Alternatives to Portus

Compare Portus alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Portus in 2025. Compare features, ratings, user reviews, pricing, and more from Portus competitors and alternatives in order to make an informed decision for your business.

  • 1
    Google Cloud Platform
    Google Cloud is a cloud-based service that allows you to create anything from simple websites to complex applications for businesses of all sizes. New customers get $300 in free credits to run, test, and deploy workloads. All customers can use 25+ products for free, up to monthly usage limits. Use Google's core infrastructure, data analytics & machine learning. Secure and fully featured for all enterprises. Tap into big data to find answers faster and build better products. Grow from prototype to production to planet-scale, without having to think about capacity, reliability or performance. From virtual machines with proven price/performance advantages to a fully managed app development platform. Scalable, resilient, high performance object storage and databases for your applications. State-of-the-art software-defined networking products on Google’s private fiber network. Fully managed data warehousing, batch and stream processing, data exploration, Hadoop/Spark, and messaging.
  • 2
    GitLab

    GitLab

    GitLab

    GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.
    Leader badge">
    Starting Price: $29 per user per month
  • 3
    Container Registry
    8gears Container Registry is a Harbor-based container registry as a service offered and operated by the project's maintainer and contributors. For organizations, and software vendors looking for ways to distribute software as container images.
    Starting Price: $249 per month
  • 4
    Securden Endpoint Privilege Manager
    Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready
  • 5
    Docker

    Docker

    Docker

    Docker takes away repetitive, mundane configuration tasks and is used throughout the development lifecycle for fast, easy and portable application development, desktop and cloud. Docker’s comprehensive end-to-end platform includes UIs, CLIs, APIs and security that are engineered to work together across the entire application delivery lifecycle. Get a head start on your coding by leveraging Docker images to efficiently develop your own unique applications on Windows and Mac. Create your multi-container application using Docker Compose. Integrate with your favorite tools throughout your development pipeline, Docker works with all development tools you use including VS Code, CircleCI and GitHub. Package applications as portable container images to run in any environment consistently from on-premises Kubernetes to AWS ECS, Azure ACI, Google GKE and more. Leverage Docker Trusted Content, including Docker Official Images and images from Docker Verified Publishers.
    Starting Price: $7 per month
  • 6
    Google Cloud Container Registry
    With Container Registry your team can manage Docker images, perform vulnerability scans and decide who accesses what resources with precise access control; All in one place. Existing CI / CD integrations allow you to configure fully automated Docker pipelines for information without delay. Get access to private and secure Docker image storage on Google Cloud Platform in minutes. Control who can access, view or download images. Get consistent uptime on a protected infrastructure with Google security. Build and push images to the private registry automatically when you commit code to Cloud Source Repositories, GitHub, or Bitbucket. Easily configure CI / CD pipelines with Cloud Build integration or deploy directly to Google Kubernetes Engine, App Engine, Cloud Functions, or Firebase. Automatically build containers on code or tag changes to a repository. Search across previous builds from the UI or view build details like a trigger, source, steps, and logs.
  • 7
    Oracle Cloud Container Registry
    Oracle Cloud Infrastructure Container Registry is an open standards-based, Oracle-managed Docker registry service for securely storing and sharing container images. Engineers can easily push and pull Docker images with the familiar Docker Command Line Interface (CLI) and API. To support container lifecycles, Registry works with Container Engine for Kubernetes, Identity and Access Management (IAM), Visual Builder Studio, and third-party developer and DevOps tools. Work with Docker images and container repositories using familiar Docker CLI commands and Docker HTTP API V2. Oracle takes care of operating and patching the service, so that developers can focus on building and deploying containerized applications. Built using object storage, Container Registry provides data durability and high service availability with automatic replication across fault domains. Oracle does not charge separately for the service. Users pay only for the associated storage and network resources they consume.
  • 8
    Red Hat Quay
    Red Hat® Quay container image registry provides storage and enables you to build, distribute, and deploy containers. Gain more security over your image repositories with automation, authentication, and authorization systems. Quay is available with OpenShift or as a standalone component. Control access of the registry with multiple identity and authentication providers (including support for teams and organization mapping). Use a fine-grained permissions system to map to your organizational structure. Transport layer security encryption helps you transit between Quay.io and your servers automatically. Integrate with vulnerability detectors (like Clair) to automatically scan your container images. Notifications alert you to known vulnerabilities. Streamline your continuous integration/continuous delivery (CI/CD) pipeline with build triggers, git hooks, and robot accounts. Audit your CI pipeline by tracking API and UI actions.
  • 9
    Azure Container Registry
    Build, store, secure, scan, replicate, and manage container images and artifacts with a fully managed, geo-replicated instance of OCI distribution. Connect across environments, including Azure Kubernetes Service and Azure Red Hat OpenShift, and across Azure services like App Service, Machine Learning, and Batch. Geo-replication to efficiently manage a single registry across multiple regions. OCI artifact repository for adding helm charts, singularity support, and new OCI artifact-supported formats. Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.
    Starting Price: $0.167 per day
  • 10
    Dist

    Dist

    Dist

    Highly available and super fast artifact repositories and container registries that keep your developers, operations teams, and customers happy and productive. Dist is the simplest and most reliable way to securely distribute Docker container images and Maven artifacts across your team, systems, and customers. Our purpose-built edge network ensures optimal performance, wherever your team and customers are. Dist is fully managed in the cloud. We take care of operations, maintenance, and backups so you can focus on your business. Restrict access to repositories by users and groups. Each user can further compartmentalize their own access using access tokens. All artifacts, container images, and their associated metadata are encrypted at rest and in transit.
    Starting Price: $39 per month
  • 11
    IBM Cloud Container Registry
    Store and distribute container images in a fully managed private registry. Push private images to conveniently run them in the IBM Cloud® Kubernetes Service and other runtime environments. Images are checked for security issues so you can make informed decisions about your deployments. Install the IBM Cloud Container Registry CLI to use the command line to manage your name spaces and Docker images in the IBM Cloud® private registry. View information about potential vulnerabilities and the security of images in the IBM Cloud Container Registry public and private repositories with the IBM Cloud console. Check the security status of container images that are provided by IBM, third parties or that are added to your organization's registry namespace. Advanced capabilities for security compliance insight. Access controls and image signing capabilities. Pre-integration with Kubernetes Service.
  • 12
    Yandex Container Registry
    Docker images are placed in fault-tolerant storage. Automatic replication is configured for all data, each replica changes when Docker images are edited, created, or deleted. The service provides containers for Linux and Windows OS. Use them however you want, running on your local machine or on a Yandex Compute Cloud VM. High-speed Docker image operations without expenses for external traffic, Docker image registries are hosted in the same data centers where your cloud infrastructure is deployed. Docker images are transmitted via HTTPS. You choose who can view, pull, push, or delete them. You use a Docker image and we take care of maintaining the infrastructure where your registry is running. You only pay for the space used by your Docker images. You can use the service via the management console, command line interface (CLI), API, or the standard Docker CLI, the service is compatible with the Docker registry HTTP API V2.
    Starting Price: $0.012240 per GB
  • 13
    JFrog Container Registry
    The world’s most advanced, powerful, hybrid Docker and Helm registry. Power your world of Docker without limits. The JFrog Container Registry is the most comprehensive and advanced registry in the market today, supporting Docker containers and Helm Chart repositories for your Kubernetes deployments. Use it as your single access point to manage and organize your Docker images, while avoiding Docker Hub throttling or retention issues. JFrog provides reliable, consistent, and efficient access to remote Docker container registries with integration to your build ecosystem. Develop and deploy your way. Supports your current and future business model with on-prem / self-hosted, hybrid, and multi-cloud environments on your choice of AWS, Microsoft Azure, and Google Cloud. Built on JFrog Artifactory’s proven track record of power, stability, and resilience to easily manage and deploy your Docker images and provide your DevOps teams with full control over access and permissions.
    Starting Price: $98 per month
  • 14
    Tencent Container Registry
    Tencent Container Registry (TCR) offers secure, dedicated, and high-performance container image hosting and distribution service. You can create dedicated instances in multiple regions across the globe and pull container images from the nearest region to reduce pulling time and bandwidth costs. To guarantee data security, TCR features granular permission management and access control. It also supports P2P accelerated distribution to break through the performance bottleneck due to concurrent pulling of large images by large-scale clusters, helping you quickly expand and update businesses. You can customize image synchronization rules and triggers, and use TCR flexibly with your existing CI/CD workflow to quickly implement container DevOps. TCR instance adopts containerized deployment. You can dynamically adjust the service capability based on actual usage to manage sudden surges in business traffic.
  • 15
    Mirantis Secure Registry
    Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated vulnerability database, and validate with cryptographic signing. Secure and accelerate CI/CD workflows: Automatically promote images from test to prod for a secure, efficient software pipeline—all while maintaining policy-based controls.
  • 16
    Alibaba Cloud Container Registry
    Container Registry allows you to manage images throughout the image lifecycle. It provides secure image management, stable image build creation across global regions, and easy image permission management. This service simplifies the creation and maintenance of the image registry and supports image management in multiple regions. Combined with other cloud services such as container service, container registry provides an optimized solution for using Docker in the cloud. Provides an intranet URL of the image repository for each region. You can visit this URL to download images without using traffic. Builds services automatically, in regions outside China, and in stages. Allows you to easily scan the image security status and provides multi-dimensional vulnerability reports. Provides an easy Docker-based continuous integration and continuous delivery solution. Easy operations allow you to quickly start using the service at low management and maintenance costs.
    Starting Price: $113 per month
  • 17
    Harbor

    Harbor

    Harbor

    CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. However, users should be aware that setting up and maintaining Harbor can require additional effort and expertise compared to simpler container registries. 
  • 18
    Amazon Elastic Container Registry (ECR)
    Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. Meet your organization’s image compliance security requirements using insights from common vulnerabilities and exposures (CVEs) and the Common Vulnerability Scoring System (CVSS). Publish containerized applications with a single command and easily integrate your self-managed environments.
  • 19
    Slim.AI

    Slim.AI

    Slim.AI

    Easily connect your own private registries and share images with your team. Explore the world’s largest public registries to find the right container image for your project. If you don’t know what’s in your containers, you can’t have software security. The Slim platform lifts the veil on container internals so you can analyze, optimize, and compare changes across multiple containers or versions. Use DockerSlim, our open-source project, to automatically optimize your container images. Remove bulky or dangerous packages, so you ship only what you need to produce. Find out how the Slim platform can help your team automatically improve software and supply chain security, tune containers for development, testing, and production, and ship secure container-based apps to the cloud. Accounts are free and there is no charge to use the platform at this time. We're container enthusiasts, not salespeople, so know that your privacy and security are the founding principles of our business.
  • 20
    Sonatype Nexus Repository
    Sonatype Nexus Repository is a robust binary repository manager designed to store, manage, and distribute open-source components, dependencies, and artifacts across the software development lifecycle (SDLC). It supports over 20 formats, including Maven, npm, PyPI, and Docker, allowing for seamless integration with build tools and CI/CD pipelines. With advanced features like high availability, disaster recovery, and scalability across cloud platforms, Nexus Repository ensures secure and efficient management of your software artifacts. The platform enhances collaboration, automates workflows, and improves visibility into your software supply chain, helping teams manage dependencies and improve software quality.
  • 21
    JFrog

    JFrog

    JFrog

    Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.
    Starting Price: $98 per month
  • 22
    Scaleway

    Scaleway

    Scaleway

    The Cloud that makes sense. From high-performance cloud ecosystem to hyperscale green datacenters, Scaleway provides the foundation for digital success. Cloud platform designed for developers & growing companies. All you need to create, deploy and scale your infrastructure in the cloud. Compute, GPU, Bare Metal & Containers. Evolutive & Managed Storage. Network. IoT. The largest choice of dedicated servers to succeed in the most demanding projects. High-end dedicated servers Web Hosting. Domain Names Services. Take advantage of our cutting-edge expertise to host your hardware in our resilient, high-performance and secure data centers. Private Suite & Cage. Rack, 1/2 & 1/4 Rack. Scaleway data centers. Scaleway is driving 6 data centers in Europe and offers cloud solutions to customers in more that 160 countries around the world. Our Excellence team: Experts by your side 24/7 year round Discover how we help our customers to use, tune & optimize their platforms with skilled expert
  • 23
    Wise Registry Cleaner
    Clean registry junks, repair Windows registry errors, defragment Windows registry, and keep your PC at peak performance. This new feature is ideal for computers that are used by more than one person, such as home computers that are shared by a family and public computers in public places. People who have administrative rights can easily scan and clean all users' registries at once. You do not need to log in under each individual account to scan & fix registry issues. The registry keeps growing when you use Windows, and so does the obsolete items in the registry, which would eventually lead to performance degradation and even system crash. Wise Registry Cleaner scans the Windows registry and finds errors & residual items in the registry and then cleans or defrags them. By fixing these residual and corrupted items in the Windows registry, your system will run faster and more stable.
    Starting Price: $29.95 one-time payment
  • 24
    Amazon Verified Permissions
    Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications. Accelerate application development by decoupling authorization from business logic. Protect application resources and manage user access to the principle of least privilege. Amazon Verified Permissions is a fully managed, Cedar-compatible permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive, performant, and analyzable open source policy language, developers and admins can define policy-based access controls.
    Starting Price: $0.00015 per request
  • 25
    Google Cloud Artifact Registry
    Artifact Registry is Google Cloud’s unified, fully managed package and container registry designed for high-performance artifact storage and dependency management. It centralizes host­ing of container images (Docker/OCI), Helm charts, language packages (Java/Maven, Node.js/npm, Python), and OS packages, offering fast, scalable, reliable, and secure handling with built-in vulnerability scanning and IAM-based access control. Integrated seamlessly with Google Cloud CI/CD tools like Cloud Build, Cloud Run, GKE, Compute Engine, and App Engine, it supports regional and virtual repositories with granular security via VPC Service Controls and customer-managed encryption keys. Developers benefit from standardized Docker Registry API support, comprehensive REST/RPC interfaces, and migration paths from Container Registry. Daily updated documentation includes quickstarts, repository management, access configuration, observability tools, and deep-dive guides.
  • 26
    Auslogics Registry Cleaner
    Auslogics Registry Cleaner comes recommended as the best registry cleaner in terms of safety and effectiveness. The app has a novice-friendly interface and special options that prevent an inexperienced user from doing something that might damage the operating system. All you have to do is run a scan of your registry, review all detected abnormalities and decide if you want any of them ignored during cleanup. Then simply click the ‘Clean up’ button and get ready to enjoy your smoother-running PC. Auslogics Registry Cleaner will let you: - Run one-click scans and cleanups for quick Windows registry repair - Search the Windows registry for specific entries by keywords, such as when you need to clean out keys left by an uninstalled app - Take full control over cleanup by excluding keys you don’t want cleaned - Schedule automatic scans for continuous performance protection - Back up the registry prior to cleanup for added safety
    Starting Price: $39.95 per year
  • 27
    Registry Recycler

    Registry Recycler

    Registry Recycler

    Registry Recycler is the answer to your each question, if you are in search of a tool that has the ability to keep your system fast and lag free by frequently identifying the broken threads within your registry database and renovating them. Registry Recycler is a free registry cleaner that scans the registry against corrupt, damaged, and invalid registry entries. There are unserviceable entries that play role in slackening your PC operations. The utility aims to repair your registry against bad registry data and threatening errors. It deeply scans the registry to find and fix errors in missing reference entries. Registry Recycler could certainly be preferred, as it thoroughly examines the registry and draws each registry error out of it. It comes with other value added features (Defragmenter, Startup Management, and Automatic Backup) with the ability to enhance system performance. A user-friendly interface and simple structure makes Registry Recycler very easy to use.
    Starting Price: Free
  • 28
    PicScout

    PicScout

    PicScout

    The PicScout Platform is the industry-leading registry of owner-identified images. The registry is fast-approaching 300 million identified images from more than 200 major content providers and 20,000 photographers. The PicScout Platform is beneficial to both content owners and users. It enables content owners to make their content more visible and accessible to content users, and in turn, lets content users visually search and identify images with ease and efficiency, for proper licensing. To search the registry, please use the free Search By Image tool below. PicScout’s Visual API is designed to help you better understand and analyze image content. Our pioneering image recognition technology is based on deep learning research, and offers a wide range of capabilities. These include visual search that identifies the same or similar images. Our user-friendly REST API is flexible, scalable and affordable.
  • 29
    AWS Service Catalog
    AWS Service Catalog allows organizations to create and manage catalogs of IT services that are approved for use on AWS. These IT services can include everything from virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage deployed IT services and your applications, resources, and metadata. This helps you achieve consistent governance and meet your compliance requirements while enabling users to quickly deploy only the approved IT services they need. With AWS Service Catalog AppRegistry, organizations can understand the application context of their AWS resources. You can define and manage your applications and their metadata, to keep track of cost, performance, security, compliance and operational status at the application level. AWS Service Catalog AppRegistry provides a single repository for collecting and managing your application resources on AWS.
  • 30
    AML Free Registry Cleaner
    AML Free Registry Cleaner is a registry cleaning software. It will safely clean and repair Windows registry problems with a few clicks and enable you to enjoy a cleaner and more efficient PC. The registry is the nerve center of your PC, and problems with the Windows registry are a common cause of Windows crashes and error messages. With a detailed startup manager, you can see what all programs start automatically with Windows and optionally disable them. AML Free Registry Cleaner also finds and removes common junk files that accumulate over time. It comes pre-configured with 22 types of file extensions that can usually be considered disposable, and you can extend the range by adding your own file types. AML Free Registry Cleaner also allows you to search for words in the entire registry. AML Free Registry Cleaner also provides a detailed overview of running programs and processes.
    Starting Price: Free
  • 31
    FDM Platform

    FDM Platform

    Framesoft

    Legal or regulatory requirements (e.g. Sarbanes-Oxley Act or Basel II) or simply business needs require an easy and safe storage, archival and exchange of an ever-growing quantity of documents and content of different types, such as e-Mails, faxes, correspondence, plans, electronic documents, websites, etc. It allows the creation of the required organizational structures as well as managing of all types of electronic files (e-Files) and documents to be tracked, stored & searched via full-text search or by assigning keywords configured on the basis of self-defined business rules. Documents can be accessed, stored, or searched in FDM in multiple ways providing a complete FDM integration into the corporate’s business environment. Flexible tree-based structure containing folders & E-Files (Collection of documents incl. substructures under a common profile) Fine grained authorization privilege system (access control) to handle access to (single) folders & documents .
  • 32
    Zoho Vault
    Say goodbye to memorizing passwords. Let us do it for you. Zoho Vault is a secure password manager that safely manages your passwords and autofills them across websites and applications. Unlimited password storage, seamless autofill, fine-grained admin controls–Vault has it all. Get clear security insights into both your personal and business passwords. Identify any weak passwords and change them in just a few clicks. Securely store, share, and manage passwords with different levels of access privileges. You can also add notes, documents, credit cards, software licenses, SSH keys, and more to your password vault. Organize passwords and other confidential data into groups as folders and sub-folders for easy password management and bulk-sharing. Allow users to log in to their everyday apps without passwords. Our catalog readily supports hundreds of popular cloud apps, as well as options for custom integration.
    Starting Price: $1 per month
  • 33
    Oracle Container Cloud Service
    Oracle Container Cloud Service (also known as Oracle Cloud Infrastructure Container Service Classic) offers Development and Operations teams the benefits of easy and secure Docker containerization when building and deploying applications. Provides an easy-to-use interface to manage the Docker environment. Provides out-of-the-box examples of containerized services and application stacks that can be deployed in one click. Enables developers to easily connect to their private Docker registries (so they can ‘bring their own containers’). Enables developers to focus on building containerized application images and Continuous Integration/Continuous Delivery (CI/CD) pipelines, not on learning complex orchestration technologies.
  • 34
    Kubescape
    A Kubernetes open-source platform providing developers and DevOps an end-to-end security solution, including risk analysis, security compliance, RBAC visualizer, and image vulnerabilities scanning. Kubescape scans K8s clusters, Kubernetes manifest files (YAML files, and HELM charts), code repositories, container registries and images, detecting misconfigurations according to multiple frameworks (such as the NSA-CISA, MITRE ATT&CK®), finding software vulnerabilities, and showing RBAC (role-based-access-control) violations at early stages of the CI/CD pipeline. It calculates risk scores instantly and shows risk trends over time. Kubescape has became one of the fastest-growing Kubernetes security compliance tools among developers due to its easy-to-use CLI interface, flexible output formats, and automated scanning capabilities, saving Kubernetes users and admins precious time, effort, and resources.
    Starting Price: $0/month
  • 35
    Google Programmable Search Engine
    Help people find what they need on your website. Add a customizable search box to your web pages and show fast, relevant results powered by Google Search. Because it’s powered by Google’s core search technology that’s constantly improving, you always get fast, relevant results. You program your search engine, so you decide what content it searches and how it looks. Integrate your search engine on your website quickly. Decide if you want users to search only your website, or include other sites on the web. Choose from several pre-built themes, or design your own search results page from scratch. Pay nothing — and even earn revenue — by showing relevant ads with AdSense, or pay a low price for an ad-free experience.
  • 36
    Ashampoo Registry Cleaner
    Windows stores common application settings and configuration data in a central database called Windows Registry. Over time, this database can become cluttered with leftover data from no longer installed software and entries can even become corrupted. Since so many applications rely on the Registry for information, clutter and data corruption can cause noticeable performance drops and make your PC feel sluggish and unresponsive. Frequent error messages or problems when uninstalling programs can also be caused by Windows Registry issues. Ashampoo Registry Cleaner 2 scans your Registry to detect and fix corrupted, redundant or invalid entries. By cleaning and compacting your Registry, your overall system speed will increase since read operations that target the Registry will perform faster. For extra safety, Ashampoo Registry Cleaner 2 comes with real-time backups to undo any modifications at the click of a button.
    Starting Price: $14.99 one-time payment
  • 37
    RegSofts Free Window Registry Repair
    Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. By using Free Window Registry Repair regularly and repairing your registry your system should not only be more stable but it will also help Windows run faster. For your convenience it automatically backup any repairs made so that you always can restore Windows registry to the original state. The registry is a heart and soul of any Windows system. It contains information that controls how your system appears and how it behaves. Almost all Windows users gradually experiences the downfall in their PC's performance. Much of it can be attributed to Windows Registry Errors. For your convenience and for insuring maximum protection. Free Window Registry Repair automatically backup any repairs made. So you always can restore Windows registry to the original state using restore button.
    Starting Price: Free
  • 38
    Revo Registry Cleaner Pro

    Revo Registry Cleaner Pro

    VS Revo Group Ltd.

    Discover a powerful Registry Cleaner with 15+ scanning categories to find and eliminate invalid and unnecessary Registry Items. Tailor your cleaning process with custom key inclusions/exclusions and 4 different depth scan modes. Customize your Windows experience using the 50 Registry tweaks. Optimize, fine-tune, and resolve issues effortlessly, and achieve a smoother system performance. The Registry Watcher monitors specified Registry keys in real-time, instantly identifying processes responsible for system modifications. Review, save, and export registry modifications, and apply filters based on operation type or data content. Create personalized backups for specific keys, perform full Registry backups, or automate scheduled backups to ensure additional safety. Our scheduled Auto Clean feature can be set up for your daily, weekly, or monthly cleanup with your preferred scan mode. There is also a Portable version available.
    Starting Price: $14.99/year/user
  • 39
    TweakNow RegCleaner
    The Registry is a heart and soul of any Windows system. It contains information that controls how your Windows appears and how it behaves. Most applications today use registry to store configuration and other important data. When you install application, new registry entries created. These entries should be deleted automatically when you uninstall the application. Unfortunately, it does not always work that way. Sometimes you find that several applications fail to remove their own registry entries. These entries will become obsolete. After a long period, after installing and uninstalling a lot number of applications, your Windows registry may contain a large number of obsolete entries. These will significantly increase the registry size and thus will slow down your computer, because Windows will need more time to load, search, and read data from registry.
    Starting Price: Free
  • 40
    Docker Scout
    Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). The SBOM is matched against a continuously updated vulnerability database to pinpoint security weaknesses. Docker Scout is a standalone service and platform that you can interact with using Docker Desktop, Docker Hub, the Docker CLI, and the Docker Scout Dashboard. Docker Scout also facilitates integrations with third-party systems, such as container registries and CI platforms. Reveal and dig into the composition of your images. Ensure that your artifacts align with supply chain best practices.
    Starting Price: $5 per month
  • 41
    TaraVault

    TaraVault

    inflectra

    Looking for safe, secure, and accessible source code hosting with both Git and Subversion code repositories, integrated ALM and issue-tracking for your projects? TaraVault is your best choice. For full traceability, TaraVault is integrated with our Spira ALM suite, look no further. The heart of TaraVault is our enterprise-grade Git repository hosting. Each TaraVault project comes with its own private Git source code repository. When you need distributed version control that is lightning fast, with powerful branching and merging out of the box, support for disconnected teams and users, Git is your best choice. The heart of TaraVault is our enterprise-grade Subversion repository hosting. Each TaraVault project comes with its own private Subversion source code repository. When you need image file storage and fine-grained access control, Subversion will be your best choice for source code management.
    Starting Price: $1,079.89 per year
  • 42
    SeedDMS

    SeedDMS

    SeedDMS

    SeedDMS is a free document management system with an easy to use web based user interface for small and medium sized enterprises. It is based on PHP and MySQL or sqlite3 and runs on Linux, MacOS and Windows. Many years of development has made it a mature, powerful and enterprise ready platform for sharing and storing documents. Before you install SeedDMS on your own server feel free to check out our demo installation. Login with 'admin' for user and password. Please note, that the maximum file size for uploading has been limited to 5 MB and the database content will be cleared once in a while without notice. If you prefer to run your own SeedDMS for a limited time, then start your own instance at "Play with Docker" (PWD). Just hit the button below which takes you right to PWD. You need to log in with your docker credentials. Fully web based user inteface, users and groups management, external authentication, and fine grained notifications upon changes.
  • 43
    Netwrix Privilege Secure for Endpoints
    Netwrix Privilege Secure for Endpoints is an endpoint privilege management solution designed to enforce the principle of least privilege across diverse environments, including domain-joined, MDM-enrolled, and non-domain-joined systems. It enables organizations to remove local administrative rights from end-users while providing controlled elevation for specific applications and tasks as needed. Key features include granular elevation of admin rights for designated executables, delegation of privileged access to settings typically requiring local admin rights, and management of PowerShell usage to prevent unauthorized script execution. The solution also offers user request and admin approval workflows, allowing end-users to request elevated privileges with secure approval processes. By implementing these controls, Netwrix Privilege Secure for Endpoints mitigates the attack surface on endpoints, reducing the risk of breaches from compromised credentials or poorly managed access.
  • 44
    Osirium

    Osirium

    Osirium

    In the current world of outsourcing, it can be hard to see who has privileged access to what on your systems. These days, the lowest-paid people have the highest privileges - and they may not even work for your organization. Osirium readdresses this balance for end-user organizations and uniquely allows MSSPs to manage tens of thousands of account credentials, outsource safely and keep their clients happy on the compliance front. Those “admin” accounts can make substantial changes to those systems. For example, they can access valuable corporate IP, reveal personally identifiable information (PII), or control how customers, staff, and partners do their work. It's also worth considering the need to protect other accounts such as the corporate Facebook, Instagram, and LinkedIn accounts as improper use could cause significant reputational damage. It’s no surprise that these accounts are the most prized targets for cyber attackers as they are so powerful.
  • 45
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 46
    Agency Suite

    Agency Suite

    Agency Suite

    Premier talent and casting agency software to manage talent, create and share video castings, and send talent packages to clients immediately. Unlimited talent, images, videos, and users for one low recurring monthly price. Free demo and trial. Agency Suite is a complete set of customizable tools to increase productivity three-fold. It is a comprehensive utility that will keep your business running smooth and efficiently, streamlining some of your most time-consuming processes. Agency Suite was built from the ground up from within the industry. Our application has seen amazing success in our partnership and development with MODELOGIC, a highly successful talent agency based in Richmond, VA. as well as agencies in Chicago, IL, Maryland, Ohio, and North Dakota. A designated Admin has complete control over the application and can customize the utility to contain agency branding, color schemes, backgrounds, and even create fields and lists and more.
    Starting Price: $300 per month
  • 47
    Apache Sentry

    Apache Sentry

    Apache Software Foundation

    Apache Sentry™ is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster. Apache Sentry has successfully graduated from the Incubator in March of 2016 and is now a Top-Level Apache project. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoop cluster. Sentry currently works out of the box with Apache Hive, Hive Metastore/HCatalog, Apache Solr, Impala and HDFS (limited to Hive table data). Sentry is designed to be a pluggable authorization engine for Hadoop components. It allows you to define authorization rules to validate a user or application’s access requests for Hadoop resources. Sentry is highly modular and can support authorization for a wide variety of data models in Hadoop.
  • 48
    Oracle Cloud Functions
    ​Oracle Cloud Infrastructure (OCI) Functions is a serverless computing service that enables developers to create, run, and scale applications without managing infrastructure. Built on the open source Fn Project, it supports multiple programming languages, including Python, Go, Java, Node.js, and C#, allowing for flexible function development. Developers can deploy code directly, with OCI handling automatic provisioning and scaling of resources. It offers provisioned concurrency to maintain low-latency execution, ensuring functions are ready to accept calls instantly. A catalog of prebuilt functions is available, enabling rapid deployment of common tasks without the need to write code from scratch. Functions are packaged as Docker images, and advanced users can utilize Dockerfiles to customize runtime environments. Integration with Oracle Identity and Access Management provides fine-grained access control, while OCI Vault securely stores sensitive configuration data.
    Starting Price: $0.0000002 per month
  • 49
    FrameTrail

    FrameTrail

    FrameTrail

    FrameTrail is an open source software that lets you experience, manage and edit interactive video directly in your web browser. It enables you to hyperlink filmic contents, include additional multimedia documents (e.g. text overlays, images or interactive maps) and to add supplementing materials (annotations) at specific points. Use any video file or even an empty video with a defined length as a basis for synchronization. Place documents on top of the video (e.g. text, images, web pages or interactive maps) and decide how and when they should be displayed. Create non-linear networks of video fragments (Hypervideos) which can be freely navigated by the user. Add supplementing materials at certain points of time and compare those with the annotation timelines of other users. In order to allow everyone to freely install, adjust and extend FrameTrail, we decided to use intentionally simple technology and self-contained formats. Everything is filebased (no database).
  • 50
    Bing Custom Search
    An easy-to-use, ad-free, commercial-grade search tool that lets you deliver the results you want. Build a customized search that fits your needs. The Bing Custom Search API gives you powerful ranking, a global-scale search index, and document processing with fast, simple setup. The core technology works in four steps—by identifying on-topic sites and images, providing automatic query suggestions, applying the Bing ranker, and delivering relevant search results. Adjust the parameters and access usage insights anytime. Define the parts of the web you want to draw from so users only see relevant results from the domains, subsites, and web pages you choose. Explore site suggestions to expand the scope of your search domain. And harness the full power of Bing’s global-scale search index to get a holistic view of searches and ranking. Create a compelling search experience for content, such as web pages, images, and even autosuggested words.
    Starting Price: $4 per 1,000 transactions