Suggested Categories:

File Converters
File converters are software tools that enable users to convert file types from one file type to another. File converters can convert different types of files such as documents, PDFs, images, and more.
File Repair Software
File repair software enables users to repair corrupt or damaged files. File repair software tools are useful for companies and users that need to repair and access files of all kinds including documents, downloads, images, videos, PDFs, and more.
File Sharing Software
File sharing software is software that enables users to securely share and exchange files and data over the internet. It allows people to easily store, access, and transfer documents, files, photos, videos, music, and other types of data to and from multiple devices. There are many popular file sharing programs available for both home networks and business use. These provide features such as file synchronization across multiple devices, security protocols for protection against malicious activity/hacking attempts, cloud-based storage capabilities, etc.
File Copy Software
File copy software is designed to transfer files and folders quickly, reliably, and often with enhanced functionality compared to standard operating system copy tools. It can handle large files, resume interrupted transfers, and manage batch operations more efficiently. Many solutions include error recovery, speed optimization, file verification, and filtering to copy only specific file types or updated versions. Advanced tools may support copying across local drives, network locations, and external storage devices with minimal downtime. This makes file copy software essential for IT administrators, content managers, and anyone handling large-scale or frequent file transfers.
File Compression Software
File compression software reduces the size of files or folders to save storage space and speed up transfers. It works by using algorithms to eliminate redundancy and efficiently encode data, often resulting in significantly smaller file sizes. These tools typically support multiple compression formats, such as ZIP, RAR, and 7z, and can also encrypt archives for added security. Many include features like batch compression, password protection, file splitting, and integration with cloud storage. File compression software is essential for sharing large files, archiving data, and improving storage efficiency on both personal and enterprise systems.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
File Sync Software
File sync software assists in the process of ensuring that edited files from multiple sources and locations are synchronized and have the same information.
Duplicate File Finders
Duplicate file finders are software tools that enable users to find and identify duplicate files, duplicate images, duplicate videos, duplicate documents, and more in order to prevent duplicates and free up space on their system or hard drive. Duplicate file finders are also known as duplicate file removers or duplicate file cleaners.
File Managers
File managers, also known as file browsers or file explorers, are software applications that enable a user to browse, search, organize, and manage the files and folders on their computer or device.
E-Filing Software
E-filing software for legal purposes enables attorneys, law firms, and self-represented litigants to electronically submit court documents to judicial systems. It streamlines the filing process by ensuring compliance with court formatting rules, deadlines, and procedural requirements. The software provides features like document tracking, real-time status updates, and automated notifications of court acceptance or rejection. With secure encryption and user authentication, it protects sensitive legal information from unauthorized access. By reducing reliance on paper filings, it increases efficiency, saves time, and minimizes the risk of errors or missed deadlines.
File Archiving Software
File archiving software is designed to compress, organize, and store files efficiently for long-term retention and easy retrieval. It helps reduce storage costs by using compression techniques and managing data lifecycle policies, such as automatic archiving and deletion. This software supports indexing and search capabilities, enabling quick access to archived files when needed. Many solutions integrate with backup and compliance systems to ensure data security and regulatory adherence. By centralizing archived data, it improves data management and preserves critical information over time.
File and Document Comparison Software
File and document comparison software enables users to compare the difference between two or more files or documents. File comparison tools can detect differences between files such as images, code, PDFs, media files, and more. Document comparison tools can detect the differences between two or more documents.
File Integrity Monitoring Software
File integrity monitoring software is a type of security tool designed to monitor and track changes made to files on a computer system. It works by comparing the current state of a file to its known baseline, alerting users if any unauthorized modifications have been made. This software can detect both accidental and malicious changes, making it useful for maintaining the integrity of important files. It is often used in conjunction with other security measures such as firewalls and antivirus programs to provide comprehensive protection against cyber threats. Overall, file integrity monitoring software plays an important role in ensuring the security and reliability of computer systems.
Secure File Transfer Software
Secure file transfer software enables the safe exchange of files between users, systems, or organizations by encrypting data in transit and at rest. It often supports protocols like SFTP, FTPS, and HTTPS to ensure secure communication while preventing unauthorized access. Many solutions include authentication, access controls, and audit logs to enhance compliance with security regulations. Advanced features may include automation, integration with cloud storage, and endpoint protection for seamless and secure file sharing. These tools are essential for businesses handling sensitive data, such as financial institutions, healthcare providers, and enterprises with strict security requirements.
HR Employee File Management Software
HR employee file management software is designed to assist HR departments with the process of gathering, searching, structuring and managing all employee information.
Managed File Transfer (MFT) Software
Managed file transfer (MFT) software provides the tools to ensure the efficiency and security of file transfers and data exchange across a network from one machine to another.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Desktop Search Software
Desktop search software is a tool that indexes the contents of a user’s computer—such as files, documents, emails, images, and archives—to enable rapid and precise searching across various data types. By building an index, these tools allow for lightning-fast queries, often supporting filters by file type, date, and content keywords. They commonly offer features like content preview, search result management (e.g., tagging or bookmarking), and compatibility with multiple formats including PDFs, Office files, archives, and more. Desktop search tools improve productivity by reducing the manual effort needed to locate files, serving professionals, researchers, students, and everyday users alike. They are designed to provide accurate, fast, and organized results, often operating silently in the background while keeping the index updated in real time.
Archiving Software
Archiving software is designed to securely store and manage digital data and documents over the long term, ensuring easy retrieval and compliance with legal or regulatory requirements. It automates the process of capturing, indexing, and preserving information from various sources such as emails, files, databases, and applications. The software often includes compression and encryption features to optimize storage space and protect sensitive data. By implementing retention policies and audit trails, archiving software helps organizations meet data governance standards and reduce risk. It supports efficient search and access, making historical data available for business intelligence and legal discovery.
View more categories (20) for "selae files"

57 Products for "selae files" with 1 filter applied:

  • 1
    IPVanish

    IPVanish

    IPVanish

    ...Keep your internet activity private with our anonymous IP addresses, and we’ll help keep network hackers, ISPs, and advertisers out of your connection. Secure your Wi-Fi connection and armor your location data with VPN. The best data defense pairs security with convenience. Safeguard access to your most important files with encrypted backup, automated syncing, and remote wiping controls.
    Starting Price: $3.99 per month
    View Software
    Visit Website
  • 2
    Enterprise Storage OS (ESOS)
    An easy to use file server that combines Windows-compatible network file sharing with a web based file manager. TurnKey File Server includes support for SMB, SFTP, NFS, WebDAV and rsync file transfer protocols. The server is configured to allow server users to manage files in private or public storage. Based on Samba and WebDAV CGI. An easy to use file server that combines Windows-compatible network file sharing with a web based file manager. ...
    Starting Price: Free
  • 3
    NetDrive

    NetDrive

    Bdrive Inc.

    ...Many NAS vendors recommend NetDrive as a standard way to mount their NAS products. Share your NAS easily with anyone as virtual drive. SFTP to securely transfer files NetDrive supports secure file transfer by SFTP (SSH File Transfer protocol) . Unlike standard File Transfer Protocol (FTP), SFTP encrypt commands and data both, preventing passwords and sensitive information from being transmitted in the clear over a network.
    Starting Price: $19.90 per year
  • 4
    Morro Data CloudNAS
    Morro Data CloudNAS Global File Services enable companies with two or more offices to share their files in real-time and no VPN or sync software required. Cloud NAS combines the local network performance of a NAS with the reliability, scalability, and accessibility of the cloud for a cloud-first solution. It allows businesses to quickly and efficiently have unlimited file storage, collaborate with multiple office file sync & lock, and get instant disaster recovery. ...
    Starting Price: $129.00/month
  • 5
    EasyNAS

    EasyNAS

    EasyNAS

    ...The structure and logic rules used to manage the groups of information and their names is called a “file system”. Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialised for serving files either by its hardware, software, or configuration. It is often manufactured as a computer appliance – a purpose-built specialised computer.
    Starting Price: Free
  • 6
    Amahi

    Amahi

    Amahi

    ...And it's expandable with a multitude of one-click install apps. Amahi Sync™ is a new and exclusive Amahi app that very easily allows you to sync, share and back up files online automatically. It's your personal cloud. Without any extra software to install. Amahi Sync runs on your HDA and monitors files in shares that you enable for syncing. When new files are added, deleted or files change, they are automatically synced with Amahi's cloud storage. You can then browse the files there or share them.
  • 7
    Igiko Management Tools
    Igiko Management Tools is web-based software for remote access, management, and monitoring of physical and virtual machines within a permission-based security model. Igiko has a built-in remote desktop gateway that allows you to establish connections with your computers or VMs. Thanks to HTML5 RDP control implemented in the web console, users can work with remote desktops from anywhere using a web browser. Unlike most RMM tools, the Igiko application is an agentless service. You can only...
    Starting Price: $5 for a machine (host or VM)
  • 8
    NetworkMiner
    NetworkMiner is a network forensics tool that extracts artifacts such as files, images, emails, and passwords from captured network traffic in PCAP files. It can also capture live network traffic by sniffing a network interface. Detailed information about each IP address in the analyzed network traffic is aggregated into a network host inventory, which can be used for passive asset discovery and to get an overview of communicating devices.
    Starting Price: $1,300 one-time payment
  • 9
    AnySecura

    AnySecura

    AnySecura

    ...By integrating Data Loss Prevention (DLP), Endpoint Protection, and comprehensive Activity Auditing, it secures—and makes traceable—both internal and external data interactions without compromising operational efficiency. One standout capability is Transparent Encryption. Based on predefined policies (e.g., by file type or user group), files are encrypted and decrypted automatically, allowing authorized users to access and edit documents seamlessly. Unauthorized users or external parties, however, see only unreadable content—preventing potential leakage at its source across the file’s entire lifecycle. Beyond encryption, AnySecura provides a full suite of Endpoint Management features, including Removable Media Control, Print Control, Document Control, Web Access Control, and real-time alerts.
    Starting Price: $216/month
  • 10
    LANGuardian

    LANGuardian

    NetFort Technologies

    ...Search by username, IP address or subnet, file name, or web address. Drill down to get readable detail; ideal for multiple network security and operational use cases. See detail like usernames, file and folder names, domains, URIs, SQL queries.
  • 11
    Riverbed Packet Analyzer
    Riverbed Packet Analyzer accelerates real-time network packet analysis and reporting of large trace files through an intuitive graphical user interface and a broad selection of pre-defined analysis views. It enables users to quickly identify and troubleshoot complex network and application performance issues down to the bit level, with full integration with Wireshark. By simply dragging and dropping preconfigured analysis views onto a group of virtual interfaces or a packet trace file, users can see results immediately, transforming hours of work into seconds. ...
  • 12
    sMonitor

    sMonitor

    Alexander Yarovy

    ...If the destination host fails to reply to a ping, connection request, or user datagram, sMonitor alerts you using audible alarms, visible notifications, e-mail messages, third-party software, modem and telnet connections. Also, the program generates log files, CSV format files, creates and uploads by FTP the HTML file, which reflects a current status. Based on test results, the program can operate remote systems (power management, reboot, alarm reporting) by modem and telnet using custom scripts. sMonitor can run as standard Windows application or NT service. NetFlow2SQL Collector can be used to receive NetFlow packets from routing devices and store their contents into databases on Microsoft SQL and MySQL servers for retrieval and analysis.
    Starting Price: $49 one-time payment
  • 13
    PCTuneUp

    PCTuneUp

    PCTuneUp

    ...You can achieve a ton of great optimization within several clicks. It is endowed with the abilities to clean disks, remove broken shortcuts, backup & repair drivers, clear online traces, recover lost files, shred data, encrypt files, auto click, create WiFi hotspots, monitor keystrokes/file/folder/program, and so forth. Keep tweaking your system - regular maintenance and occasional tuneups play an important role in helping your computer stay in tip-top shape. Free PC TuneUp Suite integrates a bunch of necessary system tuneup utilities, assisting you to spare hard disk space, backup & safeguard your privacy & any designated data, monitor & report the computer for all activities, and anything else that keeps the computer run smoothly. ...
    Starting Price: Free
  • 14
    MayaNAS

    MayaNAS

    ZettaLane Systems

    MayaNAS Cloud is a full featured enterprise-grade software defined storage solution that provides high-performance, high-throughput file storage on standard object storage (S3) without any additional resources. It is fully software-defined with support for file storage over NFS, SMB-AD and robust block services through NVMeoF, iSCSI and FC interconnect. Features: 2-node High-Availability, compression, thin-provisioning, unlimited policy driven snapshots and continuous replication. ...
  • 15
    tcpdump

    tcpdump

    tcpdump

    ...It operates on most Unix-like systems, including Linux, Solaris, FreeBSD, NetBSD, OpenBSD, and macOS, utilizing the libpcap library for network traffic capture. Tcpdump can read packets from a network interface card or from a previously created saved packet file, and it provides options to write packets to standard output or a file. Users can apply BPF-based filters to limit the number of packets processed, enhancing usability on networks with high traffic volumes. The tool is distributed under the BSD license, making it free software. In many operating systems tcpdump is available as a native package or port, which simplifies installation of updates and long-term maintenance.
    Starting Price: Free
  • 16
    Xplico

    Xplico

    Xplico

    ...Xplico can be used as a Cloud Network Forensic Analysis Tool. The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. Xplico isn’t a network protocol analyzer. Xplico is an open source Network Forensic Analysis Tool (NFAT). At each data reassembled by Xplico is associated a XML file that uniquely identifies the flows and the pcap containing the data reassembled.
  • 17
    TrueNAS

    TrueNAS

    iXsystems

    ...TrueNAS is a universal data platform that allows users to easily adopt a modern, open source approach to storing and protecting their growing data. TrueNAS is open source and harnesses the power of the legendary ZFS file system to provide unified storage (File, Block Object, and Apps) with the reliability and performance demanded by virtualization, backup, and many other data-heavy workloads. The TrueNAS CORE edition (formerly FreeNAS) is based on FreeBSD for unified scale-up storage. The TrueNAS SCALE edition is based on Debian Linux for either scale-up or scale-out solutions, and offers Linux Containers, VMs (KVM), and scale-out ZFS storage capabilities. ...
    Leader badge
    Starting Price: Free
  • 18
    Edgio

    Edgio

    Edgio

    Securely deliver sub-second web applications, stream high quality OTT and live events, or distribute large file quickly to customers around the globe. Supported by Edgio experts in security, web applications, CDN, and managed streaming services. Edgio Uplynk: Optimize streaming with Edgio Uplynk our streaming management and orchestration platform backed by our OTT/live event services team. Cut costs, increase ad revenue, and delivery high quality experiences Edgio Delivery: Power your streaming media and large file downloads on one of the world’s largest, most advanced global CDNs. ...
  • 19
    SmartDraw

    SmartDraw

    SmartDraw

    ...Get all the features you need at a more affordable price: - Sophisticated diagramming that lets your team make flowcharts, organizational charts, floor plans, CAD drawings, project charts, network diagrams, UML diagrams, AWS, Azure, and more - Whiteboarding and real-time collaboration - Powerful integrations that allow you to generate diagrams from data automatically - Migrate your existing Visio and Lucidchart files in bulk SmartDraw will save files directly to OneDrive, SharePoint, or Google Drive, giving you full control of your data. Minimize risk, simplify compliance, and increase data security. SmartDraw also works hand in glove with your existing IT infrastructure without disruption. You can provision users, save files, and set permissions entirely inside the Microsoft or Google enterprise stack.
    Starting Price: $10.95 per user per month
  • 20
    ManageEngine OpUtils
    ...With a comprehensive set of over 20 tools, this switch port management tool helps with network monitoring tasks like detecting a rogue device intrusion, keeping an eye on bandwidth usage, monitoring availability of critical devices, backing up Cisco configuration files, and more. Enable advanced IP scanning of IPv4 and IPv6 subnets in your network to identify the available and used IP addresses. Scan all the switches in your network, map switch ports, run port scans and view details such as physical location, user, and more. Identify rogue device intrusions and block access to these devices.
    Starting Price: $138.00
  • 21
    Canonical Netplan

    Canonical Netplan

    Canonical Netplan

    ...Netplan reads network configuration from /etc/netplan/*.yaml which are written by administrators, installers, cloud image instantiations, or other OS deployments. During early boot, Netplan generates backend specific configuration files in /run to hand off control of devices to a particular networking daemon.
  • 22
    Zipkin

    Zipkin

    Zipkin

    It helps gather timing data needed to troubleshoot latency problems in service architectures. Features include both the collection and lookup of this data. If you have a trace ID in a log file, you can jump directly to it. Otherwise, you can query based on attributes such as service, operation name, tags and duration. Some interesting data will be summarized for you, such as the percentage of time spent in a service, and whether or not operations failed. The Zipkin UI also presents a dependency diagram showing how many traced requests went through each application. ...
  • 23
    Homedale

    Homedale

    RunToSZ

    ...Details from information elements (IE) advertised by the access points are parsed and shown. You can also monitor the signal strength of selected access points in a graph over the time. With a right mouse click, you can start logging to a text file and create a screenshot. See the usage of all Wi-Fi channels and find the optimal channel for your access point. Make a right mouse click to connect and disconnect from a Wi-Fi / WLAN access point. The blue icon shows the currently connected access point.
  • 24
    AdminToys Suite
    ...Get system summary, view desktop remotely, inventory computers for hardware configuration. View data storage devices, perform HDDs health check, open, copy, move and delete files and folders.
    Starting Price: $149 one-time payment
  • 25
    Airtool 2

    Airtool 2

    Intuitibits

    ...Whether you’re trying to resolve Wi-Fi connectivity, roaming or configuration problems, analyzing your Wi-Fi network’s performance, you will certainly need to perform packet captures. Airtool lets you capture Wi-Fi packets in the easiest way possible. With advanced features such as automatic packet slicing and capture file limits and rotation, Airtool is a must-have tool for every wireless LAN professional.
    Starting Price: $36.61 one-time payment
  • 26
    m0n0wall

    m0n0wall

    m0n0wall

    ...m0n0wall is based on a bare-bones version of FreeBSD, along with a web server, PHP and a few other utilities. The entire system configuration is stored in one single XML text file to keep things transparent. m0n0wall is probably the first UNIX system that has its boot-time configuration done with PHP, rather than the usual shell scripts, and that has the entire system configuration stored in XML format.
    Starting Price: Free
  • 27
    Sniffnet

    Sniffnet

    Sniffnet

    ...Key features include selecting a network adapter to inspect, applying filters to observed traffic, viewing overall statistics and real-time charts of Internet traffic, exporting comprehensive capture reports as PCAP files, identifying over 6,000 upper-layer services, protocols, trojans, and worms, discovering domain names and ASNs of hosts, pinpointing connections in the local network.
    Starting Price: Free
  • 28
    AdRem NetCrunch

    AdRem NetCrunch

    AdRem Software

    NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in...
    Leader badge
    Starting Price: $1600 for NetCrunch 50 nodes
    Partner badge
  • 29
    10-Strike Network Monitor

    10-Strike Network Monitor

    10-Strike Software

    Organize monitoring of your managed switches, UPS, servers, CCTV systems, IP cameras, DVR, printers, HDD disks, network devices, and services (databases, file or web servers) located on LAN or the Internet. In addition, you can use your own scripts as monitoring checks. Monitor various variables and parameters in managed switches using the SNMP protocol. You can monitor the CPU temperature and various parameters on servers and workstations using WMI. The program generates alerts on failures using sound alarms, log records, screen messages, e-mail or SMS notifications (which can be sent using a USB-connected cell phone or 3G/4G modem that does not require the Internet connection). ...
  • 30
    MSP360 Connect
    ...It allows users to access and control Windows devices from any operating system at any time regardless of the computer’s global location. The main features: ▸ Fast and stable connection ▸ Advanced security ▸ Multi-monitor support ▸ File transfer ▸ Session recording ▸ Text and voice chat ▸ Multi-user sessions
    Starting Price: $89.99 per year
  • Previous
  • You're on page 1
  • 2
  • Next