Alternatives to Corptree LEAD

Compare Corptree LEAD alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Corptree LEAD in 2026. Compare features, ratings, user reviews, pricing, and more from Corptree LEAD competitors and alternatives in order to make an informed decision for your business.

  • 1
    AccessMatrix

    AccessMatrix

    i-Sprint Innovations

    AccessMatrix™ Universal Access Management (UAM) is a comprehensive web single sign-on (SSO), web access management, federated single sign-on (SSO), and social network login, externalized authorization management, and hierarchy-based delegated administration system. Leveraging the AccessMatrix™ technology, UAM fulfills the most rigorous form of application security by providing secure Administration, Authentication, Authorization, and Audit services (4As) to business applications within your organization. Built on the regulatory requirements and standards in banking & finance sector, UAM enables custom enterprise/ internet applications to access a common set of IAM (Identity & Access Management) services and lowers the integration cost. UAM provides a set of security APIs for developers to tightly integrate web and non-web applications.
  • 2
    Authority Court
    You no longer need to waste time hunting for information. Authority Court makes case management simple with hassle-free reporting. Easily aggregate and organize your data into a report for quick and informed decision-making. Authority Court provides you with an intuitive and easy-to-use reporting platform to empower even non-technical users.
  • 3
    PlainID

    PlainID

    PlainID

    PlainID is The Authorization Company. PlainID provides both Business AND Admin teams with a simple and intuitive means to control their organization’s entire authorization process, all based on your own business logic. The platform allows you to implement literally any kind of rules you could imagine, all without coding, and all in fine grained detail. PlainID simplifies Authorization so that thousands of Roles, Attributes and even Environmental Factors can be converted into a few logical SmartAuthorization policies using our Graph Database Decision Engine. In-depth Analytics and Insights: PlainID provides unobstructed visibility with a full audit trail. Compliance, regulation and audit requirements, they’re easy to manage on a simple graph-based UI. Access is determined dynamically and in real time, based on user attributes, environmental attributes (time, location, etc.) as well as event based authorizations. PlainID combines ABAC & RABC to a united policy.
  • 4
    kompany

    kompany

    Moody's Analytics

    Our Live Search seamlessly connects you to commercial registers, financial authorities and tax offices from around the world in real-time, providing instant access to primary source information on more than 115 million companies across over 200 jurisdictions. Our global network provides an unparalleled real-time information search experience. With direct connections to government registers, financial authorities and tax offices around the world, official company information is only a click away. Choose between our KYC API and web application KYC workspace to complete real-time business verification, client onboarding and enhanced due diligence tasks with the support of our global register network of audit-proof data. Both offer access to our shareholder identification tool, UBO discovery. KYC onchain supports our API users to provide a secure data trail of requests and responses.
  • 5
    HYPERS

    HYPERS

    HYPERS

    HYPERS uses the leading digital marketing platform to help brands refine data assets, improve decision-making efficiency, and enhance the personalized experience, so as to achieve sustainable growth in the digital age. The HYPERS full-link solution fits the business flexibly. From data collection, management, and application. Activate data value through a plug-and-play product portfolio. Improve marketing efficiency. Drive high-speed business growth. Assess the ability of marketing to acquire customers, improve the consumer experience, and increase conversion and user retention. HYPERS advertising monitoring analysis and conversion tracking platform. Professional advertising effect tracking and analysis platform, open up the links before and after marketing, and improve advertising ROI. HYPERS user consent and authorization management platform. Easily create privacy notification and user authorization processes, and efficiently manage user privacy authorization and preferences.
  • 6
    Rhyme

    Rhyme

    Rhyme

    Rhyme connects payers and providers intelligently inside the prior authorization workflow, reclaiming the time lost on back-and-forth efforts and returning it to the patient. Automating manual tasks is critical (that’s why we do it), but it isn’t enough. When the nuances of clinical decision-making require collaboration between payers and providers, Rhyme keeps your workflow clear, agile, and fluid. We created the largest integrated prior authorization network, to leave a disjointed system behind and replace it with intelligent collaboration. Deep relationships and connections to EHRs, payers, and benefits managers, all on one platform. No scrambling, no screen-scraping, no secondhand info. We meet providers and payers right where you are, in your existing systems and workflows. Connections are easy so we can adjust to you, not the other way around. Prior authorizations aren’t an add-on to our platform, they’re all we do.
  • 7
    BigHand Workflow Management
    BigHand Workflow Management is a task delegation solution that allows work to be automatically routed to the right support staff at the right cost to the law firm, and monitored through to completion. Output reports can be used by management for visibility of key metrics like work type, volume, capacity, and utilization for informed resourcing and productivity decision-making. Comprehensive forms to suit every type of support task your law firm requires. Single or multi-step workflows to automatically route tasks to the most cost-effective resource. Record high-quality voice notes, add comments, or attach files and send for transcription. A live feed of all support tasks, sort and filter by work type, assigned user, priority, due date, author, matter, and more. Automatic time recording for every task completed by any support team member. Real-time and historical data on backlogs, throughput, service levels, and support team effectiveness.
  • 8
    Civica Involve
    Putting people at the heart of your decision-making is more important than ever. From local authorities to healthcare organizations, data-driven decisions produce better outcomes for communities and stakeholders alike. Civica Involve, our digital community and stakeholder engagement platform, makes it simple to build beautiful engagement websites, create effective surveys, and analyze real-time data to inform your decision-making and service delivery. Supporting customers across the public sector, our smart engagement platform helps you increase community participation and understand the feedback you receive. Civica Involve allows you to access and manage all engagement features through an intuitive interface designed for non-technical users. Our comprehensive suite combines over 40 engagement, feedback and analytics tools, making it easy for you to create unique engagement projects.
  • 9
    Expertise Matrix

    Expertise Matrix

    Int64 Software

    Expertise Matrix (EMX for short) is a leading Skill Matrix management platform from Int64 Software for businesses who want to gain a better grasp on the breadth of skills available to their staff. It can your personnel track their own skills and help you when organizing professional development reviews (PDR), monitoring skill progression, and identifying skill gaps and at-risk areas. We have spent a great deal of time putting every part of the Expertise Matrix interface under a microscope and tweaking many parts of it to make it easier to read, more intuitive, and quicker to gain fast insight into your skill management processes. Our subscription payment system has been updated to comply with the upcoming European Banking Authority’s Payment Services Directive (PSD2) requirements for Strong Customer Authentication (SCA) to better protect your bank details. We have removed our static demo logins and are replacing them with a fully enabled 30 day triall.
    Starting Price: $36.45 per month
  • 10
    Powertech Authority Broker for IBM i
    Giving too much system access to the wrong users can lead to catastrophic data corruption and loss. Limit the risk with privileged access management software. Powertech Authority Broker for IBM i protects corporate assets and audits user access in real time for maximum system security. Security best practices recommend limiting the number of privileged user accounts, but having too many user profiles with special authorities is one of the most common security lapses uncovered in IBM i audits. Give users the access they need to do their jobs—without giving too much. Maintain a record of everything a user does when they swap into a privileged profile. Using award-winning screen capture technology, Powertech Authority Broker for IBM i provides system administrators and IT leaders with an unparalleled view of user activity, helping to safeguard sensitive IBM i data.
  • 11
    SmartGovernance

    SmartGovernance

    CAVEDIGITAL

    SmartGovernance is the most complete enterprise governance management product for decision-making ecosystems. It supports your chain of command decision-making processes, including power of authority conditional rules, and multiple board, committee, council and assembly meetings. This allows for greater agility in the decision-making process while eliminating the physical paper clutter (or the email nightmare) and its logistics, time and resource consumption. Additionally, SmartGovernance also supports multi-organizational/conglomerate scenarios. Quickly know what's coming and what tasks you need to complete. Create a proposal and recruit a team to co-edit and help. Stay on top of your tasks and approve everything that falls under your power to act. Support your chain-of-command formal approval processes and power to act rules. Prepare the agenda, organize and conduct corporate governance board and committee meetings.
  • 12
    METS

    METS

    SPD Enterprises

    METS is the Best Application for Project Estimation and Material Tracking. A true web-based application built and optimized for MEP contractors by people who know the business. From collaboration to accountability, METS is the most comprehensive material management solution for MEP Projects. METS's integral systems for extended validations and approval of various business processes augments the capability to "Delegate with Authorization" yet retain control and monitoring of the projects. METS's tools to perform on-demand analysis and its efficiency to get project status and deviations reports etc., all assists the team in taking prompt, reliable and accurate decisions. Prominent Challenges for HVAC projects are controlling the Scope of Work, minimizing deviations/variance, and delegating of authority. METS is the best way to accurately estimate, has robust change control management, delegates authority with limitations, and best tool for continuous monitor tracking.
  • 13
    Hotelace

    Hotelace

    CrowFran Innovations

    Hotelace is a versatile hospitality property management system (PMS) developed by CrowFran Innovations Limited to streamline hotel operations both on-premise and in the cloud. It integrates key modules such as front-office, outlets, accounts, housekeeping, and store management to provide seamless operational control. The platform features automated, detailed reporting, operational prompts to minimize errors, and strict authorization controls to ensure accountability. Hotelace handles complex tasks like invoice generation, bill merging and splitting, stock management, and requisitions, optimizing day-to-day workflows. Its modular design allows customization based on specific client needs, supporting multiple outlets and detailed auditing. Easy to use with helpful guides, Hotelace helps management and staff enhance productivity and decision-making through data-driven insights.
  • 14
    5x5 Data Co-Op
    Eliminate the chaos of data sourcing and get it directly from its origin through the 5x5 data cooperative. The co-op connects a diverse array of data sources and platforms, giving you the key to creating data products faster and seamlessly. Companies often have disparate data sets that can be complementary to each other. In a world where you can combine these datasets and produce something greater than the sum of its parts, the sourced data becomes transformative for growth. Unlock your full potential through unlimited access to consumption-validated data with flexible delivery options. Comprehensive monthly delivery enables informed decision-making and promotes the cooperative's effectiveness and value. Empowering members with ownership, control, and decision-making authority over their data, fostering trust, collaboration, and tailored solutions. Our members are part of the data sourcing process and ecosystem.
  • 15
    IVIX

    IVIX

    IVIX

    Designed for tax authorities to increase audit efficiency and tax revenue, IVIX technology transforms publicly available business activity data into highly accurate leads. By providing a focused list of businesses, their revenue, and the taxpayer entity, our intuitive platform enables you to promote compliance and deterrence. Bringing modern data and algorithms to revenue administration. In this data-rich age, it’s time for governments to harness the power and potential of the digital economy to deter the evasion it enables. Designed with the guidance of former IRS commissioners and current tax authorities, IVIX builds solutions that align with tax agents’ existing culture, operations, and technological infrastructure. Shadow economy insights for tax authorities. The IVIX platform brings off-the-shelf solutions to help tax authorities identify noncompliance and drive deterrence, using publicly available business activity data.
  • 16
    Cloudentity

    Cloudentity

    Cloudentity

    Cloudentity increases development velocity, audit efficiency and risk mitigation by advancing fine-grained authorization policy management and delivering continuous, transaction-level enforcement across hybrid, multi-cloud and microservice environments. Externalize authorization management that empowers developers to efficiently create policy-as-code, provision standardized controls, and invoke contextual access and data exchange enforcement as close to the service as possible. Accelerate application delivery by expediting security validation with full data lineage for audit, forensics and compliance. Cloudentity provides dynamic authorization governance that delivers policy automation and adaptive control ensuring Zero Trust between users, apps, services and data. Automate app, service and API inventory, authorization policy standardization, and declarative authorization provisioning to streamline release security verification.
  • 17
    Amazon Verified Permissions
    Amazon Verified Permissions is a fully managed authorization service that uses the provably correct Cedar policy language, so you can build more secure applications. With Verified Permissions, developers can build applications faster by externalizing authorization and centralizing policy management. They can also align authorization within the application with Zero Trust principles. Security and audit teams can better analyze and audit who has access to what within applications. Accelerate application development by decoupling authorization from business logic. Protect application resources and manage user access to the principle of least privilege. Amazon Verified Permissions is a fully managed, Cedar-compatible permissions management and fine-grained authorization service for the applications that you build. Using Cedar, an expressive, performant, and analyzable open source policy language, developers and admins can define policy-based access controls.
    Starting Price: $0.00015 per request
  • 18
    Cedar

    Cedar

    Amazon

    Cedar is an open source policy language and evaluation engine developed by AWS to facilitate fine-grained access control in applications. It enables developers to define clear and concise authorization policies, decoupling access control from application logic. Cedar supports common authorization models, including role-based access control and attribute-based access control, allowing for expressive and analyzable policy definitions. Its design emphasizes readability and performance, ensuring that policies are both easy to understand and efficient to enforce. By integrating Cedar, applications can make precise authorization decisions, enhancing security and maintainability. The policy structure is designed to be indexed for quick retrieval and to support fast and scalable real-time evaluation, with bounded latency. It enables analyzer tools capable of optimizing your policies and proving that your security model is what you believe it is.
  • 19
    Regrid

    Regrid

    Regrid

    Regrid experts collect & standardize data from multiple authorities including government records and other proprietary sources. Combining this data ensures your access to the most accurate, up-to-date information. In decision-making, reliable parcel data is a necessity. It's the secret weapon of site selectors, the x-ray glasses of geographic app architects, and the compass for all organizations sailing on the sea of data-driven insights. Regrid is your treasure map to the goldmine of parcel and spatial data solutions. Regrid specializes in offering simple, accurate access to property boundaries with all manner of land use, ownership, and property information attached to them. Regrid's dataset of 156+ million parcel boundaries and records cover >99.9% of the US population in a seamless, standardized quilt of property information for your maps, apps, and spatial analysis.
  • 20
    Inc Authority

    Inc Authority

    Inc Authority

    Be the leader in your life and make the entrepreneurial leap. Your innovation can be your freedom and fortune. With Inc. Authority, you can transform your ideas from problems, into possibilities. Let us help you get started! We are your free, easy-to-use one-stop online source to launch your startup business. Whether it’s a childhood dream or recent revelation, it’s time to regain control of your business ambitions. Be your own boss and decide your earning potential, with the structure and guidance you need to succeed. Starting your business online with Inc. Authority is effortless and provides the reassurance of support from our business startup specialists. Don’t delay, start your future today! Inc Authority will check your business name within your state. Inc Authority will prepare your entity formation documents and submit them to the state. Ensure you never miss a legal notice. Inc Authority will be your registered agent for 1yr.
  • 21
    Direct Care Innovations

    Direct Care Innovations

    Direct Care Innovations

    DCI focuses on providers and Government Agencies in the Medicaid, Medicare, and Managed Care Markets. Our software solutions streamline processes, allowing you to serve the direct care industry with coverage in all locations - from cities to rural areas. Our team can have you live in under 90 days. Are you looking to improve authorization management of your healthcare agency? At Direct Care Innovations (DCI), we offer our Real-Time Authorization Management Module as part of our business management platform. We designed the authorization module to serve as a real-time data management and reconciliation system for Medicaid, Medicare, Managed Care, and other service code-based insurance authorizations.Serves as the system of record for agencies to access and maintain service authorizations.
  • 22
    VoilaNorbert

    VoilaNorbert

    VoilaNorbert

    Hello! My name is Norbert! I can find anyone's email address. Fill up your pipeline with qualified leads and get personal with decision-makers. Build lists and contact persons of interest to build resourceful relationships. Hunt down talent and reach out with the right message, at the right time. Find the right reporters and create buzz around last new product or feature. Reach out to blogs, build links, contact authors and spread your content. Email is the best channel to build long-lasting relationships with just about anyone important to your business. Find corporate emails of decision-makers at scale to build more and better relations. Validate emails in real-time to reach real people and keep your sender score safe. Enrich contacts to target prospects with the right message, in the right place, at the right time. An accurate and up-to-date database of B2B contacts right at your fingertips.
    Starting Price: $49 per month
  • 23
    Ionic Machina
    Data security is managed in silos, but sensitive data traverses multiple applications, environments, data stores, and devices. This makes it challenging to scale data security and implement consistent access controls. Machina is your agile and dynamic authorization solution that easily handles modern challenges. Manage your shared responsibility to secure data at rest and in transit in the cloud and on-prem. Track how data is handled and accessed; audit how policies are enforced across your organization. Deliver context-aware dynamic authorization for each access request to maintain least privilege. Abstract access logic from app code to orchestrate policy enforcement across multiple environments. Implement and enforce consistent access policies in real-time across applications, repositories, workloads, and services. Monitor and analyze data handling and policy enforcement across your enterprise, and generate audit-ready proof of compliance.
  • 24
    USB Blocker Professional
    USB Blocker Professional is a security software that prevents data theft, data loss and malware infections by blocking all untrusted USB devices. All unauthorized USB drives, external drives, network drives, non-system drives, CDs, DVDs, CDs, Blu-ray discs and memory sticks will be blocked unless you authorize them. The program maintains a list of authorized USB devices that are permitted to access your PC. You can authorize several USB devices at once. By default, USB Blocker Professional does not allow access to any unauthorized USB device unless you authorize it and must be an administrator. USB Blocker Professional maintains a record of Authorized USB devices, invalid login attempt, device log, invalid password change, invalid device authorization and invalid apply changes to keep you informed of any suspicious activity while using the program. You can easily view reports anytime you have access to the program. You can export your report as a PDF, Text or CSV file.
  • 25
    Mastercard Intelligence Center

    Mastercard Intelligence Center

    Mastercard Data & Services

    Driving intelligent customer engagement based on a data-driven understanding of the business is key to success. The Mastercard Intelligence Center (MIC) is a self-service analytics software platform that provides financial institutions with actionable insights on portfolio performance. By enabling real-time analysis of rapidly refreshed data, MIC provides banks with the analytics and insights necessary for better decision-making. MIC provides customized benchmarks of similar card products that are automatically updated weekly, allowing issuers to identify gaps and opportunities to improve performance. With MIC, banks have visibility into key datasets that are not otherwise easily accessible, such as cleansed and enriched merchant data, fraud, authorization, and interchange. MIC allows users to easily drill down on any KPI and flexibly cut data by merchant category, merchant, product, time period, channel, geography, and more for granular insights.
  • 26
    Deriv

    Deriv

    Deriv

    Deriv is the next step in the evolution of Binary.com. With Binary.com, we have a proven record of delivering market-leading products that are trusted around the world. Client trust is our highest priority, and that’s why millions of users choose us. Deriv is regulated by several entities including the Malta Financial Services Authority (MFSA), the Labuan Financial Services Authority (Labuan FSA), the Vanuatu Financial Services Commission (VFSC), and the British Virgin Islands Financial Services Commission. Deriv does not use your money for its business interests and you are allowed to withdraw your money at any time. All your money is segregated and held in secure financial institutions. In this way, in the unlikely event of Deriv becoming insolvent, all your money will be returned to you because it is never merged with ours. Deriv makes it easy for anyone to start trading, understand risk, and make better trading decisions.
  • 27
    FICO Blaze Advisor
    As FICO’s flagship rules authoring solution and world’s leading decision rules management system, FICO® Blaze Advisor® maximizes control over high-volume operational decisions. Blaze Advisor provides businesses across multiple industries with a scalable solution that delivers unprecedented agility and actionability for smarter, transparent, and better business decisions. Blaze Advisor empowers business users with multiple methods for rule authoring, testing, deployment, and management, including decision trees, scorecards, decision tables, graphic decision flows and customized templates. It also supports monitoring of business performance captured through user-defined events, providing the building blocks for strategy orchestration and champion/challenger scenarios. Powerful impact and decision analysis capabilities provide explainability and multiple pathways to developing and managing the strategies that will make you successful.
  • 28
    Oso Cloud
    Customers want features that you can’t build without a refactor. Your code is hand-rolled, fragile and hard to debug. It’s spread throughout the codebase and relies on data from multiple sources. There’s no one place to see who has access to what, that authorization is working, or why requests are or are not authorized. Lay out who's allowed to do what in Workbench, our visual rules editor Start with primitives for common patterns like multi-tenancy and RBAC Extend your logic with custom rules in Polar, our configuration language for authorization. Send core authorization data, like roles and permissions. Make authorization checks and filter lists based on authorization where you used to have IF statements and custom SQL.
    Starting Price: $149 per month
  • 29
    Ediflex

    Ediflex

    Epicture

    Ediflex is a platform, accessible via an Internet browser, which makes it possible to dematerialize all administrative and financial exchanges related to the execution of a public works contract. Developed since 1989, this service has been used for several thousand operations with Public Owners (Local Authorities, Ministries, Hospitals, Cities, Public Establishments, SEM, Trams, etc.) and Private Owners. As soon as the contract is awarded, all that is needed is a computer connected to the Internet for each participant in the market to be able to connect and access the financial documents of the market. At the start of the operation, the Contracting Authority or his Contracting Authority Assistant records the financial parameters of the works contracts. Each month, on screen, the companies present their work situations, the project management verifies them and the representative of the contracting authority validates them then publishes the supporting documents.
  • 30
    Scribbles

    Scribbles

    Scribbles

    Our passion is creating innovative document management, records processing, and enrollment solutions for K-12 school districts. Each of our solutions is engineered to provide students, families, and businesses equitable access to school district resources (that's our mission). Solution for ordering and processing student & alumni records requests online. Provide district families with easy, online student enrollment and re-enrollment. Support district families with accessible and easy-to-navigate enrollment applications. Ditch the filing cabinets for cumulative, electronic student and faculty records. Fillable forms that support digital signatures and are routed to authorized personnel. Store student, alumni, and faculty records in a secure, accessible software solution. Fillable forms that support digital signatures and are routed to authorized personnel. Store student, alumni, and faculty records in a secure, accessible software solution.
  • 31
    Lightico

    Lightico

    Lightico

    Formalize orders with legally-binding authorization to ensure air-tight deals with Digital Signatures, an in-call eSignature solution. Customers are able to finger-sign documents and orders via mobile phone with the assistance of Digital Signatures. Effortless, Digital Signatures enables business owners to capture electronically binding signatures. Digital Signatures also features recording and storing capabilities for digital signatures. Digitally complete entire customer journeys with ID Verification, Forms, Document Collection, eSignature, and more using automated workflows.
  • 32
    LaTeX

    LaTeX

    LaTeX

    LaTeX, which is pronounced «Lah-tech» or «Lay-tech» (to rhyme with «blech» or «Bertolt Brecht»), is a document preparation system for high-quality typesetting. It is most often used for medium-to-large technical or scientific documents but it can be used for almost any form of publishing. LaTeX is not a word processor! Instead, LaTeX encourages authors not to worry too much about the appearance of their documents but to concentrate on getting the right content. To produce this in most typesetting or word-processing systems, the author would have to decide what layout to use, so would select (say) 18pt Times Roman for the title, 12pt Times Italic for the name, and so on. This has two results: authors wasting their time with designs; and a lot of badly designed documents! LaTeX is based on the idea that it is better to leave document design to document designers, and to let authors get on with writing documents.
  • 33
    IBM Resource Access Control Facility (RACF)
    IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
  • 34
    Permify

    Permify

    Permify

    Permify is an authorization service designed to help developers build and manage fine-grained, scalable access control systems within their applications. Inspired by Google's Zanzibar, Permify enables the structuring of authorization models, storage of authorization data in preferred databases, and interaction with its API to handle authorization queries across various applications and services. It supports multiple access control models, including Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), allowing for the creation of granular permissions and policies. Permify centralized authorization logic, abstracting it from the codebase to facilitate easier reasoning, testing, and debugging. It offers flexible policy storage options and provides a role manager to handle RBAC role hierarchies. The platform also supports filtered policy management for efficient enforcement in large, multi-tenant environments.
  • 35
    VisitorWatch

    VisitorWatch

    DATAWATCH SYSTEMS

    A full-featured visitor management system that enables tenants, property managers, and security personnel to conveniently and efficiently identify, register and track visitors. Authorized users can pre-register visitors and register unscheduled visitors. Supports a driver’s license reader, passport scanner, digital camera and badge printer. Badges can be limited to specific turnstiles or readers to support tracking and security checks. Badges automatically expire at a designated date and time. Access deny list enables tenants and property managers to list people not authorized to enter a building. The system notifies the guard if anyone not authorized attempts to obtain a badge. Tenants can remotely view and search turnstile/reader history and visitor records, scheduled visitors, processed visitors, building fire wardens and non-authorized individuals. Design custom badge templates for buildings and tenants.
  • 36
    VU.CITY

    VU.CITY

    VU.CITY

    VU.CITY is transforming cities through greater understanding, collaboration, and trust to help you turn possibilities into realities.‍ Test ideas instantly and visualize schemes in an accurate, up-to-date context, with functionality and data that helps you make better decisions, faster. Project teams can better collaborate and expedite decision-making, and communicate the compelling story of proposals to win over stakeholders. VU.CITY means that architects, developers, planning consultants, and local authorities share a clear path in mapping out a city’s future. Now everyone can work together to deliver the best possible city for all. VU.CITY helps you visualize, organize and analyze data clearly and easily so that everyone involved can make better and quicker decisions. Quickly identify and appraise sites. VU.CITY's visualization, design functionality, and planning data allow you to optimize your designs.
    Starting Price: $12.16 per month
  • 37
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic algorithms. Traceability, authorization and authentication of personal data is possible through blockchain. In some cases, we integrate TEE technology to support data analysis and processing without privacy disclosure. It's time to reclaim control of your digital identity. ONT ID enables autonomous control of your private data. You decide if and when your data is accessible by others.
  • 38
    Rainbird

    Rainbird

    Rainbird

    Rainbird co-author, powered by GPT-4, turns your instructions, documentation, or data into a “glass box” AI that explains every judgment. By addressing the limitations of LLMs, particularly in terms of explainability and audibility, Rainbird provides a solution for organizations operating in regulated markets where decision-making transparency is crucial. UiPath users can now access the Rainbird connector directly from the UiPath Marketplace. You can now make your RPA workflows work smarter, with Rainbird’s decision. Rainbird can handle complex scenarios because it reasons as humans do. It combines data with knowledge to deliver expert decisions, free of human noise and bias, and without a single line of code. Remove organizational bottlenecks by automating complex, human-intensive processes with decision intelligence. Rainbird’s decision automation solutions are up to 100x faster and 25% more accurate than humans and provide a rationale for all decisions.
  • 39
    Kornea.AI

    Kornea.AI

    Tech Mahindra

    Kornea.AI is a Tech Mahindra-built, plug-and-play productivity monitoring solution installed on employees' laptops/desktops to evaluate productivity non-intrusively, ensure compliance, and provide enhanced data security. It can be extremely powerful when integrated with ITSM, WFM, QSM, and CCT systems, enabling visibility and insights for improved decision-making. Get real-time visibility into employee activities and work time to boost workforce alignment. Kornea.AI consumes negligible system resources & does not hamper the speed or functionality of the machine. Uses a top-tier encryption method. It runs in the background without allowing the user to stop the process & is completely transparent to the user. Kornea.AI has passed all relevant security tests as per policy and processes. Kornea.AI uses computer vision paired with automation to detect anomalies. It integrates with webcams of the operator’s system to allow access only to the owner/authorized user of the machine.
  • 40
    PingDataGovernance

    PingDataGovernance

    Ping Identity

    Digital transactions and data are exploding, but authorization logic is scattered across your enterprise. Updating, auditing and managing that logic can be tedious or even impossible. PingDataGovernance provides centralized authorization policies that can evaluate identity attributes, entitlements, consents, the requesting app or other contextual information to authorize critical actions and the retrieval of high-value data. You’ll have the agility to react instantly without sacrificing security or regulatory compliance. Anyone can update policies in minutes with a simple drag-and-drop UI. And you can choose which teams it’s most appropriate to give access to so they can manage policies—or any portion of them. Unlike traditional role-based access control (RBAC), dynamic authorization assembles key contextual data attributes and evaluates the validity of access requests in real time. This lets you centrally enforce policies to comply with regulatory requirements.
  • 41
    BlueMatrix

    BlueMatrix

    BlueMatrix

    Platforms that can be implemented independently or as a complete, full-circle solution for the entire information lifecycle. From idea to fruition, our cloud-based publishing platform boosts productivity and minimizes risk to streamline the process of getting content out the door. Content blocks and multimedia assets are independently tracked and tagged for a reusable, single source of truth. Componentized content framework enables simultaneous, multi-author editorial access to an individual document. Automated workflow checkpoints, alerts, user controls, audit tracking, and disclaimer generation help keep you compliant. The cloud-based, software-as-a-service platform and mobile authoring app lets you work from the road. Real-time, granular readership metrics per channel, document, author, region, and much more to complete the feedback loop.
  • 42
    BIM 360

    BIM 360

    Autodesk

    Experience deeper connected construction. BIM 360 is part of the Autodesk Construction Cloud, connecting workflows, teams, and data to help you build better. Predict safety hazards, proactively manage quality, automate tasks, and reduce rework so that you can control costs and stay on schedule. Centralize your project data and access the information you need in real-time, anywhere, so you can track your project and make decisions in the field. Controlled work sharing enables multidisciplinary teams to co-author shared Revit models, visualize every update, and manage design data throughout the project lifecycle. Build a digital strategy that connects and structures data from individual projects, creating actionable information that drives innovation and better business decision-making. Save time, avoid data duplication, explore new workflows and access all your information in one place. Explore our 70+ software integrations to connect with BIM 360.
  • 43
    Kudzu Vines
    Introducing Kudzu Vines: a single platform for managing the full lifecycle of your company’s business forms. Access and fill-out all of your forms in one central location, regardless of form type. Quickly and easily build new forms with business user friendly tools. High-Speed, High-Fidelity conversion of business forms from one format to another. Gain easier access to valuable business data previously locked up in static, file-based documents. Leverage leading business process automation platforms to add workflow to your forms. Newly converted forms can easily participate in workflows authored on popular automation platforms from Microsoft, Nintex, K2 and others. Easily surface converted forms in a wide range of popular CMS, DPA, CRM, HRIS, and ITOM SaaS platforms. Newly unlocked and readily-accessible data can now be used to provide enhanced analytics and improve decision-making.
  • 44
    Authority Jail
    Authority Jail Management System (JMS) fully integrates with Authority Records Management. This ensures all relevant arrestee information can be auto-populated into the Authority JMS. Authority JMS also integrates warnings and other alerts from the RMS to ensure the safety of both Jail personnel and inmates. You'll be able to track inmate movement within and outside of the Jail, schedule events, and isolate specific inmates from each other. Each installation will receive a customized facility map integrated in the main control panel which allows for exceptional ease in managing inmates. Visitation processing supports screening for outstanding wants and warrants and tracks all visitation activity.
  • 45
    iLock Security Services
    Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure. Provides foundation for orb2 for Java Security Services.
  • 46
    ConsumerAffairs

    ConsumerAffairs

    Consumers Unified

    ConsumerAffairs is not a government agency. Companies displayed may pay us to be Authorized or when you click a link, call a number or fill a form on our site. Our content is intended to be used for general information purposes only. It is very important to do your own analysis before making any investment based on your own personal circumstances and consult with your own investment, financial, tax and legal advisers. We want to prevent one-star experiences for consumers and brands. Our business model is set up to support this mission. We spend hours researching companies, analyzing reviews and building tools to make your decision process surprisingly painless. We help brands collect reviews, respond to their customers and generate insights from feedback. Brands that choose to pay us for these tools are called Authorized Partners. When you’re ready to purchase, we recommend an Authorized Partner(s) that meets your unique situation.
  • 47
    SwaDocs EMR

    SwaDocs EMR

    Swa.Tantraa Wellness Private Limited

    Swa.Tantraa's SwaDocs Electronic Medical Record (EMR) is a digital version of a patient’s paper chart. SwaDocs (EMR) provides real-time, patient-centric records, that make the information available instantly and securely to authorized users. While SwaDocs (EMR) does contain the medical and treatment histories of patients, it is a system which is built to go beyond standard clinical data, collected in a provider’s office and can be inclusive of a broader view of a patient’s care. SwaDocs (EMR) is a vital part of health IT and it can: Contain a patient’s medical history, diagnosis, medications, treatment plans, immunization dates, allergies, radiology images, and laboratory and test results. Allow access to evidence-based tools that providers can use to make decisions about a patient’s care. Automate and streamline provider workflow. One of the key features of SwaDocs (EMR) is that the health information can be created and managed by authorized providers in a digital format.
    Starting Price: ₹11988
  • 48
    MySDS

    MySDS

    MySDS

    MySDS is a workplace hazardous materials and chemical compliance software company helping organizations easily and affordably author and manage their SDS or MSDS. Organizations that produce potentially harmful chemicals that could come into contact with employees, the public, or downstream users must author SDSs for these chemicals and make them available to the public. Organizations with hazardous materials in the workplace must maintain a database of SDSs, which must remain up-to-date and accessible to all employees. MySDS offers the leading cloud-based SDS authoring and management software platform, helping companies stay compliant and safe. All companies with hazardous materials in the workplace must maintain SDSs, which must remain up-to-date and accessible to all employees. MySDS is the leading cloud-based SDS management software platform, helping companies stay compliant and safe.
  • 49
    BookBud.ai

    BookBud.ai

    Archieboy Holdings, LLC

    BookBud.ai is a web-based service designed to support self-published authors in creating both fiction and non-fiction books with the assistance of AI technology. The platform offers tools that allow authors to quickly write and publish their books in various formats, including ebooks, print books, and audiobooks. One of the key features of BookBud.ai is its efficient AI-powered writing capabilities, which enable authors to create high-quality books in a relatively short amount of time. The service also provides options for ghostwriting, allowing authors who prefer a more hands-off approach to still benefit from the platform. By using BookBud.ai, self-published authors can level the playing field with traditionally-published authors, who have historically had a significant advantage.
  • 50
    MiraSMART

    MiraSMART

    MiraSMART

    MiraSMART allows you to easily customize the abstract/paper/poster submission process. Your authors and presenters will love the resulting simple and clear process. You decide how you would like to receive submissions and reviewers have full online access to them. Your reviewers will be happy to avoid carrying around bulky piles of paper. Choosing whether an abstract will be uploaded and/or copy-and-pasted. A user-friendly WYSIWYG editor that makes abstract submission and editing a breeze. An easily created author profile and login/logout that remembers where they left off in the submission process. The profile information will automatically be added to your admin dashboard for easy communication, list building, scheduling, and targeted sharing with reviewers and other stakeholders. Easy functionality that labels authors “submitters,” “speakers,” or whatever custom role you need. Administrators can choose to charge a submission fee.