Alternatives to KeyWin

Compare KeyWin alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to KeyWin in 2024. Compare features, ratings, user reviews, pricing, and more from KeyWin competitors and alternatives in order to make an informed decision for your business.

  • 1
    CAPIX

    CAPIX

    CAPIX

    CAPIX is a cloud-based treasury and investment solution that provided users with a secure and central platform that allows them to manage corporate treasury and investment operations. CAPIX features an incorporated advanced cash flow management and forecasting technology. With Microsoft Azure cloud infrastracture, CAPIX enables users to access applications and information on the move via any desktop PC, tablet, or smartphone device with internet connection. CAPIX also supports trading in different financial securities. CTM™ is IAS 39 compliant and has advanced cash-management capabilities. CTM™ automates deal capture and improves the accounting and administration of treasury operations. CTM™ supports trading in a broad range or financial securities and derivatives, including Money Market, Forex, Fixed Inte​rest, Swaps and Options.
    Starting Price: $5000 one-time payment
  • 2
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 3
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 4
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 5
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 6
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 7
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 8
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 9
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 10
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 11
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 12
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 13
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 14
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 15
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 16
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 17
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 18
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 19
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 20
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 21
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 22
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 23
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 24
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 25
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 26
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 27
    CubeBot Pro

    CubeBot Pro

    Finva Tech Pvt Ltd

    CubeBot Pro enables organizations to develop personalized AI chatbots by using their own business data. CubeBot Pro leverages advanced AI models for a better user experience and accurate responses without any hallucinations. It is more than just a chatbot; it's a professional service offering comprehensive support for customizations and integrations. Key features • Custom chatbots using the latest technologies and your business content. • Swift and precise response based on your data, without hallucinations. • Easily upload your documents and train the chatbot. • We support the upload of more than 100 types of document files. • +90 languages are supported. • We offer advanced AI models to provide accurate responses. • Use the chatbot in your web site or your application. • We provide API access. • Dashboard with many features to manage the chatbot. • All data is secured in the Microsoft Azure cloud.
    Starting Price: €100/month
  • 28
    Nuvolex

    Nuvolex

    Nuvolex

    Nuvolex Enables IT Organizations to simplify daily administration across all M365 and Azure workloads, leveraging extensive workflow automation. IT Organizations can easily manage all of their Users, Tenants, Licenses and Microsoft Cloud Services through the ManageX™Single Pane Of Glass administration portal. Ability to push multiple M365 configuration changes and Polices to any number of tenants in just a few mouse clicks. Save M365 service configurations and Policies as a template to ensure consistent and compliant configuration policies for all the end tenants managed by your team. Gain valuable insight into all of your Tenant’s data to drive increased security and lower TCO of your Cloud Services. View a single consolidated report to gain insight into your tenants usage, metrics and licensing.
  • 29
    Open Systems MDR+

    Open Systems MDR+

    Open Systems

    We improved our MDR so you aren’t flooded with alerts, and your business can keep moving. We’ve built it for modern business operations via a cloud-based SIEM, Microsoft Sentinel. Our SOC analysts are equipped with advanced AI detection and insights to identify threats earlier, determine which ones are real, and prioritize those with the highest potential for damage. We care deeply about our customers’ experience, so we have devised a way to minimize disruption by containing threats quickly and precisely. We call it MDR+. Our MDR+ solution combines human expertise, advanced threat detection processes, and world-class technology enabling you to react earlier in the kill chain. Azure Sentinel, with its vast ecosystems, already provides broad data ingestion and detection capabilities. Our use cases are enriched with powerful security playbooks that either run automatically or help the security analyst in taking the next steps.
  • 30
    Azure Database for MySQL
    Focus on application development with Azure Database for MySQL, which is cost-effective and easy to set up, operate, and scale. Enjoy advanced security, high availability, and a service-level agreement (SLA) of up to 99.99 percent. Fully managed MySQL, compatible with the latest community editions, provides maximum flexibility for database operations. Intelligent performance recommendations provide custom analysis and suggestions for MySQL database optimization. Simplified development experience and tight interoperability with Azure App Service and Azure Kubernetes Service (AKS). Enterprise-grade security and compliance, and enhanced security capabilities of Microsoft Defender for Identity. Easily build or migrate your workloads to Azure Database for MySQL. Set up, manage, and automate the maintenance of your MySQL database server, including routine updates, backups, and security. Build with the latest MySQL tools, drivers, and programming languages.
    Starting Price: $0.017 per hour
  • 31
    Hyper Historian
    ICONICS’ Hyper Historian™ is an advanced 64-bit high-speed, reliable, and robust historian. Designed for the most mission-critical applications, Hyper Historian's advanced high compression algorithm delivers unparalleled performance with very efficient use of resources. Hyper Historian integrates with our ISA-95-compliant asset database and the latest big data technologies, including Azure SQL, Microsoft Data Lakes, Kafka, and Hadoop. This makes Hyper Historian the most efficient and secure real-time plant historian for any Microsoft operating system. Hyper Historian includes a module for automatic or manual insertion of data, empowering users to import historical or log data from databases, other historians, or intermittently connected field devices and equipment. This also provides for greatly increased reliability in capturing all data, even when network disruptions occur. Leverage rapid collection for enterprise-wide storage.
  • 32
    Digital Education (D-EDU)

    Digital Education (D-EDU)

    D-Sys Data Solutions

    We at D-Sys data solutions provide the services of website design and development, mobile application development, software development, E-commerce website. Every business starts with an aim of supporting and expanding others business. Our team frame the best solutions, best options, best services” to offer an amazing experience of working with us!! Our development team uses the latest and most reliable, stable and advanced technologies for building custom web applications. We are coders of secure, multiple options, and well-constructed software's at affordable prices. The focus of our company is to create websites and software as well as to deliver marketing solutions to our clients. If you are looking for a prominent Cloud computing service provider, D-SYS is the place for you. Being experienced in IT infrastructure management & transformational services, we offer various cloud computing services for Amazon Web Services (AWS), Google Cloud Platform & Microsoft Azure.
  • 33
    NanoNotion

    NanoNotion

    IntraLearn Software

    First of its kind, born on Azure SaaS application. Azure AD, Azure SQL, Microsoft Graph, API’s, App Services. Maximizes Azure’s infrastructure and scalability. Azure Tenant Management allows for configurable preferences. Azure portal admins can manage organization-wide permissions. Azure AD and Office 365 users and groups, role access. Azure cloud reduces barriers to adoption. Enhance the value of your Microsoft Office and Office 365 application and services investment with the addition of NanoNotion. Create Notions from a variety of Office 365 document types, including Word, PowerPoint, and Excel. Easily insert links that support a Notion from materials located on OneDrive for Business and SharePoint. Use Microsoft Teams to socialize Notions, which helps to surface valuable knowledge. Once knowledge has value, use Teams to help transform knowledge into products and services.
    Starting Price: $250 per month
  • 34
    MyCloudIT

    MyCloudIT

    Conexlink

    MyCloudIT is a turnkey automation and management solution that delivers desktops and applications in Microsoft Azure in 90 mins. Move to the cloud quickly and simply with remote desktop services (RDS) technology on Microsoft Azure Infrastructure-as-a-Service. Once in the cloud, optimize for cost and performance with intelligent automation and monitoring tools that allow for total cloud management from a single pane of glass.
    Starting Price: $8.00/month/user
  • 35
    F5 NGINXaaS for Azure
    NGINX as a Service (NGINXaaS) for Azure is a fully managed offering that integrates the Microsoft Azure ecosystem with advanced NGINX traffic services. Lift and shift, migrate, or extend existing NGINX workloads to the cloud with minimal effort, helping your organization save money, increase flexibility, and achieve consistency in performance and security across its estate of on-prem and Azure cloud apps. Enables application developers to deliver consistent apps in the cloud, deployed straight from the Azure Marketplace with just a few clicks on the console. Deploy and manage NGINXaaS via the Azure Portal with built-in integrations, including Azure Monitor and Azure Key Vault for SSL/TLS certificate management. Seamless lift-and-shift experience of your existing NGINX configuration, so you can migrate or extend your workloads to the cloud faster and with minimal effort.
    Starting Price: $0.015 per ncu per hour
  • 36
    Microsoft Graph Data Connect
    Microsoft Graph is your organization's gateway to Microsoft 365 data for productivity, identity, and security. Microsoft Graph Data Connect enables developers to copy select Microsoft 365 datasets into Azure data stores in a secure and scalable way. It's ideal for training machine learning and AI models that uncover rich organizational insights and deliver new value to analytics solutions. Copy data at scale from a Microsoft 365 tenant and move it directly into Azure Data Factory without writing code. Get the data you need, delivered to your application on a repeatable schedule, in just a few simple steps. Control how your organization's data is accessed with the Microsoft Graph Data Connect granular consent model. It requires that developers specify exactly what types of data or filter content their application will access. Likewise, administrators must give explicit approval to access Microsoft 365 data before access is granted.
    Starting Price: $0.75 per 1K objects extracted
  • 37
    Windows Server
    Windows Server 2022 introduces advanced multi-layer security, hybrid capabilities with Azure, and a flexible application platform. Elevate the security posture of your organization starting with the operating system. Extend your data center to Azure ​for greater IT efficiency. Empower developers and IT pros with an application platform to build and deploy diverse applications. See how your cost savings will add up on Azure with offers such as Azure hybrid benefit and extended security updates. Modernize your workloads on Azure, the trusted cloud for Windows Server. Connect on-premises Windows Servers to Azure with Azure Arc. Update to the latest operating system for enhanced security, performance and value. Now you can leverage all of the benefits of the cloud with Azure. It’s free to start, so manage your servers, clusters, hyper-converged infrastructure, and Windows 10 PCs with Windows Server.
    Starting Price: $501 one-time payment
  • 38
    Acterys

    Acterys

    FP&A Software

    Acterys is an integrated platform for Corporate Performance Management (CPM) and Financial Planning & Analytics (FP&A) integrated with Microsoft Azure, Power BI and Excel. Automate the integration of all your relevant data sources with connectors to a variety of ERP/ accounting / Saas solutions and run all CPM processes on a single platform based on market leading SQL Server technologies (Azure & on-premise) Profit form ready made, fully configurable application templates for all aspects of planning, forecasting and consolidation. Business users can implement FP&A and CPM processes exactly to their needs, natively integrated with your day to day productivity solutions.
    Starting Price: $55.00/month/user
  • 39
    Voleer

    Voleer

    Voleer

    Put automation to work for you with out-of-the-box tools - or support to build your own. Voleer’s data centers and powerful automation tools work with your technology to enhance visibility and provide more effective management of resources, security, data governance and more. Start using out-of-the-box automations within minutes to streamline your IT tasks and gain valuable insight into the systems you use today including Microsoft Teams, Azure, Microsoft 365, Zendesk, and more! Browse the Voleer Tools Showcase for featured automations in categories like security, cost optimization, and productivity. We’re adding new tools all the time! You won’t need any coding to launch Voleer tools, so onboarding is quick and easy. Just create an account and you’re ready to start using out-of-the-box tools to automate important IT tasks.
    Starting Price: $250 per month
  • 40
    Serverion

    Serverion

    Serverion

    Secure, reliable servers and datacenter solutions. We understand that your business' goals and requirements for data center storage are constantly changing as technology and customer demands evolve. Prevent downtime and stop attacks as large as 4 Tbps. Rest assured that your service will be protected when you include the Ultimate DDoS Protection with your purchase. Our 24/7 staff monitors your server insuring the 99.9% uptime capability. You have full root access to your own machine for any desired purpose, managed or unmanaged running Windows, BSD or Linux. Our complete network is supplied with hard -and software firewalls. All data is fully secured with the latest updates and patches. We have backups and snapshots, multiple times a day. Exclusive servers dedicated as Blockchain masternode for all coins and tokens. Colocation is the term for placing your own server(s) in one of the Serverion rack cabinets.
  • 41
    Corner Bowl Event Log Manager

    Corner Bowl Event Log Manager

    Corner Bowl Software Corporation

    An enterprise class Centralized Windows Event Log Management Software Tool. A Centralized Log Consolidator. A Real-Time Windows Event Log, Syslog and Application Log Monitor Software Tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.
  • 42
    Azure Stack

    Azure Stack

    Microsoft

    Azure Stack HCI is a new hyperconverged infrastructure (HCI) operating system delivered as an Azure service that provides the latest security, performance, and feature updates. Deploy and run Windows and Linux virtual machines (VMs) in your datacenter or at the edge using your existing tools, processes, and skill sets. Extend your datacenter to the cloud with Azure Backup, Azure Monitor, and Azure Security Center. Learn about the business value and performance benefits of Azure Stack HCI with guidance from third-party analyst firm Enterprise Strategy Group (ESG). Extend your datacenter to the cloud and manage Azure Stack HCI hosts, virtual machines (VMs), and Azure resources side by side in the Azure portal. Make your infrastructure hybrid by seamlessly connecting it to Azure services such as Azure Backup, Azure Security Center, and Azure Site Recovery.
  • 43
    Traka Web
    Traka Web is an advanced software solution, operating as a scalable, web-based administration suite that can run on any authorized device on your network. Traka Web is our intuitive, browser-based administration software, providing all the tools an organization needs to centrally manage all Traka key cabinets and lockers. With the ability to regionalize administrative control, different areas of an organization can customize its security needs to make keys and assets more efficient and effective for the business. And with the power to integrate into existing third-party systems, Traka Web can greatly reduce administration overhead, and affect the processes critical to your daily operation.
  • 44
    Nerdio
    Empowering Managed Service Providers & Enterprise IT Professionals to quickly and easily deploy Azure Virtual Desktop and Windows 365, manage all environments from one simple platform, and optimize costs by saving up to 75% on Azure compute and storage. Nerdio Manager for Enterprise extends the native Azure Virtual Desktop and Windows 365 admin capabilities with automatic and fast virtual desktop deployment, simple management in just a few clicks, and cost-optimization features for savings of up to 75% – paired with the unmatched security of Microsoft Azure and expert-level Nerdio support. Nerdio Manager for MSP is a multi-tenant Azure Virtual Desktop and Windows 365 deployment, management, and optimization platform for Managed Service Providers that allows for automatic provisioning in under an hour (or connect to an existing deployment in minutes), management of all customers in a simple admin portal, and cost-optimization with Nerdio’s Advanced Auto-scaling.
    Starting Price: $100 per month
  • 45
    Microsoft Graph
    Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security. Use the wealth of data in Microsoft Graph to build apps for organizations and consumers that interact with millions of users. What's in Microsoft Graph? Microsoft Graph exposes REST APIs and client libraries to access data on the following Microsoft cloud services: - Microsoft 365 core services: Bookings, Calendar, Delve, Excel, Microsoft 365 compliance eDiscovery, Microsoft Search, OneDrive, OneNote, Outlook/Exchange, People (contacts), Planner, SharePoint, Teams, To Do, Viva Insights - Enterprise Mobility + Security services: Advanced Threat Analytics, Advanced Threat Protection, Azure Active Directory, Identity Manager, and Intune - Windows services: activities, devices, notifications, Universal Print - Dynamics 365 Business Central
  • 46
    CloudCheckr

    CloudCheckr

    CloudCheckr

    CloudCheckr unifies IT, security and finance teams around the cloud and provides total visibility, deep insight, and cloud automation and governance. CloudCheckr is a comprehensive cloud management solution, helping businesses manage and automate cost as well as security for their public cloud environments. We are an AWS Advanced Technology Partner with Security and Government competencies, as well as a certified Silver Partner with Azure, to support multi- or hybrid-cloud strategies.
    Starting Price: contact CloudCheckr
  • 47
    Agile IT

    Agile IT

    AgileIT

    Move to Office 365, Azure, or Dynamics 365 with the confidence of an award winning Microsoft Gold Partner with over 2 million accounts migrated. Protect your business and information with Microsoft 365 (including Enterprise Mobility + Security suite). Empower your organization to take full advantage of Microsoft Teams and SharePoint Online. Change the way you provide endpoint support with Windows 10 managed by Microsoft 365. Workshop with Microsoft experts to meet and maintain state, local, federal, and international compliance, security, and privacy regulations. Move beyond using Microsoft 365 as just an email and file server replacement. Simplify common business practices with Teams, SharePoint, Power Platform and Azure PaaS. Deliver technology improvements that improve YOUR customer’s experience. Proactive support, end-user empowerment. Things just work!
  • 48
    Azure Storage

    Azure Storage

    Microsoft

    The Azure Storage platform is Microsoft's cloud storage solution for modern data storage scenarios. Azure Storage offers highly available, massively scalable, durable, and secure storage for a variety of data objects in the cloud. Azure Storage data objects are accessible from anywhere in the world over HTTP or HTTPS via a REST API. Azure Storage also offers client libraries for developers building applications or services with .NET, Java, Python, JavaScript, C++, and Go. Developers and IT professionals can use Azure PowerShell and Azure CLI to write scripts for data management or configuration tasks. The Azure portal and Azure Storage Explorer provide user-interface tools for interacting with Azure Storage. Durable and highly available. Redundancy ensures that your data is safe in the event of transient hardware failures. You can also opt to replicate data across data centers or geographical regions for additional protection from local catastrophes or natural disasters.
  • 49
    CA Office Automation

    CA Office Automation

    CA Office Automation

    Streamline your task, resources, clients, communication and accounts with advance technology to get the most out of your efforts & investments. Automate work processes, monitoring systems, checkpoint rules & notifications. Set things on auto mode, no matter how granular they are. CA Office Automation's Bank-Grade SSL, latest security enhancement, and Microsoft Azure-Dedicated Server give comprehensive security to the data your clients have entrusted you with. CA Office Automation software is a next-generation work platform for CPA, CA, and Accounting Services Companies. CAOA is Software as a Service (SaaS) based software product that provides benefits of the latest web & mobile software technologies to users. More than 8,000 accounting professionals have trusted the CAOA platform across the globe.
  • 50
    AIMSCO

    AIMSCO

    AIMSCO

    AIMSCO eChecksheets™ (eCS) are a digital cloud-based version of this standard method to collect a variety of production, quality, visual and process data in real time at point-of-use providing instant visibility. eCS can be quickly built and deployed at a single site or across multiple plants and support multiple languages. Built with an extensive library of industrial eCheckitems™ (eCI), eCS are managed by key users to implement data collection and continuous improvement initiatives. In addition to manual data capture, eCI can be automatically populated by equipment interfaces (IoT) or enterprise systems through standard web service interfaces. Leveraging the Microsoft Azure Cloud, AIMSCO Power Plant™ services integrate eCS data seamlessly with Microsoft Power BI® through custom data models for advanced analytics and process visualization.