Best IT Security Software for Docusign

Compare the Top IT Security Software that integrates with Docusign as of October 2025

This a list of IT Security software that integrates with Docusign. Use the filters on the left to add additional filters for products that have integrations with Docusign. View the products that work with Docusign in the table below.

What is IT Security Software for Docusign?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Docusign currently available using the table below. This list is updated regularly.

  • 1
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 2
    ABLE Platform

    ABLE Platform

    ABLE Platform

    ABLE Platform is a multimodule web software that covers the entire loan origination and loan management processes. The following modules are included: - Landing page - to attract new borrowers. - Borrower portal - to serve actual borrowers. - Self-service portal - to manage the whole enterprise activity. - Back-office - the core of the platform to manage incoming loan applications, service disbursed loans, configure the loan product catalog, built-in dashboards and more. The platform automates the lending process throughout all the stages: - Initiation of omnichannel application - Consolidation and restructuring of debts - Negotiation with customers - Application decision-making - Personalized offers - Automation of the loan disbursement ABLE Platform serves any type of loan: - Payday Loan - Personal Loan - Point of Sale Loan (POS) - Buy Now, Pay Later (BNPL) - Mortgage Loan - Home Equity Loan - Auto Loan (Car finance) - Student Loan, etc
  • 3
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing precious data and account logins. Businesses also utilize LastPass to consolidate their tech stacks or to fill access management gaps with native integrations for MS Entra, Okta, and other IdPs and IAMs. With over 100 customizable policies, flexible privileges, detailed reporting, MFA and passwordless authentication options, LastPass makes it easy for organizations with numerous logins and increasing security risks to standardize password management company wide.
    Leader badge
    Starting Price: $4 per user per month
  • 4
    Electric

    Electric

    Electric

    Electric is reinventing how businesses manage their IT. Providing real-time IT support to 30,000 users and centralized IT management to over 600 customers, Electric offers companies a 50% reduction in IT spend and standardized security across devices, apps, and networks, whether you're on-site or remote. We have an 100+ person team ready and willing to help with IT support. Once the Electric App is enabled in your Slack workspace or Microsoft Teams tenant, your team will have access to chat with Electric whenever they need help. They'll get a response from a member of our team in 10 minutes or less (our average is 6 minutes). Electric's team of experts is trained to handle a wide range of support needs. From the most basic password reset through device crashes, we've got your team covered.
  • 5
    Rippling

    Rippling

    Rippling

    Streamline your business with Rippling’s all-in-one platform for HR, IT, payroll, and spend management. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
  • 6
    Microsoft Sentinel
    Standing watch, by your side. Intelligent security analytics for your entire enterprise. See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise. Put the cloud and large-scale intelligence from decades of Microsoft security experience to work. Make your threat detection and response smarter and faster with artificial intelligence (AI). Eliminate security infrastructure setup and maintenance, and elastically scale to meet your security needs—while reducing IT costs. Collect data at cloud scale—across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds. Detect previously uncovered threats and minimize false positives using analytics and unparalleled threat intelligence from Microsoft. Investigate threats with AI and hunt suspicious activities at scale, tapping into decades of cybersecurity work at Microsoft.
  • 7
    BetterCloud

    BetterCloud

    BetterCloud

    BetterCloud is the category creator and market leader for SaaS Management. We provide IT, security and procurement professionals the only unified SaaS Lifecycle Management platform to track your applications, manage spend and expenses, automate user permissions and access, monitor compliance and mitigate risk by securing your cloud files. With hundreds of integrations, BetterCloud provides complete visibility across your entire SaaS ecosystem. Our no-code automation enables zero-touch workflows that are critical for streamlining IT processes and eliminating manual work. Thousands of forward-thinking organizations like Oscar Health, Blue Apron, Seismic and BuzzFeed trust BetterCloud to manage their SaaS environment. Our BetterCloud Guarantee provides the industry’s only platform guarantee — 3x ROI in 90 days.
  • 8
    CloudEagle.ai

    CloudEagle.ai

    CloudEagle.ai

    CloudEagle.ai is a leader in SaaS management and governance with AI-powered capabilities that enables enterprises to optimize, govern, and renew all SaaS and AI appsfrom one place. With 500+ direct integrations, CloudEagle.ai provides complete visibility into applications, licenses, spend, and vendors while leveraging no-code Slack workflows to automate employee onboarding, offboarding, and access reviews. The platform delivers comprehensive SaaS security and governance through AI-driven usage insights, license rationalization, automated access governance, and intelligent application management that eliminates redundant and shadow IT applications, all managed from a centralized dashboard that serves as the single source of truth for SaaS operations and security posture.
    Starting Price: $2000/month
  • 9
    TurnKey Lender

    TurnKey Lender

    TurnKey Lender

    TurnKey Lender is a one-stop lending infrastructure used by creditors in 50+ countries to automate all elements of their operations. The platform enables lenders to profitably grow their business while cutting operational costs and risks. It's a powerful AI-driven SaaS that automates over 90% of all lending processes and gives both B2C and B2B lenders a competitive edge. TurnKey Lender Platform has several pre-configured solutions packages including Commercial, Consumer, Pay Later, Auto, Mortgage, Leasing, Factoring. Built in constant collaboration with lenders worldwide, TurnKey Lender is the ultimate solution that answers real-life digital lending challenges in a sophisticated manner.
  • 10
    DocsCorp

    DocsCorp

    DocsCorp

    Document management professionals turn to DocsCorp when they are looking for easy-to-use software that empowers them to work safer and smarter. We are a global brand with more than 500,000 users in over 65 countries. Our product portfolio is a list of must-have technologies that include document creation, email recipient checking, metadata cleaning, document comparison, PDF creation, and image file conversion to PDF, which can be accessed on the desktop, server or cloud. Our products integrate out-of-the-box with leading enterprise content management systems to streamline processes and to drive business efficiency. We offer organizations a combination of on-premises and cloud integrations. We work with industries that are document-centric to help them manage their most critical asset - documents. This includes Government Departments, Legal Services, Financial Services, and Technology companies.
    Starting Price: $49.50/user
  • 11
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks. Recognized as creators of the Cyber Asset Attack Surface Management (CAASM) category and innovators in SaaS Management Platform (SMP) and SaaS Security Posture Management (SSPM), Axonius is deployed in minutes and integrates with hundreds of data sources to provide a comprehensive asset inventory, uncover gaps, and automatically enforce policies and automate action.
  • 12
    Teamstack

    Teamstack

    Teamstack

    Never compromise security for convenience, choose both. Grow your team seamlessly by automating identity management for your web, mobile and legacy apps. Take efficiency to another level by integrating day-to-day applications with our identity management platform and enable employees, contractors and customers to work together seamlessly. Take advantage of pre-built integrations, Single Sign-On and one-click user provisioning and allow your team to conveniently sign in to any application passwordless with multi-factor authentication. Your workforce deserves easy access to your applications — whether they are cloud-based, custom-built or even integrated on-premise. High standards in identity management should not be limited to Fortune 500s — gain access to best-in-class security and accessibility features that protect your business, boost your efficiency and save valuable time. Whenever an employee tries to access a cloud app his login is now compliant with our access policies.
    Starting Price: $3 per user per month
  • 13
    SafeBase

    SafeBase

    SafeBase

    Share your security program the easy way. Smart trust center that simplifies security and compliance reviews. Slash time spent on questionnaires and NDAs by 90%. Showcase completed questionnaires that satisfy most needs. Be quicker to fill out any custom questionnaires. Automate NDA signing and streamline approvals. Scale your security knowledge and answer fewer repetitive Qs. Offer instant access to the security information for sales and CS. Maintain a searchable database with click-to-copy responses. Update your public trust center with ease. Speed up the sales cycle by 7 days. Impress potential customers from the jump. Make procurement easy for accounts. Get new leads from your security page. Save time for buyers, security, and sales. Self-serve access for customers. Fewer tasks for you. Reports, requests, and a lot less manual work. Achieve time savings and better customer relationships.
    Starting Price: $100 per month
  • 14
    ScoreDetect

    ScoreDetect

    ScoreDetect

    Boost your audience’s trust, so your work stands out from others. We offer ways to help you display trust markers so that you can show your audience that you are the original creator. ScoreDetect has you covered with a fast, easy, and secure way to protect your digital content with the most integrations in the industry we know of. We can also assist you with your technical integrations in our Enterprise plan. ScoreDetect is an official partner of the SKALE blockchain, an eco-friendly blockchain with zero gas fees and a sustainable, predictable cost model. SKALE reduces the high energy usage associated with blockchain mining and transaction fees, making it an environmentally-friendly blockchain solution. Reduce your carbon footprint with our eco-friendly blockchain technology.
    Starting Price: $11.31 per month
  • 15
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 16
    Google Cloud Identity
    A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.
    Starting Price: $6 per user per month
  • 17
    Locurity

    Locurity

    Locurity

    Locurity provides patent pending 360 degree security platform using 'zero trust' security model that continuously defends this new enterprise ‘identity perimeter’. Identity is the new enterprise perimeter, protect it now. Defend against 81% of all cyber attacks. Security breaches often start with compromised identity (Verizon DBIR). Detect cyber attacks proactively. Protect before attacks turn to breaches. Secure your enterprise assets. Prevents numerous identity/credential borne attacks such as - phishing, whaling, hacking, guessing, brute forcing, scraping, social engineering, keylogging, ATO, credential stuffing etc. Decentralized architecture - no honeypot of identity crown jewels. Increase productivity while minimizing cost of login/password/access related helpdesk tickets. Email, VPN, SaaS (Office365, GSuite, Salesforce, BOX, Slack...), Healthcare/Finance apps and many more. Biometric (TouchID/FaceID), Pin/Pattern and elliptic curve cryptography based multi factor authentication.
  • 18
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 19
    elba

    elba

    elba

    elba is the ultimate experience to secure your team in their daily work. Scan, monitor, and resolve your vulnerabilities at scale. Your company’s security is super-powered by our collaborative approach. Detect all the sensitive data shared externally, and reduce your risks of data loss. Automatically remediate your potential alerts with the power of employees' context. Get a full visibility of all SaaS apps ever used in your company. Clean unused, non-compliant, and risky apps. Reduce phishing risks by 99% and nudge your employees to activate MFA across all SaaS apps. Educate your collaborators from day one with a delightful experience. At every step of your collaborators' journey, elba ensures that your team is aware and trained in your latest internal policy requirements. Security guidelines, GDPR, SOC2, and more, we got you covered. We dramatically reduce phishing risk, with our automated, hyper-customized phishing. Track their improvement as weeks go by and measure their progress.
  • 20
    AgentAuth

    AgentAuth

    Composio

    AgentAuth is a specialized authentication platform designed to facilitate secure and seamless access for AI agents to over 250 third-party applications and services. It offers comprehensive support for various authentication protocols, ensuring reliable connections with automatic token refresh. The platform integrates seamlessly with leading agentic frameworks such as LangChain, CrewAI, and LlamaIndex, enhancing the capabilities of AI agents. AgentAuth provides a unified dashboard for complete visibility into user-connected accounts, enabling efficient monitoring and issue resolution. It also offers white-labeling options, allowing customization of the authentication process to align with product branding and OAuth developer applications. Committed to high-security standards, AgentAuth complies with SOC 2 Type II and GDPR, employing strong encryption for data protection.
    Starting Price: $99 per month
  • 21
    Zelt

    Zelt

    Zelt

    Zelt is a comprehensive, all‑in‑one human capital management (HCM) platform designed to manage the full employee lifecycle within a single, unified system. It centralizes employee data and automates workflows across HR, payroll, benefits, time‑off, performance, engagement, device provisioning, app access, and contractor management. With Zelt, teams can centralize onboarding, document storage, custom approval processes, reminders, and regulatory compliance; automate payroll processing, benefits enrolment and reconciliation, and global contractor payments; manage time‑off requests (including holiday, sick, WFH, parental leave) tightly integrated with payroll; oversee IT ops by provisioning and securing apps and devices, spotting inactive access, and remotely managing hardware; and facilitate people development through engagement surveys, performance reviews with anonymity features and automated timelines, and goal‑setting tools aligned to key results.
    Starting Price: $5 per month
  • 22
    Nightfall

    Nightfall

    Nightfall

    Discover, classify, and protect your sensitive data. Nightfall™ uses machine learning to identify business-critical data, like customer PII, across your SaaS, APIs, and data infrastructure, so you can manage & protect it. Integrate in minutes with cloud services via APIs to monitor data without agents. Machine learning classifies your sensitive data & PII with high accuracy, so nothing gets missed. Setup automated workflows for quarantines, deletions, alerts, and more - saving you time and keeping your business safe. Nightfall integrates directly with all your SaaS, APIs, and data infrastructure. Start building with Nightfall’s APIs for sensitive data classification & protection for free. Via REST API, programmatically get structured results from Nightfall’s deep learning-based detectors for things like credit card numbers, API keys, and more. Integrate with just a few lines of code. Seamlessly add data classification to your applications & workflows using Nightfall's REST API.
  • 23
    IDnow

    IDnow

    IDnow

    It takes customers just a few minutes to conveniently register for your services. You need a quick and easy identity verification solution, available anytime and anywhere, while not comprising on security and usability? A blend of modern AI and machine learning, trained on millions of datasets and backed by the expertise of a network of top identity and fraud specialists, gives you the best of both worlds. KYC identification in just a few minutes. Available anytime, anywhere in 195 countries and 30+ languages. Excellent usability, desktop, tablet, IDnow mobile app or SDK and POS processes. Confirmed by very good user ratings. Modern AI and machine learning technology trained on millions of datasets. All data centers, ident centers and ident specialists are completely located in the European Union to ensure a high level of data protection for our platform. IDnow AutoIdent verifies documents anytime and anywhere.
  • 24
    Rightsline

    Rightsline

    Rightsline

    This secure cloud technology travels with you wherever you go, offering real-time visual avails, pipeline management, and contract visibility in a complete enterprise system. Powerful enough to be serving the titans of earthly entertainment, Rightsline is affordable enough for many small and midsize players, too. Rightsline is the only comprehensive, cloud-based solution with both the flexibility to work the way you do and the sheer muscle to scale your business to its highest potential. Track any kind of metadata for any kind of library, including your underlying physical and digital assets. Track inbound or outbound licenses, with multi-dimensional rights sets that put real-time avails at your fingertips. Calculate many kinds of royalties, even complex combinations. Issue accounting documents directly, or sync with your ERP. Calculate many kinds of royalties, even complex combinations. Issue accounting documents directly, or sync with your ERP.
  • 25
    ThreatBlockr

    ThreatBlockr

    ThreatBlockr

    The only solution that blocks every threat from every path in your network. Networks relying primarily on archaic firewall technology without including other more modern security layers like ThreatBlockr® are easy prey for cybercriminals. Firewalls are easily blinded by encrypted attacks. They’re easily traversed by port forwarding fragmented packet attacks. They’re often misconfigured. They can also get confused by simple extended web and messaging protocols. Side-channel attacks, BYOD, and WFH all compound the problem. Organizations use ThreatBlockr® to gain instant network protection without having to drastically re-engineer their existing security stacks, whether they are on-premise, in the cloud, or both. Fix your security stack by deploying ThreatBlockr® today, and get back to working with the confidence that you’re secure, wherever you are. Enable an ideal protected network while improving firewall efficiency.
  • 26
    Entitle

    Entitle

    BeyondTrust

    Entitle fuses a security-first approach to provisioning and governance, with a commitment to business enablement for all teams, from R&D and sales to H&R and finance. Speed up provisioning to unlock security policies that automatically update with changing infrastructure and employee needs. Grant permissions to specific resources, like Google Drive folders, database tables, Git repositories, and more. Keep privileged resources and roles safe by granting access only when needed, and removing them when not. Give peers, managers, and resource owners the power to approve access requests, for authorizations you can trust. With automated access requests and zero-touch provisioning, DevOps, IT, and all teams can save serious time and resources. Users can request access to what they need via Slack, Teams, Jira, or email for a seamless approval process. Grant bulk permissions for fast onboarding and offboarding to keep up with organizational changes.
  • 27
    Threater

    Threater

    Threater

    Threater Enforce deploys and enforces data — in real time — at scale — across your entire network and blocks all known bad threat actors from ever entering your network. With full threat source attribution on every connection in your network, you are not only blocking all of the known bad threat actors at scale — but you’re arming your team with powerful insights about what is happening in your network — all in real time. Threater is a solution for managing and understanding all threats that blocks both inbound and outbound threats on your network. This service works with your existing security stack by blocking threat actors before they can even access your network. Threater has built-in support for most popular apps and common connectors, so you can maximize value and share data across all your tools.
  • 28
    Akitra Andromeda
    ​Akitra Andromeda is a next-generation, AI-enabled compliance automation platform designed to streamline and simplify regulatory adherence for businesses of all sizes. It supports a wide range of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, and custom frameworks, enabling organizations to achieve continuous compliance efficiently. The platform offers over 240 integrations with major cloud platforms and SaaS services, facilitating seamless incorporation into existing workflows. Akitra's automation capabilities reduce the time and cost associated with manual compliance management by automating monitoring and evidence-gathering processes. The platform provides a comprehensive template library for policies and controls, assisting organizations in establishing a complete compliance program. Continuous monitoring ensures that assets remain secure and compliant around the clock.
  • 29
    Proofpoint Intelligent Classification and Protection
    Augment your cross-channel DLP with AI-powered classification. Proofpoint Intelligent Classification and Protection is an AI-powered approach to classifying your business-critical data. It recommends actions based on risk accelerating your enterprise DLP program. Our Intelligent Classification and Protection solution helps you understand your unstructured data in a fraction of the time required by legacy approaches. It categorizes a sample of your files using a pre-trained AI-model. And it does this across file repositories both in the cloud and on-premises. With our two-dimensional classification, you get the business context and confidentiality level you need to better protect your data in today’s hybrid world.
  • 30
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • Previous
  • You're on page 1
  • Next