Results for: granular

54 Products for "granular" with 1 filter applied:

  • 1
    groundcover

    groundcover

    groundcover

    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity. 100% visibility, all the time. ...
    Starting Price: $20/month/node
    View Software
    Visit Website
  • 2
    Control D

    Control D

    Control D

    ... - Block malicious threats - Block unwanted types of content network wide (ads & trackers, IoT telemetry, adult content, socials, and more) - Deploy in minutes on fleets of devices using RMM - Manage clients using sub-organizations - Gain visibility on network events and usage patterns, with client level granularity - Re-route traffic via proxies (through DNS) for improved privacy and security - Enjoy superior UX and simplicity Think of it as your personal Authoritative DNS resolver for the entire Internet that gives you granular control over what domains get resolved, redirected or blocked.
    Leader badge
    Starting Price: $2/month
    View Software
    Visit Website
  • 3
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. ...
    View Software
    Visit Website
  • 4
    OpenText Server Backup
    ...The platform delivers VMware and Hyper-V protection with RTOs as low as two minutes, Microsoft application data recovery to fully functional states, and granular restores to files, folders, or VMs.
  • 5
    MissionKontrol

    MissionKontrol

    MissionKontrol

    Fully configurable tables with granular controls. Allow your internal users to view, full text search, edit, delete and add records to tables in your systems. Fully configurable tables with granular controls. Allow your internal users to view, full text search, edit, delete and add records to tables in your systems. Text search quickly finds all instances of a word, number or date in a table.
  • 6
    Zentry

    Zentry

    Zentry Security

    ...Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.
  • 7
    Nagios Network Analzyer

    Nagios Network Analzyer

    Nagios Enterprises

    ...Users can easily drill down to see specific information on individual IPs, source port, destination port, or any combination thereof. Network Analyzer’s advanced alerting and reporting capabilities provide IT staff with superior awareness of their network. Highly granular, down-to-the-packet data can be accessed and archived for further tracking and analysis.
    Starting Price: $1995.00
  • 8
    Authress

    Authress

    Rhosys

    ...You risk compromising your user data, non-compliance with local regulations, and massive business losses. * Secure authorization API--Instead of building your own authorization logic, call our API * Granular permissions--Define multiple levels of access and group them by user roles. As granular as you want * Identity Provider integrations--Plug in any of your preferred ID providers with a simple API call. * SSO and full user management
    Starting Price: $1.10 per month
  • 9
    Databay

    Databay

    Databay

    Databay is a residential proxy service that offers users access to a vast network of 7 million static or rotating proxies, available in both HTTP and SOCKS5 formats. Users have the flexibility to specify their desired location at various granularities: from continent, country, and state to city, postal code, ASN, and even GPS coordinates. Databay's platform is designed to be user-friendly, enabling users to easily manage their proxy connections. This service is particularly beneficial for those needing broad and geographically diverse internet access for their data requirements...
    Starting Price: $2.8
  • 10
    ManageEngine ADAudit Plus
    ...AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 11
    Reemo

    Reemo

    Reemo

    ...From remote desktops (Remote Desktop + Remote Support) to virtualized environments (DaaS/VDI), web and business applications (RBI, third-party access, legacy apps), and even the most sensitive environments (restricted distribution and Bastion)... Reemo provides unified, granular, and auditable access, and is ISO 27001 and SOC 2 certified across its entire scope of operations.
  • 12
    FerrumGate

    FerrumGate

    FerrumGate

    FerrumGate is an Open source Zero Trust Network Access (ZTNA) project, that uses advanced identity and access management technologies to ensure secure access to your network and applications. With multi-factor authentication, continuous monitoring, and granular access controls. You can use it for Secure remote access, Cloud security, Privileged access management, Identity and access management, Endpoint security, IOT connectivity.
  • 13
    UTunnel VPN and ZTNA
    ...It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 14
    ElephantDrive

    ElephantDrive

    ElephantDrive

    ElephantDrive delivers cloud backup for Network-Attached Storage (NAS) devices, as well as laptops, desktops, servers, and mobile devices. The solution not only delivers granular backup software that protects files in the cloud but also synchronizes across devices. ElephantDrive features the Everywhere Folder that enables users to store data and sync it to all of their other devices. ElephantDrive enables users to revert back to an older version of a stored file with the Versioning Control feature. ...
    Starting Price: $10 per month
  • 15
    COSGrid MicroZAccess

    COSGrid MicroZAccess

    COSGrid Networks

    ...Highlights: Peer to Peer Overlay model for improved privacy and performance Flexible Deployment - Host/Workload Agent & Gateway approach Integrated Device Trust and Superior Identity MFA based Access Super Simple to Deploy and Manage Platform approach for Comprehensive Security - Support in SD-WAN and SASE Stateful device compliance checks before, and during, a connection Granular policy enforcement
    Starting Price: ₹300 per user
  • 16
    NEXAVAULT

    NEXAVAULT

    Office Infosystems

    ...AI-powered document classification and summary. Preserve version histories and restore previous versions with ease. Prevent data loss and maintain a full audit trail of changes. Granular Access Control. Set permissions at the document and folder level. Control who can view, edit, delete, or share files. Manage your documents from anywhere with an intuitive mobile app. Scan and upload documents on the go. Instantly review and approve files from your mobile device. Ensure data availability and redundancy across environments. ...
    Starting Price: $12/month/user
  • 17
    Generis CARA
    ...That’s our the secret ingredient for creating leading solutions across a dozen industries specific to our customers’ requirements. But don’t worry, we also offer Out of the Box solutions tailored by decades of experience. Granular, category-based security down to the document, group, and user level. Our security allows for complex conditional rules based on any piece of metadata. This means that if you can define a rule, it can be created in CARA.
  • 18
    Ultimaker Cura
    ...Intent profiles print specific applications at the click of a button. Recommended profiles tested for thousands of hours ensure reliable results. ‘Custom mode’ gives over 400 settings for granular control. Regular updates constantly improve features and printing experience​. If you own a 3D printer, software matters. Get the most from your printer with software designed to suit your workflow. Manufacturing doesn’t need to be complicated. We design our software so anyone can use it – both experienced or rookie 3D printer users.
  • 19
    Apache RocketMQ

    Apache RocketMQ

    Apache Software Foundation

    ...Stream computing engine that provides light weight, high scalability, high performance and rich functions. Rich message type support and message governance methods to meet serverless application scenarios with message granularity load balancing. Apache RocketMQ has been widely adopted by many enterprise developers and cloud vendors due to its simple architecture, rich business functions, and strong scalability.
  • 20
    Fasoo Enterprise DRM
    Fasoo Enterprise DRM (FED) is an advanced data-centric security solution designed to protect sensitive information at rest, in transit, and in use. With granular permission control, organizations can define and enforce user-specific access rights to ensure only authorized personnel can view or edit sensitive files. Centralized policy management simplifies the enforcement of consistent security policies across the organization, reducing administrative overhead. FED’s enhanced monitoring capabilities provide real-time visibility into file usage, allowing businesses to identify risks, prevent unauthorized access, and maintain control over their data. ...
  • 21
    MaxPatrol

    MaxPatrol

    Positive Technologies

    ...Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. ...
  • 22
    rkt

    rkt

    Red Hat

    ...The core execution unit of rkt is the pod, a collection of one or more applications executing in a shared context (rkt's pods are synonymous with the concept in the Kubernetes orchestration system). rkt allows users to apply different configurations (like isolation parameters) at both pod-level and at the more granular per-application level. rkt's architecture means that each pod executes directly in the classic Unix process model (i.e. there is no central daemon), in a self-contained, isolated environment. rkt implements a modern, open, standard container format, the App Container (appc) spec, but can also execute other container images, like those created with Docker.
  • 23
    distcc

    distcc

    distcc

    ...Distcc supports cross-compilation environments, SSH tunneling for secure clusters, blacklisting of unreliable servers, and integration with build systems like Make, CMake and Ninja. Monitoring tools provide real-time statistics on job distribution and throughput, and compatibility with compilation databases (compdb) enables granular control over distributed workloads.
    Starting Price: Free
  • 24
    Barracuda Application Protection
    ...Additionally, it includes a hardened SSL/TLS stack for secure HTTPS front-end, built-in content delivery network (CDN) for optimized performance, and integration with various authentication services for granular access control. Barracuda Application Protection simplifies application security by providing a unified solution that is easy to deploy, configure, and manage.
  • 25
    Akamai Guardicore Segmentation
    Akamai Guardicore Segmentation simplifies segmentation, reduce your attack surface and prevent lateral movement with fast and simple segmentation that works everywhere. Granular visibility and segmentation controls for Data Center, Cloud and Hybrid Cloud Environments. The Akamai Guardicore Segmentation Platform is the simplest and most intuitive way to visualize activity in data center and cloud environments, implement precise segmentation policies, protect against external threats, and detect possible breaches quickly. ...
  • 26
    Chart.js

    Chart.js

    Chart.js

    ...Chart.js is a community-maintained project, contributions welcome! Visualize your data in 8 different ways, each of them animated and customizable. Redraws charts on window resize for perfect scale granularity. Includes new chart axis types.
    Starting Price: Free
  • 27
    DataSort

    DataSort

    Inventale

    ...The solution started as a custom project for one of our UAE clients, but due to high demand further developed into a full-scale product that helps different businesses to answer important questions and solve principal tasks such as: — launch of granular targeted ad campaigns; — finding the best location for opening a business unit; — identification of best locations for placing outdoor banners and so on.
    Starting Price: $50,000
  • 28
    MongoDB Compass
    ...Filter the documents within your collection using intuitive query operators that correspond to expressions in other languages. Sample, sort, and modify results with high granularity. Add new indexes and remove underperforming ones to optimize queries, monitor real-time server and database metrics, investigate performance issues with the visual explain plan, and more.
    Starting Price: Free
  • 29
    GradedBlue

    GradedBlue

    GradedBlue

    ...It monitors the performance of every job on the render farm and intelligently distributes rendering capacity across the system. Monitor each frame in real-time with the render dashboard. Use granular access controls to manage who can manage and download renders. Shared renders don't change cost or performance. Confidently render long-term projects with automatic Blender bugfixes. Only pay for the frames you render, not for storage or downloads. Pause your renders at any time to cut costs, only pay for completed frames.
    Starting Price: $2.56 per render hour
  • 30
    PromptX

    PromptX

    VE3 Global

    ...Adaptive prompts, split-chat pathways, collaborative workspaces, and agent automations streamline workflows. Deployed across any cloud or hybrid environment, PromptX integrates any LLM or external search engine, PromptX scales to any enterprise, all while providing granular permissions, SSO, audit trails, and built-in AI governance.
  • Previous
  • You're on page 1
  • 2
  • Next