Suggested Categories:

Web Servers
Web servers, also known as HTTP servers, are servers that host websites and web applications. Web servers are the backbone of all sites and web apps on the internet. Many popular web servers are open source. Different web servers have advantages and disadvantages when compared to one another, and selecting the right one depends on use case, deployment, operating system, and more.
Application Server Software
Application server software provides a platform for deploying, managing, and running applications, typically for web or enterprise environments. These servers handle the backend logic of applications, facilitating the connection between client devices and databases or other services. Application servers often provide middleware services such as security, transaction management, and messaging, enabling the smooth execution of applications. They are designed to support multiple users simultaneously and ensure high availability, scalability, and performance of applications. This software is commonly used in environments where complex, data-intensive applications are developed, such as in e-commerce platforms, enterprise resource planning (ERP), and customer relationship management (CRM) systems.
Proxy Servers
Proxy servers act as intermediaries between a user's device and the internet, routing online requests through an external server. They mask the user's IP address, enhancing privacy, anonymity, and security while browsing. Proxy servers are commonly used for web scraping, content access control, and bypassing geo-restrictions on region-locked websites. They can be categorized into different types, including data center proxies, residential proxies, ISP proxies, and mobile proxies, each with distinct features and use cases. By filtering, caching, and encrypting data, proxy servers improve browsing speed, reduce bandwidth usage, and protect users from online threats.
Server Backup Software
Server backup software provides tools for backing up and restoring server data to ensure business continuity in the event of data loss, hardware failure, or disaster. These solutions typically offer automated backup schedules, incremental or full backups, and the ability to store data both locally and in cloud storage for redundancy. Server backup software helps businesses secure critical data, including system configurations, files, applications, and databases, enabling quick recovery. Many solutions include features such as encryption, compression, and deduplication to optimize storage usage and enhance security. With robust disaster recovery options, these tools are essential for maintaining uptime and minimizing the impact of unexpected data loss.
Server Monitoring Software
Server monitoring software helps IT administrators track the performance, health, and availability of servers in real-time. These tools collect and display critical data on server resources such as CPU usage, memory consumption, disk space, and network traffic. By setting alerts for anomalies or performance degradation, server monitoring software helps prevent downtime and ensures servers run optimally. It often includes features like log management, automated reporting, and integration with other IT management tools. These solutions are essential for identifying potential issues early and maintaining the reliability of both on-premises and cloud-based server environments.
Dedicated Server Hosting
Dedicated server hosting provides clients with an entire physical server dedicated solely to their needs, offering full control over hardware resources and configuration. This hosting solution is ideal for high-traffic websites, applications, or services that require significant computing power, stability, and performance. Unlike shared hosting, where multiple users share the same server, dedicated hosting ensures that all resources (such as CPU, RAM, and storage) are allocated to a single user or organization. Clients can often choose between managed or unmanaged hosting, with managed services offering additional support like security updates and monitoring. This type of hosting is often used by businesses, ecommerce sites, or large-scale applications that need maximum uptime and customization.
DNS Servers
DNS servers, short for Domain Name System servers, are public servers that provide a protocol that connects domain names to IP addresses so that web browsers and users are able to navigate to a website using a domain name instead of an IP address. Different free and public DNS servers offer varying degrees of speed and performance. Switching from an ISP's default DNS server to a public DNS server can provide enhanced page load speed and security.
Server Management Software
Server management software provides tools and utilities for managing, monitoring, and maintaining servers in a network environment. These solutions enable administrators to configure servers, track their performance, deploy updates, and troubleshoot issues. Server management software often includes features such as system health monitoring, automated patch management, remote access, and backup solutions. By streamlining administrative tasks and improving the efficiency of server operations, these tools help minimize downtime and ensure optimal performance. They are commonly used by IT professionals to manage both on-premises and cloud-based infrastructure.
Server Virtualization Software
Server virtualization software is a form of technology that allows multiple virtualized operating systems to be hosted on the same physical server. This software helps businesses increase their resource utilization and reduce their operational costs by consolidating their IT infrastructure. It also enables them to better manage their server resources and workloads, as well as quickly deploy new servers in support of specific applications. Additionally, this type of software simplifies the process of maintaining and troubleshooting hardware-related issues.
SQL Server Software
SQL server software is a relational database management system (RDBMS) that allows businesses to store, manage, and retrieve data in structured formats using Structured Query Language (SQL). These platforms provide a robust and scalable solution for handling large volumes of data, enabling users to create, read, update, and delete data within relational databases. SQL server software includes features for data storage, transaction management, data security, backup, and performance optimization, ensuring data integrity and availability. It supports a range of applications from small businesses to enterprise-level solutions, offering integration with other business tools and systems. SQL server software is often used in applications requiring high-performance data storage, reporting, and analytics capabilities.
Ad Server Software
Ad server software is a platform that manages and delivers advertisements across various digital properties, such as websites, mobile apps, and other online channels. It allows advertisers and publishers to target specific audiences, optimize ad placement, and track campaign performance. Ad servers facilitate the automation of ad delivery, ensuring that the right ads reach the right users at the right time. These platforms also offer features like real-time bidding, reporting, and analytics to assess the effectiveness of campaigns and maximize revenue. By managing creative assets, user targeting, and performance metrics, ad server software streamlines the ad-serving process for both advertisers and publishers.
Fax Server Software
Fax server software is a solution that allows businesses to send and receive faxes electronically through a network, rather than relying on traditional fax machines. It integrates with existing IT infrastructure, enabling users to send faxes from their computers, email, or other digital devices. Fax server software typically supports features such as document routing, storage, and forwarding, along with features like fax-to-email or email-to-fax capabilities. It helps streamline communication, reduce paper usage, and improve fax management by allowing organizations to centralize and automate fax workflows. Additionally, fax server software can ensure compliance with regulations like HIPAA, where secure transmission of sensitive information is required.
Web to Print Software
Web-to-print software allows businesses and individuals to design, customize, and order printed materials online, streamlining the print procurement process. These platforms provide an interface for customers to upload designs, choose templates, and customize various print products, such as business cards, brochures, banners, and promotional materials. Web-to-print software often integrates with e-commerce platforms, enabling businesses to offer a seamless online ordering experience. It also includes features for managing print jobs, proofing, payment processing, and fulfillment tracking. By using web-to-print software, printing companies can improve workflow efficiency, reduce production errors, and offer a more convenient service to their customers.
Web Conferencing Software
Web conferencing software allows remote users to connect with each other via real-time audio and video. It is usually used to share documents, audio or video chat, or present slideshows during the meeting. Web conferencing software can be used to facilitate remote meetings, training sessions, webinars, and other online collaborations.
Web Design Software
Web design software enables users to create, design, and publish websites without needing extensive coding knowledge. These tools offer visual editors, templates, and drag-and-drop functionality to build attractive and responsive web pages quickly. Many platforms include features like SEO optimization, multimedia integration, and e-commerce support to enhance site performance and user engagement. Web design software often integrates with content management systems to facilitate easy updates and content publishing. Ultimately, it empowers individuals and businesses to establish a professional online presence with less technical effort.
Web Analytics Software
Web analytics software is a type of software that enables businesses track, measure, and analyze the behavior of visitors on their websites. These platforms provide insights into key metrics such as page views, traffic sources, user demographics, conversion rates, and bounce rates. Web analytics software allows organizations to optimize their websites by identifying areas for improvement, understanding user preferences, and measuring the effectiveness of marketing campaigns. It also helps businesses make data-driven decisions to improve user experience, increase website performance, and drive more conversions.
Web Browsers
Web browsers are software applications that enable users to access and interact with websites and other content on the internet. These platforms retrieve, display, and render web pages, allowing users to view text, images, videos, and other multimedia elements. Web browsers typically include features like tabs for managing multiple pages, bookmarking for quick access to favorite sites, browsing history, and privacy options to enhance security. They may also support extensions and plugins to add additional functionality, such as ad-blocking, enhanced security, or content management.
Web Application Firewalls (WAF)
Web Application Firewalls (WAFs) are security solutions that protect web applications by filtering and monitoring HTTP traffic between the application and the internet. They detect and block threats such as SQL injections, cross-site scripting (XSS), and other common attacks targeting application vulnerabilities. WAFs analyze incoming requests in real time, applying customizable security rules to distinguish between legitimate and potentially malicious traffic. Many WAFs are cloud-based, enabling flexible and scalable protection without impacting application performance. By acting as a shield between web applications and attackers, WAFs help ensure data security, regulatory compliance, and uninterrupted user access.
Web Hosting Providers
Web hosting providers are companies that provide online services and technologies necessary to host websites. They offer a wide variety of packages tailored to the needs of different types of customers, from small businesses to large enterprises. These services generally include server maintenance, software updates, customer support, and uptime monitoring.
Bare Metal Server Providers
Bare metal server providers offer physical servers dedicated solely to a client, with no shared resources. These servers are often used for workloads requiring high performance, customization, or full control over hardware configurations. Bare metal servers typically provide greater reliability and performance compared to virtualized environments since they aren't affected by the "noisy neighbor" issue of shared resources. Clients can choose from a variety of configurations and typically have the option to install their preferred operating systems and software. This type of hosting is particularly ideal for resource-intensive applications such as databases, gaming, and large-scale enterprise applications.
View more categories (20) for "web server php perl python"

34 Products for "web server php perl python" with 3 filters applied:

  • 1
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management...
    Starting Price: Free Up to 3 Users
    View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control...
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 3
    Mamori Server

    Mamori Server

    Mamori.io

    Mamori Server is an all-in-one data security solution that integrates ZTNA, 2FA, DAM, PAM, SQL Firewall and data privacy solutions. It uses Zero Trust security to protect business data, which prevents cyber attacks and data theft, helps meet compliance and cyber insurance requirements, and simplify DevOps & access to resources. Mamori Server is extremely simple to deploy. No agents required. No changes to servers, directories, or databases required. Mamori Server can be deployed in the cloud...
    Starting Price: $120/month/user
  • 4
    UTunnel VPN and ZTNA
    .... It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Starting Price: $6/user/month
  • 5
    ManageEngine Endpoint Central
    ManageEngine's Endpoint Central (formerly Desktop Central) is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software...
    Starting Price: $795.00/one-time
    View Software
    Visit Website
  • 6
    Fudo Security

    Fudo Security

    Fudo Security

    With Fudo, users can get access to Unix/Windows servers, applications, and devices quickly and easily. Users will not have to change their habits and can continue to use native clients like Unix Terminals, RDCMan, or Putty. They can also connect through the Fudo Web Client which only needs a web browser for access. Using the JIT feature, you can create access workflows that adhere to the zero-trust approach. Through the request management section, you can easily define and schedule when...
    Starting Price: Free
  • 7
    Resiliant

    Resiliant

    Resiliant

    Affordable, secure, user centric password-less ID authentication using blockchain and AI technology. Control your digital risk and protect data while locking out undesired users and devices. One-time onboarding for multiple uses across the web, servers, networks and devices. No more passwords, 2FA codes, or matching images, which do not protect the user and enterprise against SIM swapping or false geolocation. Decentralized IdNFT™ gives the user ownership and control of their identity. Secured...
  • 8
    Google Chrome Enterprise
    Chrome Enterprise is a trusted browser solution designed for businesses to streamline operations while maintaining security and productivity. With enhanced security features, management controls, and integrations with existing enterprise ecosystems, Chrome Enterprise supports both traditional desktop setups and hybrid, remote work environments. It includes powerful features such as data loss prevention, Zero Trust access control, and centralized cloud management tools, ensuring your...
    Starting Price: Free
    View Software
    Visit Website
  • 9
    SecureW2

    SecureW2

    SecureW2

    Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides...
  • 10
    Kasm Workspaces

    Kasm Workspaces

    Kasm Technologies

    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm uses our high-performance streaming and secure isolation technology to provide web-native Desktop as a Service (DaaS), application streaming, and secure/private web browsing. Kasm is not just a service; it is a highly configurable platform with a robust developer API and devops-enabled workflows that can be customized for your use-case, at any scale. Workspaces can...
    Leader badge
    Starting Price: $0 Free Community Edition
  • 11
    Shieldoo

    Shieldoo

    Cloudfield

    Shieldoo is a next-gen private network for remote connection from anywhere built with a well-known open-source tool called Nebula. The Shieldoo secure network is a collection of nodes, a lighthouse, and an admin center. The user device is a node, the server is a node, the cloud stack is a node, and the LAN access box is a node. Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use...
    Starting Price: $0,49 per hour/server/user
  • 12
    ManageEngine ADSelfService Plus
    ADSelfService Plus is an on-premises access management solution that caters to businesses across various industries, such as IT, banking, engineering, education, aviation, and telecommunications. Key features include: 1. Self-service password resets and account unlocks: Users can reset their passwords in AD and unlock their domain accounts from a web browser. 2. MFA: Machine logins, VPN and OWA logins, and cloud app logins can be secured using MFA. 3. Password synchronizer and SSO...
    Starting Price: $595 for 500 domain users/year
  • 13
    FileFlex

    FileFlex

    FileFlex

    ... access to your data without allowing access to your network infrastructure, all without a VPN. Remote access and share to on-premises storage on servers, server-attached, network-attached, FTP and PC storage. IT fully controls all permissions over all users and storage locations even to file level granularity. IT can view and manage all activities of all users down to folder level.
    Starting Price: $9.95 per user per month
  • 14
    Zentera

    Zentera

    Zentera Systems

    ... business agility and dramatic time-to-market gains. No more network access to meet application access requirements. Protect sensitive hosts and applications by cloaking servers from other machines on the network with micro-segmentation and end-to-end encryption. Eliminate network topology as a trust factor and replace it with certificate-based mutual authentication and policies that factor in user, machine, and application identity.
  • 15
    Perimeter 81

    Perimeter 81

    Check Point Software Technologies

    Perimeter 81 is transforming the world of secure network access and helping businesses of all industries and sizes smoothly transition to the cloud. Unlike hardware-based firewall and traditional VPN technology, Perimeter 81’s cloud-based and user-centric Secure Network as a Service utilizes the Zero Trust approach and SASE model framework to offer greater network visibility, seamless onboarding, and automatic integration with all the major cloud providers. Named a Gartner Cool Vendor,...
    Starting Price: $8 per user per month
  • 16
    ColorTokens Xtended ZeroTrust Platform
    ... and faster time-to-compliance (for HIPAA, PCI, GDPR). Easily create ZeroTrust Zones™ and drastically reduce the attack surface. Dynamic policies that protect workloads migrating to the cloud. Block lateral threats without cumbersome VLANs/ACLs or firewall rules. Lockdown any endpoint by automatically allowing only whitelisted processes. Block zero day or fileless exploits, and stop communication to C&C servers.
  • 17
    Cyolo

    Cyolo

    Cyolo

    Cyolo provides your global workforce with convenient and secure access to applications, resources, workstations, servers and files, regardless of their location or the device used. Cyolo’s Zero Trust platform is built for easy deployment and scales with minimal effort, supporting a wide range of business needs, growth and expansion. The Cyolo platform grants access to the authorized asset and not to the network itself, allowing you to achieve your security objectives without compromising...
  • 18
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification...
  • 19
    Cloudflare

    Cloudflare

    Cloudflare

    Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications. Your website, APIs, and applications are your key channels for doing business with your customers and suppliers. As more and...
    Leader badge
    Starting Price: $20 per website
  • 20
    Netskope

    Netskope

    Netskope

    Today, there’s more data and users outside the enterprise than inside, causing the network perimeter as we know it to dissolve. We need a new perimeter. One that is built in the cloud, and follows and protects data — wherever it goes. One that provides protection without slowing down or creating friction for the business. One that enables fast and secure access to the cloud and web using one of the world’s largest and fastest security networks, so you never have to sacrifice security...
  • 21
    Kitecyber

    Kitecyber

    Kitecyber

    Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc. Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections: 1) Secure Web Gateway to safeguard internet access 2) Eliminate Shadow SaaS and Shadow AI) 3) Anti-Phishing measures to protect user...
  • 22
    Endian

    Endian

    Endian

    Endian UTM is a comprehensive Unified Threat Management (UTM) solution designed to provide robust network security for businesses of all sizes. It offers a suite of advanced features, including stateful firewall, intrusion detection and prevention systems (IDS/IPS), antivirus and antispam protection, VPN support (SSL and IPsec), web and email content filtering, and quality of service (QoS) controls. Endian UTM is available as both hardware appliances and software installations, allowing...
  • 23
    VeloCloud SASE
    VeloCloud SASE, secured by Symantec, is a next-generation secure access service edge (SASE) solution that combines software-defined wide area networking (SD-WAN) with robust security features to protect enterprise networks. It offers a cloud-delivered architecture that enables businesses to securely connect their branch offices, remote workers, and cloud applications while maintaining high performance. The platform provides integrated security functionalities such as secure web gateways, cloud...
  • 24
    Ivanti Connect Secure
    ... with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.
  • 25
    Wandera

    Wandera

    Wandera

    Unified real-time security for your remote users, wherever they are and however they connect. One single security solution for all your remote users, that spans use cases from threat protection to content filtering and zero trust network access, and covers smartphones, tablets and laptops. One unified analytics and policy engine that lets you configure once and apply everywhere. Your users have moved outside the perimeter, and your data has moved to the cloud. Wandera’s cloud-first approach...
  • 26
    LoginCat

    LoginCat

    TekMonks

    ... with clients globally, enhancing and providing leading-edge technical solutions, with low risks and reasonable costs. Our core strengths lie in the domain of Cybersecurity, AI-based products, Enterprise Software Solutions Development, and Innovative Enterprise Mobile Application Development. Developing end-to-end Enterprise software solutions as well as providing software services to budding companies across the web and mobile platforms is our strength.
  • 27
    Symantec Secure Access Service Edge (SASE)
    ... service to enforce consistent web and cloud application security and compliance policies for all users, regardless of location and device. Prevent loss of sensitive data and exfiltration of intellectual property at the service edge. Protect your applications and resources from unauthorized access, network-based attacks, and lateral movement with Zero Trust Network Access (ZTNA) technology.
  • 28
    iboss

    iboss

    iboss

    iboss is a cloud security company that enables organizations to reduce cyber risk by delivering a Zero Trust Secure Access Service Edge platform designed to protect resources and users in the modern distributed world. Applications, data, and services have moved to the cloud and are located everywhere, while users needing access to those resources are working from anywhere. The iboss platform replaces legacy VPN, Proxies, and VDI with a consolidated service that improves security, increases...
  • 29
    Axis Security

    Axis Security

    Axis Security

    Ensure least-privilege user access to specific business resources without granting excessive access to your corporate network, or exposing applications to the Internet. Avoid deploying agents on BYOD or third-party devices and the friction that comes with it. Support access to web apps, SSH, RDP and Git without a client. Analyze how users interact with your business applications to better detect anomalies, flag potential issues, and ensure networking remains aware of changes in security...
  • 30
    NetFoundry

    NetFoundry

    NetFoundry

    ...Foundry Fabric - the world's most secure, performant Fabric. Zero trust security from any endpoint - including IoT and mobile. SASE security at your branches, private data centers and cloud edges. Control your cloud native networking from web console, or use your DevOps tools. Single pane of glass control, regardless of underlying networks or clouds, across all endpoints.
  • Previous
  • You're on page 1
  • 2
  • Next