Alternatives to Fudo Security
Compare Fudo Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Fudo Security in 2026. Compare features, ratings, user reviews, pricing, and more from Fudo Security competitors and alternatives in order to make an informed decision for your business.
-
1
ThreatLocker
ThreatLocker
ThreatLocker is a Zero Trust Platform that prevents cyber threats by blocking unknown applications, enforcing least privilege, and controlling what can run across your environment. Using Allowlisting, Ringfencing, Network Control, and more, ThreatLocker stops ransomware, zero-day attacks, and unauthorized activity before execution, rather than relying on detection after the fact. Built for modern IT and cybersecurity teams, the platform delivers centralized visibility and policy management across endpoints, users, and applications. ThreatLocker reduces attack surface, limits lateral movement, and supports compliance with detailed audit logs. With fast deployment, a large built-in application library, and streamlined approvals, organizations can strengthen security while minimizing operational overhead and maintaining business continuity. -
2
Keeper Security
Keeper Security
Keeper Security is transforming the way people and organizations around the world secure their passwords and passkeys, secrets and confidential information. Keeper’s easy-to-use cybersecurity platform is built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Keeper’s solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance. Trusted by millions of individuals and thousands of organizations globally, Keeper is the leader for best-in-class password and passkey management, secrets management, privileged access, secure remote access and encrypted messaging. Protect what matters at KeeperSecurity.com. -
3
Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.Starting Price: $0/month
-
4
Fortinet
Fortinet
Fortinet is a global leader in cybersecurity solutions, known for its comprehensive and integrated approach to safeguarding digital networks, devices, and applications. Founded in 2000, Fortinet provides a wide range of products and services, including firewalls, endpoint protection, intrusion prevention systems, and secure access solutions. At the core of its offerings is the Fortinet Security Fabric, a unified platform that seamlessly integrates security tools to deliver visibility, automation, and real-time threat intelligence across the entire network. Trusted by businesses, governments, and service providers worldwide, Fortinet emphasizes innovation, scalability, and performance, ensuring robust defense against evolving cyber threats while supporting digital transformation and business continuity. -
5
SonicWall Cloud Edge Secure Access
SonicWall
SonicWall Cloud Edge Secure Access is built to respond to the anytime, anywhere business world, whether on-prem or in the cloud. It delivers simple network-as-a-service for site-to-site and hybrid cloud connectivity with Zero-Trust and Least Privilege security as one integrated offering. With more remote workers than ever needing secure access to resources in the hybrid cloud, many organizations need to look beyond traditional perimeter-based network security. Companies can respond to the widening attack surface and stop the lateral movement of internal or external threats by using SonicWall’s fast, simple and cost-effective Zero-Trust and Least Privilege security approach. Cloud Edge Secure Access, in partnership with Perimeter 81, prevents unauthorized users from accessing and moving through the network and gives trusted users only access to what they need. Authenticate any one, any device and any location quickly and easily. -
6
CyberArk Privileged Access Manager
CyberArk
Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools. -
7
PuTTY
PuTTY
PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator. PuTTY is a client program for the SSH, Telnet, Rlogin, and SUPDUP network protocols. These protocols are all used to run a remote session on a computer, over a network. PuTTY implements the client end of that session, the end at which the session is displayed, rather than the end at which it runs. In really simple terms, you run PuTTY on a Windows machine, and tell it to connect to (for example) a Unix machine. PuTTY opens a window. Then, anything you type into that window is sent straight to the Unix machine, and everything the Unix machine sends back is displayed in the window. So you can work on the Unix machine as if you were sitting at its console, while actually sitting somewhere else. All of PuTTY's settings can be saved in named session profiles. You can also change the default settings that are used for new sessions.Starting Price: Free -
8
Hyperport
Hyperport
The Hyperport is a unified secure-user-access solution that merges Zero-Trust Network Access (ZTNA), Privileged Access Management (PAM), and Secure Remote Access (SRA) into one flexible architecture, allowing internal staff, remote employees, vendors and third-party partners to connect in seconds without compromising security. It enforces least-privilege access across an organisation’s entire infrastructure, from Windows and web applications to industrial control systems, via just-in-time authorization, multi-factor authentication at every security zone, real-time monitoring, session recording, and dynamic entitlement management. The platform is built for hybrid, cloud and on-premises deployments with multi-site support, enabling centralised management across IT, OT, ICS and CPS environments; it features browser-based portals (Web, RDP, SSH, VNC), encrypted file transfers, immutable audit logs, micro-segmentation and policy enforcement to reduce the attack surface. -
9
Delinea Server Suite
Delinea
Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting. -
10
Delinea Cloud Suite
Delinea
Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions. -
11
SecureKi
SecureKi
Secure access for your business, customers, or employees with our unparalleled identity security backed by a zero–trust philosophy. When it comes to protecting your data, passwords are the weakest link. That is why multifactor authentication has become the identity and access management standard for preventing unauthorized access. Verify the identity of all users with SecureKi. Compromised access and credentials most often are the leading attack vectors of a security breach. Our comprehensive privileged access management is designed to manage and monitor privileged access to accounts and applications, alert system administrators on high-risk events, reduce operations complexity, and meet regulatory compliance with ease. Privilege escalation is at the core of most cyber-attacks and system vulnerabilities. -
12
1Password Extended Access Management (XAM) is a security solution designed to safeguard every login across applications and devices, making it ideal for hybrid work environments. It combines user identity verification, device trust assessments, enterprise password management, and application insights to ensure that only authorized users on secure devices can access both approved and unapproved applications. By providing IT and security teams with visibility into app usage, including shadow IT, XAM enables organizations to enforce contextual access policies based on real-time risk signals like device compliance and credential integrity. With its zero-trust approach, XAM helps businesses move beyond traditional identity management, strengthening security in today’s SaaS-driven workplace.
-
13
SuperPuTTY
Jim Radford
The SuperPuTTY window manager for putty sessions. SuperPuTTY is a Windows-based application that manages putty ssh terminals. Additionally, it has a simple scripting language for basic tasks. It additionally supports RDP sessions. SuperPuTTY is used primarily as a window manager and multi-session manager for the PuTTY SSH Client. It allows you to embed PuTTY terminal instances inside of windows form providing a better-tabbed interface when multiple connections are used. Additionally, SuperPuTTY has support for using pscp.exe to transfer files to and from a remote host. Local terminal sessions can be started with MinTTY, as well as RDP, PowerShell, and other terminal applications. SuperPuTTY does not do any ssh or terminal management itself since PuTTY does an excellent job of this. SuperPuTTY as of v1.4.0.7 is available with an installer. SuperPuTTY is also available as a portable ZIP file, Simply unzip the files to a chosen location on your local disk.Starting Price: Free -
14
SSH Client Terminal
Moon Apps
Experience seamless remote access with SSH Client Terminal & Telnet! This terminus & SFTP app offers secure & easy-to-use terminal emulation for your device. Here is one of the most intelligent & advanced SSH Client apps to manage and connect remote servers for your iOS and Mac devices About SSH Client: SSH Client is an on-the-go SSH-Telnet app with the best putty, console, and shell iOS app with powerful remote access & terminal emulator. Our enterprise-grade mobile app is built for all kinds of server management needs. Our comprehensive features are not limited to terminal keyboard and language support, multi-session capability, and Bluetooth keyboard support but many more. Our SSH Client app can easily integrate with AWS, Azure, and DigitalOcean.Starting Price: $1.99/Month -
15
Axis Security
Axis Security
Ensure least-privilege user access to specific business resources without granting excessive access to your corporate network, or exposing applications to the Internet. Avoid deploying agents on BYOD or third-party devices and the friction that comes with it. Support access to web apps, SSH, RDP and Git without a client. Analyze how users interact with your business applications to better detect anomalies, flag potential issues, and ensure networking remains aware of changes in security controls. Use key tech integrations to automatically verify and adapt access rights based on changes in context to protect data and always ensure least-privilege access. Make private apps invisible to the Internet, keep users off the network, and deliver a safer connection to SaaS apps. -
16
Entire Connection
Software AG
Terminal emulation software that connects Windows® users to applications on the mainframe, UNIX®, Linux®, OpenVMS, and BS2000 platforms. Available for Natural on the mainframe. Connect thousands of concurrent Microsoft® Windows® users to applications running on the mainframe, UNIX, Linux, OpenVMS, and BS2000 platforms with highly scalable terminal emulation software, Entire Connection. Protect your application from desktop access by requiring a user ID and password to open a terminal session with Entire Connection. Implement SSO by storing the host user credentials encrypted in the share file and using the Entire Connection script language to log onto the host. -
17
BastionZero
BastionZero
Infrastructure teams must manage painful VPNs, homegrown bastion hosts, overprivileged certificate authorities, and long-lived credentials that present huge security risks. Infrastructure teams can easily configure, manage and secure fine-grained access controls to infrastructure targets in any cloud or on-prem environments. A single system for access all of your targets (servers, containers, clusters, databases, webservers) so you don’t have to manage an ever-growing set of systems. Provide zero-trust access to your targets by putting them behind your SSO and adding an independent MFA. Stop managing passwords. Use policy to control which users can log into which target under which role or user account. Capture the specific commands that a user ran on a target under a role or account via BastionZero’s access logs, command logs and session recordings.Starting Price: $300 per month -
18
BeyondTrust Endpoint Privilege Management
BeyondTrust
Eliminate unnecessary privileges and elevate rights to Windows, Mac, Unix, Linux and network devices without hindering productivity. Our experience implementing across over 50 million endpoints has helped create a deployment approach with rapid time to value. Available on-premise or in the cloud, BeyondTrust enables you to eliminate admin rights quickly and efficiently, without disrupting user productivity or driving up service desk tickets. Unix and Linux systems present high-value targets for external attackers and malicious insiders. The same holds true for networked devices, such as IoT, ICS and SCADA. Gaining root or other privileged credentials makes it easy for attackers to fly under the radar and access sensitive systems and data. BeyondTrust Privilege Management for Unix & Linux is an enterprise-class, gold-standard privilege management solution that helps security and IT organizations achieve compliance. -
19
Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
-
20
HostAccess
Perforce
HostAccess is PC terminal emulation software. It offers a suite of terminal emulation tools for Microsoft Windows users. This allows secure access to various platforms, including Linux, Unix, IBM, Windows, etc. The main usage of the HostAccess is to connect to PICK (multivalue) system, such as UniVerse, UniData, D3, ONware, etc., and use own package of programs written in PICK Basic. These programs provide APIs for data exchange and expansive GUI capabilities. Produce reports quickly and integrate data with Windows applications. Connect to multiple systems within one integrated environment. HostAccess offers all the key terminal emulation software features you need in a single page. So, whether you’re looking for asynchronous/synchronous connections, server-based administration, concurrent users, or multiple session access, HostAccess is an ideal solution for you. -
21
Smallstep
Smallstep
Smallstep is the world’s first Device Identity Platform™, built to ensure that only company-owned devices can access sensitive enterprise resources. It secures Wi-Fi, VPNs, ZTNA, SaaS applications, cloud APIs, and developer infrastructure using hardware-bound credentials. At its core is ACME Device Attestation, a modern standard co-developed with Google that binds identity directly to device hardware. This approach prevents credential theft, phishing, and impersonation by making credentials non-exportable. Smallstep extends Zero Trust beyond users by verifying devices with cryptographic assurance at the silicon level. The platform supports all major operating systems, enabling consistent security across modern, distributed workforces.Starting Price: $0 -
22
Zentry
Zentry Security
Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies. -
23
WinSSHTerm
WinSSHTerm
A tabbed SSH solution for Windows, combining PuTTY, WinSCP, and VcXsrv. WinSSHTerm helps you to be more productive. Using keyboard shortcuts and intelligent navigation tools allows you to quickly switch between or start new SSH sessions even if you have to manage many systems. It has built-in support for copying files and running X applications. The terminal colors are carefully selected to minimize the stress on your eyes. Ready for production use, works with the original PuTTY executable, easy file transfer (WinSCP) with "copy files", easy connection troubleshooting with "check access", eye-friendly terminal colors, multiple tabs, multiple windows, and master password. Share connections with colleagues, show connections in the menu bar, template variables, keyboard shortcuts, and background color for PROD, DEV. Supports X (VcXsrv), with copy & paste, support for SSH jump server/proxy, and portable version available. Quickly find connections and easy migration from PuTTY.Starting Price: Free -
24
Dispel
Dispel
The industry's fastest remote access system that exceeds cybersecurity standards. Remote access is useful only if your team chooses to use it. That means it must be more than a security spec sheet. It must be fast, intuitive, and yes, look good. A person on a company's warehouse tablet selects the system they need to reach. Device and protocol whitelisting are hidden from view. The intense escalation of demand under COVID broke the administrative processes underlying most remote access systems. Reestablish and maintain coherent control of your networks using Dispel, a platform built to condense information to the essentials and automate the task waterfalls that would otherwise bog down changepoint decisions. A vendor requests access through a form by defining their identity, reason for access, access scope, and time frame. The request is logged and automatically sent to an administrator, who can approve or deny the request. -
25
ConEmu
ConEmu
ConEmu-Maximus5 aims to be handy, comprehensive, fast and reliable terminal window where you may host any console application developed either for WinAPI (cmd, powershell, far) or Unix PTY (cygwin, msys, wsl bash). As Windows console window enhancement (local terminal emulator), ConEmu presents multiple consoles and simple GUI applications (like PuTTY for example) as one customizable tabbed GUI window with various features. ConEmu starts a console program in a hidden console window, and provides an alternative customizable GUI window with various features. Smooth and friendly window resizing; tabs for editors, viewers, panels and consoles. Run simple GUI apps like PuTTY in tabs. Windows 7 Jump Lists and Progress on Taskbar buttons. Easily run old DOS applications (games) in Windows 7 or 64-bit OS. Thumbnails and tiles in Far Manager. Normal, maximized and full screen graphical window modes. -
26
Oack
Oack
Oack is an external HTTP monitoring service built for engineers who need to diagnose latency and outages, not just detect them. Every probe captures: - 6-phase HTTP timing breakdown (DNS, Connect, TLS, Send, Wait, Receive) - TCP kernel telemetry — RTT, retransmits, congestion window, RTO via getsockopt(TCP_INFO) on Linux - Server-Timing header automatic capture and visualization - Cloudflare CDN log enrichment (edge PoP, cache status, origin response time) - Traceroute with per-hop RTT, ASN, and geolocation - Performance percentiles across 1d, 7d, 30d, 90d windows - Optional packet capture (PCAP) for deep post-mortem analysis Browser monitoring with Playwright — both Pageload mode (Web Vitals, HAR waterfall, screenshots) and Test Suite mode (run your existing .spec.ts files as scheduled monitors). Built-in incident management — automatic incident creation, on-call scheduling with rotations, escalation policies, war rooms, post-mortem reports.Starting Price: $14/month -
27
Teleport
Teleport
The Teleport Infrastructure Identity Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise. Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. -
28
Rocket Reflection Desktop
Rocket Software
Rocket Reflection Desktop for X is a secure cross-platform PC X server for UNIX, Linux, OpenVMS, and X11 systems that enables X11, UNIX, and OpenVMS access from a Windows desktop. It helps users work securely anywhere and connect quickly to X Window and host applications, combining terminal emulation and PC X server functionality in one host-access package. Reflection Desktop for X connects Windows desktops to both text-based and graphical X applications, supporting technologies such as Windows 10 and Windows 11, Active Directory and Group Policy, Microsoft App-V, VMware, Citrix Virtual Apps and Desktops, IPv6, and 64-bit computing. Its Smart protocol routing and compression are designed to speed X applications over sluggish connections, keeping productivity high whether users are working in the office or remotely. It supports real-time X session sharing so colleagues can collaborate around the world, and lets users start a project in one location and rejoin it later. -
29
Zecurion PAM
Zecurion
Prevent power users from abuse of their privileges with Zecurion Privileged Access Management. Key infrastructure credentials vault. Session manager and control. Archive of sessions and convenient reports. Zecurion PAM records sessions of privileged users as video. Sessions can be watched right in the console. Ability to connect to the ongoing user session. Ability to break ongoing sessions. Archive of all events, actions and commands. Easy to install and convenient to use. Implemented in enterprise-level network in 2 days. Agentless architecture. Platform-independent solution. Simple and user-friendly web-based management console. Zecurion PAM controls all popular remote control protocols. Archive of all privileged user actions. Zecurion PAM can control every category of power users. Zecurion PAM monitors thousands of enterprise systems and devices. Legally significant evidence for bringing insiders to justice. -
30
Vault One
VaultOne Software
Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4Starting Price: $99 per month -
31
Paralus
Paralus
Paralus is a free, open source tool that enables controlled, audited access to Kubernetes infrastructure. It provides just-in-time service account creation and user-level credential management, integrating seamlessly with existing Role-Based Access Control (RBAC) and Single Sign-On (SSO) systems. Paralus applies zero-trust security principles, ensuring secure access to Kubernetes clusters by generating, maintaining, and revoking access configurations across clusters, projects, and namespaces. It offers both a browser-based graphical user interface and command-line interface tools for managing kubeconfigs directly from the terminal. Additionally, Paralus includes comprehensive auditing tools that provide detailed logging of activities and resource access, facilitating real-time and historical tracking. Installation is straightforward, with Helm charts available for deployment across various environments, including major cloud providers and on-premises setups.Starting Price: Free -
32
Cyolo
Cyolo
Cyolo provides your global workforce with convenient and secure access to applications, resources, workstations, servers and files, regardless of their location or the device used. Cyolo’s Zero Trust platform is built for easy deployment and scales with minimal effort, supporting a wide range of business needs, growth and expansion. The Cyolo platform grants access to the authorized asset and not to the network itself, allowing you to achieve your security objectives without compromising business needs or user experience. Cyolo’s platform enhances visibility and control by applying granular policies and enabling real-time supervised access and session recording. This gives you a full audit trail that can integrate with your existing SIEM solution. Enable granular policies based on user ID, device ID, application, time and action, user & device location. Enable session recordings for risky users. -
33
ManageEngine Access Manager Plus
ManageEngine
Secure remote access for privileged sessions. Centralize, secure, and manage remote connections that provide privileged access to critical business systems. An exclusive privileged session management solution for enterprises. For businesses to be productive, it's important to enable privileged access to critical systems to the right employees, regardless of their location and the time of day they require access. But providing remote privileged users with such access presents huge security and privacy challenges, and legacy solutions like VPNs are often inflexible and simply don't cut it anymore. What modern enterprises need is a solution that enables direct access to every component in the infrastructure spread across the public and private clouds, while ensuring granular access controls, monitoring and recording all actions, and providing real-time control over every privileged session. ManageEngine Access Manager Plus is a web-based privileged session management softwareStarting Price: $495 per year -
34
Terminals
TECHNLG
For developers and system administrators, it’s a necessity to frequently log on to Linux servers from a Windows computer. Unlike Linux OS, Windows does not have a native ssh client. Putty is the most used freeware ssh client for Windows OS. It supports telnet and ssh protocols. One constraint with Putty is that it does not have support for tabbed windows. Putty Connection manager is developed to solve this problem but it has got a lot of issues in using the utility. Terminals supports not just telnet and ssh but also RDP, VNC, and RAS connections. You can save the login id and password of the remote servers and with a single click, you can connect to the server. You can create a group of servers and with a single click, you can open connections to all the servers added to the group. You can save multiple user credentials for the same server and can select the user name while connecting to the server.Starting Price: Free -
35
Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
-
36
ColorTokens Xtended ZeroTrust Platform
ColorTokens
The cloud-delivered ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection. Visibility across on-premise & multiclouds. Micro-segment for cloud workload protection. Stop ransomware from owning your endpoints. See all communication between processes, files, users, applications, and workloads. Identify security gaps with built-in threat and vulnerability assessment. Simple and faster time-to-compliance (for HIPAA, PCI, GDPR). Easily create ZeroTrust Zones™ and drastically reduce the attack surface. Dynamic policies that protect workloads migrating to the cloud. Block lateral threats without cumbersome VLANs/ACLs or firewall rules. Lockdown any endpoint by automatically allowing only whitelisted processes. Block zero day or fileless exploits, and stop communication to C&C servers. -
37
Jubilant Terminal Emulator
Flynet
Jubilant Terminal Emulator provides a browser based, terminal emulator to access key business systems. Access Mainframe, iSeries, Unix, VMS or MultiValue systems, on any device with zero client software. The terminal emulator is installed in a server environment, either on-premise or in the cloud, and centrally managed via the Jubilant administration centre. Jubilant works on all browsers and devices with no Java or ActiveX plugins. Jubilant has all the features you would expect in an enterprise terminal emulator, including client and server-side macro creation, file transfer, single sign-on, MFA and keyboard remapping. -
38
Devolutions Server
Devolutions
Devolutions Server (DVLS) is a self-hosted solution designed to streamline account and credential management across your organization. Without centralized control, teams often struggle with unsecured credentials, unauthorized access, and inconsistent security practices. DVLS addresses these issues by offering a secure, shared account and credential management platform with the ability to enforce access policies, manage user roles, and provide detailed auditing. DVLS also includes optional privileged access components for organizations that require more granular control over sensitive accounts. Fully integrated with Remote Desktop Manager, it offers a seamless way to manage credentials and remote sessions, ensuring that all access is secure and well-governed. Whether you’re a small team or a large enterprise, Devolutions Server simplifies credential management and improves security.Starting Price: $3/month/user -
39
BeyondTrust Pathfinder
BeyondTrust
BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring. -
40
Thinscale
Thinscale
ThinScale is an all-in-one endpoint security and management platform that helps organizations protect and control remote, hybrid, and on-site Windows devices by enforcing zero-trust security, preventing malware and data loss, and providing unified endpoint management at scale. It centralizes device lockdown, process security, and data loss prevention while supporting corporate, third-party, and employee-owned devices to create secure, compliant workspaces without sacrificing functionality, with granular allowlisting and session isolation to stop threats and unauthorized access. It supports virtual desktop and desktop-as-a-service environments, lets IT teams manage and update endpoints, policies, and applications from a single console, and includes device analytics and telemetry for real-time performance insights. -
41
BeyondTrust Privileged Remote Access
BeyondTrust
Secure, manage, and audit vendor and internal remote privileged access without a VPN. Watch demo. Give legitimate users the access they need to be productive, while keeping attackers out. Give contractors and vendors privileged access to critical assets without giving them a VPN. Satisfy internal and external compliance requirements with comprehensive audit trails and session forensics. Guarantee adoption with a system that actually lets users do their jobs faster and easier than they do today. Prevent “privilege creep” and quickly enforce least privilege to protect your IT assets. Make least privilege productive and combat data breaches, without sacrificing security. Standardized, secure, and complete privileged session management solution that controls the access to and from any platform in any environment. Eliminate manual credential check-in and check-out. -
42
Plus2 Collection Software
Cyclone Software
Plus2 is a feature-rich, debtor-based collection product designed for businesses that can accommodate small offices (as few as two users) to enterprise corporations of virtually an unlimited number of workstations. Multiple accounts and checks are combined into one location to allow the operator to gather all the information for a particular debtor. Cyclone's standards are maintained throughout the software making a variety of platforms available when using Plus2. Microsoft Windows, OSX, LINUX/UNIX workstations, thin clients can access and work accounts with Plus2. Secure connections are supported and Internet access is available for those employees who reside offsite. The high-speed network connections provides quick displays as well as allowing multiple sessions per workstation. On the server side - using a powerful Linux/Unix platform produces great reliability and speed for all users. -
43
GoAccess
GoAccess
GoAccess is an open source, real-time web log analyzer and interactive viewer that operates within a terminal on Unix-like systems or through a browser interface. Designed for rapid analysis, it provides immediate HTTP statistics, making it ideal for system administrators who need quick insights into server performance. The tool supports various web log formats, including those from Apache, Nginx, Amazon S3, Elastic Load Balancing, CloudFront, and Caddy, allowing users to set the log format and analyze logs effortlessly. Written in C, GoAccess requires only ncurses as a dependency, ensuring swift, millisecond-level updates. It offers customizable terminal and web-based dashboards, enabling users to tailor color schemes to their preferences. Beyond terminal output, GoAccess can generate comprehensive, self-contained real-time HTML reports, as well as JSON, facilitating analytics, monitoring, and data visualization.Starting Price: Free -
44
Infraon SecuRA
Infraon
A remote access and security platform that enables employees and external actors to remotely access on-premise and hybrid applications and servers without the need for costly VPNs. All remote session Infraon Secura remote control software can record any or all RDP/CLI sessions on a Windows/Linux/other server. It can record precisely all user activity during terminal server sessions. Administrators can join an ongoing remote session and also offer assistance to users during troubleshooting sessions. Ensures that all files transferred over the network are clear and secure. Any files that are suspect or infected are denied access. Provide IT administrators with the ability to view and, if necessary, interrupt and terminate an active session. The zero trust security model restricts commands that are potentially dangerous and unauthorized made by unwitting users. The administrator can write CLI scripts and schedule them to be executed by the SecuRA. -
45
GSW Telnet Server for Windows
Georgia Softworks
The GSW Telnet Server for Windows is excellent with mobile devices in RFID, RF terminals, barcode scanners, and other data collection and wireless environments. GSW Telnet Server for Windows, designed for superior operation in the most demanding mobile RF Terminal environments. With a lightweight, fast, and feature-packed Telnet Server for Windows. Capable of meeting all of your telnet server needs. With session saver, when a device goes out of range the session is saved and connects exactly where the user left off when the connection resumes. Seamlessly monitor, shadow, and obtain the status of all telnet clients. System administration couldn't be easier. Unmatched reliability, features, security, and support. Telnet is the best choice for reliable and efficient data exchange. A full suite of features allowing remote administration to monitor, shadow, attach, broadcast, terminate user sessions, obtain session status information, and more!Starting Price: $250 per year -
46
FortiPAM
Fortinet
FortiPAM provides privileged access management, control, and monitoring of elevated and privileged accounts, processes, and critical systems across the entire IT environment. FortiPAM is part of the Fortinet Security Fabric, integrating with products such as FortiClient, FortiAuthenticator, and FortiToken. Critical assets need to be protected with the highest level of security. FortiPAM allows for enhanced security including zero-trust network access (ZTNA) controls when users try to access critical assets. ZTNA tags can be applied to check device posture for vulnerabilities, installed AV, location, and more. These checks are done continuously so if something changes on the device, it can be disconnected from the critical asset. In this way, FortiPAM ensures that the users and devices accessing critical assets are secure and prevents threats from impacting the asset. You can use the pre-built applications, or web-based launchers, or easily create your own launch templates. -
47
Flynet Viewer TE
Flynet
Flynet Viewer™ TE (Terminal Emulation) provides a browser based, terminal emulator to access key business systems. Access Mainframe, iSeries, Unix, VMS or MultiValue systems, on any device with zero client software. The terminal emulator is installed in a server environment, either on-premise or in the cloud, and centrally managed via the Flynet Viewer administration centre. Flynet Viewer works on all browsers and devices with no Java or ActiveX plugins. Flynet Viewer has all the features you would expect in an enterprise terminal emulator, including client and server-side macro creation, file transfer, single sign-on, MFA and keyboard remapping. Flynet Viewer Terminal Emulation provides the same level of functionality that is associated with a full fat desktop Terminal Emulation client but is delivered over the web and served up via a browser. Flynet Viewer Terminal Emulation will run on any device regardless of operating system or indigenous browser. -
48
Pomerium
Pomerium
Pomerium is a secure, clientless solution that enables seamless access to web applications and services without the need for a corporate VPN. Designed to enhance developer productivity, it eliminates complex user access flows that can hinder workflow. Unlike traditional client-based tunneling solutions, Pomerium offers lightning-fast connections with minimal latency, ensuring security and privacy without compromise. It leverages contextual data for access control decisions, implementing continuous verification—a zero trust concept where every action is verified for contextual factors before being accepted or denied. This approach contrasts with NextGen VPNs, which only verify authentication and authorization at the start of a session. Pomerium supports secure access to web apps, databases, Kubernetes clusters, internal tools, and legacy applications, making it suitable for individuals and teams of all sizes.Starting Price: $7 per month -
49
Replica
Replica
A digital transformation has occurred, changing the way we work forever. Mobile and cloud have made any-time and anywhere access a permanent reality. Availability and freedom have completely erased the boundary in which work occurs. The perimeter is gone, and while connectivity and security have always been at odds, modern work has polarized them further. Managing the complexity of securing the virtual and physical worlds has left organizations scrambling to keep up but even more vulnerable to missteps and exploitation. Now more than ever, people need access to the data and tools to do their jobs effectively, anytime, anywhere, without compromising the mission, project,t or enterprise. Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done. Replica makes digital privacy and true zero-trust protection easy and available for every user, reducing risk. -
50
SentryBay Armored Client
SentryBay
The missing piece in the security stack jigsaw, easily downloaded in one-click to complete your armored shield against cyberattacks. The Armored Client provides real time patented protection to applications and data without needing to detect and respond to threats. It does this by using kernel level prevention of data exfiltration, even if threats exist, combined with the secure wrapping of applications and injected security. The Armored Client takes a layered approach to protecting endpoint devices being used remotely to access your applications and data and to support secure online browsing. Whether your employees are using unmanaged, BYOD or managed endpoint devices, all your corporate apps are targeted on the endpoint and run in a secure session.