Alternatives to KeyBank Touch

Compare KeyBank Touch alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KeyBank Touch in 2024. Compare features, ratings, user reviews, pricing, and more from KeyBank Touch competitors and alternatives in order to make an informed decision for your business.

  • 1
    eyefactive AppSuite
    Create engaging interactive signage software solutions on any large-scale touchscreen, table, kiosk, stele or videowall. Combine and customize ready-to-use multitouch apps easily and integrate your own content and designs, with a minimum of time and cost, without any programming involved! Provide amazing interactive experiences for customers at the point of sale, engaging infotainment for museums, hotels or public spaces - as well as collaborative teamwork and exiting corporate communication. The world’s first B2B app platform for professional touchscreen systems: Online app marketplace, AppSuite CMS software, cloud system management, touchscreen object recognition technology and excessive service and helpdesk area. Compared to simple html point and click applications, all apps are based on eyefactive’s multiple awarded software technology to provide true multi-touch and multi-user experiences, with ultra-fast performance on any touchscreen system.
    Compare vs. KeyBank Touch View Software
    Visit Website
  • 2
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 3
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 4
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 5
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 6
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 7
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 8
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 9
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 10
    XCrypt Data Encryption Platform
    Customers worldwide choose Zettaset products for use in high performance, high availability and seamlessly scalable data environments. Zettaset products are designed to function with extremely low latency to support the most demanding deployment requirements, including high-speed transactions, in-memory databases, and real-time, web-based applications. The XCrypt™ Data Encryption Platform has been designed from the ground up for optimal performance and scalability in distributed systems and elastic cloud environments. XCrypt introduces extremely low latency to the compute environment, making it ideal for in-memory stored data and transactional environments where sub-second response times are essential.
  • 11
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 12
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 13
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 14
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 15
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 16
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 17
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 18
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 19
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 20
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 21
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 22
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 23
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 24
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 25
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 26
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 27
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 28
    Preferred POS

    Preferred POS

    Rodgers Software LLC

    Preferred POS, a touch screen point of sale (POS) platform, is compatible with Windows operating systems (OS). Preferred POS features include inventory management, POS, customer management, and accounting reports. Preferred POS is compatible with small to mid-sized liquor stores, general retail, and convenience stores. Preferred POS features employee management functions like multiple security levels with passwords and staff time clock. With Preferred POS, users are also able to support different kinds of touchscreen monitors, receipt and label prints, barcode scanners, and payment pinpads.
  • 29
    Varis Receptionist

    Varis Receptionist

    Varis Technology

    Automate guest and lobby management with Varis Receptionist, a live answering and virtual receptionist solution. Varis Receptionist integrates easily with a kiosk system, wall mounted PC monitor, all-in-one desktops and in touch-screen notebooks. Varis Receptionist also features motion and face detection technology to securely welcome guests.
  • 30
    TouchDesigner

    TouchDesigner

    TouchDesigner

    TouchDesigner allows both application engine and user interface to be built in one integrated environment. Create anything from simple functional prototypes right up to complete polished applications. Most applications require an interface, either technical or user-facing, to control the system. An extensive control panel feature set allows for custom interfaces and logic. Design a front-end UI to have any look or features you want. A full range of interactions are supported such as mouse-based or touch-screen control panels, control of 3D virtual environments, gestural inputs, and multi-person interactions. Experimentation and iteration are at the core of TouchDesigner’s design philosophy, making it one of the fastest and most flexible tools for rapid-prototyping. Installation and live shows are often not constructed physically until shortly before show time, but in TouchDesigner you can also build pre-visualizations of the project to experiment creatively.
  • 31
    Navigo Digital Signage

    Navigo Digital Signage

    Interactive Touchscreen Solutions

    Navigo® is a turn-key solution that includes the software, hardware, enclosure, content design, installation and maintenance. Navigo® software can also work with your existing LED and touchscreens. Navigo® touchless building directory systems & interactive digital signage solutions capture and display information to engage and inform your audience with limitless content possibilities for effective communication. Navigo® Active Signage™ Systems break the boundaries of traditional building directories and static office signage. Turn any screen into your own custom digital sign solution and keep your target audience informed by designing and scheduling a variety of information. With Navigo® the sky’s the limit for what you can display and it’s the reason why we developed TransitAccess® Show real-time feeds on schedules for flights, trains, buses or ridesharing convenient to your site.
  • 32
    MEDHOST EDIS
    MEDHOST Emergency Department Information System (EDIS) can help aleviate documentation errors, increase revenue for hospitals, improve patient throughput, and boost patient satisfaction scores. Designed by physicians and nurses, the system helps support workflow efficiency and patient safety by eliminating drop-down menus, unnecessary screens, confusing dialogue boxes, and excessive keystrokes. MEDHOST EDIS also features intuitive, graphical floor plans of your ED to enhance staff communication and workflow. It also offers unique, touch-screen design that promotes increased user interaction and enables rich data capture and process optimization.
  • 33
    BlackBerry 10

    BlackBerry 10

    BlackBerry

    BlackBerry 10 is based on QNX, a Unix-like operating system. It supports the application framework Qt (version 4.8) and in some later models features an Android runtime to run Android applications. Prior to version 10.3.1, BlackBerry 10 also supported the Adobe AIR runtime. The user interface uses a combination of gestures and touch-based interactions for navigation and control, making it possible to control a device without having to press any physical buttons, with the exception of the power button that switches the device on or off. It also supports hardware keyboards, including ones which support touch input. The touchscreen is the predominant input method of BlackBerry 10, in addition to hardware keyboard for devices that have one. Users can use gestures and keyboard shortcuts to navigate around the system. BlackBerry 10 collates emails, SMS/MMS, calls and notifications into the BlackBerry Hub.
  • 34
    SuperSalon

    SuperSalon

    ProPoint Solutions

    Trusted by thousands of salons around the world, SuperSalon by ProPoint Solutions is a cloud-based point of sale solution that helps conveniently and efficiently manage your business. Optimized for touchscreen deployment and equipped with online check-in and appointments, loyalty programs, digital display boards, self check-in kiosks, mobile apps, and other capabilities, SuperSalon enables you to grow your customer base, simplify operations, cut costs, and boost your bottom line. Key features include sales-to-payroll reporting, traffic-based staffing, inventory on-hands reporting, predictive purchasing, and more.
  • 35
    ICS BANKS

    ICS BANKS

    ICS Financial Systems

    ICS BANK is a comprehensive banking and financial software solution that provides a modular menu to choose from and create your own customized system. ICS BANKS Universal Banking enables the bank to service its customers by providing essential digital features, utilizing facilities, and the latest technologies such as; Cloud availability, - Open APIs, Agency Banking, BPM, DMS, Artificial Intelligence and Robotics, Blockchain, Cash Management System (CMS), Chatbots, Smart Contracts, Cardless Payments, Customer onboarding, and Wearable Banking. ICS BANKS comprehensive touchpoints and omnichannel capabilities enable banks to have the opportunity in leveraging data and acquiring desired customer information at any time in any place. On the other hand, ICS BANKS supports AML, FATCA, and CRS whilst its holistic APIs connect to local and regional authorities for further regulatory and compliance processing.
  • 36
    Swiftlane

    Swiftlane

    Swiftlane

    Swiftlane combines convenience and high security to ensure every community is a safe, desirable place to live. Our cloud-based end-to-end smart technology provides access to every point in a building using face recognition access, mobile access, video intercom, visitor PINs, key card access, and voice-enabled unlock. At Swiftlane, we care deeply about protecting and elevating multifamily communities through smart access technology with features that provide safety, security, and peace of mind. What residents want and demand has drastically changed. Now, residents expect amenities like keyless entry, visitor access, and secure package and delivery management. Swiftlane is focused on solving the major challenges and pain points for the multifamily industry to ensure residents are happy and safe, investors are profitable, and property managers are operationally efficient. Swiftlane smart access technology provides safer, more secure access solutions for multifamily communities.
  • 37
    Ubuntu Touch

    Ubuntu Touch

    Ubuntu Touch

    Ubuntu Touch is made and maintained by the UBports Community. A group of volunteers and passionate people across the world. With Ubuntu Touch we offer a truly unique mobile experience - an alternative to the current most popular operating systems on the market. We believe that everyone is free to use, study, share and improve all software created by the foundation without restrictions. Whenever possible, everything is distributed under free and open source licenses endorsed by the Free Software Foundation, the Open Source Initiative. Ubuntu Touch is a mobile version of the Ubuntu operating system for mobile devices. However, unlike other 'flavors' of Ubuntu, it is more accurately an extract of parts of Ubuntu. It is adapted to run naturally in a mobile, touch-screen environment but is also capable of functioning as a desktop computer while in "desktop mode". This aforementioned converging of environments from device to device is where the term "Convergence" originates.
  • 38
    ShadowSense
    ShadowSense offers more than just an innovative, high performance, cost effective, multi-touch solution. Our customers deploy touch products in diverse and challenging environments with performance requirements far beyond simple X-Y position data. An industry first, Dashboard provides users with the ability to easily configure and modify the touchscreen behavior of all ShadowSense powered frames. Dashboard allows the user to adjust the performance and touch characteristics of the touchscreen to provide spurious touch and palm rejection, debris and static object recognition, rain and fluid cancellation, and touch object characterization. Also included with Dashboard, are comprehensive monitoring capabilities that allow users to quickly assess the health of their ShadowSense frames, ensuring 24/7 operation of the most critical applications.
  • 39
    BrightOS
    BrightOS is a rich modular Core Banking System. Its highly optimal core is extended with functional units that span all bank processes, creating a fully-operational bank environment from day one. BrightOS prepares you for tomorrow's challenges with scalable, API-rich and event-driven solutions. White-label solution to meet your customers digital expectations and native integration with our/any Core banking platform. When selecting BrightOS one of the key factors to consider is the guaranteed data privacy and protection against data loss. Our solution is fully compliant with GDPR regulation including embedded functionalities for consent management. Benefit from range of digitalization integrations, saving time and enhancing your customer services. With proactive actions initiated by our Customer Support Service, important part of BrightOS is the performance management and health orchestration that elevates automation capabilities from simple admin tasks to complex end-to-end service.
  • 40
    Natech

    Natech

    Natech Banking Solutions

    Natech Banking Solutions democratizes access to banking technology, prioritizing outstanding service and customer fulfillment. Our comprehensive product suite, encompassing everything from a core banking system to digital engagement channels, enables banks to craft and deliver personalized financial products. Our platform offers seamless onboarding and unparalleled accessibility, ensuring swift time-to-market with plug-and-play, end-to-end solutions built on modern cloud-native modular technology. The ecosystem and API integration strategy are tailored to enhance functionality, delivering precisely what is needed with cutting-edge features, thereby ensuring operational costs remain lean throughout the entire lifecycle. Moreover, Natech's collaboration on the launch of a digital-only bank, Snappi, represents a leap forward in banking technology, combining industry expertise with modern innovation.
  • 41
    TENANT File

    TENANT File

    W G Software

    Tenant File is a property management software solution that provides accounting, tenant, and lease tracking as well as building maintenance capabilities. Specifically designed for condo, residential, apartment, commercial, retail, and self-storage property managers, Tenant File offer features such as general ledger, accounts payable, transactional history, automatic posting, reminder system, database maintenance, multiple bank accounts, and more.
    Starting Price: $269.95/one-time
  • 42
    AquaSoft Video Vision
    We have long outgrown the idea of photo presentations. For years our software has been able to do much more than what could be expressed by the name SlideShow. Along with the new version 13, the renaming to AquaSoft Vision took place. AquaSoft Vision is thus the direct successor of the popular AquaSoft SlideShow programs. AquaSoft SlideShow Premium has become AquaSoft Photo Vision und AquaSoft SlideShow Ultimate has become AquaSoft Video Vision. Both programs still provide the same features that you appreciate so much, but also extend the capabilities of the earlier versions. Your photos for amazement - You have not seen your pictures this beautiful. Always put the right cut in the scene and make sure you have appropriate aperture for Wow effects.
    Starting Price: $7.99 per month
  • 43
    Computer Golf

    Computer Golf

    Computer Golf

    Golf course management software exactly the way you want it. Maximize tee sheets, increase revenues and streamline operations. Webtimes is an easy-to-use online booking system for tee times at all of your favorite golf courses. You can compare the prices of your TeeTimes between golf courses near you and across the country. Provides a user-friendly easy-to-schedule touch-screen solution for your club’s tee-times reservation management. The “no transaction fee” online reservations solution while using digital signatures, will secure both the country club and the golfers from hackers. Delivers an easy-to-use touchscreen application with complete system reliability for mission-critical daily reporting and management. Integrates point-of-sale directly to your AR when selling merchandise and charging directly to the members’ accounts. Computer Golf Software has been a leader in the development of golf course management systems for over 40 years.
  • 44
    VeriBranch

    VeriBranch

    VeriPark

    VeriBranch directly connects to back-office customer systems enabling banks to streamline business processes. Providing a quick and easy look-up of customer account information empowers bank tellers, sellers and advisors to efficiently execute transactions such as loan origination, account origination, financial planning and transfers thereby becoming high value sales centers. VeriBranch Teller, Seller and Advisor modules enables quicker, more convenient task completion for both bank employees and customers which frees both parties to initiate higher-level interactions. VeriBranch provides an infrastructure to the Omni-channel structure for the digital and smart branch concept. VeriBranch Teller, Seller and Advisor modules enables quicker, more convenient task completion for both bank employees and customers which frees both parties to initiate higher-level interactions. VeriBranch advanced and digital technologies also enable a true Omni-Channel experience.
  • 45
    ZAP IN

    ZAP IN

    ZAP IN

    ZAP IN sets the modern industry standard for an efficient automated visitor management system complimenting and enhancing your workforce. ZAP IN collects and hosts sign-ins allowing visitors to conveniently input their information from a modern touch-screen tablet ensuring flexible, secure and organized sign-ins from real life time instantly notifying your company upon a visitor's arrival. ZAP IN is a Visitor Management System that is perfectly equipped to provide any shared space or workplace a reliable Workplace Screening Solution. We have been helping thousands of users in their efforts to track their visitors/employees, reduce their liability and create accurate and accessible traffic data reports for over a decade. ZAP IN maintains an encrypted cloud-based visitor log.
    Starting Price: $49.00/month
  • 46
    TPV BDP-NET

    TPV BDP-NET

    BDP Software-Ibernyx

    TPV BDP-NET is a tactile management and POS program for bars, restaurants and cafeterias that can easily and quickly deal with the problems that arise in the daily activities of any establishment in the sector. By the use and application of easy-to-handle touchscreens, it will be simple, quick and convenient to handle table and bar orders and sales. With TPV BDP-NET, you can control what is happening at any moment in the establishment in real-time, automating orders, bills, employees, purchases, stocks, cash counts and reports. TPV BDP-NET offers everything you need in a single tool, even taking advantage of the use of automatic tills. Taking orders from tables an sending them automatically to the bar or the kitchen using service call buttons is easy with TPV BDP-NET, so you will have more time to attend the final customers, to look after them much better, directly increasing the profitability of the business and considerably improving customer attention.
  • 47
    The Jewelry Shopkeeper

    The Jewelry Shopkeeper

    Compulink Software

    Compulink does not sell any computer hardware, however, we can offer the below guidelines as to what you will need. Because each store is different, you might consult with a local computer dealer to determine your particular needs. You can get computers mail order or from a local shop that builds them. The Jewelry Shopkeeper software will work on almost any PC running Windows 11 or Windows 10, but if you do not have a computer, or you plan on buying a new one, we would recommend a more up-to-date computer such as one with the following specifications: The "processor" should be a Core i5 to i7 or equivalent; The storage drive should be 500GB or larger, (preferably an electronic SSD, not a spinning disk) and the RAM should be 8GB or more. You can use monitors with or without touch-screen capability. If you get a laptop, try to get one whose keyboard has a numeric keypad and whose screen is 17” with a 1600 x 900 resolution or higher.
  • 48
    B2K Uniform System

    B2K Uniform System

    Metalprogetti

    B2K Uniform System is a modular, uniform tracking system that can be customized to fit the type of activity and number of users. To pick up a garment, just identify yourself and select the item on the touchscreen, the computer management system identifies the corresponding uniform and, thanks to the Metalprogetti-patented moving garment extraction system, the conveyor brings it to one of the clean uniform pick-up points. Recognize the unique code on each garment (no user ID required). Sort the items dropped off into as many as three categories with a sorting system fit with pneumatic evacuation. Update the user’s credits in real-time. The credit system helps monitor the flow of uniforms since users must return the soiled garments before requesting clean ones. Our mission in creating systems for automated order picking is to simplify the management and automated dry warehousing of items in a wide range of fields.
  • 49
    ClearView Blood Bank
    ClearView Blood Bank is a premium solution that enables users to rapidly search, retrieve, and view blood data that has been archived in a discrete tabular format. The ClearView Blood Bank module helps maintain and monitor the blood deposits for clients by facility system(s) by making available details including blood types, product codes, patient details, and much more. Works seamlessly with the ClearView base and integrates with audit features and user authentication. Retains blood bank data in accordance with legal requirements. Allows clients to customize data columns to show/hide information that is important to them. Enables rapid data retrieval utilizing advanced search capabilities. Sort data by columns, paginate through the data, and filter on a particular record. Search for patient details by name, DOB, MRN, blood type, etc. Locate and view product information by facility, unit number, product code, expiration, etc.
  • 50
    Educadium

    Educadium

    Educadium

    In minutes, you can set up your online school and create an online course that looks professional and that meets the most stringent learning requirements. It’s safer and more convenient than free alternatives like Moodle and far cheaper than commercial LMS software like Blackboard. Quiz builder with integrated multimedia, math, science, music and coding notation modules. And that's just scratching the surface of the system's capabilities. There are literally dozens of additional integrated learning object types and course activities that you can easily deploy within your courses, providing learning materials and evaluations. Additional integrations with services like Microsoft Office and Google Appls allow greater connection to existing staff or school operations and user convenience. Single-sign-on (SSO) solutions are available, to connect your LMS site with other services or operations on your existing commercial or educational website.
    Starting Price: $99 per month