Alternatives to KeyNest

Compare KeyNest alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KeyNest in 2024. Compare features, ratings, user reviews, pricing, and more from KeyNest competitors and alternatives in order to make an informed decision for your business.

  • 1
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 2
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 3
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 4
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 5
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 6
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 7
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 8
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 9
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 10
    XCrypt Data Encryption Platform
    Customers worldwide choose Zettaset products for use in high performance, high availability and seamlessly scalable data environments. Zettaset products are designed to function with extremely low latency to support the most demanding deployment requirements, including high-speed transactions, in-memory databases, and real-time, web-based applications. The XCrypt™ Data Encryption Platform has been designed from the ground up for optimal performance and scalability in distributed systems and elastic cloud environments. XCrypt introduces extremely low latency to the compute environment, making it ideal for in-memory stored data and transactional environments where sub-second response times are essential.
  • 11
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 12
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 13
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 14
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 15
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 16
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 17
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 18
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 19
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 20
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 21
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 22
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 23
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 24
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 25
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 26
    Gemini NestEXPERT

    Gemini NestEXPERT

    Gemini CAD Systems

    . Capacity to import parts for nesting from a large variety of proprietary and standard CAD formats. Can be used as an add-on together with other CADs which do not provide similar automatic nesting performance.Nesting rules & restrictions, parts quantities, fabric properties can be retrieved automatically from upstream product development stages. Gemini NestEXPERT can retrieve fabric properties, cutter and plotter profiles, parts nesting and cutting manufacturing profiles from the online platform. NestEXPERT can boost nesting efficiency by using the cloud nesting farm. NestEXPERT can import shapes for nesting from most CAD applications, such as AutoCAD, corel, illustrator, gerber, lectra, assist and other
  • 27
    SigmaNEST

    SigmaNEST

    SigmaTEK Systems

    SigmaNEST is simply the best nesting software in the industry. Developed and supported by an expert team of mathematicians and engineers, SigmaNEST offers unparalleled material utilization and nesting efficiency. With unmatched versatility and maximum scalability, you can be confident in SigmaNEST’s abilities to meet your requirements, from quote to delivery and beyond. SigmaNEST drives nearly every type of profile cutting, routing, or punching machine to produce premium quality parts while saving valuable material and manpower. SigmaNEST offers CAD integration, an intuitive interface, and local customer support, which sets the software apart and are all reasons why SigmaNEST is the industry leader with over 21,000 systems installed worldwide. Nesting strategies for complex machines account for hold downs, clamps, repositioning, bevel cutting, and secondary processes. Effortlessly nest parts for specialized operations and materials like right angle shear, drop door part ejection.
  • 28
    CrowsNest

    CrowsNest

    Flying Cloud

    CrowsNest Defends Data with Real-time Data Insight. CrowsNest is the first real-time data security analytics platform for data exfiltration protection. It delivers immediate visibility into your organization’s data movement, usage, and changes to protect it from theft and misuse. CrowsNest analyzes incoming data, data in motion across the network, and data leaving the environment to continuously monitor data usage. Anomalies trigger alerts to the CrowsNest console or to your SIEM solution. Security defenders receive a data “chain of custody” that identifies exactly who, where, when, and how content was accessed, modified, or distributed. CrowsNest data defense complements existing security measures, enabling you to protect data without adding security experts. CrowsNest uses data payload inspection and active machine learning to identify, analyze, and track files as they are used across the network.
  • 29
    Alibaba Cloud Compute Nest
    Compute Nest is a Platform as a Service (PaaS) solution Alibaba Cloud provides for service providers and their customers to manage services. Service providers can publish private services on Compute Nest, and their customers can deploy these services easily. Service providers can also publish fully-managed services where they can implement hosted O&M for the resources of their customers. Compute Nest provides service capabilities to cater to each stage of the lifecycle management of services. Service providers can manage different stages using different functional modules based on their requirements. This helps service providers improve operational efficiency, reduce operating costs, and provide simple and convenient services for customers. Deploys cloud resources and software automatically to lower the deployment threshold.
  • 30
    NestDesk

    NestDesk

    NestScale

    NestDesk is an omnichannel customer service software built for Shopify stores. It powers your business to deliver excellent support and unlock more sales from every customer conversation. Using NestDesk, you can easily manage messages across all channels, view customer profiles and order history in one place. No need to switch between multiple tabs, you can create, edit Shopify orders and send the checkout link to customers within NestDesk. Support more customers in less time and increase customer satisfaction with useful features like macro (template response), tags, auto-assign, private notes, etc. Provide key metrics and actionable insights for making your business decision.
  • 31
    Less

    Less

    Less

    Less (which stands for Leaner Style Sheets) is a backwards-compatible language extension for CSS. This is the official documentation for Less, the language and Less.js, the JavaScript tool that converts your Less styles to CSS styles. Because Less looks just like CSS, learning it is a breeze. Less only makes a few convenient additions to the CSS language, which is one of the reasons it can be learned so quickly. Mixins are a way of including ("mixing in") a bunch of properties from one rule-set into another rule-set. Less gives you the ability to use nesting instead of, or in combination with cascading.
    Starting Price: Free
  • 32
    SSIS PowerPack
    SSIS PowerPack is a collection of 70+ high-performance, drag-and-drop connectors/tasks for SSIS (i.e. Microsoft SQL Server Integration Services). SSIS PowerPack is designed to boost your productivity using easy-to-use, coding-free components to connect many cloud as well as on-premises data sources such as REST API Services, Azure Cloud, Amazon AWS Cloud, MongoDB, JSON, XML, CSV, Excel, Salesforce, Redshift, DynamoDB, Google API (i.e. Analytics, AdWords), SOAP/Web API, Facebook, Twitter, Zendesk, eBay and many more. SSIS PowerPack also includes high-quality FREE commercial components and tasks with full support/upgrade. Inbuilt Layout Editor for creating complex XML with nested structure (Document Array, Nested attributes, CData Section). Automatically Split exported XML data into multiple files by Size or Number of records. Read XML Document and extract single or multiple properties by name or using XPath expression.
  • 33
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 34
    Azure Traffic Manager
    Azure Traffic Manager operates at the DNS layer to quickly and efficiently direct incoming DNS requests based on the routing method of your choice. An example would be sending requests to the closest endpoints, improving the responsiveness of your applications. Azure Traffic Manager offers six types of DNS-based traffic routing: Priority, performance, geographic, weighted round-robin, subnet, and multi-value. Choose the one that’s right for you or combine, using nested profiles. Traffic Manager can improve the availability of important applications by monitoring your Azure services, or external websites and services, automatically directing users to the next best location when there’s a failure. Traffic Manager makes your applications more responsive and improves content delivery times by directing your customers to Azure end points or an external location with the lowest network latency.
  • 35
    NEST Management

    NEST Management

    NEST Management

    NEST Management is a total martial art business management platform that helps martial arts businesses track attendance, monitor business activity, and more. Flexible and mobile, NEST Management allows users to access the platform via phone or tablet for taking and tracking attendance. NEST Management features a real-time booking widget that allows administrators to book trial lessons on their websites. Simple and direct, NEST Management features the Direct Debit fee collection system that takes away the hassle and administration of getting fees by cash. NEST is perfectly positioned to help you stabilise and grow your martial arts school. We offer the perfect combination of consultancy, software and marketing support that comes from being the industry leader for over 20 years.
    Starting Price: $35.00/month
  • 36
    SlashDB

    SlashDB

    SlashDB

    SlashDB automatically generates a REST API from relational databases for reading and writing in convenient formats like XML, JSON and CSV. Additionally, using HTML it allows for simply browsing through data so users can discover available databases, tables, queries and API endpoints. SlashDB is capable of providing a central access point to multiple databases, effectively forming an all-encompassing resource-oriented architecture (ROA), serving as an API gateway to the data for users that need access. SlashDB provides a web service shell for each of your database(s) by translating relational database structures into a logical library of uniform resource locators (URL). Conforming to REST methodology, every piece of data has its own unique identifying URL regardless of whether it is a simple scalar value or a nested structure of related records.
    Starting Price: $200 per database per month
  • 37
    Fusion Builder

    Fusion Builder

    ThemeFusion

    Drag And Drop Page Builder. Easily and accurately drag and drop page content to your desired location with incredible speed and performance, making the page building process easier and faster. Fusion Builder Elements are so versatile and are loaded with options. They allow you to quickly build professional websites that will set you apart from the competition. Not only can you set global theme options as defaults for each element, Fusion Builder allows you to override any of these settings inside the element for maximum flexibility. Nested columns are here along with an intuitive interface to easily manage them. The design possibilities that nested columns open up are extremely powerful and can easily transform your website. You can now harness the power of your right click, allowing you full control over editing your pages containers, columns and elements, without tracking the mouse or searching for your desired function.
  • 38
    PolyNest

    PolyNest

    Polygon Software

    In 1986, Polygon introduced an innovative concept open systems. PolyNest was immediately accepted. Today, PolyNest is the established and perennial leader in open systems for the sewn industry, offering pattern design, marker making, and automatic marker making. In addition, Polynest is recognized as the right system for the job around the world by small, medium, and large apparel manufacturers and established pattern service bureaus. Often imitated, never equaled, PolyNest has been improved continuously through the years to maintain product segment leadership. To make it better. Our satisfied users provide us with vital input to continually upgrade the performance of PolyNest. There’s a lot to like about PolyNest, and we look forward to working with you to make our family of products even better.
  • 39
    Lantek Integra
    Lantek Integra consists of a set of functional modules that focus on complete and integrated current and future management needs of companies in each of their areas, from the initial process of sales until the end service support. Lantek Integra is a management software platform aimed at industrial companies belonging to the sheet metal sector. Manage all key for the metal fabrication process: sales, manufacturing, purchasing and inventory among others. This system provides immediate access to all customer information, ensuring optimal communication and service. It also provides the necessary tools to achieve the main objective for the professionals involved in the commercial process – to sell! The system allows a quote to be drawn, taking into account the cutting times for each part included in the nest. It is a very accurate cost calculation system as it enables real multi-part nesting and takes into account the values specified in machine configuration.
  • 40
    Truway

    Truway

    Truway

    With Truway you can enjoy a wide range of cutting-edge services designed to meet your needs and/or those of your company. Real time monitoring. Truway reports every 30 minutes based on movement. Route control with street-level and map indicators for easy interpretation. Choose from hundreds of sensors to solve any use case, including motion and leak detection. Optimize operational efficiency as your company grows by increasing its monitoring protection. Raise or lower the temperature from wherever you are. With the Nest application, you can change the temperature from the beach, the office or your bed. The Nest Thermostat E turns itself down when you’re away. It uses your phone’s location to know you’re away. Nest Hello lets you know who’s there, so you never miss a thing. It replaces your existing wired doorbell and delivers HD video and bright, crisp images, even at night.
    Starting Price: $9.99 per month
  • 41
    TurnoverBnB

    TurnoverBnB

    TurnoverBnB

    The smart way to schedule, pay, and find Airbnb vacation rental cleaners and Airbnb cleaning services. TurnoverBnB gives you the tools you need to succeed with autopay, customized schedules, guest checkout and review management. Pull your guest calendar from Airbnb, VRBO, Homeaway and all major booking platforms and channel managers into one central location. A single app to schedule cleanings with automatic assignments, delegation and acceptance. No more waiting to see if your property will be ready for your next guest. On average, it takes five minutes per transaction to make a payment to a cleaning company. Hosts who use TurnoverBnB to pay automatically save over forty hours a year. A single app to schedule cleanings with automatic assignments, delegation and acceptance. No more waiting to see if your property will be ready for your next guest. On average, it takes five minutes per transaction to make a payment to a cleaning company.
  • 42
    Nest Time Attendance System

    Nest Time Attendance System

    Nest Computer Systems

    Management and security are among the biggest concerns of any business establishment. Nest is aimed at providing credible software services and solutions in order to felicitate the smooth sailing of company operations. We provide customized services and products in order to provide outstanding services that comply with the client's requirements. We have been providing credible software solutions to help with the efficient functioning of several departments of an industry such as management, networking, tracking, HR solutions, surveillance, etc since our inception in 2006. We have grown significantly since then in terms of both manpower, knowledge base, and experience which has enabled us to adapt to the various industry requirements and deliver accordingly. Setting up a reliable HR solutions system is imperative for the smooth functioning of an organization.
  • 43
    ProNest 2021

    ProNest 2021

    Hypertherm

    ProNest® CAD/CAM part nesting software for advanced mechanized cutting is designed to supercharge your cutting operation, helping you achieve greater automation, efficiency, and profitability. Brought to you by the cutting experts at Hypertherm, ProNest can optimize performance for plasma, laser, waterjet, and oxyfuel cutting machines. Powerful, high-yield nesting reduces your material costs and increases profitability. Incredibly easy to learn and use, with intuitive screens, and a wide variety of helpful features. ProNest is the only software that provides full support for Hypertherm’s SureCut™ technologies including True Hole® and Rapid Part™, which are delivered automatically without operator intervention, and True Bevel™ which greatly reduces bevel set up time. Modules like Common Line Cutting or Chain and Bridge Cutting can increase efficiency, and reduce cutting time and consumable wear. ProNest includes powerful features to help manage your entire cutting operation.
  • 44
    Rapidus

    Rapidus

    Rapidus

    Start with select pickup and dropoff locations. You can have multiple stops in your delivery request, and a stop can have both pickup and/or dropoff. Next step is to provide contact information (name, phone, email) at each of the stops, so that the driver knows whom and how to contact upon arrival. If the stop requires pickup, dropoff or both, you may specify this in the Instructions for the driver. You may also select pickup time either for right now or any date/time in future. Professional delivery partners. You know the status of your delivery at any time. You get up-to-minute ETA. We collect photos, names and signatures of people touching the package. You have direct access to your courier. Full transparency and complete security.
  • 45
    Kurator

    Kurator

    Optimal Access

    Kurator makes it really easy to curate, comment, and organize web pages, web documents, social media posts with one click. Kurator scrapes information off the page and lets you Edit and manage your comments while on the page, looking at the information you are saving! Kurator folders are inside your browser and synced across your devices. Create nested folders to manage your projects, quickly sort and filter the links using the headline, author, publisher, content tags, and date columns. Preview your comments and easily drag and drop links between folders. Kurator folders are inside your browser and synced across your devices. Create nested folders to manage your projects, quickly sort and filter the links using the headline, author, publisher, content tags, and date columns. Preview your comments and easily drag and drop links between folders. Kurator offers a Freemium model. The free version of Kurator offers three folders for storing your research.
    Starting Price: $3.99 per month
  • 46
    TrapStation

    TrapStation

    Augur Systems, Inc

    TrapStation logs and forwards SNMP traps, usually to distributed management systems. You can selectively route traps, translate any SNMP version, filter, correlate events, apply thresholds, and modify varbinds. Then view graphs, search logs, and replay traps. TrapStation is a modern design, backed by decades of event-handling experience. TrapStation was designed to replace legacy apps: TrapEXPLODER, TrapBlaster, and LooperNG. Enjoy support for SNMP v3 encryption/security, trap modification, log search/replay, a browser interface, and more. And we hope you see TrapStation as a compelling alternative to unsupported scripts, or in-house development TrapStation maps incoming traps to your rule tree nodes. Each node has a filter to test traps, and options to log and forward matching traps. Nested tiers form progressively specific tests, which reduces the complexity of individual rule nodes. Nesting ensures that a partially-matched trap falls into a fail-safe rule node.
  • 47
    iRewards

    iRewards

    Global Hospitality Solutions

    Everything you need to generate demand, build long-life customer relationships, and drive direct booking. Powerful mining integrated to multiple touchpoint. A holistic guest profile record that captures guest data from PMS, Social media and Loyalty Marketing platform to understand what your guest needs and wants and apply those guest insights to deliver personalized service. ​Allowing you to engage with your guests throughout their journey from their search of where to stay, before they arrive, during stay and post-departure. At GHS, we empower hotels with capabilities to create new business opportunities in this digital, connected and social era. We focus on providing innovative digital solutions for the hospitality industry to drive more direct business and profit optimization through strategic implementation of CRM and Loyalty Marketing. The success of iRewards continues and from there we developed products to support the fast-growing needs of the industry.
    Starting Price: $250.00/month
  • 48
    Epicuri

    Epicuri

    ThinkTouchSee

    Enterprise features, 24/7 support and fully mobile POS for restaurants, bars, clubs and cafes. - Android tablet mobile POS - Rerservations and Takeaways - Table Planning - Table and Counter Service POS - Guest app for takeaways/at-table self-service - Online ordering - Online reservations - Wireless printing to prep areas and billing - Paperless ticketing for the kitchen - Stock control - Staff management - Full menu management - Integrations with Hotel PMS - Integrations with Accounting Software - Integrations with PDQ card payment machines The Epicuri platform uniquely blends Restaurant Point of Sale (POS) and Guest Management by putting a firm focus on front-of-house where the restaurant and guest meet. Epicuri helps attract, book, host and re-engage your guests in way never before possible.
    Starting Price: £10/month
  • 49
    CypNest

    CypNest

    Friendess

    CypNest is a nesting software designed for CypCut/HypCut sheet laser cutting system. It integrates advanced functions of drawing modification, quick nesting, toolpath generation, analysis report and more to meet your production needs.
  • 50
    Gate Sentry

    Gate Sentry

    Gate Sentry

    Residents control, and can remotely modify, their guest list from their phone. Approved guest lists are available to the security team on a mobile tablet in real-time. Without leaving a visitor, Security can verify guest identity, capture visitor photo identification, grant access and send a mobile notification to the resident in less than 20 seconds upon guest arrival. Residents create a list of permanent visitors allowed access without a call from Security. Residents receive visitor notifications anywhere using their mobile app, or on the web. Add temporary visitors for the date specified; removed from list after the duration expires; Security will call for re-authorization. Track visitor history by date and time, which allows remote visibility into contractor and vendor arrivals. Security Staff’s mobile tablet is continuously updated by residents, or by the Security team with approval from residents, so guest lists are always current and accurate.