Other Useful Business Software
SIEM | API Security | Log Management Software Icon
SIEM | API Security | Log Management Software

AI-Powered Security and IT Operations Without Compromise.

Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More
Securely stream and govern industrial data to power intelligent operations with agentic insights. Icon
Securely stream and govern industrial data to power intelligent operations with agentic insights.

For IoT Developers, Solution Architects, Technical Architects, CTOs, OT/IT Engineers

Trusted MQTT Platform — Fully-managed and cloud-native MQTT platform for bi-directional IoT data movement.
Learn More
Haystack is a modern, engaging, and intuitive intranet platform that employees actually use. Icon
Haystack is a modern, engaging, and intuitive intranet platform that employees actually use.

You Deserve the Best Intranet Experience

With customizable iOS and Android mobile apps, Slack and Microsoft Teams integrations, and an intuitive design employees love, Haystack brings an outstanding digital employee experience to your entire workforce, no matter where their work takes them.
Learn More
DeskTime is a cloud-based time tracking software Icon
DeskTime is a cloud-based time tracking software

DeskTime is best for medium to large companies, as well as freelancers who want to boost productivity without overworking.

DeskTime is a high-performance, automated time tracking and workforce management solution for teams and freelancers. It runs silently in the background, logging computer activity from the moment of boot-up to ensure 100% accurate data without the need for manual timers.
Learn More
DriveStrike: Remote Wipe | Data Breach Protection Icon
DriveStrike: Remote Wipe | Data Breach Protection

. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Learn More

Additional Details for RSS Guard

Operating Systems

Linux, Mac, Windows

Programming Language

C++

Registered

2024-09-17

Last Updated

Categories

RSS Feed Readers, Podcast

Maintainers

sf-editor1

Keep Me Updated!