With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud-based help desk software with ServoDesk
Full access to Enterprise features. No credit card required.
What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
lib_data_io is a set of PHP libraries designed to easily move complex sets of data between PHP array data structures and a variety of sources and destinations including JSON, XML, ICAL, MySQL, HTML, Trac WIKI, text, LDIF, and plot images.
Political Region Management System is a Contact Management System for organising political associations at the grassroots level. A 'political region' is an electoral district, constituency or riding, depending on local terminology.
PowerMovieList is a PHP/MySQL-script for your movie-collection. The script automatically fetches detailed information from imdb.com (genres, director, actors, plot...) It has multi-list and multi-user features, themes and prints covers for your cd-cases.
DynaGraph creates dynamic graphs based on data selected from a database query. Using PHP, DynaGraph accesses a MySQL database, and uses the results to plot information to a bar graph in the GIF format, using gd1.3.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: