Alternatives to Key Wizard

Compare Key Wizard alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Key Wizard in 2024. Compare features, ratings, user reviews, pricing, and more from Key Wizard competitors and alternatives in order to make an informed decision for your business.

  • 1
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 2
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 3
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 4
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 5
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 6
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 7
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 8
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 9
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 10
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 11
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 12
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 13
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 14
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 15
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 16
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 17
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 18
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 19
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 20
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 21
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 22
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 23
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 24
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 25
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 26
    CodeSource

    CodeSource

    Hudson Lock

    From the leader in locksmith software HPC’s CodeSource®, the ultimate code retrieval program is actually 8 programs in 1! We all know the importance of offering code-cut keys; it is what separates key cutters from locksmiths. At the heart of every locksmith shop is the code program, a vital aspect of its operations. HPC’s CodeSource® is the most comprehensive, user-friendly code retrieval program on the market today! It has a database of millions and millions of codes that can be accessed quickly and easily. The Windows® operating system allows for quick maneuvering through the program with the point and click method or by clearly marked “hot keys.” CodeSource® makes looking up a code completely effortless. There is no need to have extensive computer knowledge to run the program, simply follow the instructions on the screen. If you have questions, on-screen help is available at the touch of a button.
  • 27
    Masterstroke

    Masterstroke

    Strikedart Technologies

    Register and manage all your assets, accessories, software and consumables. Manage and track even assets on a Loan basis, Free of charge and Lease/Rent basis. Create unique tags for assets, accessories, and software media with your own nomenclature and label design. Track assets to the level of Workspace/Rack, End-user, and Cost center along with associated accessories and software. Stock optimized quantity of assets and accessories. System Alert on reaching Reorder level. Manage all asset movements across geography, organization level, end-user and economy zones. Manage all software installation and un-installation processes. GST/VAT complaint material DC/Gate Pass (Returnable / Non-Returnable). Track AMC / Warranty / Insurance details and Preventive Maintenance schedules. Bulk AMC Execution and Warranty Extensions. Conduct asset audit through reading of Barcode/RFID tags in Wi-Fi, Off-line or App-on-mobile mode.
  • 28
    uManage Mobile
    AVR’s uManage Mobile Workforce Management and Client Billing system is designed to work seamlessly with our uVisionPLUS utility billing solution. uManage Mobile can also integrate with other back end work order solutions. It allows the user to create, manage and close out work orders that are related to utility billing accounts for tracking purposes. It also has its own location database for any service location that does not have a billing service connection. uManage® offers state-of-the-art browsing that allows filtering, sorting, grouping, multiple selections for updating in mass reporting and managing access to all work orders in the database. View, sort, search & complete work orders. Browser based works on multiple devices. Dynamic screen formatting based on screen size. Use your own company logo & colors.
  • 29
    Green Doors

    Green Doors

    Green Doors

    Promote your own business and create a branded experience for owners and residents. Branded by you, powered by us. Your entire portfolio on one screen. Track critical investment analytics, compare and contrast properties & make informed decisions. Make it easy on yourself and collect online & autopay payments, track maintenance requests and manage their leases. Track your entire portfolio's returns, cash flow, equity, & loans. Compare and contrast each property's performance & make informed decisions. Accept ACH or credit card payments. Collect a security deposit and automate late fees. Residents pay through the mobile app and can enroll in autopay. Add templates and send out pre-filled documents for signing. We manage your templates, map fields, and ensure that data fills correctly. Store all your pictures, leases, receipts & other documents in one place. Tag a file for a property, lease, maintenance request, or vendor for easy retrieval.
    Starting Price: $39 per month
  • 30
    Fixed Assets CS

    Fixed Assets CS

    Thomson Reuters

    A comprehensive depreciation software is crucial when it comes to managing assets efficiently. With Thomson Reuters Fixed Assets CS, adding, changing, disposing, and transferring assets is quick and simple. This robust fixed asset management software offers a logical, easy-to-follow file folder format, plus an intuitive display that shows how depreciation values were calculated. Fixed Assets CS calculates an unlimited number of treatments — with access to virtually any depreciation rules a professional or corporation might need for accurate depreciation. Add, change, and dispose of assets using an easy-to-navigate file folder format and customizable tracking and sorting options. Choose from disposal, method/life or association wizards. The method/life wizard fills in the methods and lives for assets.​ Fixed Assets CS only presents the necessary data entry options so your team can stay focused and accurate.
  • 31
    iDoc

    iDoc

    iComply Lifescience Solutions

    iDoc offers an effective document management system. Controls, and automates the documentation process like distribution, organization policies, standard operating procedures, work instructions, and so forth. It is very robust and secure in controlling document management systems and provides real-time visibility. Streamlines all the processes from creation, review, approval, and archival of critical documents and supports multiple files in a controlled manner. Integration with training management system for assignment of training and also to eliminate wrong documents which ensures accuracy to end-users and track compliance. Simplified automated documentation process, document Retrieval with Searching/Indexing capability, and document archival. Easily set up tags, labels, and descriptions that help sort information & keep track of documents. Records and maintains all documents and every change made to records provides audit trail reporting of documents or data fields.
  • 32
    nviroSoft

    nviroSoft

    Aarushi Software

    A consistent modern design with easy navigation and powerful search features. Produce all the Compliance Reports needed by the Regulatory Authorities at the push of a button. A Pump Selection, Configuration and Quotation Tool Technology which will make it easy for pump manufacturers, pump distributors and end-users alike to select, configure, quote/purchase pumps online that are fit for purpose. A livestock tracking, auctioning and accounting software system which caters for the entire operational activities of the Mart. Staff can focus on Customer Service and Delivery with minimum paperwork.
  • 33
    SeeMyMachines
    Deploy this industrial IoT platform at your shop floor, hospital, or any similar setting. Stay on top of asset tracking and maintenance management. Prevent unplanned disruptions in production with machine condition monitoring. Compare real-time and historical data to assess wear and tear and proactively address maintenance issues. Locate medical equipment; track movement of staff and patients. As a real-time location system, SeeMyMachines helps track movable resources improving operational efficiency in large hospitals. Remotely monitor turbines and solar panels across multiple energy farms. Paperless inspections and remote asset monitoring can help optimize maintenance and increase power plant efficiency. Locate anything, anyone in busy airports with a connected network of equipment, tools, and staff. Track assets, monitor temperature, locate staff, and more on a single platform.
  • 34
    CUBIC

    CUBIC

    FREY Municipal Software

    The CUBIC® Comprehensive Utility Billing and Control System is designed to provide a powerful billing and CIS (Customer Information System) for utility operations. It supports robust customer information, billing, and cash receipting functions, usage, and bill/payment history, plus a myriad of report options. It supplies important functions like multiple search criteria for account inquiries, real-time updating and electronic input, and receipting interfaces. Reports provide extensive statistics based on customers, services, rates, routes, and much more. CUBIC® powerful receipt processing supports traditional receipt processing and high-speed scanning systems. Everything is online including bill/payment and usage history, deposit and service information, as well as a consumption graph for each individual service. Accounting is highly controlled by the system as well. NARUC reporting is easily accomplished with CUBIC®.
    Starting Price: $1500.00/one-time
  • 35
    Cloud9 Maintenance

    Cloud9 Maintenance

    Cloud9 Maintenance

    Cloud9 Maintenance is a simple, powerful and affordable CMMS software to manage assets, schedule maintenance and track work orders. Setup your CMMS software in less than 10 minutes. Functionalities: - Work orders: Create, assign, and manage work orders with a few clicks. Set priorities, statuses, due date, and other relevant data. - Preventive maintenance: Schedule work orders to be created on a specified frequency to avoid non-planned down-time on your critical assets. - Asset management: Setup and track an unlimited number of assets across your locations. - Reports & Analytics: Easily check work orders that are overdue and assigned to you by status and quick overview of real-time insights to work order status. - Unlimited users and locations: All plans include unlimited users and locations. The system includes predefined roles to limit access for specific users.
    Starting Price: $99 per month
  • 36
    SHEQsys

    SHEQsys

    SHEQsys

    SHEQsys is an online web application, which allows users and managers to log, investigate, report, and determine trends of Safety, Health, Environment, Risk, and Quality related activities within their organisation. It does this through the use of smaller modules that all work individually, or together, in an easy-to-navigate web interface with in-built wizards to assist users in operating the system. SHEQsys is a framework that allows your organisation to work the way you want. The flexible utilities available enable you to switch features and modules on or off, and flavor nomenclature to your industry, which means this system can be scaled to always meet your needs. Capture only the information that is required, Relevant users and managers are automatically emailed notifications of new entries and actions for their attention, as well as scheduled overdue reports.
  • 37
    RVS Mosaics

    RVS Mosaics

    RVS Software

    This latest version of the RVS Utility Billing System is built on the foundation of our previous RVS Utility Billing Program. We added hundreds of enhancements and an easy Windows interface to make RVS Mosaics the most powerful and easiest to use utility software ever. ONE key accepts a reading and prompts for the next reading when entering meter readings. ONE key posts a full payment when posting receipts. Utilities and functions allow you to copy location data from a previous account for a new customer without having to re-enter information. Customer information screens are quickly accessed with either an account number or just a few letters of the last name. Search through accounts alphabetically, by account number or by reading sequence number. Lookup or change customer information from ONE screen. Wizards quickly step you through finalizing accounts, changing out meters, and correcting billing errors.
    Starting Price: $25.00
  • 38
    AITS

    AITS

    AITS

    This solution combines facial recognition with advance Artificial intelligence features offering an excellent user experience for contact-free access control, temperature screening, and time attendance functions. The AI powered incident-driven approach removes the need for a full time operator to manage the system. Temperature and attendance is automatically recorded and stored into database for comprehensive on-demand reports. Audio alert triggered to remind user to wear a mask before entering premises. Screen one person or instantaneously screen the temperature of multiple people. The days of lock & key are almost extinct as we rapidly speed into a technological future. We will not rely on physical, manual keys to unlock things such as doors or lockers. Today, we’re focusing on “smart” electronic doors or lockers using Artificial Intelligence to recognize each user, without the worry of having to remember to bring their keys.
  • 39
    REALSynergy

    REALSynergy

    Altisource Solutions

    Real-time transaction processing of cash or shadow receipts and disbursements for borrowers, investors, additional servicers and internal companies via ACH file creation, lockbox payment processing or multiple loan payment processing as well as bank account reconciliation. Track multiple properties per loan, UCC financing statements, operating statements, property inspections, detailed property characteristics, appraisal information, lease information, letters of credit and certificates of deposit. Work with unlimited escrow/reserve/holdback accounts and related bank accounts while providing detailed escrow analysis reports, critical date reports, allocation of interest earned and scheduled tax and insurance payments.
  • 40
    Locus Fleet Maintenance Software
    Maintain™ is an enterprise-class, cloud-based fleet maintenance system. Maintain™ can be deployed as a stand-alone, web-based solution or packaged with the Track™ GPS fleet tracking system for a powerful fleet management solution. Easily manage vehicles and assets from anywhere. Keep your assets on the road. All of your fleet maintenance data at your fingertips in an easy-to-navigate fleet maintenance dashboard. Avoid costly repairs and vehicle downtime by taking an offensive position to fleet maintenance. Minimize vehicle breakdowns and down time by ensuring equipment is serviced at proper preventative maintenance intervals. Maintain™ includes a preventative maintenance template designer to manage preventative maintenance tasks and provide user-definable alerting based on miles or calendar dates. Easily setup reminders for any maintenance needed. Minimize vehicle downtime by scheduling maintenance ahead of time.
  • 41
    4n6 Outlook Forensics Wizard
    4n6 Outlook Forensics Wizard is the most reliable, fast and easy-to-use software to open and analyze Outlook email data files. Forensics Investigator is this application developed specifically to collect evidence from Outlook data files. This advanced Outlook Forensics Software provides detailed preview of Outlook data files in various modes. You can easily use this software without facing any type of problem. The app also offers several premium benefits: 1. Allows to open, view, and analyze unlimited Outlook Data Files. 2. No need to install Outlook application to analyze email data. 3. Outlook Forensics Wizard is complete free from any type of risk. 4. Supports all the versions of Outlook including Outlook 2019. 5. Analyze Outlook email data in multiple modes to deeply analyze.
  • 42
    HDS Loan Servicing System

    HDS Loan Servicing System

    Housing and Development Software

    Loan Servicing Portfolio Management is adaptable to multiple loan amortizing and non-amortizing products. This ability to manage a portfolio of traditional and non-traditional loans makes this HDS product unique. The HDS Loan Servicing System can be used as a standalone product that can integrate with third party software, or simply as part of the HDS Enterprise Solution. In either case, this system allows agencies to track important loan data including borrower, co-borrower, property, and funding source. The system flow is organized for ease of use, with all information readily available. The HDS Loan Servicing Portfolio Management System features customizable views which give the agency’s users the flexibility to display, sort, and query on many general loan fields. This allows the agency to report on and group data in the loan portfolio at-a-glance. The software has full capture of individual borrowers and co-borrowers, as well as entities and organizations as borrowers.
  • 43
    DragDrop
    We wanted to overcome the slow proces of getting an email out of Outlook into your CRM, document management system, ERP while cluttering your desktop with emails. So we created DragDrop for Outlook. DragDrop for Outlook is an Outlook add-in that loads with your Outlook Desktop Client and creates the drag and drop functionality in the background. Easy, without bothering the user with any configuration. While companies are moving to Office 365 / Microsoft 365 and start using Outlook on the Web – also called OWA / Outlook Online – we used a similar process to not just be able to drag an email or attachment from Outlook on the Web to another browser but also to your desktop, explorer and any application that normally accepts a file drop. Dragging mails and attachments directly from Outlook to anywhere has never been as easy as before. Just install and start drag and dropping!
    Starting Price: €19 per user
  • 44
    Surgical Center Toolbox
    Dynamically customize and manage Policies and Procedures (PnPs). Search PnPs and agency standards electronically. Attach notes, documents and PnPs, to the associated agency standard. Prepare and manage facility documents for Surveys. End-user will able to search their agency standards electronically with the ability to view and/or attach insights, notes, related operational documents, and polices & procedures. End-user will have the ability to search standards, operational documents, and polices & procedures based on name or keyword search functions. End-user will have the ability to prepare and navigate agency surveys with step by step preparation tools related to PnPs, amendments, and deficiency tracking. Furthermore, log-ins can be created for consultant roles and monitoring. Using HOTB’s proprietary technology, policies & procedures can be dynamically populated based on system data inputs specific to the end-user’s agency.
  • 45
    Newsasset

    Newsasset

    Newsasset

    Integrate your existing clipping feed of traditional media or any other subscription-based news source you need. Discover current events by grouping similar articles and posts into topics, with summaries. Aggregation of information, posts, tweets or news is automated and supported across multiple media, sources and wires. Machine learning technologies allows us to identify persons, locations, organizations and more to provide you with separate content pools for advanced navigation via multiple tags. Combine aggregated content with archived material and content items you have produced in house. User profiles based on actual corporate roles and responsibilities with personalized dashboards which any authorized user at your company can access for the desired information without clutter. Filter aggregated content by source name, type, keyword or even date and create your own information streams.
  • 46
    [GO] Core Banking
    The next-generation banking platform designed ground-up for flexible configuration, automated compliance, CRM, and real-time insights—across multiple entities and in any jurisdiction. A powerful back-end system for processing accounts, cards, loans, deposits, payments and settlements. An intelligent reliable core engine for processing large quantities of transactions, operations and services. A powerful payments engine supporting current or transactional accounts linked to debit or credit cards. Includes authorization, holds, payment orders, standing orders with searchable and taxable transactions and account metadata. The deposits engine supports the full lifecycle of all deposit products from current accounts to term deposits with or with out overdraft facilities and a full range of interest and calculation options.
  • 47
    Patentfield

    Patentfield

    Patentfield

    Patentfield is a patent search and analysis platform that combines advanced search, data visualization, AI functions, etc. It's not only for searching, it also has AI semantic search and AI classifications for screening patents faster. AI has been learning word meanings from over 10 million data patents in order to find similar patents. By scoring in descending order of similarity from any natural documents or specific documents you want to find, you can investigate immediately from the patent literature that is close to the technology you are looking for without preparing teacher data, etc. Similar image search allows you to input image data and search for patents and design publications that have similar images, targeting the drawings disclosed in them. The system also supports the input of multiple drawings, enabling similar image searches based on a set of six views for designs, or a combination of exterior and internal structure images for patents.
  • 48
    WP Umbrella

    WP Umbrella

    WP Umbrella

    Manage multiple WordPress sites from a single dashboard and get all the information you need to keep things under control in one place. Save a ton of time and fully manage all your theme and plugin updates without leaving WP Umbrella's application. Track your website’s uptime and load time from multiple locations and find bottlenecks that affect your customers' end-user experience. Never let a customer blaming you because its website is down and you were not even aware of it. Get alerted immediately by email or slack when something goes wrong on your WordPress sites. Build trust with your clients with professional activity reports about your WordPress maintenance operations. Client reports and plugin can be white-labeled.
    Starting Price: $14.99 per month
  • 49
    Alibaba Image Search
    Alibaba Cloud Image Search is an intelligent image search service that helps users find similar or identical images. Based on machine learning and deep learning, the product enables end-users to take a screenshot or upload an image to search and find desired products and fulfill other search requests. Allows your customers to use a product image to search for products from an image library. This feature simplifies the shopping process and is suitable for shopping scenarios where content-based image retrieval (CBIR) is required. After your customers use images to search for products, the system automatically recommends the same or similar products. This feature is suitable for product recommendation scenarios to improve the shopping experience of your customers.
  • 50
    SmartSkies

    SmartSkies

    ANRA Technologies

    ANRA Technologies is a leading international provider of end-to-end drone operations and traffic management solutions for unmanned system operators and airspace managers. ANRA offers intelligent and modular traffic management software capabilities as part of the SmartSkiesTM family for UAS Traffic Management (UTM) and Urban Air Mobility (UAM) operations. For organizations that need an enterprise-class drone operations solution, we offer SmartSkiesTM Mission ManagerTM and for delivery solutions, we offer SmartSkiesTM Delivery. The platforms have been rigorously tested and vetted by the world’s foremost government aviation authorities and are operational today in multiple locations worldwide. SmartSkies provides end-to-end capability by connecting vendors, customers, and drone providers in the same ecosystem. Drone service providers are integrated with our customizable solution that supports their end-user anywhere in the world.