Alternatives to CodeSign

Compare CodeSign alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to CodeSign in 2025. Compare features, ratings, user reviews, pricing, and more from CodeSign competitors and alternatives in order to make an informed decision for your business.

  • 1
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
  • 2
    CodeSignal

    CodeSignal

    CodeSignal

    CodeSignal is how the world discovers and develops the skills that will shape the future. Our skills platform empowers teams to go beyond skills gaps, with hiring and AI-powered learning solutions, and helps individuals cultivate the skills they need to level up. Wherever you are on your journey, CodeSignal’s technical hiring and learning & development solutions meet you there and get you where you need to go. Having powered millions of skills evaluations, CodeSignal is trusted by leading companies like Netflix, Capital One, Meta, and Dropbox, and is used by learners across the globe.
  • 3
    Fortinet FortiWeb Web Application Firewall
    Unprotected web applications and APIs are the easiest point of entry for hackers and vulnerable to a number of attack types. FortiWeb's AI-enhanced and multi-layered approach protects your web apps from the OWASP Top 10 and more. FortiWeb ML customizes the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions. With ML, FortiWeb identifies anomalous behavior and, more importantly, distinguishes between malicious and benign anomalies. The solution also features robust bot mitigation capabilities, allowing benign bots to connect (e.g. search engines) while blocking malicious bot activity. FortiWeb also features API discovery and security, as well as threat analytics to identify meaningful security incidents. FortiWeb is available as an appliance, VM, and fully featured WAF-as-a-Service - which is available to trial and purchase in most cloud marketplaces.
    Starting Price: $30/mo for 1 app on SaaS
  • 4
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 5
    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber

    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications that organizations are increasingly reliant upon, such as Microsoft Teams, Slack, Zoom, Salesforce, and social media. A blind-spot is growing for security operations as adoption of these tools increases, creating more risk and vulnerability to ransomware, business compromise, and confidential information leakage. Email security lacks the ability to both create visibility outside of email, and primarily defend against malicious files and links. CASB/SASE solutions are difficult to deploy and manage, and the control function is typically left “open” to prevent false positives. Manage day-to-day business communication risk extending beyond email and into enterprise collaboration applications. According to the Verizon DBIR, 92% of social engineering attacks achieve infiltration.
  • 6
    Dropbox Sign
    eSignatures for everyone. Dropbox Sign (formerly HelloSign) is the most simple and secure way to get documents signed. With Dropbox Sign, contracts are signed on average 80% faster than traditional paper-based contracts and just as legally binding. Built-in reminders and advanced signer options significantly improve document completion rates. Personalize the signing experience for your customers. Easily add your company logo, color, and custom messaging to stay on-brand. Documents that you send out frequently can be saved as reusable templates. Templates are excellent to speed up the signing process and streamline data entry. Documents signed with Dropbox Sign are more secure than pen and paper. An affixed (court admissible) audit trail ensures that actions are tracked and time-stamped. Account admins have the power to manage document permissions and configure team settings from a centralized dashboard, keeping everything more organized and secure.
    Leader badge
    Starting Price: $20 per month
  • 7
    CrowdStrike Falcon
    CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.
  • 8
    CodeSign Secure

    CodeSign Secure

    Encryption Consulting LLC

    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing.
  • 9
    SignPath

    SignPath

    SignPath

    In times of growing cyber security breaches, platform vendors and customers require all deployed applications to be digitally signed. Code signing is the only way to guarantee that software has not been modified by a third party. The corporate solutions of SignPath enable DevOps teams to seamlessly integrate code-signing into their development lifecycle and empowers InfoSec teams to define secure policies and gain transparency over private key usage. Frequent software releases and updates, the popularity of microservices as well as stricter enforcement of internal security measures have increased the complexity for code signing. SignPath is made for developers from one of the leading European software development companies for government institutions. We automate security best practices to keep your development process agile.
  • 10
    SignServer Enterprise
    One flexible platform that supports all your electronic signature use cases. Integrates with your business applications via standard interfaces. Deploy SignServer as it suits your needs - either as a turn-key software or hardware appliance or in the cloud. The SignServer platform covers all your signing use cases in one solution, including standard document signing, eIDAS advanced signing and seal, code signing for multiple formats, timestamping services and ICAO ePassport signing. Avoid managing a myriad of signing solutions and centralize all your signature processes in this multitenant solution and improve on security policy compliance. Server-side signature solutions give maximum control and security and allow you to leverage your hardware security module (HSM) investment in the best way. Signature keys are generated and used for signing in your HSM. SignServer supports most HSMs on the market - and both short-lived keys, and keys or certificates with a longer lifecycle.
  • 11
    SSL2BUY

    SSL2BUY

    SSL2BUY

    SSL2BUY is an authorized reseller of the world's leading certificate authorities (CAs) like DigiCert, Comodo, Sectigo, GlobalSign, GeoTrust, Thawte, and RapidSSL. As a global SSL certificate and code signing certificate provider, it focuses on providing the utmost encrypted SSL security with excellent discount offers and customer support for any size of organization or individual. Get hassle-free security solutions with our low-cost SSL certificates and code signing certificates. SSL certificates protect online transactions with strong 256-bit SSL encryption, and code signing certificates help protect your software.  We offer low-cost SSL certificates, but we never compromise with your web security. All of our certificates come with modern algorithms recommended by the CA/Browser forum.
    Starting Price: $8 per year
  • 12
    Keyfactor Signum
    With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing keys, without changing workflows. Integrate with signing tools via lightweight Windows and Linux agents that are quick to install on build servers or developer workstations. Generate key attestation to comply with CA/B forum requirements to verify that keys are stored and generated in an HSM.
  • 13
    SignMyCode

    SignMyCode

    SignMyCode

    SignMyCode is a one-stop shop for trusted and authentic code signing solutions, offering code signing certificates from reputed certificate authorities like Sectigo, Certera, DigiCert etc. suitable for individual developers and software organisations to safeguard their software, EXE, scripts, and apps by digitally signing them.
    Starting Price: $210.99/year
  • 14
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 15
    jarsigner
    The jarsigner tool has two purposes, to verify the signatures and integrity of signed JAR files and to sign Java Archive (JAR) files. A digital signature is a string of bits that is computed from some data (the data being signed) and the private key of an entity (a person, company, and so on). Similar to a handwritten signature, a digital signature has many useful characteristics, its authenticity can be verified by a computation that uses the public key corresponding to the private key used to generate the signature, it is a function of the data signed and thus cannot be claimed to be the signature for other data as well, the signed data cannot be changed. If the data is changed, then the signature cannot be verified as authentic and It cannot be forged, assuming the private key is kept secret.
  • 16
    Entrust TLS/SSL Certificates
    Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.
    Starting Price: $199
  • 17
    apksigner
    The apksigner tool, available in revision 24.0.3 and higher of the Android SDK Build Tools, lets you sign APKs and confirm that an APK's signature will be verified successfully on all versions of the Android platform supported by that APK. This page presents a short guide for using the tool and serves as a reference for the different command-line options that the tool supports. For a more complete description of how the apksigner tool is used for signing your APKs. The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file.
  • 18
    ClickSSL

    ClickSSL

    ClickSSL

    ClickSSL is an platinum partner of the leading Certificate Authorities like VeriSign(now Symantec), GeoTrust, RapidSSL, Thawte and Comodo. ClickSSL offers EV SSL, Code Signing Certificate, UCC Certificate, Wildcard SSL & more SSL Certificates at market low price. ClickSSL offers SSL certificates can provide you with non-forgettable proof of your website's identity, and customer confidence in the integrity and security of your online business. Buy RapidSSL, VeriSign(now Symantec), GeoTrust, Thawte and Comodo SSL Certificates at affordable price. ClickSSL offers SSL certificates with strong 256 bit encryption at affordable price to secure your web sites, eCommerce, exchange, intranets and extranets. Our inexpensive digital certificate is supported by over 99% of current browsers. Buy SSL certificate at lowest price to establish secure environment on your site(s). Move your step ahead with HTTPS and never let down customer’s confidence.
    Starting Price: $13.21
  • 19
    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb is an authorized partner of Sectigo (formerly known as Comodo) and offers the cheapest SSL certificates from globally reputed Certificate Authorities like COMODO, SECTIGO, and CERTERA. We provide all types of SSL & Code Signing certificates like DV certificates, OV, and EV certificates.
  • 20
    iOS App Signer

    iOS App Signer

    iOS App Signer

    iOS App Signer can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
    Starting Price: Free
  • 21
    GeoTrust

    GeoTrust

    GeoTrust

    GeoTrust, a leading certificate authority, provides retail and reseller services for SSL encryption, and website authentication, digital signatures, code signing, secure email, and enterprise SSL products. In today’s digital economy, every company needs web security they can trust. With more than 100,000 customers in over 150 countries, there’s good reason businesses around the world choose GeoTrust for SSL/TLS security solutions. Since 2001, GeoTrust has delivered business-class certificates to organizations of all sizes—from enterprise to single-site small business—at the best possible value. The wide range of authentication levels offered by GeoTrust allow companies to cost-effectively meet their specific security needs across virtually every major browser and mobile device, while also aligning themselves with a respected digital security brand.
    Starting Price: $149 per year
  • 22
    SignTool

    SignTool

    Microsoft

    The software industry must provide users with the means to trust code including code published on the Internet. Many webpages contain only static information that can be downloaded with little risk. Some pages, however, contain controls and applications to be downloaded and run on a user's computer. These executable files can be risky to download and run. Packaged software uses branding and trusted sales outlets to assure users of its integrity, but these guarantees are not available when code is transmitted on the Internet. Additionally, the Internet itself cannot provide any guarantee about the identity of the software creator. Nor can it guarantee that any software downloaded was not altered after its creation. Browsers can exhibit a warning message that explains the possible dangers of downloading data of any kind, but browsers cannot verify that code is what it claims to be. A more active approach must be taken to make the Internet a reliable medium for distributing software.
  • 23
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks.
  • 24
    SSH Secure Sign
    SalaX Secure Sign is a secure digital signature solution that enables users to electronically sign confidential documents with robust encryption, ensuring authenticity and compliance with legal standards. It allows for the signing of various file types, including PDFs, images, office documents, and source code files, with the capability to sign multiple documents simultaneously. The solution does not require end-user accounts or registration, simplifying the signing process. Users can verify, track, and audit all digital signatures, with e-signatures archived for easy auditing. Secure Sign offers flexible configuration options, including various authentication methods such as Active Directory, Signicat, or SMS OTP, and can be deployed on-premises or in the cloud, ensuring full control over data. As part of the SalaX Secure Collaboration suite, it integrates seamlessly with other applications like encrypted secure email, secure e-forms, and secure rooms for file sharing.
  • 25
    .ID Signatures
    .ID signatures are based on your true identity, secured by the toughest cryptography and identity verification. Sign any digital document with confidence! .ID platform allows you to upload and store any files for signing. Digital signatures with .ID are strong and based on verified identity. Sign documents and files easily with a click of your pin code or just a thumbprint. .ID platform is using banking grade authentication to secure your files and protect them from intruders. Sign your documents with confidence. As signatures are based on person's verified identity, you always know who actually have signed documents. .ID signatures are different from other digital signature solutions on the market. The .ID is not based on a scribbled drawing of your signature placed on a PDF, but the signature is sealed with encrypted code. That makes .ID digital signatures more secure and valid than any other.
    Starting Price: €7.90 per month
  • 26
    Ploy

    Ploy

    Ploy

    Discover, protect, and manage your SaaS in minutes. Integrate in minutes to detect all SaaS applications employees are using. Identify duplicate applications and licenses that are no longer used by employees. Triage applications that have access to sensitive data and uncover supply chain risks. Ploy enables businesses to save on wasted SaaS spending that can manifest in multiple ways. Ensure employees have been completely offboarded from SaaS tools so licenses aren't being paid for unnecessarily. Ploy also automatically identifies duplicated SaaS, so you'll never end up paying for Jira and Asana again. Gain insights into low-usage licenses, so you can de-provision licenses that are no longer required by employees. See every app employees have signed up to and their authentication method. Guarantee employees have been offboarded ensuring your data is protected. Identify licenses no longer being used by employees. Use Ploy's workflows to automate all your onboarding and access processes.
  • 27
    Datto SaaS Protection

    Datto SaaS Protection

    Datto, a Kaseya company

    Reliably and securely backup Microsoft 365 and Google Workspace (formerly G Suite) to ensure critical programs used for business, email and docs are protected from every day downtime events and cyber threats. Datto SaaS Protection is a cloud-to-cloud backup solution built exclusively for MSPs, protecting thousands of businesses today. Datto SaaS Protection offers comprehensive backup, recovery and overall cyber resiliency for critical cloud data that lives in Microsoft 365 and Google Workspace applications. Protect against permanent data loss and recover from ransomware or user-error quickly with one-click restore. Get new clients up and running fast with streamlined onboarding and manage client backups from a single pane of glass. Discounts are applied to the total licenses sold across all of your clients, meaning that, the more you sell, the more you’ll make. Meet business continuity, compliance, and security requirements beyond Microsoft 365 and Google Workspace.
  • 28
    Digital Signer

    Digital Signer

    PULKITSOFT LLP

    Digital Signer is a digital signature software. - Sign pdf file - Sign pdf by DSC - Sign pdf by PFX - Sign pdf by PKCS#12 - Sign pdf by Certificate Store Feature-packed, eSigning made simple & easy. Prevent and protect PDF file editing, tampering and fraud. Your documents become permanently uneditable with high-grade security. Digital Signer software protects, prevent documents tamper-proof your personal, official, Invoice, Bills, Tax forms, Business Contracts, Legal and any other document. Using this product you can quickly sign multiple PDF files (batch mode) by selecting input and output directory/folder. This is ideal for bulk signing of a large number of corporate documents rather than signing each one individually.
  • 29
    bugScout

    bugScout

    bugScout

    Platform for detecting security vulnerabilities and analyzing code quality of applications. bugScout was born in 2010, with the objective of promoting global application security through audit and DevOps processes. Our purpose is to promote a culture of safe development and thus provide protection for your company’s information, assets and reputation. Designed by ethical hackers and reputable security auditors, bugScout® follows international security rules and standards and is at the forefront of cybercrime techniques to keep our customers’ applications safe and secure. We combine security with quality, offering the lowest false positive rate on the market and the fastest analysis. Lightest platform on the market, 100% integrated with SonarQube. A platform that unites SAST and IAST, promoting the most complete and versatile source code audit on the market for the detection of Application Security Vulnerabilities.
  • 30
    Hdiv

    Hdiv

    Hdiv Security

    Hdiv solutions enable you to deliver holistic, all-in-one solutions that protect applications from the inside while simplifying implementation across a range of environments. Hdiv eliminates the need for teams to acquire security expertise, automating self-protection to greatly reduce operating costs. Hdiv protects applications from the beginning, during application development to solve the root causes of risks, as well as after the applications are placed in production. Hdiv's integrated and lightweight approach does not require any additional hardware and can work with the default hardware assigned to your applications. This means that Hdiv scales with your applications removing the traditional extra hardware cost of the security solutions. Hdiv detects security bugs in the source code before they are exploited, using a runtime dataflow technique to report the file and line number of the vulnerability.
  • 31
    StepSecurity

    StepSecurity

    StepSecurity

    If you are using GitHub Actions for CI/CD and are worried about the security of CI/CD pipelines, StepSecurity platform is for you. Implement network egress control and CI/CD infrastructure security for GitHub Actions runners. Discover CI/CD risks and GitHub Actions security misconfiguration. Standardize GitHub Actions CI/CD pipeline as code files by automated pull requests. Provides runtime security to help you prevent SolarWinds and Codecov CI/CD security attacks by blocking egress traffic with an allowlist. Instant contextualized insight into network and file events for all workflow runs. Control network egress traffic with granular job-level and default cluster-wide policies. Many GitHub Actions are not maintained and are risky. Enterprises fork such Actions, but ongoing maintenance is expensive. By offloading the tasks of reviewing, forking, and maintaining Actions to StepSecurity, enterprises can realize substantial risk reduction and time savings.
    Starting Price: $1,600 per month
  • 32
    Checkmarx

    Checkmarx

    Checkmarx

    The Checkmarx Software Security Platform provides a centralized foundation for operating your suite of software security solutions for Static Application Security Testing (SAST), Interactive Application Security Testing (IAST), Software Composition Analysis (SCA), and application security training and skills development. Built to address every organization’s needs, the Checkmarx Software Security Platform provides the full scope of options: including private cloud and on-premises solutions. Allowing a range of implementation options ensures customers can start securing their code immediately, rather than going through long processes of adapting their infrastructure to a single implementation method. The Checkmarx Software Security Platform transforms the standard for secure application development, providing one powerful resource with industry-leading capabilities.
  • 33
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 34
    ManageEngine Browser Security Plus
    Browser Security software is a tool that helps protect sensitive enterprise data from security breaches associated with cyberattacks. Browser Security Plus is an enterprise browser security tool that helps IT administrators manage and secure browsers across networks. It enables them to gain visibility on browser usage trends, harden browsers settings, control browser extensions and plug-ins, lock down enterprise browsers, and ensure compliance with stipulated browser security standards. All this helps admins protect their networks from cyberattacks, such as phishing attacks, watering hole attacks, ransomware, viruses, and trojans. Gain total visibility into browser usage trends and add-ons present across your network. Detect which add-ons components are capable of causing security breaches. Manage and secure the browser add-ons with Add-on Management.
  • 35
    Kona Site Defender

    Kona Site Defender

    Akamai Technologies

    Protect your apps and APIs against the largest and most sophisticated attacks with a web application firewall and DDoS protection at the edge. Kona Site Defender provides application security at the edge — closer to attackers and further from your applications. With 178 billion WAF rule triggers a day, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats. Flexible protections help secure your entire application footprint and respond to changing business requirements, including APIs and cloud migration, with dramatically lower management overhead. Kona Site Defender employs a proprietary anomaly detection engine designed to deliver the highest accuracy out of the box. You need application security that can be customized for your unique requirements and the organizations you support.
  • 36
    GreenSign

    GreenSign

    GreenSign

    GreenSign is a cutting-edge electronic signature solution designed to streamline document signing processes while promoting sustainability. By providing secure, legally binding digital signatures, GreenSign helps businesses eliminate the need for paper, ink, and physical document handling. This not only reduces environmental impact but also accelerates workflows, saving time and money. GreenSign offers versatile integration options, including dynamic no-code web forms, API integrations, and seamless connections with popular apps and CRM systems. These features allow businesses to integrate electronic signatures into their existing workflows with minimal disruption, enhancing operational efficiency and improving the overall user experience for both employees and customers. With a focus on security, compliance, and ease of use, GreenSign empowers businesses to go paperless while maintaining the integrity of their documents.
    Starting Price: $0.50 per envelope
  • 37
    JetSign

    JetSign

    JetSign

    Tap or click anywhere to sign with your finger. Add your e-signature, dates, and text to your document and generate a signed PDF! Send out documents for e-signature with a simple signing link that you can share in your own email or text message. You and your remote signer(s) can view and sign your document with a full audit trail. Easily fill and sign forms by editing text directly on the document - no text entry pop-ups required! Resize text, add checkmarks and X's, and clone fields with our form filler features and save as a PDF. Add one or several documents at a time including Word (doc/docx), Pages, PDF, HTML, RTF, WordPerfect, images, and 15 other file formats. We protect your documents in the cloud with leading encryption methods (AES-256), SSL hosting, and full audit trails for electronic signatures.
    Starting Price: Free
  • 38
    TAAP Visitor Book
    Digital Contactless Reception Desk Solution. Simple sign in for visitors, employees and contractors. Visitors scan a QR code to sign in and out at reception. Caters for small single site and large multi-site clients. Safe sign-in eliminates pen, paper and kiosk touch points. A Visitor Badge is created for identification on site. Calendar Integration for instant email notifications. Fully digital with no more waiting in line at reception. No specific hardware required, it works on any device. Visitors details are safe and secure aligned with GDPR. TAAP Visitor Book is a solution for every organization of any size that wants a new modern contactless digital reception. It allows visitors, contractors and employees to digitally sign in and out of locations using their smartphone. The application is free for Visitors to use and available at a low monthly cost for organizations. TAAP Visitor Book also supports shared and serviced offices.
    Starting Price: $69 per month
  • 39
    iXGuard

    iXGuard

    Guardsquare

    Hackers can use readily available tools to disassemble and inspect your iOS applications and SDKs and gain insight into their internal logic. This opens the way for various forms of abuse, including intellectual property theft, credential harvesting, tampering and cloning. iXGuard protects native iOS and cross-platform apps and SDKs against reverse engineering and hacking. It hardens apps’ code and enables them to defend themselves at runtime. iXGuard is a command-line tool that processes and protects iOS applications and libraries. It enables you to fully protect your application or SDK without requiring you to share or alter the source code. iXGuard is easy to configure. It can be set up to protect entire applications or specific functions with a single configuration file. iXGuard offers built-in support for both native iOS (Objective-C, Swift) and cross-platform applications (Cordova, Ionic, React Native, Unity).
  • 40
    Imperva Runtime Protection
    Imperva Runtime Protection detects and blocks attacks from inside the application. Using patented LangSec techniques which treat data as code, Imperva Runtime Protection has full context of potentially malicious payloads before the application completes its processes. The result? Fast and accurate protection with NO signatures and NO learning mode. Imperva Runtime Protection is a key component of Imperva’s market-leading, full stack application security solution which brings defense-in-depth to a new level.
  • 41
    SignInSafe

    SignInSafe

    Sensible Technologies

    SignInSafe is a web-based application that provides digital, no-contact, visitor, and guest sign-in through a QR code. SignInSafe can be used anywhere sign-in/out is required. SignInSafe is used to track construction site visitor logs, restaurant guest lists or waitlists, covid-tracing, school visitor or student sign-in/out, and sports drop-off/pick-up. SignInSafe is centrally managed on the cloud and requires no app to be installed by customers or visitors.
    Starting Price: $65 per month
  • 42
    SonicWall Email Security
    Protect against today’s advanced email threats using a cloud email security service. Email is the most common threat vector used by cyber criminals. Deploy the cloud-based service that protects your organization from advanced email threats such as targeted phishing attacks, ransomware, business email compromise (BEC) and email fraud. SonicWall solution reduces administrative overhead through easy deployment, management and reporting. The massively expanding, distributed IT reality is creating an unprecedented explosion of exposure points for sophisticated cybercriminals and threat actors to exploit. SonicWall Email Security is ideal for organizations that need a dedicated on-premises solution. SonicWall’s solution can be deployed as a hardened physical appliance, robust virtual appliance or software application. The multi-layered solution provides comprehensive inbound and outbound protection, and defends against advanced email-borne threats such as ransomware.
  • 43
    ZoopSign

    ZoopSign

    ZoopSign

    Introducing ZoopSign: The Ultimate Contract Management Platform! Say goodbye to outdated document management and signing processes! ZoopSign revolutionizes workflows with advanced document tracking, seamless e-signing, and PDF editing tools, all-in-one. Take control of your contracts with ZoopSign's robust document tracking. Know who views, opens, and signs your documents, enhancing collaboration. Customizable security settings, password protection, watermarking, and access controls ensure your data stays safe. From small businesses to established enterprises, ZoopSign caters to all. Its user-friendly interface and comprehensive features make contract management effortless. Embrace efficiency, security, and simplicity with ZoopSign. Experience the transformative impact of ZoopSign today! Simplify workflow, increase productivity, and bid farewell to paperwork. Try ZoopSign now and witness the future of contract management.
    Starting Price: $5/month/user
  • 44
    OneSpan Sign
    OneSpan Sign is a secure and reliable electronic signature solution that powers some of the world's most trusted brands. Top analyst firms and regulated industries recognize OneSpan Sign as a flexible and scalable solution that enables them to manage identities, secure access, verify transactions, and protect assets across the enterprise, financial, e-commerce, government, and healthcare markets. Available in the cloud or on-premises, OneSpan Sign seamlessly captures signatures at the point of sale (POS), in the field, or on websites.
    Starting Price: $20.00/month/user
  • 45
    ZebraSign

    ZebraSign

    ZebraSign

    ZebraSign is a secure electronic document management system built for small and medium-sized businesses. It centralizes all documents – contracts, forms, approvals, and signed records – in one workspace with full access control and audit history. The platform’s simple interface makes it easy to manage and track documents at every stage. By moving to digital workflows, ZebraSign helps reduce paper use and storage costs while ensuring secure access to critical files. Key Features - Electronic logbooks for record keeping; - Signing on a tablet for easy, on-the-go document approval and confirmation; - Workflow automation and reusable templates for recurring business forms and contracts; - Virtual printer for instant document conversion and signing. ZebraSign brings all your contracts, forms, and approvals into one workspace where you can sign on the go, track every change, and automate routine tasks.
    Starting Price: $4.99
  • 46
    Trend Micro Cloud App Security
    Enhance the security of Office 365, Google Workspace, and other cloud services by leveraging sandbox malware analysis for ransomware, BEC, and other advanced threats. The security included with Office 365 filters known antivirus threats, but 95% of today’s malware will only infect one device and is unknown to traditional antivirus techniques. Direct cloud-to-cloud integration: Uses APIs to enhance protection without complications. Sets up quickly and automatically: API integration requires no software to install, no user setting changes, no proxy to deploy, and no MX record to change.
  • 47
    ApproveMe

    ApproveMe

    ApproveMe

    WPESignature is an easy-to-use, reliable WordPress plugin that gives you the eSignature automation tools you need to protect your business (while saving you a ton of money and time). Easy to use contract builder allows you to create beautiful legally binding contracts from your WordPress website. Collect valuable data with text fields, radio buttons, checkboxes, dropdowns, date pickers, even file upload forms. Look like a pro to your customers. Easily download or receive an email attachment of signed documents as a PDF. Have people sign contracts in-person using your Android or IPad tablet. Works well for NDA’s, photo releases, waivers, and more. Easily sign and store unlimited documents, contracts, proposals, estimates with no limit. Unlimited means exactly that. Protect your company, your signers and your documents. Have your signers password protect their documents with an access code and unique password.
  • 48
    Zoho Sign
    Recognized by top-industry analysts and peer-to-peer review websites. Securely sign, send, and manage your documents from anywhere with Zoho Sign. Digitally sign documents yourself and email the signed copies to others, get documents signed on the spot, or send documents to request signatures. Zoho Sign offers military-grade encryption and ensures the highest level of data security. It complies with the most current e-signature laws: ESIGN and eIDAS. Define the signing order when sending a document to multiple recipients, and control how they receive and sign your documents. Track every step of the document signing process with our comprehensive audit trail. Receive instant alerts and notifications on the status of each document. Create personalized templates once and use them forever, saving your time and effort. Incorporate your brand image across your documents, with customized logos and emails.
    Starting Price: $10 per month
  • 49
    eSigns

    eSigns

    eSigns

    eSigns is an electronic signature solution, designed for both individuals as well as enterprises, which has proven to be best in streamlining workflows and closing contracts swiftly. Leveraging the advanced technology & automation, the software lets you discover the most convenient way to sign documents digitally, organize them in order and share amongst your teams as well as clientele, within few clicks from anywhere any time. Quick & Easy Say goodbye to those long waiting hours of getting your documents signed, printed and shared within or outside your organization. With eSigns its done with ease in seconds! Fully Secured eSigns adheres to ensure all your documents signed, shared and stored within the system are fully protected and encrypted. So, there’s no data breach – Stay assured! On-The-Go Solution Now, you’re all set to experience the most hassle-free way to electronically sign and send documents, from anywhere, at anytime.
    Starting Price: $9.99 per month
  • 50
    Barracuda Application Protection
    Barracuda Application Protection is an integrated platform that provides comprehensive security for web applications and APIs across on-premises, cloud, or hybrid environments. It combines full Web Application and API Protection (WAAP) functionality with advanced security services to defend against a wide range of threats, including the OWASP Top 10, zero-day attacks, and automated threats. The platform offers features such as machine learning-powered auto-configuration, full-spectrum DDoS protection, advanced bot protection, and client-side protection to safeguard applications from sophisticated attacks. Additionally, it includes a hardened SSL/TLS stack for secure HTTPS front-end, built-in content delivery network (CDN) for optimized performance, and integration with various authentication services for granular access control. Barracuda Application Protection simplifies application security by providing a unified solution that is easy to deploy, configure, and manage.