ActTrader
ActTrader - The leading edge of currency trading technology
20 Alternatives To ActTrader
BitBox
The Virtual Environment for secured and comfortable Web Browsing: On the basis of a…
Cambridge ePayables Solution
Cambridge ePayables Solution is an electronic enablement process that assists companies in the reduction of traditional check payments, and is supported by technology that allows the business partners to efficiently enroll their payment details in a…
Deep Freeze
DESCRIBING DEEPFREEZE SOFTWARE
Deepfreeze, by Faronics, is an application that solves a unique problem that many companies have these days; it prevents an end user from making permanent changes to important system/administrative files.
ExchangeRate-API
An easy to use, free & reliable Exchange Rate API trusted by tens of thousands of developers since 2010!
FairFX
The easy way to manage your travel money online! Join the UK’s smartest travellers. Spend abroad with a FairFX Currency Card in Euro, US Dollar or Sterling.
GesWall
GeSWall is intrusion prevention system that is non-intrusive and easy to use. With GeSWall, you can safely surf the Web, use e-mail, chat, exchange files, regardless of the security threats posed by the Internet.
Hopedot VOS
23 Sep 2012 - 6 min - Uploaded by Hopedot VOSHopedot VOS is a virtualization software that enables users to run a virtual operating system .
VMRay Analyzer Platform
VMRay is an agentless, hypervisor-based sandboxed automated malware testing environment
VMware ThinApp
Speed up application deployment and migration with VMware ThinApp, an agentless application virtualization solution. Learn how it works.
VirSCAN
VirSCAN.org-free virus scan is a free online scan service, utilizing various anti-virus programs to diagnose single files.
eMoneyexchangesoft
eMoneyexchangesoft™ is an all in one cost effective package for all type of money exchange office or money exchange shop to run its secure monitorable foreign exchange business
mbox
Mbox is the based on the technology of sandbox and is primarily deployed for the purpose of configuration or carry on those activities on the system that are suspicious are in nature.