Alternatives to AWS Client VPN

Compare AWS Client VPN alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AWS Client VPN in 2026. Compare features, ratings, user reviews, pricing, and more from AWS Client VPN competitors and alternatives in order to make an informed decision for your business.

  • 1
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    Thinfinity® Workspace 7 is a comprehensive, secure platform that offers a zero-trust approach, enabling secure and contextual access to corporate virtual desktops, virtual applications, internal web apps, SaaS, and files, whether they are on Windows, Linux, or mainframes. It supports various deployment models, including cloud, on-premise, and hybrid settings, and can be deployed on any cloud provider of your choice. With its proprietary reverse gateway technology, Thinfinity® Remote Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
    Leader badge
    Compare vs. AWS Client VPN View Software
    Visit Website
  • 2
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Partner badge
    Compare vs. AWS Client VPN View Software
    Visit Website
  • 3
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control. OpenVPN also has a cloud-delivered solution called CloudConnexa.
    Starting Price: Free Up to 3 Users
  • 4
    Twingate

    Twingate

    Twingate

    The way we work has changed. People now work from anywhere, not just from an office. Applications are based in the cloud, not just on-premise. And the company network perimeter is now spread across the internet. Using a traditional, network-centric VPN for remote access is not only outdated and difficult to maintain, but exposes businesses to security breaches. VPN infrastructure is costly and time-consuming to procure, deploy, and maintain. Inability to secure access at the app level means hacks can expose whole networks. Twingate enables organizations to rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud.
    Starting Price: $10 per user per month
  • 5
    AWS VPN

    AWS VPN

    Amazon

    AWS VPN enables secure connections between on-premises networks and AWS Virtual Private Clouds (VPCs) using IPsec VPN tunnels. Each connection includes two tunnels for high availability, terminating in different availability zones to ensure resilience. It supports both static and dynamic routing with BGP, and offers customizable tunnel options, including inside tunnel IP addresses, pre-shared keys, and BGP Autonomous System Numbers (ASNs). Accelerated Site-to-Site VPN leverages AWS Global Accelerator to route traffic through the nearest AWS edge location, improving performance by reducing latency and jitter. AWS Client VPN is a fully managed, elastic VPN service that allows users to securely access AWS and on-premises resources from any location using an OpenVPN-based client. It supports authentication through Active Directory, mutual certificate authentication, and SAML-based federated authentication.
  • 6
    XplicitTrust Network Access
    XplicitTrust Network Access is a Zero Trust Network Access (ZTNA) solution that provides secure, seamless access to applications regardless of location for users working from anywhere. It provides identity-based access control that integrates with existing identity providers for single sign-on (SSO) and multi-factor authentication (MFA) using factors such as user identity, device security, location and time. The platform includes real-time network diagnostics and centralized asset management for better oversight. Clients require no configuration and the solution is compatible with platforms including Windows, MacOS and Linux. XplicitTrust uses strong encryption, end-to-end protection, automatic key rotation and context-aware authentication to provide robust security. It also supports scalable application access and secure connections for IoT, legacy applications and remote desktops, making it versatile for today's security needs.
    Starting Price: $5/month/user
  • 7
    Cloudflare Access
    Enforce default-deny, Zero Trust rules for users accessing any application, in any on-premise private network, public cloud, or SaaS environment. Connects users faster and more safely than a VPN and integrates flexibly with your identity providers and endpoint protection platforms. Try it forever for up to 50 users with our Free plan. Granular application access control without lateral movement. Users can seamlessly access the resources they need and are blocked from those they do not. Cloudflare is both identity and application agnostic, allowing you to protect any application, SaaS, cloud, or on-premises with your preferred identity provider. Before you grant access, evaluate device posture signals including presence of Gateway client, serial number, and mTLS certificate, ensuring that only safe, known devices can connect to your resources.
    Starting Price: $7 per user per month
  • 8
    Ivanti Connect Secure
    Zero trust secure access to the cloud and data center. Reliable, secure access means higher productivity and lower costs. Ensures compliance before granting access to the cloud. Data protection with always-on VPN and lockdown mode. The most widely deployed SSL VPN for organizations of any size, across every major industry. Reduce management complexity with only one client for remote and on-site access. Directory Services, Identity Services, EMM/MDM, SIEM, NGFWs. Ensure that all devices comply with security requirements before connecting. Simple, secure and streamlined access to on-premises and cloud-based resources. Protect data-in-motion with on-demand, per-application and always-on VPN options. Centrally manage policy and track users, devices, security state and access activity. Access web-based apps and virtual desktop products with nothing to install. Data access and protection requisites for industry and regulatory compliance.
  • 9
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else you’ve tried. Work-saving touches — like built-in provisioning tools and on-premises and cloud integrations — reduce the workload for IT, from deployment through everyday management. Get strong IAM to move faster into the future. Cloud-based Identity as a Service scales quickly to accommodate new users, expanding use cases, and evolving security threats.
  • 10
    LogMeIn Hamachi
    Create and manage virtual networks on-demand as you need them. Quickly and easily provision virtual network client software to new computers without having to go onsite. Run Hamachi in the background of networked computers so you always have access even when they’re unattended. Available with Standard, Premium and Multi-network subscriptions. Provide remote users with secure access to specific computers on your network from any location, without modifying firewalls or network routers. Quickly and easily create a simple, virtual, mesh network that allows remote machines to directly connect to each other, thereby giving users basic network access to all the network resources they need. Control network access and usage, including password management, network authentication, network locking, and ongoing network membership.
    Starting Price: $49 per year
  • 11
    Approw

    Approw

    Approw

    Approw is an easy-to-implement, adaptable authentication and authorization platform, built for the cloud, but compatible with many on-premises applications. Approw focus on identity and build a social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business, but also redefines the user experience. Multi-factor Authentication (MFA) is a simple and effective security approach that goes beyond usernames and passwords to Add a layer of security. For example, U-Shield for banks and off-site login require SMS verification. Empower Approw applications to quickly enable multi-factor authentication (MFA), and immediately improve application authentication and access security levels. Compared with traditional multi-factor authentication, "adaptive" multi-factor authentication can choose to apply different MFA methods according to the current security situation.
    Starting Price: $19 per month
  • 12
    PROXY Pro

    PROXY Pro

    PROXY Networks

    Hosted or On-Premise remote support software for IT departments and helpdesk. With Proxy Networks, you can provide remote desktop and troubleshoot PCs, servers and mobile devices securely. Our encryption, authentication and privileged access management allows our customers to define their own security levels and flexible remote access policies. PROXY Pro is easy to use and designed to fit any budget, making it easy to meet even the most complex remote desktop management needs. We provide remote access software for all platforms, including virtual computers and Thin Clients, regardless of the user’s system. Use our PROXY Deployment Tool and manage host settings anytime to create custom configurations for remote access to your machines, or use our web-based Host on Demand (HOD) for all your clientless remote access connections. Proxy Networks' software supports any system or endpoint, enabling IT professionals to provide remote support immediately and securely both.
  • 13
    OpenOTP Security Suite
    OpenOTP Security Suite is a European Enterprise-grade Security all-in-one Solution for Identity & Access Management (IAM), including : - Multi-Factor Authentication (MFA/2FA) with U2F / OTP, applicable even for Legacy Applications - Federation Services (SSO with OpenID & SAML / ADFS) - Network Access Control (protecting Wifi & Ethernet Swiches) - VPN security (via an included Radius Bridge), designed specifically for remote work - Windows logins & Remote Desktop Services (RDS) OpenOTP Security Suite combines mobile technology with proven security standards to offer professionals and non-professionals the best alternative, bringing modularity and flexibility to suit any infrastructure's needs. OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)
    Starting Price: €1.85/User/M
  • 14
    Rublon

    Rublon

    Rublon

    Rublon enables your workforce to securely access your organization's networks, servers and applications. Protect your data via easy-to-use multi-factor authentication and comply with data protection regulations like GDPR. Deploy Rublon organization-wide, enabling MFA for all your cloud apps, VPNs, servers, workstations, internal as well as on-premise apps.
    Starting Price: $1/month/user
  • 15
    Oracle Access Management
    Access Management delivers risk-aware, end-to-end multifactor authentication (MFA) and single sign-on (SSO) that seamlessly integrate identities and systems across cloud and on-premises. Available to deploy as an image in Oracle Cloud Infrastructure or in on-premises data centers, organizations gain flexibility to control access for existing enterprise platforms and support their migration to cloud. Organizations can ensure these policies follow the user regardless of the device and location to secure access to data anywhere, anytime, from any device. Deliver seamless user access controls across the enterprise and the cloud from any device. Single sign-on (SSO) simplifies access to minimize the requirements for the user, while enabling consistent access security. Adaptive authentication reduces risk by increasing login requirements for users based on device, location, and behavior when access is deemed high-risk.
  • 16
    Delinea Connection Manager
    Rapid deployment to start. Elastic scalability to grow. Gain visibility across hundreds of different connections in a single location. From a single interface, access required credentials from the secret server vault, on-premises, or in the cloud. Monitor and record simultaneous remote sessions. Quickly switch between active sessions or easily launch a new session in a separate tab, easily expanding to full screen. Efficiently manage multiple remote connections from a single screen. Launch and configure sessions across multiple environments. As IT groups scale their efforts across larger networks, new cloud services, various connection protocols, numerous privileged users, different business groups, and customer environments, they need to closely monitor privileged accounts across sessions. Teams must navigate complex networks, cloud services, and user needs. Connection Manager is an advanced remote connection management solution that provides one place to manage remote sessions.
  • 17
    Viscosity

    Viscosity

    SparkLabs

    Viscosity has been designed from the ground up for both macOS and Windows, using native frameworks for perfect integration. Viscosity has been protecting users for over a decade, everyone from home users to large enterprise, with regular updates the entire time. Viscosity monitors your OpenVPN connections to ensure you know all the important traffic, network and connection details in style. Easily bundle Viscosity with settings and connections so your users are ready to get started. Create simple deployable connection profiles. Powerful authentication options, connection folders, IPv6, traffic obfuscation, advanced networking, simultaneous connections, and more! Every component of Viscosity has been designed to maximise the speed and reliability of your OpenVPN connections. Control Viscosity using AppleScript or VBScript, and call custom scripts and actions when a VPN connection changes state.
    Starting Price: $14 one-time payment
  • 18
    Huawei Cloud VPN
    Virtual Private Network (VPN) establishes a secure, encrypted communication tunnel between your local data center and your VPC on HUAWEI CLOUD. With VPN, you can build a flexible and scalable hybrid cloud environment. Huawei-proprietary hardware encrypts data based on IKE and IPsec with carrier-class reliability and ensures VPN connection stability. You can use the VPN service to connect your VPC on the cloud to your local data center and add more computing capacity to your network by leveraging the scalability and elasticity of the cloud. Uses Huawei-proprietary hardware devices to establish secure, reliable, and encrypted IPsec tunnels over the Internet. Enables you to extend your local data center into HUAWEI CLOUD, meeting application and service scaling requirements. Allows you to purchase VPN connections on demand. The connections are immediately accessible upon creation.
    Starting Price: $0.0082 per hour
  • 19
    Azure VPN Gateway
    Azure VPN Gateway connects your on-premises networks to Azure through Site-to-Site VPNs in a similar way that you set up and connect to a remote branch office. The connectivity is secure and uses the industry-standard protocols Internet Protocol Security (IPsec) and Internet Key Exchange (IKE). Point-to-Site VPN lets you connect to your virtual machines on Azure virtual networks from anywhere, whether you are on the road, working from your favorite café, managing your deployment, or doing a demo for your customers.
  • 20
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN

    Amnezia VPN is a self-hosted client that allows you to set up a VPN on your own server using various protocols: OpenVPN, WireGuard, OpenVPN over Cloak, AmneziaWG, XRay, and others. The service does not log your requests. In addition to the self-hosted option, Amnezia VPN offers AmneziaFree, a free VPN available in Russia, Turkey, Iran, Kyrgyzstan, and Myanmar, which allows bypassing restrictions on socially significant and popular resources for free. Amnezia VPN also provides Amnezia Premium, a VPN service for unrestricted access to any websites with five different locations and unlimited connection speed. Based on WireGuard, the AmneziaWG protocol enables bypassing restrictions even in countries where other VPN protocols are blocked. The client’s source code, as well as the source code for the AmneziaWG protocol, is available on GitHub.
    Starting Price: €2.50/month
  • 21
    Entrust Identity Essentials
    Fast, cost effective multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach. Start with an easy-to-use, easy-to-deploy on-premises MFA solution, then, if and when it makes sense, migrate to the cloud with Identity as a Service. Seamless integration between the two ensures a frictionless experience while benefitting from three extra authentication options: device fingerprint, mobile push, and grid cards. Secure and enable your company´s digital business with one solution, one license. Limit user friction with adaptive authentication and self-service password resets. Provision different authentication methods for different users and requirements. Available authenticators include SMS, email, voice, and OTP. Option to leverage smart phone biometrics including fingerprint and facial match. ActiveSync for Outlook protects unauthorized devices from accessing users’ email without requiring MDM integration.
  • 22
    LexisNexis TrueID
    Government-issued identity documents such as driver’s licenses, passports, visas, and national IDs, are often at the heart of identity vetting processes. Traditionally, organizations have relied on sophisticated on-premise solutions for global document authentication. As organizations evolve to multi-channel and geographically dispersed offerings, it is vital to access proven document authentication capabilities across multiple channels and devices. Legitimate ID documents are constantly evolving with new standards and increasingly advanced security features. Illegitimate on-demand ID sellers are keeping pace with sophisticated, readily available fake IDs. Today, a proven, multi-channel, globally supported ID document authentication process as a service solution is readily available, on-premise, on-device, and via hosted web service API. LexisNexis TrueID helps organizations confidently authenticate identity documents in face-to-face and remote transactions.
  • 23
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 24
    Cisco ACI
    Achieve resource elasticity with automation through common policies for data center operations. Extend consistent policy management across multiple on-premises and cloud instances for security, governance, and compliance. Get business continuity, disaster recovery, and highly secure networking with a zero-trust security model. Transform Day 2 operations to a more proactive model and automate troubleshooting, root-cause analysis, and remediation. Optimizes performance, and single-click access facilitates automation and centralized management. Extend on-premises ACI networks into remote locations, bare-metal clouds, and colocation providers without hardware. Cisco's Multi-Site Orchestrator offers provisioning and health monitoring, and manages Cisco ACI networking policies, and more. This solution provides automated network connectivity, consistent policy management, and simplified operations for multicloud environments.
  • 25
    Delinea Database Access Controller
    Delinea’s Database Access Controller enables enterprises to adopt modern cloud databases from AWS, Google, Azure, Oracle, Redis, and others while still enforcing appropriate access levels, multi-factor authentication, complete reporting, and auditing workflows. Proxy connections through a centralized portal and restrict direct database access. Protect databases with layered authentication, authorization, and granular role-based access controls. Provides time-based access, auditable logs, and reports to generate alerts and notifications. Gain granular access control to databases, such as Oracle, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, AWS RDS, and Google DB, whether on-premise or in the cloud. See who is accessing databases and govern their database access using capabilities such as multi-factor authentication (MFA) and logging activities for tighter database security. Secure database access to protect your most valuable information.
  • 26
    MetaDefender OT Access
    MetaDefender OT Access enables secure, just-in-time remote access to Operational Technology (OT) and Cyber-Physical Systems (CPS), allowing both internal employees and external vendors to connect safely over mutually authenticated, outbound-only TLS tunnels without exposing OT networks to inbound traffic risks. It supports various industrial and IT protocols (e.g., Ethernet/IP, MODBUS, OPC UA, S7Comm, Telnet, SSH, RDP, HTTPS), enabling compatibility across a wide range of legacy and modern OT infrastructure. Depending on deployment mode, the solution can be cloud-managed (with remote configuration via AWS-hosted services) or on-premises (with a local Management Console), making it suitable for both internet-connected and air-gapped environments. It leverages components such as an Admin UI, Windows client (or service-level client), and a Management Console (in on-site deployments) to manage connections and enforce security policies.
  • 27
    SurePassID

    SurePassID

    SurePassID

    SurePassID is an advanced, deploy-anywhere multi-factor authentication platform built to secure both IT and OT (operational technology) environments, including critical infrastructure, legacy systems, on-premise, air-gapped, hybrid cloud, or fully cloud-based operations. It supports a wide variety of authentication methods; passwordless, phishing-resistant approaches like FIDO2/WebAuthn (with FIDO2 PIN, biometric, or push), as well as one-time passwords (OTP via OATH HOTP/TOTP), mobile push, SMS, voice, and traditional methods. SurePassID integrates with common operating systems, including domain and local logins, RDP/SSH remote access, and even legacy or embedded Windows systems often found in OT/ICS/SCADA environments, enabling offline 2FA when needed. It also supports securing VPNs, network devices, appliances, legacy applications, web apps (via SAML 2.0 or OIDC identity provider functionality), and network-device access protocols.
    Starting Price: $48 per year
  • 28
    Hyperport

    Hyperport

    Hyperport

    The Hyperport is a unified secure-user-access solution that merges Zero-Trust Network Access (ZTNA), Privileged Access Management (PAM), and Secure Remote Access (SRA) into one flexible architecture, allowing internal staff, remote employees, vendors and third-party partners to connect in seconds without compromising security. It enforces least-privilege access across an organisation’s entire infrastructure, from Windows and web applications to industrial control systems, via just-in-time authorization, multi-factor authentication at every security zone, real-time monitoring, session recording, and dynamic entitlement management. The platform is built for hybrid, cloud and on-premises deployments with multi-site support, enabling centralised management across IT, OT, ICS and CPS environments; it features browser-based portals (Web, RDP, SSH, VNC), encrypted file transfers, immutable audit logs, micro-segmentation and policy enforcement to reduce the attack surface.
  • 29
    FileFlex

    FileFlex

    FileFlex

    The FileFlex Enterprise ZTDA platform provides secure remote data access and sharing across your entire Hybrid-IT infrastructure to protect your most valuable asset, your corporate data. The FileFlex Enterprise patented Zero Trust Data Access (ZTDA) architecture uses innovative, granular file and folder level micro-segmentation to greatly reduce an attacker’s ability to move laterally within your organization. FileFlex Enterprise authenticates and authorizes every transaction needing remote access to your data without allowing access to your network infrastructure, all without a VPN. Remote access and share to on-premises storage on servers, server-attached, network-attached, FTP and PC storage. IT fully controls all permissions over all users and storage locations even to file level granularity. IT can view and manage all activities of all users down to folder level.
    Starting Price: $9.95 per user per month
  • 30
    Check Point Capsule

    Check Point Capsule

    Check Point Software

    With Check Point Capsule’s cloud based mobile security container, you will easily enforce your internal security policies on laptops and remote offices, wherever they are. Policy management couldn’t be easier: simply add a network object for the cloud to the relevant policy rule. Once the policy is implemented, it will automatically propagate to all on-premises gateways and to the cloud. With Check Point Security Management built in, you will have an easy-to-use management interface that integrates seamlessly with your other Check Point deployments. And you can use it anywhere. With Check Point Capsule, you will leverage protections from all your Check Point Software Blades as a cloud-based service, meaning you can protect more users with your existing security investments. Remote offices can connect their local appliance to the cloud, extending corporate security without the need to deploy additional hardware.
  • 31
    SentryFusion
    SentryFusion allows a more secure, multi-factor analysis for access control to critical resources and areas. SentryFusion includes a cluster-based architecture that provides effective scalability, robustness, and future-proofing, along with the option of hosting on-premise or in a data center. Identify a user's voice and face during a video call so that they may later be recognized during a voice conversation, video call, or image. With identity theft on the rise, MFA is increasingly used to prevent unauthorized access to customer data or financial resources. This opens up the possibility of better-than-real-time operation, even in large-scale authentication scenarios. SentryFusion provides near-instantaneous results, streamlining the authentication process and removing the unnecessary hassle for end users.
  • 32
    KeyInfo Hybrid Cloud

    KeyInfo Hybrid Cloud

    Key Information Systems

    With KeyInfo's Hybrid Cloud, you can be more selective about when and how to use cloud resources and traditional on-premises infrastructure. It’s important to remember that a hybrid cloud is not in itself a technology, but more of a usage philosophy. The way you use, manage, and orchestrate on-premises, private, and public cloud resources is what defines a hybrid cloud. Shorten provisioning times to accelerate application development and deployment. Build an on-demand, elastic, scalable and fully configured application development, testing, and hosting environment. Continuous delivery of infrastructure, configuration and applications. API creation and management, with built-in security and governance. Integrate and sync system data into your SaaS applications. Reliable enterprise messaging and connectivity.
  • 33
    AuthControl Sentry

    AuthControl Sentry

    Swivel Secure

    Deployed in over 54 countries and implemented across enterprises including finance, government, healthcare, education, and manufacturing, AuthControl Sentry® provides organisations with true multi-factor authentication (MFA). It delivers an intelligent solution to prevent unauthorised access to applications and data. AuthControl Sentry® has the flexibility to support a range of architectural requirements and the ability to ensure maximum adoption, thanks to its variety of authentication factors. Patented PINsafe® technology for ultimate security. Supports on-premise and cloud for changeable architecture. A single tenancy and single-tiered cloud solution ensures optimised customization. Risk-based authentication and single sign-on as standard. Integrates seamlessly with hundreds of applications. Ensures maximum adoption with an extensive range of authenticators.
  • 34
    AWS DataSync
    AWS DataSync is a secure, online service that automates and accelerates moving data between on-premises storage and AWS Storage services. It simplifies migration planning and reduces expensive on-premises data movement costs with a fully managed service that seamlessly scales as data loads increase. DataSync can copy data between Network File System (NFS) shares, Server Message Block (SMB) shares, Hadoop Distributed File Systems (HDFS), self-managed object storage, AWS Snowcone, Amazon Simple Storage Service (Amazon S3) buckets, Amazon Elastic File System (Amazon EFS) file systems, Amazon FSx for Windows File Server file systems, Amazon FSx for Lustre file systems, Amazon FSx for OpenZFS file systems, and Amazon FSx for NetApp ONTAP file systems. It also supports moving data between other public clouds and AWS Storage services, enabling replication, archival, or sharing of application data easily. DataSync provides end-to-end security, including data encryption and data integrity.
  • 35
    AWS Site-to-Site VPN
    AWS Site-to-Site VPN is a fully managed service that establishes secure connections between your on-premises networks and AWS resources using IPsec tunnels. Each VPN connection includes two tunnels, each terminating in a different availability zone, to provide increased availability to your VPC. If there's a device failure within AWS, your VPN connection automatically fails over to the second tunnel so that your access isn't interrupted. For globally distributed applications, the accelerated Site-to-Site VPN option provides even greater performance by working with AWS Global Accelerator to intelligently route your traffic to the nearest AWS network endpoint with the best performance. AWS Site-to-Site VPN supports both static and dynamic routing options, including BGP peering, to give you flexibility in your routing configuration. It also supports NAT traversal, allowing you to use private IP addresses on private networks behind routers with a single public IP address.
    Starting Price: $0.05 per hour
  • 36
    Bravura Privilege

    Bravura Privilege

    Bravura Security

    Bravura Privilege secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Bravura Privilege secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster. Bravura Privilege grants access to authorized users, applications and services. It can integrate with every client, server, hypervisor, guest OS, database and application, on-premises or in the cloud. Discovers and classifies privileged accounts and security groups. Randomizes passwords and stores them in an encrypted, replicated vault.
  • 37
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 38
    Tailscale

    Tailscale

    Tailscale

    Create a secure network between your servers, computers, and cloud instances. Even when separated by firewalls or subnets, Tailscale just works. A frustratingly complex and brittle collection of firewalls, rules, and holes while wondering if your network is secure enough. Devices connect directly, working from any physical location or networking environment. All without poking holes in your firewall. Devices only connect after signing in through your existing identity provider. Easily enforce multi-factor authentication, deauthorize employees who’ve moved on, and more. Define role-based access controls to restrict sensitive servers or authorize contractors to only see what they need. And every connection is centrally logged from both ends, viewable from a dashboard and logging API.
    Starting Price: $5 per user per month
  • 39
    Clarity Connect
    Clarity Connect was developed exclusively for and is native to Skype for Business. That means no additional software clients need to be installed – agents and supervisors can simply open a web browser to get started. Clarity Connect does not duplicate or complicate Skype for Business’ infrastructure or call control, has access to its unified communications and collaboration functionality, and retains Skype for Business’ excellent voice quality and reliability. Clarity Connect is cloud-managed, so you can deploy a contact center for the on-premises installation of Skype for Business. Best of all, there’s no need for additional on-premises infrastructure or additional software clients, reducing costs, and improving efficiency. Clarity Connect, by Perficient, scales to meet the challenging demands of geo-distributed contact centers without the need for cost-prohibitive hardware or dedicated operational staff.
  • 40
    WANdisco

    WANdisco

    WANdisco

    Since 2010 we have seen Hadoop become an essential part of the data management landscape. Over the decade the majority of organizations have adopted Hadoop to build out their data lake infrastructure. However, while Hadoop offered a cost-effective way to store petabytes of data across a distributed environment, it introduced many complexities. The systems required specialized IT skills and the on-premises environments lacked the flexibility to easily scale the systems up and down as usage demands changed. The management complexity and flexibility challenges associated with on-premises Hadoop environments are much more optimally addressed in the cloud. To minimize the risks and costs associated with these data modernization efforts, many companies have selected to automate their cloud data migration with WANdisco. LiveData Migrator is a fully self-service solution requiring no WANdisco expertise or services.
  • 41
    Trustgrid

    Trustgrid

    Trustgrid

    Trustgrid is the SD-WAN for application providers. The Trustgrid platform uniquely addresses the needs of SaaS application providers who rely on remote systems. By combining an SD-WAN 2.0, edge computing, and zero trust remote access into a single platform we allow software providers to manage and support distributed application environments from the cloud to the edge. With the Trustgrid platform you can: • Build cloud to on-premise networks at scale • Manage and support 100s of networks from a single pane of glass • Control on-premise apps and appliances as if they were in the cloud • Run and support Docker containers in any cloud or on-premise • Provide your support teams secure access to edge application environments Simplify connectivity, enhance security, and guarantee network availability with Trustgrid.
  • 42
    ActivID

    ActivID

    HID Global

    A versatile, flexible and highly scalable platform for securing access to government and corporate systems and online consumer services. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Multi-factor authentication for securing employee remote access to corporate VPNs and other enterprise resources. Rapidly build and deliver authentication solutions for trusted identity and compliance. Smart card solution for strong authentication to protect workstations, mobile devices and networks. Solution for issuing and managing PIV and PIV-I cards, enterprise access cards and mobile credentials. HID PIV IDMS performs identity proofing, while securely issuing credentials - even to remote users. Leverage service bureau card issuance efficiently and securely.
  • 43
    SFTPPlus

    SFTPPlus

    Pro:Atria

    Secure, Managed File Transfer software for Enterprise with multi-protocol support. Our simple to use on-premise, cloud, or container deployed solution will help you secure and automate file transfers across multiple platforms. SFTPPlus server transfer supports SFTP, FTPS, HTTPS, AS2 and many other protocols. Features include browser-based file management, user account management, and external database authentication and detailed audit. SFTPPlus works on Windows, Linux, or macOS Server and is perfect for lightweight containers or virtual environment. SFTPPlus client transfers provides complete automation and management for monitoring local and remote locations. It triggers actions and transfers without scripting. Client transfers work as a fully automated, non-interactive service. Its API support for pre/post-processing makes it a flexible tool for file transfer management.
  • 44
    AirVPN

    AirVPN

    AirVPN

    This impenetrable tunnel prevents criminal organizations, your ISP or even your government from spying on your communications. Perfect Forward Secrecy - Through Diffie-Hellman key exchange DHE. After the initial key negotiation, re-keying is performed every 60 minutes (this value can be lowered unilaterally by the client). Additional connection types, supported by every Air VPN server, for ISPs or countries disrupting OpenVPN, are OpenVPN over SSH, SSL or Tor. Make it impossible to identify the type of traffic or protocol you are using, even for your ISP. Connect to any wireless network without risking data eavesdropping between your computer and the WiFi hotspot. Hide your IP - Get a new IP address, so that nobody can discover your identity through it. Optional block lists protecting you from ads, adware, trackers and malicious sources.
    Starting Price: $2.08 per 3 days
  • 45
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 46
    SonicWall NetExtender
    SonicWall's NetExtender is an SSL VPN client that enables remote users to securely connect to a company's network, providing seamless access to resources as if they were on the local network. Compatible with Windows and Linux operating systems, NetExtender allows users to run applications, transfer files, and mount network drives securely over an encrypted connection. This transparent software integrates smoothly with SonicWall's range of firewalls, including the TZ, NSa, NSsp, and NSv series, as well as the Secure Mobile Access (SMA) 100 Series appliances. By utilizing Point-to-Point Protocol (PPP), NetExtender ensures that remote clients have reliable and secure access to internal network resources, enhancing productivity without compromising security.
  • 47
    RapidScale Identity as a Service
    RapidScale’s Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Built on the backbone of Azure Active Directory, our IDaaS solution provides potent security out of the box. Protect your critical data and applications no matter where they’re located – in cloud, hosted or on-premises environments. We have options supporting single sign-on (SSO), multi-factor authentication (MFA), password synchronization, and much more. It’s easy to make your login security even stronger with our options for identity services. Employ advanced password sync functions like user password reset and changing, writeback and more, along with a wealth of other services so you can control access more finitely. It’s easy to manage your IDaaS services through our full-service portal, along with your other RapidScale solutions. Alternately, let us manage your IDaaS deployment for you.
  • 48
    AWS Elastic Fabric Adapter (EFA)
    Elastic Fabric Adapter (EFA) is a network interface for Amazon EC2 instances that enables customers to run applications requiring high levels of inter-node communications at scale on AWS. Its custom-built operating system (OS) bypass hardware interface enhances the performance of inter-instance communications, which is critical to scaling these applications. With EFA, High-Performance Computing (HPC) applications using the Message Passing Interface (MPI) and Machine Learning (ML) applications using NVIDIA Collective Communications Library (NCCL) can scale to thousands of CPUs or GPUs. As a result, you get the application performance of on-premises HPC clusters with the on-demand elasticity and flexibility of the AWS cloud. EFA is available as an optional EC2 networking feature that you can enable on any supported EC2 instance at no additional cost. Plus, it works with the most commonly used interfaces, APIs, and libraries for inter-node communications.
  • 49
    Oxide Cloud Computer

    Oxide Cloud Computer

    Oxide Cloud Computer

    Vertically integrated and scale-ready. Bringing hyper-scaler agility to the mainstream enterprise. Software that empowers developers and operators alike. Launch projects within minutes of powering on. Per-tenant isolation gives you full control of networking, routing, and firewalls through VPC and network virtualization capabilities. Network services scale with your deployment, eliminating traditional bottlenecks. Elastic compute capacity can be provisioned against a single infrastructure pool, with support for the tools developers already use. High-performance, persistent block storage service with configurable capacity and IOPS per volume. Go from rack install to developer availability in a matter of hours, compared to weeks or months today. Takes up two-thirds as much space as traditional on-premises infrastructure. Manage with technologies you already know and use with our Kubernetes and Terraform integrations.
  • 50
    Check Point Mobile Access

    Check Point Mobile Access

    Check Point Software

    Check Point Mobile Access is the safe and easy solution to securely connect to corporate applications over the Internet with your Smartphone, tablet or PC. Integrated into the Check Point Next Generation Firewalls (NGFW), Mobile Access provides enterprise-grade remote access via both Layer-3 VPN and SSL/TLS VPN, allowing you to simply and securely connect to your email, calendar, contacts and corporate applications. Easy access for mobile workers – simply connect from mobile devices to secure connectivity for smartphones, tablets, PCs and laptops. Communicate securely with proven encryption technology, two-factor authentication, and User-Device pairing to eliminate network security threats. Integrated in Next Generation Firewalls enables consolidation of security controls decreasing costs.