Products to help you get data where it needs to go—securely and efficiently.
For too many businesses, complex file transfer needs make it difficult to create, manage and support data flows to and from internal and external systems. Progress® MOVEit® empowers enterprises to take control of their file transfer workflows with solutions that help secure, simplify and centralize data exchanges throughout the organization.
Learn More
Project Planning and Management Software | Planview
For Enterprise PMOs
Planview® ProjectAdvantage (formerly Sciforma) is an enterprise-centric project and portfolio management (PPM) software designed to enable change, drive innovation, and lead in a company's digital transformation. With ProjectAdvantage, teams can strategically track and monitor project data in order to make relevant decisions. It offers multiple features focused on strategic management, functional management, and execution management. A highly scalable and cost-effective solution, ProjectAdvantage is available in various deployment models.
Executable UML command-line interpeter and metamodel. Intended future import-export compatibility for proprietary xtUML and iUML metamodels and model compilers. Emphasis on analysis/implementation separation and parallel processing implementations.
Coral is a tool and a development platform to create and transform models and modeling languages. It can be used to edit UML models, to develop editors for other modeling languages and to implement MDA and QVT-like model transformations.
An AToM3 definition of a CASE framework for creating Zope products with files in the filesystem. The framework consists of a modelling notation ZProduct and a suit of related transformations.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.