Alternatives to Alcatraz AI

Compare Alcatraz AI alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Alcatraz AI in 2024. Compare features, ratings, user reviews, pricing, and more from Alcatraz AI competitors and alternatives in order to make an informed decision for your business.

  • 1
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 2
    Oloid

    Oloid

    Oloid

    Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees can choose contactless biometrics or mobile credentials to gain physical access. Make the workplace frictionless and secure for Smartphone and non-smartphone users alike. Use computer vision to keep an accurate count of people entering & exiting doors and enforce occupancy limits at the points of entry with Oloid’s rule-based access control. Leverage existing security cameras or install off-the-shelf IP cameras.
  • 3
    Precise YOUNiQ

    Precise YOUNiQ

    Precise Biometrics

    Experience facility access in a YOUNiQ way at the gym, office, hospital or in temporary buildings. YOUNiQ is designed to be scalable, fast and accurate, while maintaining the highest levels of convenience, privacy and security using biometric technology. YOUNiQ offers the latest technology for a safe, cost-effective and flexible access control system. It replaces or supplements any keys, tags or PINs currently required for access to offices and buildings. With YOUNiQ, YOU are the key.
    Starting Price: $54 per month
  • 4
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
    Starting Price: Free
  • 5
    CERTIFY Access Control
    Introducing CERTIFY Access Control, the Revolutionary solution for secure access, physical access control, identity management, and contactless authentication systems. Workplaces are adopting a new set of working guidelines for today's work environment, and the burden of following these guidelines grows. As a result, standard documentation and manual paperwork is required for entry into your office. With cutting-edge facial recognition technology, CERTIFY SnapXT scans the facial features and compares them with the images stored in the database. With 99.9% accuracy for detecting faces, thus winning the trust of your visitors and maintaining your organization’s reputation. CERTIFY SnapXT device has a thermal sensor that detects the body temperature of the user who enters your facility and transmits the data wirelessly to the server. The data then will be analyzed, and it denies access to the user if their temperature exceeds the set parameter.
    Starting Price: $9.95 per month
  • 6
    Door Cloud

    Door Cloud

    SPICA GROUP

    Door Cloud comes with an outstanding user experience. Secure your workspace while ensuring maximum mobility for your workforce, and open your doors from anywhere using a smartphone. The Door Cloud app turns a smartphone into an access control tool. It eliminates the need for ID card readers and ID cards, and significantly reduces implementation time and the costs of access control. Our solution offers a secure and convenient way to unlock doors. Keep your facilities safe and secure for employees, contractors, and outside visitors. Easily enable access to the right people at the right time. Monitor real-time happenings in your facilities and increase operational efficiency while our security protocols ensure the highest security standards for your business. Door Cloud access control works with standard electric locks and does not require any specific smart lock. It offers professional access control management, which is scalable to hundreds of doors and thousands of users.
  • 7
    OnGuard

    OnGuard

    LenelS2

    The OnGuard® access control system exemplifies our commitment to providing a superior, integrated and customizable security management system that meets your evolving needs. The OnGuard system delivers solutions that seamlessly unify access control and video monitoring for a wide range of industries. Providing the means to aggregate, visualize and share security data from multiple sources, the OnGuard system helps companies recognize context and analyze inputs from a number of simultaneous events. Seamlessly synthesizing information from access control, video and other sensors, the OnGuard system delivers complete line-of-sight to all aspects of security and facilitates intelligent responses and outcomes. The OnGuard system integrates seamlessly with a wide range of existing business systems. The OnGuard system can bi-directionally exchange cardholder data with many HR platforms and/or ERP systems, coordinate alarm/event data with emergency response systems, and more.
  • 8
    Workforce Access
    A state-of-the-art solution designed by MM Hayes that secures the workplace, improves employee morale, and increases overall productivity. The leading access control system with UKG integration. UKG Dimensions, UKG Workforce Central, or UKG Ready into one unified Access Control solution. Combined with UKG Dimensions, UKG Workforce Central, or UKG Ready, Workforce Access provides customers with an efficient, reliable, and secure solution. Whether integrated on the same or separate server, information can still flow seamlessly between the two systems to present a complete, unified solution for all of your door access needs. For UKG users, the Hayes Access Control Terminal provides a reliable option for controlling door hardware. Intelligent terminals that serve as the interface between Access Control software and door hardware. Seamless integration with 3rd-party software, such as hr, payroll, or badging systems.
  • 9
    Anyvision

    Anyvision

    Anyvision

    An automated watchlist alerting system that identifies persons of interest and their contact history in real-time and historically while protecting the identity of bystanders. A touchless access control solution that uses facial recognition to open guarded points of entry for authorized people, which improves safety from the outside in. Provide frictionless access to people who are authorized to enter a space through privacy compliant and spoof-proof face recognition. Eliminate the need to touch any surface when entering a controlled space by using face recognition to verify authorization. Stop bottlenecks with recognition software that identifies a person instantly. Deploy quickly and seamlessly integrate with the current access control system. Create enforceable, digital barriers without erecting permanent structures and get instant alerts when unauthorized people are identified.
  • 10
    Magic Monitor
    Everything you need, all in one stunning user interface. The Magic Monitor® client provides an unsurpassed user experience, unifying access control, video surveillance, forensics, digital signage, live-sourced Internet feeds such as weather, traffic, news, and interactive content like floor plans and maps. The Magic Monitor experience is available for users of both NetBox™ and OnGuard® ecosystem products, including access control and video management systems. The Magic Monitor unified client provides a single interface to view access control events, video surveillance feeds, and other real-time information providing security operators with a 360-degree view of their environment. Support for NetBox and OnGuard access control systems allows for live event monitoring, one-click viewing of associated event video, and easy administration of personal records. Ideal for the needs of security operations centers, reception, or security desks.
  • 11
    ePortPass

    ePortPass

    ePortation

    ePortPass™ is a cloud-based mobile solution that allows security personnel to control and restrict access to all points of a facility in an easy to use, common sense, way. Though we offer a full range of access control solutions we don’t just stop at the gate. Surveillance, alert sensors, security rounds, and reports are just a few items on the long list of security personnel duties. ePortPass™ provides the ability to efficiently manage security operations with real-time visibility. The resulting COP (common operating picture) of activity and incidents across a single or multiple locations is crucial in today’s heightened security environment. We provide live-camera feeds, geo-location mapping services, and real-time messaging from both sensor technology and security personnel on the ground, enabling quality information to be dispersed amongst a security group.
  • 12
    BlueDiamond

    BlueDiamond

    LenelS2

    With multi-technology readers, a feature-rich mobile app and the ability to support mobile and physical credentials, organizations can upgrade to the BlueDiamond™ experience at their own pace. The BlueDiamond mobile user experience enables employees to turn any smartphone into a device for effortless, touchless access. The BlueDiamond solution leverages Carrier’s 20 years of experience developing mobile credential technology. With over 4,000,000 Bluetooth® locking devices deployed across multiple industries – including Energy, Financial, Hospitality and Real Estate. LenelS2 is proud to be a part of the Carrier Healthy Buildings Program, which includes the BlueDiamond touchless access offering. Designed to work seamlessly with existing infrastructure and leverage open credentialing standards, BlueDiamond multi-technology access control readers are platform agnostic and support the standard output protocols.
    Starting Price: Free
  • 13
    Openpath

    Openpath

    Openpath

    On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control solutions. Combining sleek, secure hardware, multi-technology video readers, and an easy-to-use app, Openpath enables touchless entry for commercial buildings and offices across the globe. Openpath’s powerful cloud-based software makes security management easier than ever, and the open platform enables seamless integrations for full-building automation. Openpath is a complete access control system that scales effortlessly for any space, securing anywhere from a single door up to hundreds of entries across multiple locations. With end-to-end encryption, built-in video capabilities, and customizable user-level permissions, Openpath is both more secure and more dynamic than traditional systems.
  • 14
    CampTrac

    CampTrac

    CampTrac

    CampTrac is designed to support companies and organizations to give secure access to facilities, automatically manage visitors and charge money for products and services with the use of contactless smart card readers, QR keys, and SMS keys. CampTrac lets you manage all your access control for all your facilities in one single web-based user interface and by using the card readers on the wall as payment readers you can also charge for different products and services you would like to provide to your guests, visitors, employees, and contractors. CampTrac has a built-in automatic visitor management system that lets you automatically handle all your visitors without the need for interaction. With the use of self-service kiosks and intelligent tools, the user and guest are able the handle tasks that were previously managed by receptionists and administrators. The CampTrac Card is a unique encrypted contactless smart card that staff and guests can use in order to gain access to the site.
  • 15
    Qumulex QxControl

    Qumulex QxControl

    Qumulex QxControl

    A unified, cloud-based, physical security solution for those serious about security. QxControl is a modern take on video management and access control software. With QxControl, commercial customers can manage their physical security from anywhere, on any device that runs a browser, using a cybersecure, intuitive UI. Modern, intuitive user interface that can be operated on desktop, mobile, or any device with a browser, from anywhere you have an internet connection. Open platform architecture allows Integrators to choose the best cameras, door controllers, and analytics on the market and enables the use of existing infrastructure when upgrading legacy systems. Total control of storage via cloud-connected cybersecure gateways as well as external cloud storage. No more legacy system headaches of manual software updates, thick client applications to download, cumbersome NVRs, and insecure port-forwarding.
  • 16
    FortressBA

    FortressBA

    Fortress Identity

    Strengthen security and eliminate passwords with a mobile and web biometric user authentication solution. Fortress Identity is simplifying everything about secure authentication by introducing a biometric API into the equation. Implement voice authentication directly in the browser and expand to include the user’s smart phone for true multi-factor authentication. Secure account access and transaction authentication. Secure account access and transaction authentication. Strengthen security to corporate intranets and extranets. Reduce IT overhead cost for password reset. Create an omni-channel unified authentication platform. Protect access to medical records and patient data. Control door access to restricted areas and venues. Use a single API call for authentication and a single API call for enrollment. Use RESTful API to request user authentication (Voice, face, fingerprint).
  • 17
    Paxton Net2

    Paxton Net2

    Paxton Access

    Designed to make the management of any building very simple. Net2 is our networked access control system. It can be administered using one or more PCs and can be monitored and managed from a central location. It is a complete solution that encompasses wireless and door entry. Net2 is designed with simplicity in mind and is easily scalable depending on your current or future needs. Our systems have been developed so that you can add one door at a time using a wired or wireless controller or door entry for versatile security and building management. We design our products to be easy to install and make the management of any building very simple. The software is intuitive and comes with a range of features that move beyond the basics of locking or unlocking a door. There are two versions available – Net2 Lite, which is ideal for most sites and is free of charge, and Net2 Pro, which offers extra features for more flexible and advanced access control.
  • 18
    Liberty Access Control Software
    Identiv’s powerful, affordable Liberty Access Control software system is an ideal solution for small-to-medium installations, providing web-based access control management for up to 32 doors. The Liberty Access Control software system is a powerful, affordable access control solution for small-to-medium installations. Liberty provides web-based access control management for up to 32 doors, including elevator control and complex input and output logic. Liberty utilizes a compact web server appliance to administer the entire system and is accessible from any web browser and browser-enabled device. Enables fast, easy deployment via intuitive web-based user interface for configuration and programming with reduced installation time, costs, and hardware footprint. Significantly reduces costs by replacing expensive, cumbersome control panel hardware and installation with a compact, energy-efficient Liberty Encryption Bridge.
  • 19
    Bosch Access Management System
    Access control is an essential component of building security. You need truly reliable software to manage the access profiles of different users of your facility. Our access control software (Access Management System) is a future-proof access management system for medium- to large-sized applications. It is easy to use, operate and expand. It offers the highest data security and several features found only in high-end security solutions. On top of this, the software is also open for integration with third-party systems, thus making it a very versatile solution for your access control projects. Our access control solution can easily grow with the needs of the customer. The software is offered in three pre-configured software bundles for different-sized enterprises, Lite, Plus, and Professional. The bundles offer each a large range of cardholders and doors enabling an easy upgrade when your organization grows. Up to 400.000 cardholders and up to 10.000 doors can be administered.
  • 20
    DoorFlow

    DoorFlow

    NetNodes

    Cloud-based access control for your building, that works with your existing locks and user directory. While DoorFlow can work as a standalone system, most of our customers benefit from the fact that we integrate with user directory, co-working space management systems and sport club systems out of the box. What makes DoorFlow unique is that it’s a fully automated, setup-and-forget solution. Building access rights policies are assigned once to groups like HR, Sales or Cleaners. So once a new person joins your organization, they automatically get the right access based on the groups you assigned to the user either in DoorFlow or directly in systems like Office365/Google and many more. You don’t need a technical background or need to become an access control guru to implement DoorFlow and smart locks. We help everybody from one-door sports clubs, hotel facilities to 100.000 employee multi-site enterprises, from A to Z.
    Starting Price: $35 per month
  • 21
    Cloudvue

    Cloudvue

    Johnson Controls

    Johnson Controls is transforming how spaces and places are perceived and enjoyed. Applying data from both inside buildings and beyond, our customers can now manage operations and security systemically. Introducing the blueprint of the future, OpenBlue is a dynamic new space from Johnson Controls. This is how buildings come alive. Cloudvue is trusted all over the world to simplify surveillance, streamline access control, and provide powerful intelligence that improves security operations and helps with organizational efficiency. Command an entire security system in one interface, on one map, and click on any camera or door worldwide. Easily control cameras, grant access to doors, and set intelligent alerts with centrally managed software and cloud-connected hardware. An unlimited number of cameras and access control points can be added. Custom floor plan views, map views, and powerful dashboards keep data organized as operations scale.
  • 22
    Homebase

    Homebase

    Homebase

    Homebase is the only hubless solution for smart apartments. Connect your buildings with smart access control, community WiFi, device automation, and digital payments. One app. One fob. Every door in the building. Set schedules to allow access for residents and staff at configured times for various amenity spaces such as co-working spaces, gyms, and pools. Use one key fob or mobile app access for every door in the building. Create stays and customize access for every door and user. Send temporary access in as little as 10 minute increments. Use the Homebase widget to unlock doors straight to your homescreen. Connect all of your building infrastructure and devices while increasing your per unit NOI by $30+ a month. Homebase provides seamless multifamily WiFi connectivity across your entire building, with solutions for your amenity spaces, staff networks & more. Offer an instant internet connection to residents. Set prices and configure your own internet tiers.
    Starting Price: $30 per month
  • 23
    Sensorberg

    Sensorberg

    Sensorberg

    Use the Sensorberg App in a custom branding or integrate the features into your App. Booking of rooms and lockers enables a more flexible use of space. Sensors collect and forward room information, defined rules trigger actions. Via notification the building and its management can communicate directly with people. With one app light, temperature, air-quality, heating and window blinds can be controlled. Our flagship access control device, used for access control, management and monitoring. Provides access via Bluetooth and LAN, with modular NFC and touch-button. Our flagship access control device, used for access control, management and monitoring. It offers the best protection from vandalism, damage and extreme weather. Provides access via Bluetooth and LAN, with modular NFC and touch-button.
  • 24
    Proptia

    Proptia

    Proptia

    Proptia provides all-encompassing visitor management, access control, license plate recognition, and intercom solutions. A seamless experience that is as powerful as it is flexible. Whether you’re managing a single commercial building or a sprawling community, Proptia offers the tools you need to get the job done—with ease, accuracy, and speed. Our Security Smart Intercom Units and Software are the ultimate solutions for modern security needs in guard-gated communities, residential hi-rise buildings, and commercial buildings. Our state-of-the-art intercom units offer seamless communication and access control, with video and audio capabilities, digital keys and pass, and remote management features. Our cutting-edge license plate recognition software and vehicle identification system offer advanced monitoring capabilities for both entry and exit points.
    Starting Price: Free
  • 25
    Luchismart

    Luchismart

    Luchismart

    Luchismart is a cutting-edge technology company specializing in cloud-based access control systems with advanced features such as time and attendance management, video surveillance, and time tracking capabilities. With a focus on providing secure and efficient solutions, Luchismart aims to revolutionize the way businesses manage their access control and monitoring processes. One of the key features of Luchismart's system is its access control functionality. Using cloud-based technology, the system allows businesses to control and monitor access to their premises in real-time. It offers a comprehensive set of tools to manage and customize access permissions for employees, visitors, and contractors, ensuring that only authorized individuals can enter restricted areas. In addition to access control, Luchismart offers robust time and attendance management features. The system enables accurate tracking of employee attendance, including clock-in and clock-out times.
  • 26
    Genetec Synergis
    Aging physical security systems are not just costly to maintain, but they also weaken your security. Lack of modern capabilities or access to newer door control technology, and emerging cybersecurity vulnerabilities put you at a clear disadvantage. Security Center Synergis IP access control offers a modern approach. As a truly open system, it connects to a large and growing selection of third-party access control devices. Seamlessly unified with video and other security systems, it delivers operational and security insights about your secured areas leading to more informed decisions and improved operations. Synergis provides a modern and innovative access control solution that addresses your business needs. It expands your reach with security and visibility to areas never thought possible.
  • 27
    STANLEY Security

    STANLEY Security

    STANLEY Security

    STANLEY Security offers a wide range of access control systems to help you protect your assets and create a safer environment for employees and visitors. The right access control system is the cornerstone of your entryway security, enabling you to manage who enters, when, and how, with visibility to all that’s going on. STANLEY Security has the technology and expertise you need for your access control security: for global and small business, schools and campuses, manufacturing facilities, and for commercial enterprises of all kinds. Find your solution today. The right access security supports a healthy and safe environment for your employees and visitors. STANLEY Security can build you a commercial access control system that's tailored to your needs. Limit and personalize access to restricted areas to only those who need it, with the flexibility to grant secure temporary access to visitors. 
  • 28
    ID Flow

    ID Flow

    Jolly Technologies

    Print photo ID cards, encode smart cards, and link badges with access control systems with ID Flow ID card software and systems. Insert logos and artwork to make your card unique and branded to your company. ID Flow ID card designer app has all the tools to design ID card with ease to meet your needs. Include a photo on your ID badge design. Photos can be captured using a webcam or digital camera with ID Flow photo ID software. Automatically remove the background from photos and automatically crop them to best fit the ID card design. Capture signature and biometrics using any compatible USB biometric capture device, save the data in the record and print on the ID card. Include signature and fingerprint images on your card design for an extra layer of security. Capture fingerprints and signatures and include them on printed ID cards. Encode contact and contactless smartcard including Mifare.
    Starting Price: $400 per user per month
  • 29
    Alloy Access

    Alloy Access

    SmartRent

    Alloy Access Cloud-based access control for multi-tenant and commercial buildings. Our cloud-based access control system provides hands-free access solutions to address communities current needs while ensuring scalability for the future. Alloy Access is a frictionless platform that can be utilized to protect communities and assets through the use of control panels, smart access locks and intercoms, with integrations to property management software and customer relationship platforms to keep data in one place. Combining Alloy Access with our other smart home products provides customers the ability to create a truly connected community. Flexible Options with Alloy Access. With Alloy Access, you have the flexibility to choose different access methods for each entry point. Customize how residents, employees and visitors access all perimeter doors, amenity spaces, garages and units. Bluetooth locks & mobile passes. Key fobs - use existing key fobs or cards. Smart locks & custom pin
  • 30
    Nexkey

    Nexkey

    Nexkey

    Don’t worry anymore about forgetting your key card or fob at home. No more fumbling around looking for the right key. Unlock any door with your phone or Apple Watch. Grant and revoke keys instantly and schedule access for all your doors through one platform. Secure your business from easily copied key cards and pin codes that never change. Remotely let people in your space. Know when they enter your space in the Nexkey app. Be notified when someone enters the building during off hours. Streamline your business operations by understanding how people use your space through dashboards. Flag users not active in the space helping to reduce turnover and eliminate security threats. Communicate with everyone who has access to your space. Having an event after work hours or is something in the space not working properly? Let everyone know through Nexkey. Integrate Nexkey’s access control system with the apps you already use and love.
  • 31
    Kisi

    Kisi

    KISI

    Kisi offers a flexible platform for your business, acting as an all-in-one, standalone solution or integrating with your existing access control solution. Streamline user onboarding and management with automated access provisioning in Kisi. You can even connect your user management systems to Kisi, automatically enrolling users and granting them the permissions they require. Grant and revoke access on a user or team-wide basis. You can even integrate your SSO or directory solution for automatic provisioning in the future. Customized alerts automatically forwarded to via email or phone push notification when a door is forced open. All events are recorded and organized in the Kisi dashboard, making reports and audits a breeze. Leverage software integrations or build custom solutions with Kisi's API.
  • 32
    exacqVision
    Protect what matters with Exacq video surveillance solutions, integrated access control, and intelligent analytics. Designed for small, simple installations to larger, enterprise needs, Exacq video solutions provide security to meet your needs now and in the future. Since 2002, Exacq has built powerful and scalable video surveillance solutions with open platform software that's easy to integrate. Our products work in virtually every market and integrate with a variety of access control and video analytics software as well as thousands of IP cameras. With an Exacq video surveillance solution, you can connect cameras, add access points, and select the storage that fits your needs. Additionally, exacqVision software allows you to customize deep learning analytics to match your business needs. Keep your existing IP or analog cameras or upgrade to something new. From excellent quality video and cameras equipped with video intelligence and analytics to small, discreet devices.
    Starting Price: Free
  • 33
    Senstar

    Senstar

    Senstar

    With intelligent video management, video analytics, access control and innovative perimeter intrusion detection systems, Senstar offers a comprehensive suite of proven, integrated technologies. A modular solution for security management and data intelligence, as well as an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules. Senstar’s product portfolio is the industry’s best. By selling what we manufacture, Senstar can service, customize and adjust for any project. Where multiple layers of security are needed, Senstar products can work together for complete facility-level solutions.
  • 34
    Hirsch Velocity Software
    Identiv’s Hirsch Velocity Software is an integrated security management system that manages access control and security operations in hundreds of different facilities, from single high secure rooms to multi-building, multi-location campuses. What if a person enters a building and is later found to be symptomatic of an illness? Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry level packages. Velocity delivers stringent security compliance, interoperability, and expansion and flexibility options designed to accommodate the evolution of security technology and meet the needs of even the most complex business, personnel, and facility requirements.
  • 35
    Honeywell WIN-PAK
    Honeywell’s WIN-PAK 4.8 software solution provides a cost-effective way to integrate and manage access control, video surveillance, and intrusion detection through a single interface. Building upon WIN-PAK’s legendary and robust workstation-based management system, WIN-PAK 4.8 provides an intuitive browser-based interface allowing users to perform everyday access control actions from virtually anywhere. WIN-PAK 4.8 can be easily scaled from a single site to a multi-region, enterprise-level solution without restrictions on the number of users or sites being managed. WIN-PAK 4.8 supports third-party integrations such as HID's Mobile Access®, BioConnect® Suprema®, Morpho biometrics, point-of-sale systems, visitor management, and HR applications. Using the included WIN-PAK API, your software developers can create custom integrations to meet your integration needs. Integrated access, video, intrusion, and fire systems through one interface.
  • 36
    Brivo

    Brivo

    Brivo

    Brivo supports your whole company to achieve your physical security, scalability, cybersecurity, data analytics and customization needs. Brivo is the global leader in cloud-based access control and security platforms for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve user experiences for property managers, tenants, employees, and visitors. With over 20 million users and 1,500 authorized dealers, our SaaS platform has been unifying the security experience across access control, mobile credentials, video surveillance, identity federation, visitor management, intercoms, and elevator control since 2001. Hundreds of software partners and end users use our APIs and SDKs to extend our solutions to unique vertical market offerings. Brivo’s Vacation Rental Property Management is a cloud-based system that combines guest bookings, messaging, home automation, and security to increase property value and appeal.
  • 37
    Avigilon

    Avigilon

    Avigilon

    Our video, cloud and access control solutions seamlessly integrate across your entire video security system to provide you with the right information at the right time — so you can take decisive action. Powered by advanced AI and video analytics we keep our technology simple and easy to use, letting you focus on what matters most. The majority of operator time is spent looking for suspicious activities, with less than 5% detection rate after the first 20 minutes. Around 10% of operator time is spent verifying security events – something humans are good at, when given enough time. There is little time left for operators to actively collaborate on effective actions that prevent negative outcomes. Our video security, cloud and access control solutions are integrated and powered by AI to provide you with the right information at the right time — so you can take decisive action.
  • 38
    ID R&D

    ID R&D

    ID R&D

    Frictionless biometric authentication and liveness detection. ID R&D uses the power of AI and the science of biometrics to transform the user experience. Surprisingly effortless. Significantly more secure. ID R&D combines extensive research in the science of biometrics with advances in AI to deliver award-winning voice, face, and behavioral biometric authentication software. We’re on a mission to make authentication simultaneously frictionless and significantly more secure. ID R&D technology works with digital and traditional interaction channels, IoT devices, embedded hardware and more. Text dependent and text independent voice verification software null. Accurately detect fraud attempts that use recording, synthesized or converted voice null. The world’s first entirely passive facial liveness detection software – iBeta tested, ISO 30107-3. Continuous verification of web and mobile users through keystroke detection and more.
  • 39
    DigitalPersona

    DigitalPersona

    HID Global

    Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements.
  • 40
    MiniAiLive

    MiniAiLive

    MiniAiLive

    MiniAiLive is a provider of Touchless Biometrics Authentication, ID verification solutions. We offer strong security solutions with cutting-edge technologies for facial recognition, liveness detection, and ID document recognition. We also ensure that these solutions seamlessly integrate with our clients’ existing systems. MiniAiLive face recognition app is an advanced face recognition app designed to provide secure and reliable access control solutions with the added layer of passive liveness detection. Our app ensures that only authorized individuals gain access to sensitive areas, accounts, or services, while minimizing the risk of unauthorized access through spoofing or impersonation attempts.
    Leader badge
    Starting Price: lifetime license
  • 41
    IDcheck

    IDcheck

    IDcheck

    IDcheck specialises in cloud-based, automated Biometric Identity Screening, Fraud Detection & KYC-AML. Through our proprietary Facial Recognition, Frictionless Liveness and Motion Detection algorithms, we authenticate global identity documents, with advanced AI and OCR. Few professionals possess the skills to detect fake IDs. If a fake ID passes, all standard background screening is performed on the real person instead of the fake, leaving organisations at risk of fraud and AML violations. IDcheck registration and log-in is far more secure than SMS verification. We use Key-Based 2-Factor Authentication, where the "pin" is neither transmitted nor stored. If a device is lost or stolen, the pin would fail after a few incorrect attempts and by using a keypad, even a Key-Logger could not detect the pin. There are multiple industry-specific, automated portals, with strict access management, permissions and internal controls, including sanctions, credit & wealth source checks.
  • 42
    Axiom Protect

    Axiom Protect

    Axiom Protect

    To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics.
  • 43
    Verbio

    Verbio

    Verbio

    Increase security and user experience in daily interactions with the unique potential of voice. An innovative language agnostic, cost-effective and reliable alternative to seamlessly verify and identify users in real-time. Voice biometrics allows to automatically recognize any person through the characteristics of their voice and it can smartly substitute traditional authentication methods (cards, passwords, signature, fingerprint, etc) in security access control, user verification for digital transactions or for fraud prevention and detection. With an easy and cost-effective solution, authentication through voice biometrics brings an innovative and safe experience to users, with a risk-free and remote access. Biometric Authentication and Identification through voice has never been so secure and fast with different operational uttering models for each type of client and advanced anti-spoofing methodologies.
  • 44
    FaceTec

    FaceTec

    FaceTec

    The FaceTec interface makes 3D Liveness Detection and 3D Face Matching fast, easy, and incredibly secure for everyone, regardless of their device. During onboarding, FaceTec’s two-second video-selfie verifies 3D liveness, matches the user’s 3D Face to their Photo ID, OCRs the text on their ID, and sets up their new account. Every time they return, FaceTec’s ongoing user authentication again proves 3D Liveness and compares their new 3D FaceMap to the one stored from onboarding. If they match, they get instant access; no password required! Login from any smartphone, tablet, PC or Laptop, and unlock everything from your car door to your bank account. Real users gain access easily, but bad actors, bots and hackers are rebuffed by level 1&2 anti-spoofing certified by NIST/NVLAP. FaceTec is the 3D face matching market leader and provides more security, flexibility, and convenience than any other biometric modality.
  • 45
    VoiceMe

    VoiceMe

    VoiceMe

    In an always more contactless world, arises the necessity of a new model of digital trust. VoiceMe enables people, companies, and objects to interact with each other through a simple interface and in an ultra-secured way opening the door to a new generation of services. Access restricted physical areas guaranteeing users' identity. Sign with legal validation documents and contracts. Our algorithms pre-identify the user based on behaviors, using also biometric parameters obtained from the upper face and voice. All customer-related data remains exclusively at the user's disposal, offering maximum privacy and respect for GDPR regulation. Each data set is encrypted, divided in pieces, and spread on a network of nodes, making it impossible for an external unauthorized source to extract. At each authorized data usage the inverse process is done to recompose the data set. API or SDK for third-party allows easy integration in already existing systems.
  • 46
    FACEKI

    FACEKI

    FACEKI

    FACEKI is a Facial Recognition authentication platform. FACEKI creates safer, more accessible user experiences for all, powered by state-of-the-art facial recognition technology. It's a highly secure cloud-based cross-devices technology. Which can be integrated easily with any online platforms, websites, and apps to provide them with a powerful facial recognition login and onboarding capabilities. FACEKI aim is to make login to accounts seamless, simple and more secure than ever.
  • 47
    Leosac

    Leosac

    Leosac

    Leosac is a software company specialized into physical access control industry. We provide a scalable, modular and affordable open-source access control and credential provisioning solution. For individuals and from small to large companies, for trusted identities and physical access management that you are in control.
  • 48
    ButterflyMX

    ButterflyMX

    ButterflyMX

    A top-rated smartphone app, integrations to other cloud-based systems, and a powerful property management dashboard are all designed to make property access into and throughout your building easy. Our products are relied upon by more than 7,500 multifamily, commercial, student housing, and gated communities around the world including those developed, owned and managed by the most trusted names in real estate. We make property access simple for owners, staff, residents, and visitors. We’ve designed our features with you in mind. Residents enjoy a seamless building entry experience. Property managers get added security and convenience. Developers & owners eliminate building wiring and in-unit hardware. Installing our video intercoms and keypads allows your residents to manage property access from their smartphones. They can receive video calls, unlock the door & gates remotely, and grant managed access to delivery people and service providers.
  • 49
    CredoID

    CredoID

    Midpoint Security

    CredoID: the open platform access control software. Midpoint Security develops integrated solutions for access control and security projects. CredoID access control software is the cornerstone of these solutions. The core of every solution is our access control software CredoID, which is easily expandable by additional modules for time & attendance, video surveillance, burglar alarm, vehicle and elevator control, ID card design & printing, maps and scripts. CredoID provides an easy way to install security systems of any size. Our open platform solution supports full range of HID EVO Edge, VertX Evo & Aero and Mercury LP EP Series controllers and extension modules, wireless Aperio locks. CredoID also supports integration with DigiFort VMS, alarm panels from ASB security and DigiFort LPR. CredoID software integrates the functions of access control, alarm monitoring and time & attendance in one package.
  • 50
    ImageWare Authenticate

    ImageWare Authenticate

    ImageWare Systems

    Increase the fidelity of user access management with biometrics. Simple to use and easy to deploy, Authenticate provides true user assurance across your enterprise applications and end customer base. Add your existing environments and its self-enrollment feature to quickly get users up and running. For simple passwordless login, the users can choose the most convenient option from the enabled modalities. When a more secure authentication is needed, you can enforce use of two or more modalities to reach a higher level of security. Facial Authentication: using a mobile phone or laptop webcam, users look at the camera similar to taking a selfie. Highest level of authentication, particularly when combined with the NIST compliant Biointellic Anti-Spoofing technology. Voice Recognition: users speak a randomized phrase, typically using a mobile phone.