Alternatives to Key Organizer

Compare Key Organizer alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Key Organizer in 2026. Compare features, ratings, user reviews, pricing, and more from Key Organizer competitors and alternatives in order to make an informed decision for your business.

  • 1
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.
    Compare vs. Key Organizer View Software
    Visit Website
  • 2
    Klevio

    Klevio

    Klevio

    Klevio is a smart access control solution that transforms existing locks into smart locks, enabling users to manage property access remotely via a mobile app or web dashboard. The system allows for the sharing and revocation of digital keys in seconds, providing flexibility with permanent or time-limited access. Users can monitor entry activity, knowing who enters, when, and through which door, enhancing security and oversight. Klevio's hardware integrates with current door systems without the need for lock changes, maintaining the functionality of physical keys. The platform is suitable for various applications, including short-term rentals, property management, offices, shared spaces, and commercial properties, offering a comprehensive solution for modern access control needs. Unlock the doors to your house, apartment or office from anywhere in the world, whether you’re directly outside, at your desk or even on holiday.
  • 3
    SecurityRecords.com

    SecurityRecords.com

    InstaKey Security Systems

    Mechanical lock and key systems are the first line of defense in maintaining your security. This means that having a comprehensive key management system is crucial to controlling and monitoring secure keyed access for your organization. Our patented, cloud-based key-tracking software modernizes the way you manage your key system. SecurityRecords.com gives you visibility and control over all aspects of your key system with easy-to-use dashboards and real-time updates. Key tracking software can give you control of your key system in a way that paper files, spreadsheets, or PC-based software can’t. Poor key management can compromise your security, be a hassle to manage, and cost you time and money. No matter what lock and key system you have in place, InstaKey’s key-tracking software can help you better manage your keyed security. Here's where you can see how SecurityRecords.com stacks up against it's competition.
  • 4
    InstaKey

    InstaKey

    InstaKey Security Systems

    InstaKey Security Systems offers a comprehensive key control program designed to enhance security and reduce costs through innovative hardware solutions, cloud-based management, and dedicated support. Their program includes restricted, serialized keys that prevent unauthorized duplication, user-rekeyable locks that can be rekeyed up to 12 times without locksmith assistance. InstaKey's approach ensures that organizations maintain control over their key access systems, streamline key management processes, and effectively respond to security breaches or key losses. Our keyways are restricted, meaning the key blanks themselves are not available on the open market. Local locksmiths and hardware stores are unable to acquire them, thus limiting unauthorized duplication opportunities and providing better controls. On top of that, each InstaKey key blank is stamped with a unique serial number, recording when and how it was cut, and who it was issued to, giving it a distinct fingerprint.
  • 5
    SiteMaster 200
    SiteMaster 200 is a key control software developed by Schlage, designed to assist organizations in managing their mechanical key systems efficiently. It enables users to oversee multiple key systems by client, manufacturer, and top master key, generate new key systems, and expand or reproduce existing ones. The software tracks key histories, identifies interchanges between different key systems, and maintains a complete history from creation to issuance, loss, return, damage, or unassigned status. Users can edit and add doors on the fly, look up and key doors without prior cylinder product assignments, and import existing systems and personnel data quickly through included import wizards. An available lock shop enhancement upgrade offers additional benefits for locksmiths and shop team members. Electronic validation allows users to manage all order authorizations for restricted key systems, eliminating paperwork and saving time.
  • 6
    Parakey

    Parakey

    Parakey

    With Parakey you ensure that the right person, at the right time, has access to the right locked space, with a smartphone as a key. A super-easy way to manage mobile keys for all types of users, businesses, and business models, whether it's a single space or an entire property portfolio. Administration via the Parakey web portal or on autopilot via Parakey's incredibly many integration possibilities. The Parakey app does not require an internet connection to unlock. All Parakey devices are "offline" and are not connected to the internet. Administrate the single premise to the large real estate portfolio. Manage an infinite number of users, doors, and properties. Just like the demands and needs of the market, Parakey is in constant development and is continuously enriched with new functionality. It also increases security as you as an administrator have full control over who has a mobile key, to where and when, and you can take back a mobile key at any time.
    Starting Price: $36.79 per month
  • 7
    SALTO KS

    SALTO KS

    SALTO Systems

    With SALTO KS you can send a Digital Key to anyone with a smartphone, so no need to hand over tags or even do a remote opening. Issuing and receiving access is much easier and more flexible. Integrate SALTO KS functionality into your existing app with Connect API or depending on your business needs build your own access control solution from scratch with Core API. No more managing mechanical keys. Simply grant access to individuals or groups for selected locks and timeframes. See who goes where and when, and block users on the go. It can be daunting to find the right access control fit to meet the needs of your business.
  • 8
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 9
    Digital Handover Management
    Agile Handover’s Digital Handover Management™ Platform transforms incoming information into knowledge, aligning data strategy with O&M business goals. It automates the process of integrating infrastructure handovers into operations, enabling collaborative handover between O&M Information Silos, standardizing Data and Document sharing between existing solutions. Digital Handover Management™ Platform increases the quality of data, ensuring infrastructure data compliance and integrity by enabling best practices to efficiently cleanse and standardize data from all sources, helping customers take advantage of data gravity. Utilize our iterative process to extract knowledge from data/docs to build object relationships, categorize the data/docs with our engineering library, and utilize the cleansed knowledge to expand the value of O&M Data Silos and increase productivity with our guaranteed ROI.
  • 10
    Vert.x

    Vert.x

    Vert.x

    Han­dle more re­quests with fewer re­sources com­pared to tra­di­tional stacks and frame­works based on block­ing I/O. Vert.x is a great fit for all kinds of ex­e­cu­tion en­vi­ron­ments, in­clud­ing con­strained en­vi­ron­ments like vir­tual ma­chines and con­tain­ers. Peo­ple told you asyn­chro­nous pro­gram­ming is too hard for you? We strive to make pro­gram­ming with Vert.x an ap­proach­able ex­pe­ri­ence, with­out sac­ri­fy­ing cor­rect­ness and per­for­mance. Don’t waste re­sources, in­crease de­ploy­ment den­sity and save money. You pick the model that works best for the task at hand, call­backs, promises, fu­tures, re­ac­tive ex­ten­sions, and (Kotlin) corou­tines. Vert.x is a toolkit, not a frame­work, so it is nat­u­rally very com­pos­able and em­bed­d­a­ble. We have no strong opin­ion on what your ap­pli­ca­tion struc­ture should be like. Se­lect the mod­ules and clients you need and com­pose them as you craft your ap­pli­ca­tion.
  • 11
    FiLMiC Firstlight
    FiLMiC Firstlight is a revolutionary photo camera from the makers of the class-leading FiLMiC Pro HD video camera that makes live photography fun and creative. Firstlight filters are inspired by the amazing legacy of 19th and 20th-century photography. Each filter pack is based on the films and photographic processes that created over a century of legendary images. First­light com­bines cus­tom film sim­u­la­tions, adap­tive film grain, and FiLMiC Pro’s fa­mous live an­a­lyt­ics to of­fer an ad­vanced but ap­proach­able front end cam­era ex­pe­ri­ence like no oth­er. Fast, easy, and in­tu­itive, First­light lets you en­vi­sion and cap­ture your best mo­ments in cam­era, with­out hav­ing to spend hours edit­ing your pho­tos lat­er. Shoot and share, it’s that easy. Fast, in­tu­itive fo­cus and ex­po­sure con­trols, tap the screen to set fo­cus/ex­po­sure, and tap again to lock. Cross-swipe man­u­al con­trols, the most in­tu­itive way to man­u­al­ly ad­just fo­cus and ex­po­sure.
  • 12
    MODS Origin
    Labor-intensive paper records and work packaging lead to confusion, delays and added cost. With MODS Origin, industrial construction management software for greenfield sites and other complex mega builds, such wastage is a thing of the past. This customizable software digitizes your workflow, streamlining construction, permitting, preservation, testing and handover activities. MODS Origin enables the digital evolution of your construction execution, digitizing your workflow for every phase from planning through handover, increasing productivity and reducing costs. This innovative software eliminates paper, digitizing and automating your processes at every project phase to plan, control, execute, test, and hand over work more efficiently. MODS Origin digitally unifies construction, execution, completions, and handover with software and mobile technology to de-bottleneck and reduce worker hours as well as non-value-added time, making significant budget savings for our customers.
  • 13
    MINT TMS

    MINT TMS

    MINT Software Systems

    MINT TMS: Cloud-based digital records & qualification management, resource planning, and data mining. The unique and flex­i­ble de­sign of MINT en­ables record keepers to keep track of var­i­ous types of re­sources & all their qual­i­fi­ca­tions. Sim­ple and easy to use data-setup and edit­ing func­tion­al­i­ties keep all records ac­ces­si­ble and ed­itable at any time. Create and design your own electronic forms and grade sheets in a fully flexible manner from a library of components, for various purposes of data collection, to be performed online or offline. MINT provides the tools you need to manage what students are expected to learn, evaluate whether or not it was learned, and visibility to improve student learning. A lot of the magic of MINT lies in its unique sched­ul­ing ca­pa­bil­i­ties. The so­lu­tion han­dles all stages of plan­ning and au­to­mated sched­ul­ing flaw­lessly.
    Starting Price: $300 one-time payment
  • 14
    Datanet

    Datanet

    DATANET

    DATANET has been active since 1986 in the fields of data pro­ces­sing / analysis / eva­lua­tion and sup­porting con­sulting services. A special focus was on indi­vidual soft­ware deve­lop­ment in the tele­com­mu­ni­ca­tions industry (soft­ware, service, consulting). Other services include: project manage­ment for complex tele­com­mu­ni­ca­tions archi­tec­tures, as well as Tele­com­mu­ni­ca­tion -Ex­pense Mana­ge­ment (TEM) solutions for major customers. Contract manage­ment (inventory, ordering, logistics, histor­ici­za­tion), Invoice process­ing (check, assign, update), Re­porting (exten­sive analysis of con­sump­tion, costs and origin at all organi­za­tional levels of a large company), Inte­gration into existing system environ­ments (ERP systems, SRM systems, HR systems, SAP ARIBA, Crossinx, basware, Service­Now ...), Connection of any network operator and supplier.
  • 15
    Lystra

    Lystra

    Castledot

    Lystra helps contractors manage crew scheduling, timesheets, materials and tools across multiple worksites. Workers clock in/out from their phones. Supervisors see who's where in real-time. Materials requests flow through approvals. Tools are tracked with handover records. Built for construction, utilities and trades companies in Australia. Replaces spreadsheets, WhatsApp groups and paper forms with one clear platform. Key features: - Smart Scheduler with drag-and-drop assignments - Smart Timesheets with one-click approval - Materials Cycle tracking from request to return - Tools Cycle with compliance and handover records - Mobile app for iOS and Android - Real-time reporting and exports 14-day free trial. No credit card required.
    Starting Price: $199/month
  • 16
    Activate

    Activate

    iHandover

    Activate™ is a secure web application that formalizes knowledge and information transfer during job handovers. From mapping key relationships to discussing vital process steps, ensure that key intel stays in the business. Read on to discover how Activate™ delivers Improved performance, enhanced collaboration, and greater workplace engagement. Transferring knowledge between employees is a challenge for most organizations, if not all. It is a complex process especially when you consider that there are many reasons why an employee vacates their job position. Once triggered, line managers are under pressure to manage the planned or unplanned change as well as their normal work activities. We understand it can be overwhelming for all stakeholders and we provide a system and support that offers stability, confidence, and continuity during handover processes.
  • 17
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 18
    Internet Lock

    Internet Lock

    TopLang Software

    Internet Lock is an access control and password protection solution for your internet connections and internet programs. With Internet Lock, you can fully control the internet connections and programs on your computer. By using Internet Lock, you can restrict or password protect internet access, schedule internet access, protect internet programs on certain IP addresses or domains, limit users to access only the websites you specified, or keep them from accessing unwanted websites. You can use Internet Lock to restrict internet connections and programs. Programs blocked by Internet Lock will not be able to access the internet. You can use Internet Lock to password protect internet programs and connections. Users must provide correct password in order to use the protected programs to access internet. When a password protected program tries to connect to internet, Internet Lock pops up a password window to ask user to enter password. If user couldn't provide the correct password.
    Starting Price: $29.95/one-time/user
  • 19
    LockStep
    LockStep is an easy, rapid authoring interface with all the same integrated editors found in WinSequence Enterprise. LockStep also supports the direct image capture with supported cameras, just like WinSequence Enterprise. However, LockStep is designed for the smaller company that just needs a simple, single-user desktop solution for authoring and exporting formatted PDF instructions. LockStep and the enterprise products are built on the same data model, so LockStep is easily upgraded to the enterprise suite of products when the time is right. Typically, the transition takes place when a networkable multi-user solution is needed for authors, or when electronic work instructions via web browser is needed in production, or when integration with other IT solutions is desired. WinSequence Enterprise will have the same look and feel as the LockStep application for authoring, so only minimal additional training is required to use additional functionality of WinSequence.
    Starting Price: $799.00/one-time/user
  • 20
    Log my Care

    Log my Care

    Log my Care

    Log my Care is a cloud-based care management and electronic care planning platform that streamlines how care teams plan, record, deliver, and report care by replacing paper records with digital workflows accessible from mobile devices and a web-based Care Office dashboard, so carers can log daily activities, incidents, handovers, risk assessments, outcomes and goals in real time and managers get auditable, inspection-ready reports and oversight across services. It includes a Carer App for frontline staff to access tasks, capture logs, upload photos/videos, check off to-dos, and deliver person-centred support on the go, and a Care Office for supervisors to coordinate care plans, monitor compliance, manage schedules, and generate analytics. Built-in templates and tools support consistent, compliant care documentation with risk assessments, outcomes tracking, structured handovers, and digital signatures.
  • 21
    LockDown Browser
    LockDown Browser® is a custom browser that locks down the testing environment within a learning management system. Used at over 2000 higher educational institutions, LockDown Browser is the “gold standard” for securing online exams in classrooms or proctored environments. LockDown Browser’s name says it all: it "locks down" the browser on a computer or tablet. Students are unable to copy, print, access other applications, or visit other websites during an online exam. LockDown Browser also blocks hundreds of common and advanced methods of digital cheating, such as the use of Virtual Machines, remote desktops, screensharing, instant messaging, screen recording, keystroke combinations, launching applications with timers/alerts, browser cache exploits and much more.
    Starting Price: $2795 per year
  • 22
    RemoteLock

    RemoteLock

    RemoteLock

    RemoteLock is a cloud-based access control platform designed to simplify property operations by enabling centralized management of door access across multiple properties and door types. It provides a universal access control system that works with both smart locks and hardwired doors, allowing users to control connected devices, assign permissions, and monitor activity from anywhere using a smartphone or laptop. Through a single intuitive dashboard, users can manage every door in a building or portfolio, eliminating the need to switch between disparate systems while maintaining full visibility into who enters, where, and when. It is hardware-agnostic, supporting a wide range of leading lock brands, and integrates seamlessly with property management systems and booking platforms to automate processes such as guest access, code generation, and scheduling. RemoteLock enables customizable access schedules, real-time monitoring, and detailed audit trails.
  • 23
    SimpleK

    SimpleK

    SimpleK

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 24
    ShieldApps AppLock
    ShieldApps AppLock has been developed as an effortless way for Android users to protect their device and personal data against unauthorized access. AppLock has been designed for ease of use, and intuitive controls give users an easy way to enhance their privacy. The accessible application lock can protect any app installed on the user’s device, as well as hide images and video galleries. ShieldApps AppLock details a list of applications installed on the device. Each application can be accessed and locked individually, with either a PIN, pattern, or fingerprint lockdown, depending on the phone's abilities and the user’s preferable choice. Once the application has been locked, it can only be accessed using the verification method selected. An image gallery, as well as each individual image, can be hidden in the same manner. While the user enters the application, a list of all hidden items will show in the menu.
  • 25
    Best Disk Lock

    Best Disk Lock

    DoGoodSoft

    Best Disk Lock is an easy-to-use tool that can lock the local disks. The advanced-locked disk will be completely hidden from your computer and cannot be found in any environment except in the software interface. It can also set USB storage devices to be disabled or read-only. DoGoodSoft's Best Disk Lock is a user-friendly tool designed to enhance data security by locking local disks and controlling USB devices. The software offers three levels of locking options, including elementary, intermediate, and advanced locks. When a disk is locked using the advanced option, it becomes completely hidden from the computer and can only be accessed through the software interface. In addition to locking disks, Best Disk Lock can also disable or set USB storage devices to read-only, ensuring that sensitive data remains protected from unauthorized access.
    Starting Price: $19.95/lifetime/computer
  • 26
    Duplicacy

    Duplicacy

    Duplicacy

    A new generation cross-platform cloud backup tool. Duplicacy backs up your files to many cloud storages with client-side encryption and the highest level of deduplication. Duplicacy is built on top of a new idea called lock-free deduplication, which works by relying on the basic file system API to manage deduplicated chunks without using any locks. A two-step fossil collection algorithm is devised to solve the fundamental problem of deleting unreferenced chunks under the lock-free condition, making the deletion of old backups possible without using a centralized chunk database. Duplicacy comes with a newly designed web-based GUI that is not only artistically appealing but also functionally powerful. With just a few clicks, you can effortlessly set up backup, copy, check and prune jobs that will reliably protect your data while making the most efficient use of your storage space. The intuitive dashboard includes several statistical charts.
    Starting Price: $20 per year
  • 27
    DashCX

    DashCX

    DashCX

    By allowing personal WhatsApp for business chat, you risk losing valuable leads and data. Attrition is high, people leave and take their chats with them. This causes a nightmare during handover time. After implementing DashCX, your business chats will come within your business and stay with you forever. Dependency on agents is removed and handovers are made extremely simple. Create no-code chatbots for a chat that answer customer questions automatically, share content, and send notifications related to orders, payments, and shipping. Make conversation flow with your customers on their preferred platform & customize your welcome/reply messages as per your needs. Create frictionless user journeys in your sales funnel to visualize the experiences of customers with your product and services.
    Starting Price: $49 per month
  • 28
    Table Duck

    Table Duck

    Table Duck

    Each team member can easily take over and manage customer conversations, with a seamless handover between virtual assistant and live agent. Connect all your customer support channels like Email, Live Chat and Facebook Messenger into one inbox. The virtual assistant automatically answers most of your customer support questions. Easily taking over conversations and answering the customer in case the assistant doesn’t understand. The virtual assistant automatically answers most of your customer support questions. Our virtual assistant speaks and helps your customers in multiple languages. Build rich profiles and easily merge multiple communication channels from the same, single customer. Easy to set up, within 5 minutes. No technical skills required or complicated flow builders to work with.
    Starting Price: €19 per month
  • 29
    RIB Digital Handover
    Ensure a simple and efficient transition from construction to operation. The operational phase constitutes by far the largest part of the costs of a construction project. Therefore it is important that the owner/operator specify the quality demands of the information that is received from the contractors upon project handover already in the early phases of a project. With RIB Digital Handover all relevant data is collected in a database, preferably with the BIM model as a starting point. The process is simple and efficient for all parties and ensures high quality as well as full documentation of the submitted data to the owner/operator regardless of the FM system. Efficient and systematic collection of operational information. Gain complete visibility of all components with dashboards and reports. Achieve high quality in the delivered O&M material. Avoid delays in the delivery process when all operational material is ready by the deadline.
  • 30
    MemOptimizer

    MemOptimizer

    CapturePointStone

    The Problem: Almost 100% of software programs contain "memory leaks". Over time these leaks cause less and less memory to be available on your PC. Whenever a Windows based program is running, it's consuming memory resources - unfortunately many Windows programs do not "clean up" after themselves and often leave valuable memory "locked", preventing other programs from taking advantage of it and slowing your computer's performance! In addition, memory is often locked in pages so if your program needed 100 bytes of memory, it's actually locking up 2,048 bytes (a page of memory)! Until now, The only way to free up this "locked" memory was to reboot your computer. Not anymore, with MemOptimizer™! MemOptimizer frees memory from the in-memory cache that accumulates with every file or application read from hard-disk.
    Starting Price: $14.99 one-time payment
  • 31
    Bugsmirror MASST
    MASST (Mobile Application Security Suite & Tools) is a unified mobile app security platform designed to detect, protect, and monitor mobile applications across development and runtime. The suite’s Threat Detection layer includes modules such as CodeLock for static analysis across 50+ vulnerability vectors, RunLock for runtime testing and attack simulations, APILock for discovering and securing API endpoints, and ThreatLock for deep red-teaming assessments. The Threat Mitigation layer wraps your mobile apps with protections including Defender (RASP-based real-time shielding), Shield (anti-reverse-engineering and IP-theft protection), and Guard (secure local storage of keys, certificates, and sensitive data via white-box cryptography). The Threat Visibility layer offers the ThreatLens Dashboard for real-time monitoring, analytics, and actionable insights into attacks, anomalies, and app security posture.
  • 32
    7Caps

    7Caps

    Digola, Aldo Radešič, s.p.

    7Caps is a compact yet powerful application that keeps you informed in real-time about the status of your Caps Lock and Num Lock keys. With the new Watermark indicator feature in the latest version, 7Caps now offers a transparent display of Caps Lock and Num Lock status directly on your desktop. Its versatility extends through multiple display options, including tray icons, floating notifications, and customizable audio alerts, ensuring seamless user awareness of key states. This utility discreetly runs in the background, providing immediate notifications whenever the Caps Lock or Num Lock keys are activated or deactivated. Customize the notification to your liking; position it anywhere on your screen for convenient visibility. The tiny application is invaluable for those who regularly use the Caps Lock or Num Lock keys and need instant updates about their status.
    Starting Price: $5.95 one-time payment
  • 33
    C3D ATLAS
    C3D ATLAS was designed to manage the entire project completion process from the building inspection’s scope of work to manag-ing inspection activities, system walk-downs, and punch lists during each project phase (from start to completion). C3D ATLAS enables users to manage and report on inspection activities using BIM-based interface. C3D ATLAS is used to successfully handover plants, buildings, and infrastructure facilities. C3D ATLAS offers an easy-to-use interface that defines all the required tasks and forms so you can build the inspection scope in different project phases (construction, pre-commissioning, commissioning, and start-up). System setup starts the definition of the reference data such as project phases, disciplines, categories, tags, and the QC Forms required for handover.
  • 34
    LoanTek

    LoanTek

    Bankrate

    Managing rate locks, compensation, margins, and overlays has never been easier. LoanTek’s pricing engine feature ‘Lock Desk Manager’ is an innovative and intuitive lock management system. Lock Desk Manager provides unparalleled convenience and efficiency in managing pricing rules and mortgage rate locks across all of your lenders. LoanTek’s best execution pricing engine allows the user to efficiently manage overlays, and compensation, produce the best execution rate sheets, and more. LoanTek’s Lock Desk Manager streamlines the process of managing mortgage rate locks by displaying all of your current and future mortgage rate locks, for all lenders, in one easy-to-use interface. The ability to view and manage all of your rate locks in one screen provides efficiency while ensuring that your best execution pricing is being applied. Our mortgage pricing engine provides access to historical pricing for each of your lenders and allows easy access to best execution pricing results.
  • 35
    PropFlo

    PropFlo

    PropFlo

    PropFlo is a AI Driven Real Estate CRM Software built for the future from the Initial Enquiry to Handover. The AI powered real estate CRM with end to end solutions for developers and Brokers to automate Sales & Marketing Cycle.
  • 36
    Voolsy Lock

    Voolsy Lock

    Voolsy Lock

    Voolsy lock gives you control of your all android devices from single platform. Be it the activities of sales staff or handling devices employed in your dining space, Spare yourself the worry of managing numerous devices and employ Voolsy Lock system to get smoothen work processes. Avoid technical hurdles and control devices from a single location with Voolsy Lock system. Voolsy Lock is the enterprise mobility management solution that secures, manage and monitor corporate owned mobile & tablet devices. Voolsy Lock helps access those apps and files which are necessary. It leads to necessary and limited usage of internet data.
    Starting Price: $12 per device per year
  • 37
    Edzcom

    Edzcom

    Edzcom

    Edzcom designs, builds and operates private 4G/5G networks for enterprises and provides high-performing data and voice connectivity enabling ambitious digitization strategies. Edge Connectivity is a private network solution, connecting assets, equipment, and people in the field that is designed, built, and operated at the edge, at the user‘s site.​ Network design ensures full autonomy and reliability for business-critical operations by ensuring all network components are at the edge. Private, geo-redundant network architecture. Dedicated spectrum, interconnection to the existing architecture. Data stays on site. Network performance dashboard and control. Connection for all assets with seamless handover. Reliable connectivity is a cornerstone for digitalization and automation. Edzcom fully autonomous 4G/5G private networks enable 24/7 continuity of business-critical operations, seamless handover of moving assets, full control, and data privacy, by keeping data locally.
  • 38
    Morro Data CloudNAS
    Morro Data CloudNAS Global File Services enable companies with two or more offices to share their files in real-time and no VPN or sync software required. Cloud NAS combines the local network performance of a NAS with the reliability, scalability, and accessibility of the cloud for a cloud-first solution. It allows businesses to quickly and efficiently have unlimited file storage, collaborate with multiple office file sync & lock, and get instant disaster recovery. Morro Data CloudNAS enables remote users to work on the same project as if on the same local network. The remote users can collaborate on the projects across multiple global sites with file syncing and locking in the background. Cloud NAS supports file locking for AutoCAD, Civil3D, Bluebeam, Microstation, Adobe, and Microsoft Office. The project files are safely stored in the cloud and cached to the local CacheDrive gateway for performance.
    Starting Price: $129.00/month
  • 39
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 40
    Anchor

    Anchor

    Anchor

    Anchor’s file security platform is built on zero trust principles to secure and control your sensitive files, but remain invisible to end users. Traditional cybersecurity focuses on locking down networks, devices, and people. All of this is done in the name of data security. But, once individual files are moved, shared, or stolen, the data is no longer protected. Even worse, these controls get in the way and frustrate business users to the point they intentionally work around them. Cyber insurance premiums are rising, as well as the requirements for obtaining coverage. At the same time, coverage is reducing. Most insurance companies require MFA to get coverage and exclude paying ransoms for data that is stolen. Satisfy MFA while also eliminating the ability for your data to be stolen and used against you.
  • 41
    EAS Expense Allocation System
    Get al­lo­ca­tions right, every time. Au­to­mat­i­cally cal­cu­late and ap­ply shar­ing per­cent­ages only to funds el­i­gi­ble to take an ex­pense. Con­sol­i­date ac­counts payable firmwide and en­joy easy ac­cess to pre­cise ex­pense re­port­ing. Get al­lo­ca­tions right, every time. Au­to­mat­i­cally cal­cu­late and ap­ply shar­ing per­cent­ages only to funds el­i­gi­ble to take an ex­pense. Con­sol­i­date ac­counts payable firmwide and en­joy easy ac­cess to pre­cise ex­pense re­port­ing. Pre­vent mis­al­lo­ca­tion penal­ties. Use EAS to au­to­mate al­lo­ca­tion pol­icy and en­sure ex­penses are al­ways al­lo­cated ac­cord­ing to fund agree­ments and dis­clo­sures. The manual process for allocating expenses across funds is notoriously convoluted and opaque. Complicated Excel-based allocations often contain hidden mistakes due to a lack of controls. Allocation mistakes put asset managers at risk for reimbursement delays or misallocations.
  • 42
    CubiLock

    CubiLock

    CubiLock

    CubiLock is a pre-eminent and client-trusted Enterprise Mobility Management Solution that simplifies mobility challenges for your business with easy deployment, security and app distribution. With affordable pricing, CubiLock helps streamline your fleet of Android Devices with top-notch device management capabilities, real-time updates, and enable single or multi-app KIOSK mode. CubiLock offers simple and remote Android Device Management with zero-touch enrollment. It enables to deploy and scale very fast. It assists to improve device-led operations for productive administration and business as a whole with an easy-to-use and effortless Cloud-Based Dashboard interface.
  • 43
    Next Field

    Next Field

    Next One Technology

    Handovers, safety rounds, condition assessments, HSEQ, QA and JSA. Whatever you do, CHECKD will make it easier for you. Log deviations and pins, delegate, follow up and extract reports. Get a complete overview of the basic drawings for the project using our WEB and field application. Workers in the field can feel secure knowing that all drawings are easily accessible in their pockets. All types of projects: construction, assignments, operations, etc. Upload your drawing files, and plot points directly on the drawings. Log deviations, tasks, observations. Extract digital reports, or export them as a PDF. Fill in our standardized checklists, such as RUH, deviations, change notifications, takeovers, etc. You can also order your own checklists. Super-simple, visual field tool for people in the BAE industry. Get all inspections, handovers, and checklists right in your pocket. Plot points directly on the drawing, and delegate to the person in charge.
    Starting Price: $12.00/month/user
  • 44
    iToolab UnlockGo
    iToolab UnlockGo (Android) is a multifunctional tool for all Android phones and tablet. First of all, it can remove all screen locks (PIN, pattern, password, fingerprint, face recognition) from 6000+ Android models. All popular brands like Samsung, Google, Huawei, vivo, OPPO, and more are supported. The most popular function of iToolab UnlockGo (Android) is bypassing FRP lock, which supports Samsung, Xiaomi, Redmi, vivo, OPPO, Motorola, Realme, OnePlus, Huawei, Lenovo, and Micromax. It’s a powerful FRP unlock tool. You can regain full access to the device within several minutes. According to Android Authority, it becomes harder to bypass FRP lock on Android 15 and later, but you can easily do it with iToolab UnlockGo (Android). What’s more, iToolab UnlockGo (Android) allows you to factory reset Samsung devices in 1 click for free. If you own a mobile repair shop or you don’t want to go through the complicated reset process, it’s a handy tool for you.
    Starting Price: $14.95 per month
  • 45
    OpenText XM SendSecure
    OpenText XM SendSecure is a state-of-the-art file exchange platform that is both highly secure and simple to use. It allows the safe exchange and ephemeral storage of sensitive files in a virtual SafeBox. Any files exchanged are virus scanned, then encrypted in transit and at rest. 2-Factor Authentication (2FA) ensures the proper recipient gets them, and the data is automatically purged after a set period of time. To further aid regulatory compliance, XM SendSecure automatically generates an audit trail of all file interactions and communications. Central to the XM SendSecure solution is the SafeBox file container, created on upload and kept separate from other storage in a locked virtual space. Each SafeBox allows users to transfer an unlimited number of files in any format and up to 5TB each. All files are automatically scanned with antivirus software as they enter the solution, and once an exchange is started, additional files can be attached by either the sender or recipient.
  • 46
    CurrencyTransfer

    CurrencyTransfer

    CurrencyTransfer

    Whether you’re paying someone overseas or making international business payments, CurrencyTransfer has modern-day payment solutions to fit your needs. Every day, individuals and businesses rely on CurrencyTransfer for ease of access to the very best international money transfer deals online. We make international money transfers easy and transparent. Your currency concierge will work with you to make a tailor-made international money transfer service. Log in and get a quote.Lock it when you’re happy and book your trade online via your personal dashboard. Transfer the funds for your payment. Everything will be tracked throughout the process. Allocate and manage your recipients. You can enjoy a simple, easy, and better global money transfer experience. CurrencyTransfer’s unique platform gives you access to a global payment network. It means you will benefit from the best deal among several payment institutions. All in one place.
  • 47
    CyLock

    CyLock

    Cybernexa

    Cybernexa, a global leader in information security, pioneers cutting-edge solutions such as CyLock MFA, SSO, ADPass, and PKI. Committed to innovation, our robust products address the dynamic security needs of today's mobile-centric environment. Offering seamless integration, CyLock MFA ensures multi-factor authentication, while CyLock SSO simplifies access to multiple systems. Manage Active Directory securely with CyLock ADPass, and fortify data integrity with CyLock PKI's encryption. Beyond products, our dedicated team delivers comprehensive cybersecurity compliance services, ensuring your organization stays ahead of threats. Choose Cybernexa for unparalleled security innovation, global reach, and comprehensive services tailored to diverse sectors.
  • 48
    KeyTracer

    KeyTracer

    Real Time Networks

    KeyTracer is a scalable RFID key management solution that enables you to track, manage, and store your keys and can be customized to support your organization’s unique workflows. With the right system in place, your team will know where all keys are at all times, giving you the peace of mind that comes with knowing your assets, facilities, and vehicles are safe. A key management system enables you to track and control all of your keys and restrict who can access them, where they are taken, and when. Instead of spending time looking for misplaced keys or having to replace missing ones, you can rest comfortably with the ability to track keys in real-time. Complete transaction and management services for your keys around the clock. An automated key tracking system increases accountability and reduces human error. Eliminate manual key tracking and virtually eliminate errors. Spend less time and capital on manual record-keeping tasks and virtually eliminate errors.
  • 49
    AdLock

    AdLock

    AdLock

    When AdLock is on, ads are off. Enjoy fast internet and apps without pop-ups and banners. Meet AdLock — an unrivaled standalone ad blocker for Windows devices. Our adblocking software removes ads from all browsers, games, and other apps providing top-notch privacy security all along. Being lightweight, convenient, and elegant, AdLock is an absolute unit. AdLock is a complex multitool providing the best quality protection from phishing, malware intrusion, and malicious ads. Our defender module checks URLs of suspicious websites before you click them and warns you about the possibility of your device getting infected. The Web nowadays is like the streets of Brazil — everything and everyone tries to steal your valuables. AdLock is built by cybersecurity experts according to the best sensitive data protection practices. It protects your personal data from spies, crooks, and phishers.
    Starting Price: $1.60 per month
  • 50
    OpenApp Smart Locks
    Our smart locks are designed keeping your business in mind. Solving unique challenges faced by the Telecom and Logistics Industry, have opened new channels for our smart locks in a multitude of other industries for both access control and asset security. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Enjoy the privilege of instantly giving and revoking access to locks from the Dashboard, combined with the ability to view and download ‘Access logs’ anytime, from anywhere. Fleet moving critical assets? When there's a theft, the smart locks will give admins a tracking link for real-time tracking.