Results for: codeblocks-16.01 mingw-setup

Suggested Categories:

Lease Accounting Software
Lease accounting software automates the management and reporting of lease agreements in compliance with accounting standards such as ASC 842, IFRS 16, and GASB 87. It helps organizations track lease terms, payment schedules, renewal options, and lease liabilities while generating accurate financial reports. The software often includes features for lease classification, amortization calculations, journal entry automation, and audit trail documentation. By centralizing lease data and ensuring regulatory compliance, it reduces manual effort, minimizes errors, and supports timely financial close processes. Lease accounting software is essential for companies managing multiple leases to maintain transparency and meet accounting obligations.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
Alumni Management Software
Alumni management software is used by educational organizations to manage and track alumni information as well as to coordinate and organize school events and reunions.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Fitness Software
Fitness software is designed to help fitness centers, gyms, and personal trainers manage operations, enhance client experience, and track fitness progress. These platforms often include features like class scheduling, membership management, workout tracking, nutrition plans, payment processing, and client communication tools. Fitness software also allows trainers to create customized workout plans, track client performance, and monitor progress over time. Many fitness platforms include mobile apps for clients to track their activities, book classes, and receive personalized updates. This software streamlines administrative tasks, improves member engagement, and enhances business management for fitness-related establishments.
Pixel Art Software
Pixel art software enables artists and game developers to create images where each individual pixel matters—from tiny icons to animated sprites. It provides tools such as pixel-perfect brushes, limited color palettes, layer and frame management, tile and grid support, and animation features like onion-skin and frame tags. Many applications also support sprite sheet export, tileset editing, and palette manipulation, making them especially useful for game assets and retro-style art. With zoomed-in canvases and precise control over each pixel, this software lets creators craft crisp visuals that retain clarity at any size. Ultimately, pixel art software empowers users to bring nostalgic, stylized, or game-ready artwork to life with accuracy, efficiency, and artistic flair.
Blockchain-as-a-Service Providers
Blockchain-as-a-Service (BaaS) providers provide organizations with a managed blockchain platform hosted in the cloud, which enables companies to build blockchain applications without worrying about hosting or maintaining the blockchain platform infrastructure.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (9) for "codeblocks-16.01 mingw-setup"

34 Products for "codeblocks-16.01 mingw-setup" with 3 filters applied:

  • 1
    Routee

    Routee

    AMD Telecom

    Routee is an intelligent omnichannel communication platform (CPaaS) offering advanced Web and API automation for all industries worldwide. Powered by AMD Telecom’s robust infrastructure, Routee's services enable businesses to optimize their marketing & business processes. -SMS Marketing: tailor-made messages based on customers' individual preferences -Email Marketing: personalized newsletters & email campaigns based on an audience's behavioral data -Transactional Email: automated emails...
    Starting Price: $0.01 one-time fee
  • 2
    Domotz

    Domotz

    Domotz

    Domotz is an IT Infrastructure Monitoring and Management Software on a mission to provide all service providers, MSPs, integrators, and enterprises with affordable network monitoring software that enables you to work smarter, build customer loyalty, and solve problems faster than ever. Domotz enables the complete solution to cost-effectively manage and monitor your customers’ networks with a plug-and-play setup, a friendly UX, and a comprehensive feature set accessible from any desktop browser or mobile device. Monitor any network and IT infrastructure with our powerful, affordable, user-friendly network monitoring software. All the features you need to manage and monitor your IT infrastructure proactively.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 3
    Comet Backup

    Comet Backup

    Comet Backup

    ...Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup. Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers). Comet’s modern ‘chunking’ technology powers client-side deduplication with no full re-uploads after the first backup. Backups are incremental forever—your oldest backup can restore just as fast as your most recent. ...
    Leader badge
    Starting Price: $19 per month
    Partner badge
    View Software
    Visit Website
  • 4
    Themis

    Themis

    Cossack Labs

    Secure Cell is a multi-mode cryptographic container suitable for storing anything from encrypted files to database records. Use Secure Cell to encrypt data at rest. Secure Cell is built around AES-256-GCM, AES-256-CTR. Secure Message is a simple encrypted messaging solution for the widest scope of applications. Use Secure Message to send encrypted and signed data from one user to another, from client to server, to prevent MITM attacks and avoid single secret leakage. Based on ECC + ECDSA /...
    Starting Price: $0.01
  • 5
    Zercurity

    Zercurity

    Zercurity

    Bootstrap and build out your cybersecurity posture with Zercurity. Reduce the time and resources spent monitoring, managing, integrating, and navigating your organization through the different cybersecurity disciplines. Get clear data points you can actually use. Get an instant understanding of what your current IT infrastructure looks like. Assets, applications, packages, and devices are examined automatically. Let our sophisticated algorithms find and run queries across your assets....
    Starting Price: $15.01 per month
  • 6
    SpamTitan Plus
    SpamTitan Plus Anti-Phishing is an AI-driven email protection solution that provides “zero-day” threat protection and intelligence. Spam Titan Plus provides 100% coverage of ALL current market leading anti-phishing feeds, 1.5X increase in unique phishing URL detections and has 1.6X faster phishing detections than the current market leaders. With real-time continuous updates providing SpamTitan Plus with 10 million new, never-before seen malicious URLs a day. Book a SpamTitan Plus demo Today.
  • 7
    Delska

    Delska

    Delska

    Delska (former DEAC European Data Center & Data Logistics Center) is a carrier-neutral data center and network provider in Northern Europe with 25 years of experience delivering reliable, personalized IT and network solutions in cloud computing, colocation, data security, network, and more. We own five data centers (one under construction, launching in 2025) in Riga and Vilnius, along with points of presence in Frankfurt and Amsterdam. For quick IT infrastructure deployment in Riga,...
    Starting Price: €10
  • 8
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
    Starting Price: $10 per user per month
  • 9
    K7 Total Security
    Protect your devices, data, information and files with one product. Get advanced protection against malware, spyware and ransomware. Protect your digital identity with robust privacy protections. Enjoy multi-layered protection for your devices. K7 Total Security detects and eliminates threats in real-time, so you can stay secure as you browse, shop, bank, learn and work online. K7 Total Security works in the background with no impact on device performance. That's not all, with PC Tuneup...
    Starting Price: $16.20 per year
  • 10
    Aspida Mail
    Aspida Mail was developed with simplicity in mind. We know it's important for you to be able to continue with business as usual. Aspida Mail's setup is seamless and works with any IMAP enabled device. Aspida is HIPAA compliant encrypted email.
  • 11
    Insightful

    Insightful

    Insightful

    ...With Insightful, businesses can better understand how teams work, track performance, and align talent strategies with company goals, especially in remote and hybrid setups. Insightful offers a complete set of workforce analytics tools. These include activity and time tracking, data collection, reporting, and easy-to-read dashboards. HR, talent teams, and leadership use these insights to plan smarter and work more efficiently. Designed from the ground up, Insightful is simple, affordable, and flexible. ...
    Starting Price: $6.40 per employee per month
  • 12
    Password Boss
    ...Password Boss gives you a complete end-to-end solution for your customer’s passwords and helps them to increase security while reducing their risks from security breaches. Assign different roles to your team members to setup, manage and access your customers' passwords. Centralized dashboards and reports on customers and individual security scores, usage and audit logs.
  • 13
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    ...Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 14
    Authy

    Authy

    Twilio

    Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers. Simple to setup, secure cloud backup, multi device support. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts. Relying on just usernames and passwords to secure your online accounts is no longer considered safe. Data breaches occur daily and hackers are always inventing new ways to take over your accounts. ...
  • 15
    Mullvad VPN
    ...Your IP address is replaced by one of ours, ensuring that your device's activity and location are not linked to you. Using Mullvad is straightforward and simple – just download and install the app. You won't need to waste time with setup configurations or a multi-step registration process. We built Mullvad with ease of use in mind. Privacy is fundamental to a well-functioning society because it allows norms, ethics, and laws to be safely discussed and challenged.
  • 16
    Gophish

    Gophish

    Gophish

    ...Using the UI, you can view a timeline for each recipient, tracking email opens, link clicks, submitted credentials, and more. Everything in Gophish is designed to "just work". It's so easy to setup, easy to use, and quick to give powerful results that you'll think it's magic.
  • 17
    Kerio Control

    Kerio Control

    GFI Software

    ...Kerio Control goes beyond just checking files for malicious code; it scans your network traffic for potential attacks. Create secure, high-performance server-to-server connections between your offices running Kerio Control with an easy-to-setup VPN technology. Or, you can create a secure VPN connection to a remote office that doesn’t have Kerio Control deployed, using industry-standard VPN protocols.
    Starting Price: $270 per year
  • 18
    Banyan Security

    Banyan Security

    Banyan Security

    ...Banyan replaces your traditional network access boxes, VPNs, bastion hosts, and gateways, with a cloud-based zero trust access solution. One-click infra access, never expose private networks. Dead simple setup, high-performance connectivity. Automate access to critical services, without exposing private networks. One-click access to SSH/RDP, Kubernetes, and database environments, including hosted applications like GitLab, Jenkins, and Jira. CLI, too! Collaborate across on-premises and cloud environments, without complex IP whitelisting. ...
    Starting Price: $5 per user per month
  • 19
    Bitdefender Antivirus Free
    ...It detects ransomware, phishing, rootkits, Trojans, and malicious downloads using advanced behavioral analysis. Designed for Windows, macOS, Android, and iOS, it ensures cross-platform security with minimal setup required. Bitdefender’s award-winning technology brings top-tier cybersecurity to everyone—no credit card, no trial limits, just pure protection.
    Starting Price: Free
  • 20
    signer.digital

    signer.digital

    Chartered Information Systems

    signer.digital is the range of solutions which offer its users innovative ways to sign the documents and files and eInvoices, through it rage of procuts like, Bridge Application, REST APIs, Web Server and Web Libraries, DLLs and Free signer.digital Browser Extension. The signer.digital Bridge application can be setup in minutes for Digitally Signing with any of the existing ERP or application without writing a line of code, while the web server and libraries can be configured with any application, signer.ditial supports cross-platform applications through REST APIs. With signer.digital Browser Extension we offer seamless PKI operations through all the modern Browsers like Chrome, Edge and Firefox on all 3 OS platforms. ...
    Starting Price: $1
  • 21
    AP Lens

    AP Lens

    AP Lens

    ... - No More 0-Day Attacks: Escape the limits of blacklisting with AP Lens Augmented Whitelist. - Compliant: AP Lens meets regulatory requirements requested by cybersecurity insurance policies. - One-Click Installation: No need for a lengthy setup process or updating from the user's side. - No Maintenance: Stop malware and phishing without continuous monitoring. Our team builds on over 20 years of experience in cyber security, cloud security, and information protection in industries such as private banking and the public sector.
    Starting Price: $5
  • 22
    DNSFilter

    DNSFilter

    DNSFilter

    ...Leveraging its proprietary AI engine, Webshrinker, DNSFilter continuously scans and categorizes over 180 million websites, enabling real-time blocking of malicious domains, phishing sites, and inappropriate content. The platform offers flexible deployment options, including agentless setups and roaming clients for various operating systems, ensuring comprehensive coverage for both on-site and remote users. With features like intuitive reporting, customizable filtering policies, and compliance with regulations such as CIPA, DNSFilter serves diverse sectors, including education, healthcare, and enterprise environments. ...
    Starting Price: $20/month
  • 23
    Xink

    Xink

    Xink

    ...All with clickable call-to-actions to help you drive traffic and interest. With role-based login, the marketing or communications department can easily manage it. After the initial setup (45 min), IT has no workload. Safely hosted at ISO 27001-certified data centers (Microsoft Azure). This ensures the best, most secure data storage available – under all laws and regulations, including GDPR.
    Starting Price: $1/user/month
  • 24
    Fleetsmith
    Put your devices on auto-pilot. Fleetsmith automates device setup, intelligence, patching, and security, for your company’s Macs, iPhones, iPads, and Apple TVs. Automatically set up devices for new hires? Check. Automatically detect and prevent problems across your fleet? Yup. Automatically install and update apps automatically? You bet. Security is deeply considered in every aspect of our product, and in every decision we make.
    Starting Price: $8.25 per user per month
  • 25
    SandBlast Network

    SandBlast Network

    Check Point Software Technologies

    ...SandBlast Network provides the best zero-day protection in the industry, while reducing administration overhead and ensuring ongoing business productivity. Powerful threat intelligence and AI technologies prevent unknown cyber threats. Single click setup, with out-of-the-box profiles optimized for business needs. Delivering a prevention-first strategy with no impact on user experience. Humans are the weakest link in the security chain. Pre-emptive user protections eliminate threats before they reach the users regardless of the user activity – browsing or using email. Real-time threat intelligence derived from hundreds of millions of sensors worldwide.
  • 26
    StixMDM
    ...Android’s work profile separates work and personal applications so IT can manage business data while employees keep their personal apps, photos, and other data private. It's peace of mind for both users and IT. Setting up a work profile is as easy as downloading an EMM app from Google Play and following the setup wizard.
    Starting Price: $0.99 per month
  • 27
    AuthPoint

    AuthPoint

    WatchGuard

    Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access. Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. ...
  • 28
    Shieldoo

    Shieldoo

    Cloudfield

    ...Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use. A tailored wizard will guide you through the initial setup, and the usual administration is handled in the admin center. You pay only for users and servers seen in the network that month, and you always get the complete feature set: unlimited admin accounts, SSO, MFA, domain by your choice etc.
    Starting Price: $0,49 per hour/server/user
  • 29
    ESET Small Business Security
    ESET Small Business Security is a digital security solution designed specifically for small and home offices managing between 5 and 25 devices. It delivers strong, AI-powered protection against online threats, scams, ransomware, and human error across multiple platforms. The solution supports Windows, macOS, Android, iOS, and Windows Server, making it suitable for mixed-device environments. ESET includes essential features such as anti-phishing, secure online banking, ransomware remediation,...
  • 30
    Guardian Digital

    Guardian Digital

    Guardian Digital

    ...The most effective email protection is delivered through a purpose-driven solution designed to close critical security gaps in Microsoft 365 and Workspace, coupled with the expert setup, ongoing remote system management and accessible support required to improve IT security. With real-time cybersecurity business insights, we help you understand what your risk profile is today, and protect you from the dangers that all businesses face. EnGarde Cloud Email Security - Key Features: • Phishing, spoofing & impersonation protection • Link & file analysis • Zero-day attack protection • Malware & Ransomware protection • SPF/DKIM/DMARC checking • Encryption • Comprehensive management & support service
    Starting Price: Monthly & Annual Subscriptions
  • Previous
  • You're on page 1
  • 2
  • Next