Search Results for "military grade encryption"

Showing 4 open source projects for "military grade encryption"

View related business solutions
  • OpManager the network monitoring software used by over 1 million IT admins Icon
    OpManager the network monitoring software used by over 1 million IT admins

    Network performance monitoring, uncomplicated.

    ManageEngine OpManager is a powerful network monitoring software that provides deep visibility into the performance of your routers, switches, firewalls, load balancers, wireless LAN controllers, servers, VMs, printers, and storage devices. It is an easy-to-use and affordable network monitoring solution that allows you to drill down to the root cause of an issue and eliminate it.
    Learn More
  • Tremendous is the global payouts platform for businesses sending gift cards and money at scale. Icon
    Tremendous is the global payouts platform for businesses sending gift cards and money at scale.

    Getting started is simple: add a funding method and place your first order in minutes.

    Trusted by 20,000+ leading organizations, Tremendous has delivered billions of rewards and enables businesses to reach recipients across 230+ countries and regions. Recipients have 2,500+ payout options to choose from, including gift cards, prepaid cards, cash transfers, and charitable donations.
    Learn More
  • 1
    Leashmore

    Leashmore

    Leashmore is an open-source Operations Management Software

    Leashmore is an open-source "Operations Management Software" distributed under the MIT License. It employs military-grade encryption alongside sophisticated integrity verification feature to ensure data security. You can freely modify and distribute copies and any modifications of the Leashmore. You can use Leashmore in commercial applications. GitHub page with the source code and the user guide can be found at https://github.com/Northstrix/Leashmore Leashmore requires .NET 6.0 https://dotnet.microsoft.com/en-us/download/dotnet/6.0 V1.0.1 - Added the missing integrity/authenticity verification feature Made with the help of the ChatGPT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SipLine

    SipLine

    Free, native Windows SIP softphone with HD audio, SRTP encryption

    SipLine is a modern, lightweight SIP softphone for Windows 10/11 built with .NET 9 WPF. It provides enterprise-grade VoIP communication with a focus on performance, security, and extensibility. Features Ultra-Fast: Startup in <0.5s, minimal CPU usage HD Audio: Opus and G.711 codecs with adaptive jitter buffer Security: TLS transport, SDES-SRTP encryption, Windows DPAPI credential protection Multi-Account: Up to 5 simultaneous SIP accounts Plugin SDK: C# SDK for custom integrations (CRM, call recording, automation) Plugin Marketplace: Community and premium extensions Headset Support: Jabra, Poly, Sennheiser, Logitech with HID controls Call Quality: Real-time MOS Score, Jitter, Packet Loss and RTT monitoring Enterprise: Silent MSI installer, GPO support, JSON centralized config Compatibility: 3CX, Asterisk, FreePBX, OVH, Twilio, RingCentral, and more Language packages : https://sipline.feelautom.fr/languages
    Downloads: 14 This Week
    Last Update:
    See Project
  • 3
    Eluvium Data Encryption Software

    Eluvium Data Encryption Software

    DATA PROTECTION SOLUTION FOR A SAFER WORLD

    Eluvium is an easy to use encryption software that uses 256-bit military grade encryption to protect your private files and prevent them from being modified, read or even theft. Protect all your sensitive personal and commercial information including your photos, credit card data, tax returns or any other private document. Eluvium, don't require an internet connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    FilterDriver

    File activities monitor and file access control, file encryption

    A.File and Folder Monitoring Monitor Windows file I/O activities in real time, track the file access and changes, monitor file and folder permission changes, audit who is writing, deleting, moving or reading files, report the user name and process name, get the user name and the ip address when the Windows file server's file is accessed by network user. B.File Access Control and Security Control Control Windows file I/O activities in real time, intercept the file system call, modify...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dragonfly | An In-Memory Data Store without Limits Icon
    Dragonfly | An In-Memory Data Store without Limits

    Dragonfly Cloud is engineered to handle the heaviest data workloads with the strictest security requirements.

    Dragonfly is a drop-in Redis replacement that is designed for heavy data workloads running on modern cloud hardware. Migrate in less than a day and experience up to 25X the performance on half the infrastructure.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB