verified Permissions provides a managed permissions management service that is Cedar-compatible. It also allows you to fine-grained authorize your applications. Cedar is an expressive, performant and analyzable policy language that allows developers and administrators to define policy-based controls. -
26
PicScout
PicScout
PicScout Platform is an industry-leading registry for owner-identified images. The registry has more than 200 major content providers, and 20,000 photographers. PicScout Platform benefits both content owners as well as users. It allows content owners to make their content visible and more accessible to content users. In turn, it lets content users visually search for images and identify them with ease and efficiency. This is necessary to ensure proper licensing. Use the below free Search By Image tool to search the registry. PicScout's Visual API was created to help you understand and analyze image content. Our image recognition technology is based upon deep learning research and offers a wide variety of capabilities. These include visual search that identifies similar or identical images. Our REST API is user-friendly, scalable, and affordable. -
27
Registry Recycler
Registry Recycler
FreeRegistry Recycler is the tool to answer all your questions if you're looking for a tool that can keep your system running fast and free from lags. Registry Recycler regularly identifies broken threads in your registry database and renovates them. Registry Recycler scans your registry for invalid, damaged, or corrupt registry entries. Unserviceable entries can slow down your computer's performance. This utility will repair your registry to protect it from bad registry data and other threatening errors. It scans your registry in depth to identify and fix any errors in missing reference entries. Registry Recycler is a good choice, as it thoroughly scans the registry and extracts each registry error from it. It also offers additional value-added features such as Startup Management, Defragmenter, and Automatic Backup, which can help improve system performance. Registry Recycler's simple structure and user-friendly interface make it easy to use. -
28
AML Free Registry Cleaner
AML Soft
FreeAML Free Registry Cleaner can be used to clean up your registry. It will clean up and repair Windows registry issues in just a few clicks. This will allow you to have a cleaner and more efficient computer. Windows registry problems are a common reason for crashes and error messages. A detailed startup manager allows you to see which programs are automatically starting with Windows. You can also disable them. AML Free Registry Cleaner can also find and remove junk files that accumulate over time. It comes pre-configured, with 22 types file extensions that can be considered disposable. You can expand the range by adding additional file types. AML Free Registry Cleaner allows you to search the entire registry for specific words. AML Free Registry Cleaner also gives you a complete overview of all running programs and processes. -
29
AWS Service Catalog
Amazon
AWS Service Catalog allows organizations the ability to create and manage a catalog of IT services that can be used on AWS. These IT services can include everything, from virtual machine images, servers, databases, and software to complete multi-tiered application architectures. The AWS Service Catalog allows central management of deployed IT services, as well as your applications, resources, metadata, and metadata. This allows you to maintain consistent governance and comply with your compliance requirements. It also allows users to quickly deploy the IT services they require. Organizations can see the application context for their AWS resources with AWS Service Catalog AppRegistry. To track cost, performance, compliance, and operational status at the app level, you can define and manage your apps and their metadata. -
30
Zoho Vault
Zoho
$1 per month 4 RatingsYou can forget about remembering passwords. Let us do it for you. Zoho Vault, a password manager that protects your passwords and autofills them across all websites and applications, is secure. Vault offers unlimited password storage, seamless autofill, and fine-grained admin controls. Clear security insights into your passwords, both personal and business. You can quickly identify weak passwords and make changes in just a few mouse clicks. Securely store, share, manage, and manage passwords with different access privileges. You can also add documents, notes, credit cards and software licenses to your password vault. You can organize passwords and other confidential information into folders and subfolders to make it easy to manage and share bulk passwords. Users can log in to their daily apps without having to remember passwords. Our catalog supports hundreds of cloud apps and offers options for custom integration. -
31
FDM Platform
Framesoft
Legal or regulatory requirements (e.g. Sarbanes-Oxley Act, Basel II, or business requirements require the safe and secure storage, archival, and exchange of an ever-growing number of documents and content. It allows for the creation of organizational structures and the management of all types electronic files (eFiles). Documents can be tracked, stored, and searched via full-text searches or by assigning keywords based on self-described business rules. FDM allows documents to be accessed, stored and searched in multiple ways, allowing for a seamless integration with the corporate's business environment. Flexible tree-based structure that contains folders and E-Files (Collection documents incl. substructures that share a common profile. Fine-grained authorization privilege system (access management) to manage access to single folders and documents. . -
32
Oracle Container Cloud Service, also known as Oracle Cloud Infrastructure Container Service Classic, offers Operations and Development teams the benefits of Docker containerization for building and deploying applications. Oracle Container Cloud Service: - Provides an easy-to use interface to manage Docker environments - Provides out-of-the box examples of containerized services or application stacks that can all be deployed in just one click - Allows developers to connect to their Docker registries to 'bring their containers' - enables developers to focus on building containerized application images and Continuous Integration/Continuous Delivery (CI/CD) pipelines, not on learning complex orchestration technologies
-
33
Kubescape
Armo
$0/month Kubernetes is an open-source platform that provides developers and DevOps with an end-to-end security solution. This includes security compliance, risk analysis, security compliance and RBAC visualizer. It also scans images for vulnerabilities. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It instantly calculates risk scores and displays risk trends over time. Kubescape is one of the most popular Kubernetes security compliance tools for developers. Its easy-to-use interface, flexible output formats and automated scanning capabilities have made Kubescape one of the fastest growing Kubernetes tools. This has saved Kubernetes admins and users precious time, effort and resources. -
34
RegSofts Free Window Registry Repair
RegSofts
FreeMost Windows users experience a gradual decline in their computer's performance. Windows Registry Errors are a major cause. Windows will run more quickly if you use Free Window Registry Repair frequently and fix any registry issues. It automatically backs up any repairs so that you can always restore Windows registry to its original state. Registry is the heart and soul of every Windows system. It holds information that controls how your computer appears and behaves. Most Windows users experience a gradual decline in their computer's performance. Windows Registry Errors are a major cause. To ensure maximum protection and convenience, we offer free Windows Registry Repair. Any repairs made to the Windows Registry will be automatically backed up by Free Window Registry Repair. You can always restore Windows registry to its original state by using the restore button. -
35
Your website can help people find the information they need. You can add a search box to your website and get fast, relevant results from Google Search. It's powered by Google Search's core search technology, which is constantly improving. This ensures that you always get relevant results. Program your search engine to determine what content it searches for and how it looks. Integrate your search engine on your website quickly. Decide whether you want your search engine to only include your website or other websites. You can choose from a variety of pre-made themes or create your own search results page. You can either pay nothing and earn revenue by showing relevant ads using AdSense or you can pay a low fee for an ad-free experience.
-
36
TweakNow RegCleaner
TweakNow
FreeThe Registry is the heart and soul of any Windows operating system. It controls how Windows behaves and appears. Registry is used by most applications to store configuration and important data. New registry entries are created when you install an application. These registry entries should be deleted when you uninstall the program. It doesn't always work this way. Sometimes, multiple applications fail to delete their registry entries. These entries will eventually become obsolete. Your Windows registry could become obsolete after a long period of time, especially if you have installed and uninstalled many applications. These entries will increase the registry size, which will cause your computer to be slower. Windows will take longer to load, search, or read data from the registry. -
37
Ashampoo Registry Cleaner
Ashampoo
$14.99 one-time paymentWindows Registry is a central database that stores configuration and application settings. This database can become cluttered over time with data leftover from non-installed software. In some cases, entries can even become corrupted. Because so many applications depend on the Registry for information cluttering and data corruption can lead to noticeable performance drops and make your computer feel slow and unresponsive. Windows Registry problems can also cause frequent error messages and problems when uninstalling applications. Ashampoo Registry Cleaner 2, scans your Registry to find and fix invalid, redundant, or corrupt entries. Your overall system speed will improve by cleaning and compacting your Registry. Read operations that target the Registry will run faster. Ashampoo Registry Cleaner 2 offers real-time backups that allow you to undo any modifications with the click of a mouse. -
38
TaraVault
inflectra
$1,079.89 per yearYou are looking for secure, accessible, and safe source code hosting that supports both Subversion and Git code repositories, integrated issue-tracking, ALM, and Git code repositories for your projects. TaraVault is the best choice. TaraVault integrates with our Spira ALM suite for full traceability. Our enterprise-grade Git repository hosting is the heart of TaraVault. Every TaraVault project has its own Git source code repository. Git is the best choice for distributed version control. It is lightning fast and supports disconnected teams and users. Our enterprise-grade Subversion repository hosting is the heart of TaraVault. Every TaraVault project has its own Subversion source code repository. Subversion is the best choice for source code management if you need image file storage or fine-grained access control. -
39
Docker Scout
Docker
$5 per monthContainer images are composed of layers and software packages that are vulnerable to vulnerabilities. These vulnerabilities can compromise security of containers and apps. Docker Scout provides a proactive solution to enhance your software supply chain's security. Docker Scout creates a Software Bill of Materials by analyzing your images. The SBOM is compared to a constantly updated vulnerability database in order to pinpoint security vulnerabilities. Docker Scout is an independent service and platform with which you can interact using Docker Desktop and Docker Hub. You can also use the Docker CLI and the Docker Scout Dashboard. Docker Scout facilitates integrations with other systems, including container registries and CI platform. Discover and analyze the composition of your images. Ensure your artifacts are aligned with supply chain best practice. -
40
Active Roles
One Identity
Simplify identity management with a single pane-of-glass that provides visibility into all Entra ID tenants (Azure Active Directory), Microsoft 365 domains, and Active Directory domains. Dynamic delegation across your identity landscape ensures users and objects are granted fine-grained access when they need it. Automate manual processes for increased efficiency and security, while also accelerating account management, group management, and directory administration. Our Microsoft solution allows you to manage all Active Directory domains (including Azure AD), Entra ID (Azure ID), and Microsoft 365 tenants through a single pane. Automated policies, group families and dynamic rules allow you to control access and permissions. Manage users, groups and roles, contacts, Microsoft 365 licences, objects, and Microsoft 365 licenses with customizable workflows and scripts. Active Roles and AWS Directory Service seamlessly integrate for a zero-trust, least privilege model. Access delegation is also possible, as well as synchronized data on-prem. -
41
SeedDMS
SeedDMS
SeedDMS is a document management system that is free and easy to use. It's suitable for small and medium-sized businesses. It runs on Linux, MacOS, and Windows and is based on PHP or MySQL or sqlite3. It has been developed over many years to be a powerful, enterprise-ready platform for sharing and storing documents. Check out our demo installation before you install SeedDMS on a server. Log in with the username and password 'admin'. The maximum file size allowed for uploading is 5 MB. The database content will be cleared once every few minutes without notice. You can run your own SeedDMS temporarily by starting your own instance at "Play with Docker (PWD). Click the button below to go directly to PWD. Log in with your docker credentials. Fully web-based user interface, user and group management, external authentication, fine grained notifications upon modifications. -
42
Osirium
Osirium
It can be difficult to identify who has access to which systems in the current outsourcing world. The lowest-paid people are often granted the greatest privileges, even though they may not work for your company. Osirium helps to balance this for end-user organisations and uniquely allows MSSPs the ability to manage tens or thousands of account credentials, outsource securely, and keep their clients happy on compliance. These "admin" accounts have the ability to make significant changes to these systems. They can access corporate IP and reveal personally identifiable information (PII), as well as control the work of customers, staff, partners, and other business partners. You should also consider the importance of protecting other accounts, such as corporate Facebook, Instagram, or LinkedIn accounts, as any misuse could result in serious reputational damage. These accounts are no surprise to cyber attackers and are highly prized because they are so powerful. -
43
Apache Sentry
Apache Software Foundation
Apache Sentry™, a system to enforce fine-grained role-based authorizations to data and metadata stored on Hadoop clusters, is called Apache Sentry. Apache Sentry successfully graduated from the Incubator on March 16, 2016 and is now a Top Level Apache project. Apache Sentry is a role-based, granular authorization module for Hadoop. Sentry allows you to set and enforce specific privilege levels on data for authenticated users on a Hadoop cluster. Sentry works with Apache Hive Metastore/HCatalog and Apache Solr. Sentry is a pluggable authorization engine that can be used with Hadoop components. It allows you to define authorization rules that validate access requests to Hadoop resources by users or applications. Sentry is modular and can support authorization for a wide range of data models in Hadoop. -
44
Bing Custom Search
Microsoft
$4 per 1,000 transactions 1 RatingA simple-to-use, ad free, commercial-grade search engine that will deliver the results you desire. Create a search that suits your needs. The Bing Custom Search API provides powerful ranking, a global search index, and document processing in a fast, simple setup. The core technology works in four stages: it identifies on-topic sites and images and provides automatic query suggestions. It then applies the Bing ranker to deliver relevant search results. You can adjust the parameters to access usage insights at any time. Define which parts of the web you wish to draw from, so that users only see relevant results from domains, subsites, or web pages you select. To expand the scope of your search domain, explore site suggestions. To get a complete view of search results and ranking, use Bing's global-scale index. You can create a compelling search experience for web pages, images, or autosuggested keywords. -
45
Agency Suite
Agency Suite
$300 per monthSoftware for talent management and casting agencies. Manage talent, create video castings and share them with others. Send talent packages to clients instantly. Unlimited talent, videos, images, and users at a low monthly price. Free demos and trials. Agency Suite is an all-in-one set of customizable tools that will increase productivity by three times. It is a comprehensive tool that will streamline some of the most time-consuming business processes and keep your company running smoothly. Agency Suite was developed from the ground-up by industry professionals. Our application has been a huge success with our partnership and development of MODELOGIC - a highly successful talent agent based in Richmond VA - as well as other agencies in Chicago IL, Maryland Ohio and North Dakota. A designated Admin can customize the utility with agency branding, color schemes, background, and even create lists and fields. -
46
TeamSlide
Aploris
€140 per user, per yearTeamSlide is a powerful slide manager that allows you to keep PowerPoint slides at your fingertips. Finding a slide can be a tedious task that results in decreased productivity and lower output quality. Ever wonder how certain apps can manipulate PowerPoint files and create slides automatically? Financial services companies, for example, create slides with updated numbers automatically every month. TeamSlide can update slides that are out of date or specific objects on a slide automatically. TeamSlide searches your slide library and matches your search terms to specific slides. This is done by indexing individual slides in the backend and taking a photo of each one. TeamSlide uses the index to search all items (text, images and videos) within your slides. It returns thumbnails of the most relevant slides. -
47
FrameTrail
FrameTrail
FrameTrail is an open-source software that allows you to view, manage, and edit interactive video right from your web browser. FrameTrail allows you to link filmic content, add multimedia documents (e.g. You can add text overlays, images, or interactive maps to specific points. As a basis for synchronization, you can use any video file or an empty video of a specified length. You can place documents on top of the video (e.g. Text, images, web pages, interactive maps, and other documents can be placed on top of the video. You can decide when and how they should appear. You can create non-linear networks of video fragments called Hypervideos that can be navigated freely by the user. You can add additional materials at specific points in time and compare them with annotation timelines from other users. We chose to use a simple technology and self-contained formats to make FrameTrail easy to install, modify, and extend. Everything is file-based (no database). -
48
JetDrive
Abelssoft
€29.90 one-time paymentJetDrive can detect errors on your hard drives and can even fix them automatically if you wish. Do you remember that feeling you had when your computer was new? Everything ran so fast. JetDrive can help you regain that speed. There's a reason your computer slows down over time. JetDrive defragments your drive to restore it to its optimal state. Our registry defragmentation algorithm ensures that defragments do not affect your Registry. Choose which drive you wish to defragment. A memory overview will show you how much memory is left free or occupied. JetDrive by Abelssoft solves the problem, defragments your computer, and optimizes performance. Files are stored in magnetic fields, each sector by sector, on the old hard disks. A gap is created when a file is deleted. It is possible for an issue to arise if the next file that is stored is not exactly the same size as the gap. -
49
Helix TeamHub
Perforce
$1.05/month Your code repository software is where your source code is stored. This could be a Mercurial repository, Git, SVN repository, or a combination of both. Helix TeamHub is able to host your source code repository. You can either add multiple repositories to a single project or create separate projects for each repository. Helix TeamHub can store more than just your code repositories. All of your software assets can be managed and maintained in one place. This includes building artifacts (Maven and Ivy), and Docker container registry registries. Private file sharing via WebDAV repositories is also available. This allows you to access your other binary files. Helix TeamHub can be used alone or in conjunction with Helix Core to provide a single source for truth across all development teams via Helix4Git. You can, for example, keep large binary files in Helix Core and then combine them with Git assets from Helix TeamHub to create a hybrid workspace that achieves high build performance. -
50
Lighter images can speed up your website. Image optimization is for everyone. It's a known fact that web pages get heavier every day. Images are becoming more prominent. You will experience a faster user experience, better SEO and a better speed. You don't need to fine-tune your images anymore, they are automatically optimized. You can reduce the image's weight without sacrificing quality. They will still be beautiful. All your images can be optimized in one click. You can resize your images instantly. You can restore your media to their original formats if you need to. Images are automatically optimized at the chosen compression level.