Quality and compliance software for growing life science companies
Unite quality management, product lifecycle, and compliance intelligence to stay continuously audit-ready and accelerate market entry
Automate gap analysis across FDA, ISO 13485, MDR, and 28+ regulatory standards. Cross-map evidence once, reuse across submissions. Get real-time risk alerts and board-ready dashboards, so you can expand into new markets with confidence
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
LuaSofia is a Lua binding of Sofia-Sip library. Sofia-SIP is an open-source SIP User-Agent library, compliant with the IETF RFC3261 specification. We decided to use git, source code can be get at: git://github.com/ppizarro/luasofia.git
Tiny Box is a free Direct Connect server completely written in lua code and based on the Lua AIO Distribution available at http://luaaio.luaforge.net/.
Streaming isolated remote applications and desktops to the browser
Building effective anti-phishing, anti-malware and ransomware defenses has never been easier. Kasm’s isolation technology insulates users by creating a "chasm" between the user's personal computer and web-borne threats.