Alternatives to ARIA KMS

Compare ARIA KMS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ARIA KMS in 2024. Compare features, ratings, user reviews, pricing, and more from ARIA KMS competitors and alternatives in order to make an informed decision for your business.

  • 1
    groundcover

    groundcover

    groundcover

    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity. 100% visibility, all the time. Cover your entire Kubernetes stack instantly, with no code changes using the superpowers of eBPF instrumentation. Take control of your data, all in-cloud. groundcover’s unique inCloud architecture keeps your data private, secured and under your control without ever leaving your cloud premises.
    Compare vs. ARIA KMS View Software
    Visit Website
  • 2
    Trend Micro Cloud Edge
    Trend Micro Cloud Edge integrates with existing tools and processes for maximum efficiency and optimal security. Combines a physical appliance with an industry-unique cloud scanning function for maximum performance and protection. Benefit from a next-generation, on-premises unified threat management appliance plus the convenience of security as a service. Protection managed natively from the cloud provides zero-touch deployment, multi-tenant management, and complete control of your customers’ security in one central location. Simple deployment and user-friendly management allow you to maintain security without compromising on performance. With our unique, pay-as-you-go MSP pricing model, there are no upfront costs and no term commitments. Cloud Edge intelligently combines a comprehensive set of protection techniques and features, providing maximum protection and performance to your customers.
  • 3
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 4
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 5
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 6
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 7
    XCrypt Data Encryption Platform
    Customers worldwide choose Zettaset products for use in high performance, high availability and seamlessly scalable data environments. Zettaset products are designed to function with extremely low latency to support the most demanding deployment requirements, including high-speed transactions, in-memory databases, and real-time, web-based applications. The XCrypt™ Data Encryption Platform has been designed from the ground up for optimal performance and scalability in distributed systems and elastic cloud environments. XCrypt introduces extremely low latency to the compute environment, making it ideal for in-memory stored data and transactional environments where sub-second response times are essential.
  • 8
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 9
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 10
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 11
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 12
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 13
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 14
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 15
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 16
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 17
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 18
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 19
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 20
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 21
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 22
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 23
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 24
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 25
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 26
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 27
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 28
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 29
    VMware Aria Operations
    Enable IT teams to be more proactive and agile with VMware Aria Operations (formerly vRealize Operations) — a self-driving IT Operations Management platform for private, hybrid and multi-cloud environments that incorporates AI and predictive analytics. Automate and simplify operations management with VMware Aria Operations. With full-stack visibility from physical, virtual and cloud infrastructure—including Virtual Machines (VMs) and containers—to the applications they support, VMware Aria Operations provides continuous performance optimization, app-aware intelligent remediation, and integrated compliance. It is available on premises and as-a-service. Trust self-driving operations for your most demanding applications from the IDC market leader for four consecutive years. Use VMware Aria Operations on premises or as a cloud service. Consume standalone, as part of Aria Suite.
    Starting Price: $11.95 per month
  • 30
    SonicWall Email Security
    Protect against today’s advanced email threats using a cloud email security service. Email is the most common threat vector used by cyber criminals. Deploy the cloud-based service that protects your organization from advanced email threats such as targeted phishing attacks, ransomware, business email compromise (BEC) and email fraud. SonicWall solution reduces administrative overhead through easy deployment, management and reporting. The massively expanding, distributed IT reality is creating an unprecedented explosion of exposure points for sophisticated cybercriminals and threat actors to exploit. SonicWall Email Security is ideal for organizations that need a dedicated on-premises solution. SonicWall’s solution can be deployed as a hardened physical appliance, robust virtual appliance or software application. The multi-layered solution provides comprehensive inbound and outbound protection, and defends against advanced email-borne threats such as ransomware.
  • 31
    DocRAID

    DocRAID

    AvailabilityPlus

    Multi-award-winning, CloudRAID driven security. Resilient, yet easy to use file sharing. On-premise on your metal or off-premise in our data centers. Zero-knowledge-Storage. Email protection. No software installation is required at the receiver. CloudRAID based, highly resilient, yet easy-to-use email encryption gateway. No software to maintain, no PKI required. No software installation. No hassles. All email clients supported. All devices. Ready to protect in minutes. Software to identify vulnerabilities and to harden critical infrastructures. Built-in cooperation with the German Federal Office for Information Security (BSI). Fragmentation, encryption and redundant distribution reduce your attack surface. DocRAID® is leading in CloudRAID technology. Fragmentation, encryption and redundant distribution protect your files during transport and at rest. Redundant distribution of encrypted data fragments to multiple jurisdictions adds an extra layer of protection.
    Starting Price: $24 per month
  • 32
    Ivanti Connect Secure
    Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.
  • 33
    ProxySG and Advanced Secure Gateway
    Symantec delivers high-performance on-premises secure web gateway appliances that protect organizations across the web, social media, applications, and mobile networks. Combine with cloud-delivered Web Security Service for a centrally-managed, hybrid secure web solution. Symantec protects organizations with a scalable, high-performance web proxy appliance designed to secure communications from advanced threats targeting web activity. Symantec Secure Web Gateway solutions draw on a unique proxy server architecture that allows organizations to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience. Get complete visibility into SSL/TLS-encrypted web traffic with Symantec's advanced secure web proxy and cloud security solutions. Symantec Web Isolation prevents websites from delivering zero-day malware, protects users' devices by executing web sessions away from endpoints, and safely sends rendering information to the browser.
  • 34
    Symantec Data Center Security
    Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services.
  • 35
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 36
    IronCore Labs

    IronCore Labs

    IronCore Labs

    IronCore's SaaS Shield is a platform for managing Application-Layer Encryption in cloud software applications. It manages all of the concerns of such a system from key orchestration to rotation to audit trails. And it supports multi-tenant setups and BYOK/HYOK needs. Together with IronCore's other products, meaningfully protected data can still be usable and it can be searched over with Cloaked Search and Cloaked AI.
    Starting Price: $299/tenant
  • 37
    Aria

    Aria

    Aria Systems

    Aria helps enterprises make the shift from ownership to access, from one time purchases to ongoing relationships. Aria’s cloud-native billing and monetization platform is purpose-built to allow enterprises to bring sophisticated usage-based and subscription products and bundles to market. Offer products in new ways and expand your market to people and places you were unable to reach before. Aria orchestrates what you need to provide your customers with simple and effortless buying experiences. Web storefronts access Aria to present the right offers and pricing to drive customer acquisition by making it simple for users to sign up for services and take advantage of special offers and trial periods. With Aria, it’s easy to provide a consistent, positive buying and branding experience regardless of where your products are sold or by whom. Offers can reflect current customer relationships, such as transitioning from freemium offerings to paid subscriptions or service plan upgrades.
  • 38
    ARIA ADR

    ARIA ADR

    ARIA Cybersecurity Solutions

    ARIA Advanced Detection and Response (ADR) is an automated AI SOC solution purpose-built with the capabilities of seven security tools — including SIEMs, IDS/IPSs, EDRs, Threat Intel tools, NTAs, UEBAs, and SOARs. With this single, comprehensive solution organizations will no longer have to settle for limited threat surface coverage or struggle to integrate and maintain disparate tools at substantial cost and little return. ARIA ADR’s machine learning-powered threat models, guided by AI, can find and stop the most harmful network-borne threats such as ransomware, malware, intrusions, zero-day attacks, APTs and more—in just minutes. This is a powerful advantage over most traditional security operations approaches that surface more noise than threats and require highly-trained security operations staff. There is also a cloud-based version of ARIA ADR which is a great entry level option for organizations.
  • 39
    VMware Aria Automation
    Designed to deliver self-service clouds, multi-cloud automation with governance, and DevOps-based infrastructure management and security, VMware Aria Automation helps improve IT agility, productivity and efficiency so you can prepare for the future of your business. Establish consistent policies across multi-cloud environments and strengthen infrastructure with native compliance management, flexible guardrails, and vulnerability remediation. Rapidly set up and manage multi-cloud environments throughout the lifecycle with an intuitive, self-service consumption experience. Enable users to request and provision infrastructure resources across clouds with a unified and consistent IaaS consumption layer, self-service catalog, and idempotent REST API.
    Starting Price: $0.04527 per OSI per hour
  • 40
    InterScan Messaging Security
    Trend Micro™ InterScan™ Messaging Security provides the most comprehensive protection against both traditional and targeted attacks. Using the correlated intelligence from Trend Micro™ Smart Protection Network™ and optional sandbox execution analysis, it blocks spam, phishing, and advanced persistent threats (APTs). The included hybrid SaaS deployment option combines a powerful gateway virtual appliance with a SaaS prefilter that stops majority of threats and spam in the cloud—closer to their source. This hybrid solution delivers the best of both worlds: the privacy and control of an on-premises appliance with an in-the-cloud pre-filter for resource efficiency and proactive protection. The Data Privacy and Encryption Module solves the toughest regulatory compliance and data protection challenges by securing outbound data. This optional module offers easy-to-use identity-based encryption and customizable data loss prevention (DLP) templates for quick deployment.
  • 41
    Fiorano Hybrid Integration Platform (HIP)
    Create a secure, agile message-driven enterprise backplane with distributed, parallel data flow between endpoints for dynamic scalability and extensibility. The Fiorano Hybrid Integration Platform (HIP) allows integration specialists and application developers from organizations to rapidly deploy a lightweight, powerful, and scalable IT infrastructure backbone, enabling asynchronous information exchange across the extended enterprise. Fiorano HIP unifies multiple systems, on-premise or in-cloud, combining the elasticity of cloud, the security of on-premises systems and the computing power of multiple executions. Adapt quickly to volatile market conditions by adopting a dynamic and scalable architecture. Streamline information exchange and processes and increase efficiency and productivity. Use real-time availability and accessibility of data to enable faster decision-making across departments and instantly address ever-changing customer demands.
  • 42
    ARIA

    ARIA

    Ascensor

    ARIA is a comprehensive web based tour operator software that enables inbound and outbound tour operators to easily create estimates real-time from Anywhere using an internet browser on Any device Anytime within a short-time frame for group, FIT and dynamic packages. ARIA X exploits cloud technology to provide 24x7 availability and serves its user community with a single database to efficiently connect its suppliers, their services offered and travel agents to generate an estimate instantly. ARIA’s open architecture further permits customization to integrate web services from other suppliers and vendors to reduce double handling and manual operation. ARIA X is a comprehensive tour operator software with a fully fledge accounting module to supports its accommodation, transport, entrance fees, entertainment and other service provisions with capabilities to amend tour quotes/estimates while the customers on travel.
  • 43
    Aria

    Aria

    Aria Vet

    ARIA is an intelligent and versatile software to help veterinarians capture high-quality images. ARIA allows a practical, fast and homogeneous organization, sharing and storage of all diagnostic images taken with any x-ray device. The interface is intuitive, fast and extremely easy to use. It can be seamlessly integrated with your existing computer network in place, without any need for modification. ARIA is an intelligent and versatile software to help veterinarians capture high-quality images, generating clear results in just a few seconds in order to make more precise and prompt diagnoses. ARIA is structured in modules that can be integrated with each other. The system is flexible to meet user needs and can be manipulated to produce the best results. Aria is not just a software tool but a robust platform to manage the whole workflow of the clinic, from reports to medical records and from archives to administrative data.
  • 44
    Panduit SmartZone DCIM
    SmartZone™ Cloud Software is Panduit’s next generation DCIM solution. A true cloud-native platform, built from the ground up to take advantage of cloud flexibility and scalability as well as enhanced manageability, security, and operations ease of use and efficiency to manage Data Center, Enterprise and Edge Infrastructures. Supports the management, monitoring, and alerting for power, cooling, environmental, IT, and connectivity. Its secure cloud-based platform includes encryption on data at rest and in transit, two-factor authentication, fine-grained access control, security-focused development lifecycle, and harden with multiple industry-leading security scanning and assessment solutions designed to thoroughly analyze today's complex web applications and web services for security vulnerabilities.
  • 45
    Seald

    Seald

    Seald

    Every industry has its own data security challenges: strengthening customer trust, achieving compliance, minimizing the consequences of a data breach, ... Seald addresses these challenges by offering to simply integrate end-to-end encryption into your applications. The privacy of your customers' data will be assured by design with Seald's certified technology, protecting them even in the event of a data breach. By using server-side encryption (including KMS, HSM or BYOK), the data is first transferred in its clear-text version and is then protected with encryption by the server. The servers therefore have access to a clear-text version of the data, which means that if compromised, the data would become vulnerable. By using Seald, data is secured on the client side, before being sent to the server. This way, neither Seald nor the cloud hosting company can decrypt the protected data, even if servers are compromised.
    Starting Price: €499 per month
  • 46
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
    Starting Price: $0
  • 47
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 48
    Junos Security Director

    Junos Security Director

    Juniper Networks

    Security Director is your portal to SASE, bridging your current security deployments with your future SASE rollout. Security Director enables organizations to manage security anywhere and everywhere, on-premise and in the cloud with unified policy management that follows users, devices, and applications wherever they go. Policies can be created once and applied everywhere. Customers can use both Security Director Cloud and on-premises instances simultaneously to securely transition to a SASE architecture. Security Director provides extensive security policy management and control through a centralized interface and enforces policies across physical, virtual, and containerized firewalls on-premises and across multiple clouds simultaneously. Quickly manage all phases of the security policy lifecycle for firewalls, including zero-touch provisioning and configuration, and gain insight into sources of risk across your network.
  • 49
    ZoneZero

    ZoneZero

    Safe-T Data

    ZoneZero® enables organizations to implement identity-based security and add per-application secondary multi-factor authentication (MFA) for all types of users – network users, VPN users, remote access (ZTNA, SDP, PAM) users, etc. Secondary MFA can be added to any type of application (legacy applications, proprietary services, RDP, file shares, SSH, SFTP, web applications, databases, etc) without the need to redesign the network, applications, or remote access solutions. Creates true separation of the data and control planes. Applies application-level policies for all of your users. Enables you to apply identity-based segmentation in your network. Introduces MFA to any VPN, service, or application. Central management for full transparency and efficacy. Seamless implementation and rapid deployment.
  • 50
    Trustgrid

    Trustgrid

    Trustgrid

    Trustgrid is the SD-WAN for application providers. The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single platform we allow software providers to manage and support distributed application environments from the cloud to the edge. With the Trustgrid platform you can: • Build cloud to on-premise networks at scale • Manage and support 100s of networks from a single pane of glass • Control on-premise apps and appliances as if they were in the cloud • Run and support Docker containers in any cloud or on-premise • Provide your support teams secure access to edge application environments Simplify connectivity, enhance security, and guarantee network availability with Trustgrid.