We help you deliver Virtual and Hybrid Events using our Award Winning end-to-end Event Management Platform
Designed by event planners for event planners, the EventsAIR platform gives you the ability to manage your event, conference, meeting or function with
EventsAIR have been anticipating and responding to the ever-changing event industry needs for over 30 years, providing innovative solutions that empower event organizers to create successful events around the globe.
Learn More
Business password and access manager solution for IT security teams
Simplify Access, Secure Your Business
European businesses use Uniqkey to simplify password management, reclaim IT control and reduce password-based cyber risk. All in one super easy-to-use tool.
Cross-platform code editor, with syntax highlight for 300+ languages. Has lite interface with tabs. Has JSON config files instead of the options dialog. Supports Python extensions. Documentation wiki: http://wiki.freepascal.org/CudaText
Yet another scripting language
Main features:
- Pointers
- Structures
- Objectoriented programming (yet to come)
- code in plain english
- easy to learn (based on C, C++, Java, Pascal, Python, Lua)
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
RUG is an universal machine-friendly binary file generator. Together with suitable macro packages, it can be used to assemble executables for almost any known processor. The main goal is to build a backend for a future Scheme translator.