Ideal for small to medium-sized businesses. Pay for all the modules or only the ones you need.
isoTracker Quality Management is a popular cloud-based quality management software (QMS) that is used by small to medium sized businesses on a worldwide basis. It helps to manage ISO 9001, ISO 13485, ISO 22000, ISO 17025, ISO 14001 systems...plus many similar other systems. It also conforms to the requirements of 21 CFR Part 11.
Learn More
Find out just how much your login box can do for your customer | Auth0
With over 53 social login options, you can fast-track the signup and login experience for users.
From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
Support variant based Java program execution, adapted to support MDE.
Work Case Toolkit is a tool that provides variant based program's execution. Our main goal is to define an API that we can use embedded into any Java application to support dynamic execution based on variant flows. The variants are controlled by a graph decision using features diagrams relationships.
The project was originally planned in 2005 to support Model Driven Architecture OMG approach, focusing specially on the management of architectural changes and models transformers. The main...
Executable UML command-line interpeter and metamodel. Intended future import-export compatibility for proprietary xtUML and iUML metamodels and model compilers. Emphasis on analysis/implementation separation and parallel processing implementations.
An AToM3 definition of a CASE framework for creating Zope products with files in the filesystem. The framework consists of a modelling notation ZProduct and a suit of related transformations.
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.