Alternatives to FuseCommander
Compare FuseCommander alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FuseCommander in 2026. Compare features, ratings, user reviews, pricing, and more from FuseCommander competitors and alternatives in order to make an informed decision for your business.
-
1
1Password
1Password
1Password is a secure, scalable, and easy-to-use password manager that's trusted by the world's leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up. -
2
ManageEngine ADManager Plus
ManageEngine
ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. Create multiple users and groups in Office 365, manage licenses, create Exchange mailboxes, migrate mailboxes, set storage limits, add proxy addresses, and more. -
3
Cisco Duo
Cisco
Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.Starting Price: $3 per user per month -
4
Dashlane
Dashlane
Dashlane fills all your passwords, payments, and personal details wherever you need them, across the web, on any device. Yes, we're a password manager. But we can radically simplify your whole life online. Security for your business. Simplicity for your employees. Weak, stolen, or reused employee passwords are the #1 cause of breaches. You need a solution for managing them that's as easy to use as it is safe. Businesses choose us for our patented security and employee adoption rates. Control the business credentials you need to, and protect against breaches and hacks. Employees love us because we’re actually easy to use. They can keep their business and personal accounts separate, but manage them in one safe place. Save passwords and logins as you browse. Sync your Dashlane data to every device automatically, whether you’re an Apple diehard, an Android addict, or any combination in between.Starting Price: $4 per user per month -
5
Electric
Electric
Electric is reinventing how businesses manage their IT. Providing real-time IT support to 30,000 users and centralized IT management to over 600 customers, Electric offers companies a 50% reduction in IT spend and standardized security across devices, apps, and networks, whether you're on-site or remote. We have an 100+ person team ready and willing to help with IT support. Once the Electric App is enabled in your Slack workspace or Microsoft Teams tenant, your team will have access to chat with Electric whenever they need help. They'll get a response from a member of our team in 10 minutes or less (our average is 6 minutes). Electric's team of experts is trained to handle a wide range of support needs. From the most basic password reset through device crashes, we've got your team covered. -
6
AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your users. IAM enables your users to control access to AWS service APIs and to specific resources. IAM also enables you to add specific conditions such as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device. Protect your AWS environment by using AWS MFA, a security feature available at no extra cost that augments user name and password credentials. MFA requires users to prove physical possession of a hardware MFA token or MFA-enabled mobile device by providing a valid MFA code.
-
7
JumpCloud
JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.Starting Price: $9/user -
8
Transmit Security
Transmit Security
The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact. Turn complex authentication, authorization and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure. -
9
Axiom Protect
Axiom Protect
To empower your multiple IT systems( On-premise, cloud or hybrid) by embedding multifactor security to suit each individual system, service, workflow and user's preference. Central Control to meet your business needs and regulatory compliance comes from policies and settings. Default to Custom all with simple clicks. Inbuild Complex Password Source to external LDAP/Active Directory synchronized user and operator sources for consolidation. Bringing trust through user's devices makes authentication more flexible and stronger. Multiple users on a single device or multiple devices for a single user is a business need. It's not hard if you have a good platform. Everything is DATA. Data at rest & at transit security at mobile, web, iOT device, Server, files / DB. Customised security grades with varied key lengths & algorithms. No expensive VPN. SDK and APIs available. 99%+ accuracy to build your EKYC or remote access authentication comes by pure 100% AI/DL based facial biometrics. -
10
IDWholesaler Software
IDWholesaler
The industry’s most common proximity card format is a 26-bit card (also referred to as H10301). This is an open format which allows you as the consumer to order proximity cards from any photo identification retailer. This is essential in helping keep your costs down.The amount of data that can be encoded on to a card with a magnetic stripe card is the same for both HiCo and LoCo cards. The primary difference between the cards has to do with how difficult it is to encode and erase the information on each type of stripe. Investing in the right ID card printer is critical, and navigating the identification buyer’s landscape can be overwhelming. This guide contains valuable information and helpful tips for anyone preparing to purchase an ID card printer. -
11
Foleon
Foleon
Foleon’s leading content creation platform empowers business teams to create engaging and intelligent content experiences at scale. Organizations use Foleon to produce personalized content for every stage of the customer journey and give buyers the flexibility to self-educate and consume content at their own pace. Our intuitive drag & drop editor and powerful templating engine provides sophisticated design capabilities while dramatically reducing complexity, enabling increased content velocity across the entire organization. Foleon content provides the audience insights needed to turn customer journeys into seamless experiences. Martech integrations empower teams to make follow-up communication relevant and timely. Smash through content bottlenecks and rise above the digital noise with interactive content experiences that are highly visual, optimized for any device, and personalized for today’s B2B buyers. -
12
IdentityX
Daon
Daon’s IdentityX is a multi-modal, vendor agnostic and future-proof identity services platform that addresses the full customer identity lifecycle. The key to trust in a digital identity is a unified, user-centric view of identity creation, use, and management. The IdentityX Platform provides the following core functions: Identity Establishment through account origination and digital onboarding, Omni-Channel Multi-Factor Authentication via mobile, web, and call center authentication, Identity Recovery and other device and account lifecycle management functions. Daon’s IdentityX Digital Onboarding product enables quick, accurate identity establishment for a range of purposes, including Anti-Money Laundering (AML) and Know Your Customer (KYC) checks. -
13
MarketingConnect
Experian Marketing Services
In today’s hyperconnected, always-on world, consumers move across channels, devices and real-world locations at lightning speed. Keeping up with customers – and their data – to deliver relevant experiences can feel almost impossible. But it doesn’t have to. MarketingConnect by Experian Marketing Services resolves customer identities to build a full customer profile that connects multiple touchpoints, transcends channels and devices, and merges offline and digital behavior. The result is a persistent, privacy-compliant identity that covers all aspects of a consumer’s day-to-day life. Unify fragmented data points, declared and unknown, across offline and online touchpoints to create a holistic picture of your best customers and prospects. Our people-based graph grounded in over 50 years of referential data helps marketers accurately and consistently connect real individuals and households to data points. -
14
Opensend
Opensend
Get the email, physical address, and device data for real-time retargeting. Grow your email list by collecting more first-party data and leveraging plug-and-play audiences to scale your online advertising campaigns more profitably. Capture all the high-intent traffic on your site that doesn’t convert. Generate high-intent ad-ready audiences tailored to your buyer persona. Multi-channel retargeting increases the value of each website visitor. With the power of email, ads, and postcards, convert your visitors in record time. Send automated email sequences via your preferred email marketing platform. Re-engage more visitors programmatically across millions of websites. Activate prospective buyers from the comfort of their homes. Never lose a customer again. Reactivate buyers on-demand and extend the lifetime value of each customer (even when you can’t reach them anymore). When a customer email bounces, Opensend replaces the undeliverable record with an active email address.Starting Price: $499 per month -
15
Capillary Insights+
Capillary Technologies
Get Actionable Insights with AI-Powered Customer Analytics & Business Intelligence. Consumers expect brands to know them and their preferences. Capillary Insights+ offers you deeper understanding and critical insights into your consumer’s behavior and preferences. With so many interaction channels today, it’s difficult to know where your consumer has been and how they engage with your brand. Gather consumer data from all touchpoints and get a 360° single view of consumers with a Consumer Data Platform. Capture data across channels, cleanse and de-dupe consumer records, and enrich consumer records based on each and every activity. Get a 360° single view of each consumer along with transactional and behavioral activity across channels. Increase conversions with personalized messaging and experiences powered by demographical and behavioral customer segmentation through CDP data.Starting Price: $25,000 per year -
16
Specops uReset
Specops Software
Are password resets and account lockouts exhausting valuable IT resources? Let users address common tasks related to password management including Active Directory self-service password resets, changes, and account lockouts. With Specops uReset, you can revolutionize password resets with a flexible authentication engine, and ensure that users always have a secure way to reset their password, regardless of location, device, or browser. -
17
LivePerson Automotive
LivePerson
No car was ever sold or serviced without a conversation — and today’s shoppers and owners prefer messaging over all other forms of communication. LivePerson Automotive gives dealers powerful messaging tools to win more customers, deliver higher quality experiences, and increase customer loyalty. Car shoppers prefer to research and buy online, but filling out forms and finding specific info can be difficult. 74% of online buyers report they would be more likely to complete forms if they had live chat support with vehicle specs or financial details. Give consumers quick fingertip access to your team to guide them through the buying process with Conversational Car Buying™, the best live chat and messaging solution in the automotive industry. -
18
RSA SecurID
RSA Security
RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity. -
19
buynomics
buynomics
Optimze core KPIs like profit, units, volume and revenue in a few clicks. buynomics' user-friendly interface means you don't need to be a data scientist to leverage your data for portfolio insights. buynomics answers questions in minutes giving you constant access to market transparency. Don't wait 4-6 weeks for expensive market research but answer questions right when they become relevant. Virtual Customers combine the information from sales numbers, market studies, competitive information, expert knowledge and are enriched with our customer insights database. All preferences and behavioural effects are simulated simultaneously, allowing for realistic customer reactions to an offer or price change. Virtual Customer technology, a unique model of consumer purchasing behavior is the core of buynomics. buynomics does not work with a limited number of buyer personas, but with millions of Virtual Customers, each with slightly different preferences, just like real consumers. -
20
JamLoop
JamLoop
JamLoop is an OTT/Video Ad Platform company that helps media buyers reach cord-cutting audiences who are watching TV via streaming apps on any digital device. TV viewing habits are changing. Consumers are streaming episodic and live content using Smart TVs, Roku, Amazon Fire, Apple TV, smartphones, tablets, and laptops. This makes it a little more difficult to reach your target audience by traditional means. JamLoop instantly delivers your ads to your audience on their internet-connected devices. We help you reach them with scale, efficiency, and full transparency. We operate our own proprietary bidder platform and buy directly from Publishers. This gives you unmatched control and transparency. Our OTT platform is designed to give you access to your audience even when they are watching something on an internet-connected device. -
21
OpenText IAM
OpenText
Digital transformation can deliver many efficiencies and new sources of value, but it also presents an enormous challenge: providing secure access to information within and outside the firewall. IT must manage user access to internal and cloud-based applications among employees, customers and trading partners. In the digital economy, every person, system and device needs a digital identity. The OpenText Identity and Access Management (IAM) Platform helps enterprises manage all the digital identities that request access to their systems and applications. With OpenText IAM in place, information access becomes manageable, governable and visible. Identity and access management creates and manages user accounts, roles and access rights for individual users, systems and devices. The best IAM solutions manage both employee identities within an organization and across an extended business ecosystem of customers and partners. IAM is also essential to manage the identities of IoT devices. -
22
IAMCompare
IAMCompare
IAMCompare is the only solution focused on auditing the integrity of your Provisioning & De-provisioning process. We perpetually identify user access exceptions and track to resolution, reducing both time and cost from your process. IAMCompare is a focused solution that brings companies direct visibility into their account. Our solution provides results at a transparent price point. Next, our clients identify assets (applications, databases, devices, other) that require monitoring and supply relevant account data. IAMCompare unites census and account information and identifies actionable anomalies. View account access for employees as well as authorized contractors, vendors & customers. Leverage IAMCompare to streamline system user access reviews and standardize vendor, customer and other 3rd party user certifications.Starting Price: $500 per month -
23
IBM Verify
IBM
Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs. -
24
Audience Acuity
Audience Acuity
Identity resolution is the process of matching identifiers across all devices and touchpoints to a single, unified, persistent profile. In our highly digitized world, the inability to identify and contextually interact with consumers across channels is a top issue facing organizations. Today, the vast majority of online visitors do not log in, purchase, or authenticate themselves creating lost opportunities with an engaged consumer. The goal is to develop a holistic view of the customer, the digital identifiers they use, and their interactions with the brand, into an opportunity for exceptional customer experience. This becomes even more urgent as marketers prepare for the planned deprecation of the third-party cookie. We developed a unique and highly authoritative identity graph that is purely deterministic and at scale. The aim of our work is to enable firms to identify and contextually interact with audiences across channels and devices at scale. -
25
Check Point Harmony Endpoint
Check Point Software Technologies
Check Point Harmony is the industry’s first unified security solution for users, devices and access. The solution protects devices and internet connections from the most sophisticated attacks while ensuring Zero-Trust Access to corporate applications. Protecting today’s hyper-distributed workspace requires endless security functions across user devices, applications and networks. However, stitching together point solutions often leaves security gaps and creates a cumbersome infrastructure that is difficult to manage and scale. Harmony offers an alternative that saves you the overhead and increases security. Harmony unifies 6 cloud-based security products to keep you 100% safe. Wherever you connect from, whatever you connect to, and however you connect – Your home, your devices, your privacy and your organizational data are secured and protected from any cyber threat. -
26
RAC/M Identity
OKIOK Data
RAC/M Identity™ is a simple, effective, IGA solution that enables organizations large and small to understand and manage the complex relationships between users and their access to physical and digital assets, whether on-premises or in the cloud. It is the cornerstone upon which to build a successful IAM program capable of taming your most daunting challenges such as lack of resources, limited budgets, strict timelines, complex technological and business landscape. RAC/M Identity™ also addresses one of the most difficult challenges faced by IAM programs, maintaining executive support. It automatically generates a composite health score that reflects the maturity and effectiveness of key IAM processes, enabling executive management to assess progress made as well as the remaining road ahead on the journey. Risk is reduced by continuously identifying and remediating risky situations such as orphaned and rogue accounts, enforcing SOD rules as well as quickly revoking unnecessary access. -
27
DruID
DruID
Intelligent relationships based on Identity. Managing the unique consumer identity is fundamental to establishing long-term relationships. DRUID helps you Integrate your digital ecosystem, Consolidate your users’ data and Personalize for them amazing experiences. What is DRUID? DRUID is a platform that manages the unique identity of the consumer and access control (CIAM). DRUID allows you to integrate complex digital ecosystems with enormous flexibility, manage all points of contact dynamically, ensure compliance with the law on data protection and enrich the information of your consumers through external sources, such as social networks. RELATIONAL STRATEGY DRUID is a key piece in your consumer-centric strategy. DRUID helps you to obtain a unique consumer identity and to know better the target audience (consumers, stakeholders, customers, influencers, employees…) DRUID is key to deploying a winning strategy in 3 steps: 1. Integrate. Align the entire digital ecosystem -
28
Eyeota
Eyeota
We deliver addressable, privacy-compliant audience data that help marketers reach new customers, enhance marketing analytics, deepen insights, and boost omnichannel campaign performance. Identify, reach, and engage your best customers across digital touchpoints. Unlock the value in your data for business growth. Bolster marketing and advertising strategies with a deeper understanding of audience data, consumer profile segmentation, and omnichannel targeting for vertical and seasonal campaigns. Connect directly with our audience specialists to identify and build the best audience plan for your specific campaign goals. Eyeota is the leading global provider of audiences for insights, personalization, and targeting, removing the barriers caused by data silos and integrating across all verticals, digital channels, and categories. Eyeota fuses online and offline identifiers to create powerful audience-targeting data for B2B and B2C brands to use for marketing and advertising. -
29
DataCommander
Commanders Act
To increase relevancy, many marketers are building a single view of their prospects and customers that goes beyond the devices they’re using to consume digital content or the channels they’ve previously engaged with. This is made possible with DataCommander as it allows enterprises to compile, standardize, and store all previous prospect and customer interactions in one place that’s accessible for future campaigns. This solution seamlessly integrates with many CRM platforms enabling both sales and marketing teams to enhance their existing prospect and customer profiles with online and offline purchasing data, browsing histories, previous marketing campaign exposures, and even call center interactions. The DataCommander platform automates the process of combining data across disparate solutions enabling marketers to do what they do best: understanding their audiences, designing relevant campaigns to target them, analyzing campaign performance and leveraging the insights. -
30
cidaas
WidasConcepts
cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see. -
31
Growth Intelligence
Growth Intelligence
A radically new way to personalize marketing. Gain a multiplier on your sales and marketing performance by targeting the right companies, through the right channels, with the right message. At scale. From identifying your ideal buyers to knowing their potential spending, Growth Intelligence empowers personalization at scale. Identify every company that’s a good fit for your product or service. Segment them by their likelihood to buy, from high to low. and see your conversion rates increase by up to 5x. Know the lifetime value of every potential customer before you spend even one marketing dollar to acquire them. Select the most optimal sales and marketing channels based on predicted spend to maximize return on investment and boost your deal size. Personalization is not nice to have, it is expected by B2B buyers. Create personalized buyer experiences that delight your customers by using bespoke typologies derived from your best customers and billions of external data points. -
32
Accops HyID
Accops Systems
Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment. -
33
Resiliant
Resiliant
Affordable, secure, user centric password-less ID authentication using blockchain and AI technology. Control your digital risk and protect data while locking out undesired users and devices. One-time onboarding for multiple uses across the web, servers, networks and devices. No more passwords, 2FA codes, or matching images, which do not protect the user and enterprise against SIM swapping or false geolocation. Decentralized IdNFT™ gives the user ownership and control of their identity. Secured by blockchain, no private data is stored or uploaded to the cloud. Zero-knowledge proof permits transfer of information without revealing user credentials. -
34
Infillion XGraph
Infillion
XGraph is Infillion’s prebuilt cross-device identity graph optimized for maximum reach and addressability of today’s connected consumer. Enriched with precise location data signals and unique connected device identifiers, XGraph enables robust audience segmentation and attribution. Built from Gimbal’s proprietary location panel and TrueX’s access to unique CTV audiences, XGraph offers over 30% more CTV IDs than a standard digital graph, making it one of the largest and richest cross-device graphs available for the open internet. It connects mobile, tablet, desktop, laptop, and connected TV devices to individuals and households using a privacy-first framework. Features include universal frequency capping at the user level, audience extension and lookalike modeling based on consumption patterns, and advanced retargeting across devices. -
35
Capillary Engage+
Capillary Technologies
Consumers want brands to be relevant to them. Increase the effectiveness of your marketing efforts by personally connecting with each consumer over their preferred channels, building relationships at every interaction with Engage+. Personalize customer engagement with AI-powered marketing solutions. Accurately target your customers on channels where they are most active and improve conversion by personalizing products, content & offers based on demography, browsing pattern, purchase history, product preferences & more! X-Engage is powered by an advanced algorithm that automatically picks the best channel mix for a customer by analyzing multiple factors like reachability, responsiveness score and conversion probability. -
36
LogMeIn Pro
GoTo
LogMeIn Pro is a reliable remote access software that enables individuals and small businesses to connect to their PCs or Macs from anywhere. It offers fast, secure remote control, allowing users to work as if they were physically at their computers. The platform supports unlimited users, file transfer between devices, remote printing, and multi-monitor display for enhanced productivity. LogMeIn Pro also includes antivirus protection powered by Bitdefender to safeguard devices from malware and cyber threats. Pricing plans allow access to 2, 5, or 10 computers depending on user needs. Ideal for remote work, it helps users maintain productivity and stay connected without commuting.Starting Price: $30 per month -
37
Hexnode IdP
Hexnode
Hexnode IdP is an identity provider designed to help organizations manage authentication, access control, and identity governance from a centralized platform. It enables IT and security teams to verify user identities and enforce secure access to enterprise applications, devices, and resources. By combining identity verification with real-time device posture evaluation, Hexnode IdP supports a Zero Trust approach to access management. The platform includes capabilities such as single sign-on (SSO), multi-factor authentication (MFA), role-based access control (RBAC), and conditional access policies. These controls allow organizations to ensure that only authorized users on compliant devices can access sensitive systems and data. By centralizing authentication and access policies in a single console, organizations can simplify identity management while improving overall security visibility and control. -
38
Jack Henry Payments
Jack Henry & Associates
If you own the payment channel, you “own” the relationship. But payments are evolving at an unprecedented rate. Innovators like Square and Venmo are working hard to disenfranchise financial institutions with faster, more engaging payment services. Meanwhile, fintech companies have intriguing innovations on their drawing boards. Retailers like Amazon and service providers like Netflix have changed the level of convenience and speed-of-service consumers expect. And today’s mobile mentality means consumers and businesses expect to conduct most of their interactions and transactions on mobile devices. Owning the dynamic payments channel is getting more difficult with new competitors, new payment alternatives, and new end-user expectations. But when you choose the Jack Henry Payments, you gain fully integrated solutions that support virtually every payment channel and the entire lifecycle of virtually every payment type. -
39
AppSmart Identity
AppSmart
Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices. -
40
Connectio.io
Connectio
Add new subscribers to your email lists – automatically and dynamically – directly from inside Facebook™ using Lead Ads! Your subscriber list grows in real-time as Facebook™ users click to subscribe. They don’t even have to type in their email address! Feed new subscribers into your autoresponder and funnel instantly, with no additional work needed – via Facebook™! Fully integrates your Facebook™ ad account and autoresponders for maximum efficiency – No wasting time downloading CSV files, uploading them to your autoresponder, etc. ConnectLeads handles it all! Cloud-based Software – Nothing to download or install. Use via any web browser on Windows, Mac, Linux and even tablets or mobile devices! You need to market effectively, by segmenting your lists based on preferences, behaviours and responsiveness. Increase Your Revenue Per Subscriber By 156% to 243%. -
41
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
42
bi-Cube Identity Access Management
OEDIV SecuSys
In today's heterogeneous IT infrastructure of companies, the most demanding task is the management of data, accounts and access authorizations of employees. The question always arises: Who is allowed to do what, when and where? Every person within a company or even external support requires selected authorizations, depending on their position or task. These should not only be available when an employee joins the company, but preferably also automatically withdrawn when an employee leaves the company. A very good IAM system ( Identity Access Management System) ensures the distribution of authorizations on the basis of conscientious role modeling and distribution, can be easily integrated into existing systems, is traceable and verifiable in terms of IT security and reduces IT expenses, for example with the help of automation of the Active Directory. -
43
C2 Identity
Synology C2
Easily grant or revoke user access to company resources with group management. Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal. Centrally manage users, groups, workstations, and single sign-on (SSO) for Software as a Service (SaaS) applications across your entire organization. Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.Starting Price: $19.99 per month -
44
Email Hippo
Email Hippo
Email Hippo provides fast, accurate and secure email verification software, accessed via web app or API. The CORE product allows users to import lists of up to 500,000 emails and verify them directly within a self-service web app. MORE is an API product that can be used to check the validity of an email address in real time, looking at up to 74 data points for maximum accuracy. With ASSESS, users can check email addresses for common pre-fraud indicators. Email Hippo has provided email verification since 2000 and became ISO27001 certified in 2017.Starting Price: $10.00/one-time -
45
Mass Address
Mass Address
Every year in America, over 35 million Americans change their address. The current process involves selling your change-of-address information to 3rd parties who in turn sell it to businesses and/or government agencies. Hackers and enemy nation-states can pose as legitimate businesses and pay to get updated addresses on 160 million Americans, and there is no process in place to stop this practice, it happens every day. As the world's first Citizen Identity Management platform, Mass Address allows citizens and businesses to change their address privately by only notifying organizations they actually have an account with. By operating on this principle, it puts the citizen in control of who gets access to their change of address. When a citizen controls access to their identity, identity and address fraud are significantly reduced or eliminated.Starting Price: $5/Lifetime -
46
Intercede MyID
Intercede
MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart. -
47
LeadEagle
LeadEagle
LeadEagle gives you a complete view of your market, prospects, and customers. Reach and engage target audiences, build personalized buyer journeys, and act instantly on buyer intent signals throughout the customer lifecycle. We utilize identified website traffic and in-market consumer data to optimize your digital ad spend and ROI. With LeadEagle, you'll radically reduce conversion costs by only spending ad dollars on the leads who are most likely to buy. Gone forever are the days of frustratingly high CPAs, CPMs, and CPLs. Imagine that you had access to your entire addressable market. Now, imagine you could contact that market at the beginning, middle, and end of their buying journey. With Lead Eagle, you can do exactly that. To us, they are highly-targetable, huge revenue opportunities. We leverage identity resolution using our first-party secure data to unlock 200%-400% more of your site visitors and turn them into paying customers. -
48
Barracuda PST Enterprise
Barracuda
PST files are often used by end-users as personal email archives. As a result, they are typically scattered widely across end-user devices and network storage, which makes them notoriously difficult to discover and manage consistently or effectively. Thanks to improvements to Microsoft Exchange and Office 365, your users no longer need to store data locally within PST files. However, legacy PST files still contain important data that you need to bring back under control. Barracuda PST Enterprise is designed specifically to help you address this challenge. You may have many terabytes of data stored in PST files located on end-user devices and on network servers. And these files are notoriously unreliable, since they are often corrupted and easily misplaced. The costs associated with storing, securing, and managing these large files, in terms of both system resources and IT administrative overhead, are significant. -
49
Adbrain
Adbrain
Adbrain powers marketers and their partners to understand and engage with their customers with a personalized, consistent message across devices, channels and platforms. Deliver relevant, personalized, and consistent messages across the customer journey. People are consuming media across more devices than ever before, which makes delivering a consistent brand experience increasingly difficult. That’s where Adbrain comes in. Adbrain empowers you to solve for this fragmentation by unifying varied quality data sources so that you can focus on targeting the person, not just their device. Adbrain uses machine learning algorithms to contextualize unstructured data points across devices, people, and households – achieving both broad coverage and a clear view of your target audience’s behavior. With a multidimensional approach to identity, it’s easier than ever to compare patterns across people, places, and things. -
50
Folloze
Folloze
Today's digital-first buyers want more. Give them an experience they won't forget. Create dynamic digital buyer experiences in less than 30 minutes. Our no-code designer makes it easy to support any marketing campaign or program across the entire buyer journey. Leverage your existing data, content and messaging to personalize and guide buyers through their unique journeys — all at enterprise scale. Execute precise marketing-led campaigns that focuses your sellers on the right target accounts and ensures they deliver on their booking goals. Analyze target accounts with a shared view of engagement that spans every activated channel and touchpoint. Understand buyers — known or unknown — their needs and challenges, and where they are in their journey.