Alternatives to AlertEnterprise

Compare AlertEnterprise alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AlertEnterprise in 2024. Compare features, ratings, user reviews, pricing, and more from AlertEnterprise competitors and alternatives in order to make an informed decision for your business.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. AlertEnterprise View Software
    Visit Website
  • 2
    athenaOne

    athenaOne

    athenahealth

    A powerful tool that lets you practice medicine anywhere, anytime. Get meaningful clinical work done whenever and wherever you are with the athenaOne mobile app. Access patient records to prepare for and document exams, create and sign orders, respond to patient cases and more. The app gives you the flexibility to catch up on or get ahead of work during free moments throughout your day. Easily log into the app using touch or Face ID and access a glanceable view of your day. See your schedule, the patients you've prepped for, and review and manage your inbox. A few moments are all you need to get up-to-speed on a patient's history with customizable patient summaries. Access full charts to review everything that's happened since their last visit. Use the clinical inbox to get critical work anywhere, any time. Create and sign orders, view test results, respond to patient cases and more, all with the speed and security of athenaClinicals.
  • 3
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 4
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 5
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 6
    Autonix

    Autonix

    Autonix

    Autonix is a Trackable Dynamic QR Code Generator frontend with a visitor management solution backend. We enable businesses to collect and view visit activity with a powerful dashboard reporting on important KPIs. Our visitor check-in options via QR Code, Kiosk, or unique web URL lets visitors have choice when checking in. Gain insights and earn trust with an easy-to-use visitor check-in system. All plans include unlimited trackers and scans. We support all kinds of types of QR Codes, styles, and export as PNG/SVG/EPS for further. Data is available in dashboard, with your Google Analytics. Visitors exportable as well. Zapier Integration and API available. Teams, SSO and more available for enterprise customers. Custom solutions and functionality capable, just request a demo and lets talk about your unique use case!
    Leader badge
    Starting Price: Free Account Available
  • 7
    SAP Access Control
    Give employees the applications and services they need without exposing data and processes to unauthorized use. Streamline the process of managing and validating user access with governance software that automates user provisioning and helps you certify access to on-premise applications and data. You can also enforce governance by embedding preventative policy checks and monitoring emergency access. Identify and remediate access risk violations automatically across SAP and third-party systems. Embed compliance checks and mandatory risk mitigation into business processes. Enable users to submit self-service, workflow-driven access requests and approvals. Identify and remediate violations of segregation of duties and critical access accurately with embedded risk analysis. Automate user access assignments across SAP and third-party systems. Define and maintain compliance roles in business-friendly terms and language.
  • 8
    HID SAFE

    HID SAFE

    HID Global

    Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations.
  • 9
    TEKWave Visitor Management

    TEKWave Visitor Management

    TEKWave Solutions

    Get real-time data, insights, and peace of mind from one central platform through TEKWave's automated cloud solutions for community, logistics, and commercial gate access management. What happens when advanced data and technology meets innovative human thinkers? TEKWave. Our solutions provide digital control and visibility for everything at your physical gates. Enhance security, improve visitor efficiency, and eliminate friction from your visitor experience. Employees, vendors, and guests come and go all day, every day. High traffic can easily create friction in your on-site experience, as well as security vulnerabilities you simply cannot risk. TEKWave’s Commercial Visitor Management system delivers visitor scheduling, processing, tracking, and verification with ease and simplicity - as well as a frictionless, safe way for employees to go to work each day. Monitor and control traffic flow in and out of your campus or facility from any internet connection.
  • 10
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 11
    CSA360

    CSA360

    CSA360

    Security Management: includes many aspects. Security management starts with a plan developed using standards and the knowledge of all aspects of your business, these attributes combined will drive the security plan. The security plan includes policies, procedures, and the actions of performing the plan. All well laid plans require the review of their results. Every environment is continually changing, the key is to keep up with the changing environment we live in. Most organizations are up and running smoothly, we are here to ensure you have the tools to work with. GSS is here to assist in any capacity, so you can easily run your security department. DailyLog Gordon Security Solutions provides services and software solutions assisting you to make the right decisions for your organization. Every organization is different. Allow GSS to work with you in designing the best plan and implement the right solutions to make you aware and effective, so you can reduce vulnerabilities and losses.
  • 12
    SMS by KeyTech

    SMS by KeyTech

    Keytech Security Solutions

    A multi-solution platform developed based on intense expert research and the existing security difficulties organizations face on a daily basis. The solution is designed to eradicate outdated procedures, inefficient data retrieval, ongoing inconsistency in procedures, the vulnerabilities of data information, disorganization through cluttered paper documents and the time-consuming. Is a Combined effort of security procedures and managerial standards? Using cutting-edge technology to enhance the standard of security procedures. Create strong communication between administrators and field users. Bridge the gap within communities. Developed based on logic and intelligent algorithm. At SMS by KeyTech Ltd, we believe that security and facility management should be a straightforward and uncomplicated process. It should deliver efficiency, accountability, and consistency. SMS by KeyTech promises to not only revolutionize current security and facility procedures.
  • 13
    Protecsys 2 Suite

    Protecsys 2 Suite

    Horoquartz

    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 14
    HelloID

    HelloID

    Tools4ever

    HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs. HelloID Modules: Provisioning - Automate the entire user lifecycle process by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. Service Automation - Transform your legacy help desk into a fully automated “Self-Service” platform Access Management - Zero-Trust security with 1-click Single Sign-On (SSO) and Multifactor Authentication (MFA)
    Starting Price: 2.18/month/user
  • 15
    OpenText NetIQ Identity Manager
    Manage the complete identity lifecycle of entities across your diverse, hybrid infrastructure. Deliver efficient, consistent, and secure access to corporate assets within and beyond the firewall. Collect and curate identity information and relationships across complex, hybrid environments. Leverage a centralized framework to provision identities and access to applications and data. Save time and decrease risk by automating tasks required to make access decisions. Continuously adapt security controls based on real-time information and insights. Develop a consistent, overarching view of identities inside and outside your organization. Identity Manager collects and curates identity governance data so you know who has access, why it was granted, and whether it is still needed. With features such as attribute-level authority and continuous reconciliation, you have a single source of truth for identity and access.
  • 16
    OfficerReports.com

    OfficerReports.com

    OfficerReports.com

    Security guard software that includes real-time electronic reporting, GPS based tour tracking, and security guard scheduling all in one place. Our electronic reporting software gives you and your clients access to paperless reports whenever and wherever you need them. You can even review reports before your clients see them. Our guard tour tracking software with GPS technology gives you real-time access to view officer patrol activity. This helps to ensure that officers are on site, alert, checking all, and completing their tours. Better yet the software will send you an alert if your officers are not. Our time and attendance software alerts you if your officers aren’t clocking in and out of shifts on time. Time and attendance also helps make scheduling, payroll, and invoicing easier. We make sure reports are delivered to your clients on time. We give you access to view officer patrol activity in real-time.
    Starting Price: $20 per month
  • 17
    Veristream

    Veristream

    Veristream

    Enhance safety and security in all your facilities with Veristream visitor management solutions. A proven industry leader, Veristream combines the latest technology and their extensive security experience to help organizations secure every facility while enhancing the check in experience for guests at the same time. Veristream's top-rated solutions include BreezN visitor management solution for enterprises organizations and iVisitor for multi-tenant.
  • 18
    iLobby

    iLobby

    iLobby

    Deployed across more than 6,000 sites worldwide, iLobby powers complex work environments by optimizing and automating key facility processes to achieve regulatory compliance, enforce safety protocols, and drive site security requirements. The iLobby platform is supported by robust reporting, turnkey onboarding, and extensive configurability that ensures maximum impact in complex and regulated industries. iLobby optimizes your front desk, and adds an extra level of security, even in highly-regulated facilities such as government, banks, airports, factories, schools, and offices. The platform streamlines the complex process of screening visitors, into one quick and easy checkpoint. Its enterprise-level features make it easy to reach a high level of security and compliance in a matter of seconds. Used by Fortune 500, government, and SMBs.
    Starting Price: $199/month
  • 19
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
  • 20
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 21
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 22
    Visual Identity Suite

    Visual Identity Suite

    Core Security (Fortra)

    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously offered by Courion, Visual Identity Suite (VIS) empowers organizations to see user privileges and access certifications in a whole new way, leveraging an intelligent, visual-first approach. By providing an easy-to-use graphical interface, you can see common user entitlements and quickly identify outliers to make informed decisions about who has access to what. VIS enables you to visualize what access looks like in your business, so you can intelligently mitigate identity risk and manage identity chaos within your organization. Mitigating identity risk in your organization requires intelligent and visible identity governance across all of your environments. This means leveraging a visual-first approach for the creation and management of roles and access reviews, combined with intelligence-enabled context, to simplify your identity governance and administration processes.
  • 23
    Core Security Access Assurance Suite
    As part of the Core Security Identity Governance and Administration portfolio of solutions, previously known as Courion, Access Assurance Suite is an intelligent identity and access management (IAM) software solution that enables organizations to deliver informed provisioning, meet ongoing regulatory compliance, and leverage actionable analytics for improved identity governance. Comprised of four industry-leading modules, our identity management software offers the most intelligent and efficient path to mitigating identity risk, and provides a complete solution for streamlining the provisioning process, reviewing access requests, managing compliance, and enforcing robust password management. A convenient web portal where end users can request access and managers can review, approve, or deny access. Using a shopping cart approach, Core Access delivers an efficient and user-friendly experience, replacing paper forms, emails, and tickets used to manage access.
  • 24
    Echosec Systems

    Echosec Systems

    Echosec Systems Ltd

    Intelligence and security teams are responsible for protecting people, places, data, infrastructure, and other critical assets from harm. The internet is a valuable yet overwhelming source of threat intelligence, helping drive more informed decisions in response to these risks. Echosec Systems gives users a single point of access to a wealth of online data so they can respond faster and more effectively to cyber, cyber-enabled, and physical threats. Our solutions deliver an unparalleled breadth of online sources in a simple user interface, filtering relevant data from millions of surface, deep, and dark web posts in a digestible format. Machine learning threat classifiers, advanced keyword filtering, and geo-location features help users eliminate noise and pinpoint specific, relevant content in real-time. Whether the event is a violent threat, a planned attack, or a data breach—Echosec Systems delivers immediate situational awareness so security and intelligence teams can res
  • 25
    midPoint

    midPoint

    Evolveum

    Go with the best. Join hundreds of organizations that have tried and trust midPoint, the open-source leader in Identity Governance and Administration. Choose what fits you: run midPoint in the cloud, the hybrid cloud or on-premise. Accelerate your security and efficiency with enhanced visibility, policing, synchronization, and identity management. Meet the requirements of the regulations with midPoint’s excellent accountability, record-keeping abilities, and data protection scope. Put users in control of their personal data managed by organizations through the implementation of advanced data protection and privacy mechanisms. Enhance the digital experience of the users by empowering them to enable self-service access requests, password resets, and profile management. Enjoy the scalability and comfort midPoint in the cloud brings. Save valuable time and human resources by engaging third-party experts to take care of the seamless operation. Get the most out of the synergy.
  • 26
    Able+

    Able+

    New Era Education

    Able+ is the most comprehensive Identity and Access Management Solution available on the market. Offering the customisation and flexibility to ensure IAM strategy aligns to business needs. Delivered as a managed service, it can be operated from the public cloud, private datacentre, or a hybrid infrastructure. It streamlines identity governance and improves user productivity and satisfaction by enabling secure single sign-on to applications. Able+ is a highly extensible platform that adapts to your organisation to meet your requirements. It saves you money and time, allowing you to innovate and grow. The choice and mix of infrastructure – public cloud, private, or a hybrid – is a key part of an organisation’s digital strategy.​ Able+ operates across any infrastructure, aligning with your evolving infrastructure strategy, and not dictating it.
  • 27
    Verkada

    Verkada

    Verkada

    Verkada brings the ease of use that consumer security solutions provide, to the levels of scale and protection that businesses and organizations require. By building high-end hardware on an intuitive, cloud-based software platform, modern enterprises are able to run safer, smarter buildings across all of their locations. PoE cameras are online and fully operational in minutes. No NVRs or DVRs. Store up to 365 days of footage locally. Stay ahead of emerging threats with ongoing feature and security updates. Cameras send encrypted thumbnails to the cloud and stream only when actively viewed. Store clips in the cloud indefinitely and easily share archived events with key stakeholders. Bring footage across sites into one dashboard and grant secure access to your entire team. Cameras act as sensors, leveraging the latest in AI and edge computing to uncover actionable insights in real-time. Overcome common challenges associated with physical security management.
  • 28
    Worksphere

    Worksphere

    Worksphere

    Easily book desks, know who's in office, welcome visitors and improve team collaboration from one intuitive platform. Use your office data to realize the full potential of flexible work. Your team can see who's in office and choose where they sit to improve productivity and collaboration. They can book the right space in seconds from their mobile device or laptop. Welcome visitors to your offices, keep track of safety and security needs, and save your team time - all while creating a great first impression. Empower your team to work safely together. Employees can provide proof of vaccination or do a daily symptom screening. Responses are private, secure and HIPAA compliant. We know how hard it can be to implement new technologies. You can set up Worksphere in under an hour. Employees love our intuitive interface and mobile app.
    Starting Price: $149 per month
  • 29
    Hirsch Velocity Software
    Identiv’s Hirsch Velocity Software is an integrated security management system that manages access control and security operations in hundreds of different facilities, from single high secure rooms to multi-building, multi-location campuses. What if a person enters a building and is later found to be symptomatic of an illness? Hirsch Velocity Software with Contact Tracing can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry level packages. Velocity delivers stringent security compliance, interoperability, and expansion and flexibility options designed to accommodate the evolution of security technology and meet the needs of even the most complex business, personnel, and facility requirements.
  • 30
    Vireo

    Vireo

    Vireo

    Hand-built to make managing your security or investigation company a breeze! We will brand and register our iPhone, Android & Windows apps in the app stores for your company. Be the envy of your competitors and impress your clients with your own company mobile apps. The system comprises of a management portal, employee portal, and client portal. You can manage your full business, clients, contracts, and employees and each user type has its own login area! The System was developed with GDPR and data protection at the heart. From data subject access requests to automated data destruction, Vireo is above and beyond what is required. Manage your company from anywhere in the world. Change the look and feel at the click of a button. With encryption and 2FA we ensure your data is secure. Integrated confidential messaging system. Our system is integrated with the SIA for one-click license checks, and with PayPal and World Pay for client payments.
    Starting Price: $5,584 one -time payment
  • 31
    Coconut Software

    Coconut Software

    Coconut Software Corporation

    Our cloud-based, enterprise-level appointment scheduling and visitor management platform combine your on-location and digital channels, providing self-service booking and curbside pickup, online and physical queuing, wait time tracking, callback requests and virtual meeting support as well as contact center integration. Providing this customized experience, either in person or digitally, enhances client engagement, speeds up revenue-generating opportunities, balances workforce staffing, and delivers key insights that organizations cannot capture through their calendars or CRMs alone. In fact, we are the frictionless layer on top of those technology pieces and allow for meaningful connections through a simpler engagement process. Our intuitively-built user interface will delight your clients and your staff with its simplicity and flexibility. We understand the finance industry’s security and compliance requirements—and have built Coconut to surpass them.
  • 32
    OCTOPUS PSIM

    OCTOPUS PSIM

    Octopus Systems

    Today’s security officer has to manage numerous security systems from different providers and generate an accurate situational picture from disparate data sources. This makes security management time consuming and expensive, and the lack of integration and cross referencing makes it difficult to make fast and well-informed security decisions. The OCTOPUS PSIM Command & Control Center takes the guesswork out of your security management by unifying your disparate security devices and information systems into one converged platform. Octopus Systems is using a first of its kind USMS (Unified security management system) which is the next generation PSIM system handling both physical and Cyber related incidents. As the only fully Cloud-based PSIM available on the market, the OCTOPUS PSIM Command & Control Center is a complete solution for security, safety and operation centers, offering a unified common operational picture (COP) either on a multiple screen layout or on a laptop or tablet.
  • 33
    ActNow

    ActNow

    CRMIT Solutions

    A corporate workplace wellness solution for Salesforce. Enabling you to build a healthy employee workforce. Enable remote consultation, telemedicine, and home healthcare amid restrictions. Includes, HIPAA compliant video conferencing, text chat, media sharing in real-time. Configurable, periodic, and compelling notification to employees to comply with mandatory health checks for self and dependents. Enable employees to self-assess their health or symptoms and thereby consult with recommended healthcare experts. Minimize phone traffic by enabling bookings, cancellations, or re-schedule routine appointments online. Manage & monitor the various corporate metrics, viz. wellness program ROI, health habits, and risks. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. We understand the sensitivities and the significance associated with keeping patient healthcare data private and secure.
  • 34
    Color

    Color

    Color

    From population genomics programs to high-throughput COVID-19 testing, Color provides the technology and infrastructure for large-scale health initiatives. Improve your population’s access to COVID-19 antiviral treatment. Organizations can support the health of their populations by partnering with Color to deliver clinical programs for preventive and recurring needs. Color’s platform provides employee health check-ups, a range of common vaccinations, and wellness screenings wherever they are. Color’s platform was built for large-scale healthcare delivery. Public health entities rely on Color’s software and infrastructure to deliver healthcare services to large, diverse populations. Our software connects communities to local sites and labs for testing, immunization, infectious disease management, and more, while easily integrating with existing systems. Our HIPAA-compliant COVID-19 platform and reporting dashboards enable schools to easily manage risk screening, test ordering, etc.
  • 35
    PyraMED

    PyraMED

    PyraMED

    Streamline payments, immunization status & demographic information seamlessly, unifying the wellness services, and business operations with campus systems. Designed specifically for the university and college health market we deliver your needs today with a growth pathway for the future. Integrate all aspects of wellness on a campus providing department-specific content & detailed security access controls for health & counseling services, athletic training, and accessibility services. Our implementation services ensure that your journey is smooth by delivering your system pre-loaded with content & supported by methodology meant to minimize our client's effort. PyraMED ANYwhere saves time and makes patient care data portable. With a solution that seamlessly integrates information providers can enjoy optimal productivity. For 25+ years we have provided software & services to a loyal client base of campuses. Customer input is highly valued and incorporated in every new software release.
  • 36
    OpenApp Smart Locks
    Our smart locks are designed keeping your business in mind. Solving unique challenges faced by the Telecom and Logistics Industry, have opened new channels for our smart locks in a multitude of other industries for both access control and asset security. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Enjoy the privilege of instantly giving and revoking access to locks from the Dashboard, combined with the ability to view and download ‘Access logs’ anytime, from anywhere. Fleet moving critical assets? When there's a theft, the smart locks will give admins a tracking link for real-time tracking.
  • 37
    Trackforce Valiant

    Trackforce Valiant

    Trackforce Valiant

    Our mission is to ensure the delivery of reliable security services, improve operational efficiency and optimally manage human capital. Our solutions are built to increase workforce accountability, improve operational efficiency and enable better communication between all stakeholders. With the help of Trackforce Valiant, over 30,000 organizations from around the globe have optimized their security officer operations. Our extensive knowledge of the security industry coupled with our skilled software development team enables us to build a system capable of addressing all our clients’ physical security needs and concerns. For nearly 30 years, Trackforce Valiant has provided fully integrated security and human capital solutions to its partners and customers. Our applications require minimal computer skills, ensuring quick user adoption. Thanks to input from tens of thousands of clients, we are continuously improving our products and services.
  • 38
    ForgeRock

    ForgeRock

    ForgeRock

    Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs.
  • 39
    ConductorOne

    ConductorOne

    ConductorOne

    ConductorOne is a user-friendly, cloud-loving identity security platform that makes access requests, access reviews, and deprovisioning fast, secure, and compliant. The explosion of cloud apps and infrastructure is great for productivity and collaboration. But for security and GRC teams, managing those SaaS identities and permissions is clunky and error-prone. This results in painful audits, over-permissioned users, and increased risk for breaches. ConductorOne’s identity security platform provides seamless automation, a deep bench of integrations, and best-in-class user experience to help you manage the full lifecycle of cloud permissions and access. No more spreadsheets. No more manually pulling data from apps. No more pinging managers and resource owners for access reviews. Quickly and easily automate access reviews.
  • 40
    SAP Cloud Identity Services
    With SAP Cloud Identity Services, you can successfully support identity management in cloud and hybrid environments. SAP Cloud Identity Services enable you to provide audit reports and support compliance with corporate policies and legal regulations. Improving security, compliance, and system integration in cloud and hybrid environments. Secure system and data access, while granting users an SSO access experience across your cloud or hybrid landscape. Apply consistent mechanisms for user authentication, user provisioning, role assignment, and authorization management. Eliminate redundancies by using one central repository to manage user accounts in a complex cloud or hybrid system landscape. Benefit from centralized capabilities, such as secure authentication and SSO. Provide convenient user self-services, including registration and password reset, for employees and partners. Protect access to applications by defining risk-based authentication rules, two-factor authentication, etc.
  • 41
    IBM Security Verify Governance
    IBM Security Verify Governance allows organizations to provision, audit and report on user access and activity through lifecycle, compliance and analytics capabilities. Within your organization, you need to be able to understand who has access to what and how that access is being used. Is your identity governance working intelligently? IBM is focused on collecting and analyzing identity data to support enterprise IT and regulatory compliance. With IBM Security Verify Governance, you’ll improve visibility into how access is being utilized, prioritize compliance actions with risk-based insights, and make better decisions with clear actionable intelligence. All of this is driven by a business-activity based approach to risk modeling, a major differentiator for IBM that makes life easier for auditors and risk compliance managers. Enable and streamline full provisioning and self-service requests to quickly onboard, offboard, or manage employees.
  • 42
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 43
    SPHEREboard

    SPHEREboard

    SPHERE Technology Solutions

    SPHEREboard is an end-to-end workflow to understand the state of your environment, automate collection, identify immediate risks and seamlessly remediate. Our proprietary methodology is embedded into SPHEREboard architecture and workflows. Know your inventory, showcase all your vulnerabilities and build custom Control Scorecards. Holistically gain these insights across your unstructured data both on-premise and in the cloud. Proactively assign owners and run campaigns to enforce Zero Trust. Resolve access control violations with Virtual Workers at scale with proper tracking and reporting. There is no one size-fits-all approach in accurately identifying ownership. SPHEREboard provides a simple interface to lock in our business logic across your unstructured data but also allows you to proactively build your own rules. This will allow you to resolve incorrect ownership within your books of record and ensure there are never ownership gaps moving forward.
  • 44
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 45
    Zilla Security

    Zilla Security

    Zilla Security

    Zilla gives security teams the visibility and automation required to ensure that your cloud applications are secure and compliant. With Zilla, you can be sure that all your application security settings are correct, permissions are appropriate and onboarded API-based integrations are not leaking critical data. A growing cloud footprint creates an ever-expanding web of data interactions. Automated access reviews are now critical to ensuring that users and API based integrations have the right access. Labor intensive spreadsheets or complex identity governance products with expensive professional services engagements are no longer the only way to achieve access compliance. Automated collectors make it a snap to bring in permission data from all your cloud services and on-premises systems as required.
  • 46
    BAAR-IGA

    BAAR-IGA

    BAAR Technologies Inc.

    BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications.
  • 47
    Veza

    Veza

    Veza

    Data is being reconstructed for the cloud. Identity has taken a new definition beyond just humans, extending to service accounts and principals. Authorization is the truest form of identity. The multi-cloud world requires a novel, dynamic approach to secure enterprise data. Only Veza can give you a comprehensive view of authorization across your identity-to-data relationships. Veza is a cloud-native, agentless platform, and introduces no risk to your data or its availability. We make it easy for you to manage authorization across your entire cloud ecosystem so you can empower your users to share data securely. Veza supports the most common critical systems from day one — unstructured data systems, structured data systems, data lakes, cloud IAM, and apps — and makes it possible for you to bring your own custom apps by leveraging Veza’s Open Authorization API.
  • 48
    Rhombus

    Rhombus

    Rhombus

    Smarter, safer spaces made easy. Rhombus delivers enterprise security cameras and sensors managed seamlessly from a unified cloud-based platform. No NVR/DVRs or complex configurations required. Deploy Rhombus with ease and remotely manage it from a single pane of glass. Cameras feature enterprise-grade encryption and come online in minutes. Footage is stored locally on the camera and events are processed in real-time. Improve safety and response. Sensors are customizable based on your needs and deliver real-time actionable insights with high-resolution video. Physical security built the way your organization operates. Streamline workflow and enhance visibility by integrating with industry-leading solutions. Fast and easy deployment anywhere in the world. Manage unlimited devices, locations, and users from a single console.
  • 49
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
    Starting Price: $595.00 / year
  • 50
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.