Alternatives to Keyfactor Signum
Compare Keyfactor Signum alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keyfactor Signum in 2026. Compare features, ratings, user reviews, pricing, and more from Keyfactor Signum competitors and alternatives in order to make an informed decision for your business.
-
1
Proton VPN
Proton AG
Protect your business against damaging data breaches and easily comply with security frameworks like ISO 27001, GDPR, and HIPAA. Our software-only virtual private network easily integrates with your existing infrastructure to provide a flexible and scalable way to protect your organization. With our VPN Professional plan, you can securely access your LAN and SaaS resources by assigning and segmenting permissions to private dedicated VPN servers, allowing employees to access only what they need. With all plans, your network traffic is secured using strong AES-256 or ChaCha20 encryption. You can further strengthen your organization's security with enforced 2FA and seamless login through single sign-on (SSO) with SCIM support for automated user provisioning. Proton VPN's high-speed server network is one of the largest in the world and is part of a suite of open source end-to-end encrypted products from the makers of Proton Mail that are designed to keep your business secure. -
2
CodeSign Secure
Encryption Consulting LLC
Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing. -
3
jarsigner
Oracle
The jarsigner tool has two purposes, to verify the signatures and integrity of signed JAR files and to sign Java Archive (JAR) files. A digital signature is a string of bits that is computed from some data (the data being signed) and the private key of an entity (a person, company, and so on). Similar to a handwritten signature, a digital signature has many useful characteristics, its authenticity can be verified by a computation that uses the public key corresponding to the private key used to generate the signature, it is a function of the data signed and thus cannot be claimed to be the signature for other data as well, the signed data cannot be changed. If the data is changed, then the signature cannot be verified as authentic and It cannot be forged, assuming the private key is kept secret. -
4
SignPath
SignPath
In times of growing cyber security breaches, platform vendors and customers require all deployed applications to be digitally signed. Code signing is the only way to guarantee that software has not been modified by a third party. The corporate solutions of SignPath enable DevOps teams to seamlessly integrate code-signing into their development lifecycle and empowers InfoSec teams to define secure policies and gain transparency over private key usage. Frequent software releases and updates, the popularity of microservices as well as stricter enforcement of internal security measures have increased the complexity for code signing. SignPath is made for developers from one of the leading European software development companies for government institutions. We automate security best practices to keep your development process agile. -
5
SignServer Enterprise
PrimeKey
One flexible platform that supports all your electronic signature use cases. Integrates with your business applications via standard interfaces. Deploy SignServer as it suits your needs - either as a turn-key software or hardware appliance or in the cloud. The SignServer platform covers all your signing use cases in one solution, including standard document signing, eIDAS advanced signing and seal, code signing for multiple formats, timestamping services and ICAO ePassport signing. Avoid managing a myriad of signing solutions and centralize all your signature processes in this multitenant solution and improve on security policy compliance. Server-side signature solutions give maximum control and security and allow you to leverage your hardware security module (HSM) investment in the best way. Signature keys are generated and used for signing in your HSM. SignServer supports most HSMs on the market - and both short-lived keys, and keys or certificates with a longer lifecycle. -
6
CodeSign
Aujas
Code signing is a proven security practice to protect and extend the trust-based usage of software systems and applications. Organizations that publish as well as consume software, need a secure code signing mechanism to ensure software authenticity. The objective is to ascertain that valid software is not taken over as a medium by ransomware. CodeSign by Aujas provides a scalable, secure, easy to integrate DevOps-ready platform that ensures the integrity of software applications, enables allow-listing to protect internal infrastructure, protects the signing keys, provides automated audit trails, and combat ransomware. CodeSign is available both as a SaaS application and as an on-premise appliance and easily scales to hundreds of millions of file signings per year. It allows unmatched versatility to sign all file types across all platforms. Organizations use variety of software applications which are essential for running day to day business. -
7
Entrust TLS/SSL Certificates
Entrust
Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.Starting Price: $199 -
8
SSL2BUY
SSL2BUY
SSL2BUY is an authorized reseller of the world's leading certificate authorities (CAs) like DigiCert, Comodo, Sectigo, GlobalSign, GeoTrust, Thawte, and RapidSSL. As a global SSL certificate and code signing certificate provider, it focuses on providing the utmost encrypted SSL security with excellent discount offers and customer support for any size of organization or individual. Get hassle-free security solutions with our low-cost SSL certificates and code signing certificates. SSL certificates protect online transactions with strong 256-bit SSL encryption, and code signing certificates help protect your software. We offer low-cost SSL certificates, but we never compromise with your web security. All of our certificates come with modern algorithms recommended by the CA/Browser forum.Starting Price: $8 per year -
9
GaraSign
Garantir
There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc. -
10
apksigner
Google
The apksigner tool, available in revision 24.0.3 and higher of the Android SDK Build Tools, lets you sign APKs and confirm that an APK's signature will be verified successfully on all versions of the Android platform supported by that APK. This page presents a short guide for using the tool and serves as a reference for the different command-line options that the tool supports. For a more complete description of how the apksigner tool is used for signing your APKs. The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file. -
11
SignMyCode
SignMyCode
SignMyCode is a one-stop shop for trusted and authentic code signing solutions, offering code signing certificates from reputed certificate authorities like Sectigo, Certera, DigiCert etc. suitable for individual developers and software organisations to safeguard their software, EXE, scripts, and apps by digitally signing them.Starting Price: $210.99/year -
12
ClickSSL
ClickSSL
ClickSSL is an platinum partner of the leading Certificate Authorities like VeriSign(now Symantec), GeoTrust, RapidSSL, Thawte and Comodo. ClickSSL offers EV SSL, Code Signing Certificate, UCC Certificate, Wildcard SSL & more SSL Certificates at market low price. ClickSSL offers SSL certificates can provide you with non-forgettable proof of your website's identity, and customer confidence in the integrity and security of your online business. Buy RapidSSL, VeriSign(now Symantec), GeoTrust, Thawte and Comodo SSL Certificates at affordable price. ClickSSL offers SSL certificates with strong 256 bit encryption at affordable price to secure your web sites, eCommerce, exchange, intranets and extranets. Our inexpensive digital certificate is supported by over 99% of current browsers. Buy SSL certificate at lowest price to establish secure environment on your site(s). Move your step ahead with HTTPS and never let down customer’s confidence.Starting Price: $13.21 -
13
iOS App Signer
iOS App Signer
iOS App Signer can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.Starting Price: Free -
14
CheapSSLWeb
CheapSSLWeb
CheapSSLWeb is an authorized partner of Sectigo (formerly known as Comodo) and offers the cheapest SSL certificates from globally reputed Certificate Authorities like COMODO, SECTIGO, and CERTERA. We provide all types of SSL & Code Signing certificates like DV certificates, OV, and EV certificates.Starting Price: $2.99 -
15
GeoTrust
GeoTrust
GeoTrust, a leading certificate authority, provides retail and reseller services for SSL encryption, and website authentication, digital signatures, code signing, secure email, and enterprise SSL products. In today’s digital economy, every company needs web security they can trust. With more than 100,000 customers in over 150 countries, there’s good reason businesses around the world choose GeoTrust for SSL/TLS security solutions. Since 2001, GeoTrust has delivered business-class certificates to organizations of all sizes—from enterprise to single-site small business—at the best possible value. The wide range of authentication levels offered by GeoTrust allow companies to cost-effectively meet their specific security needs across virtually every major browser and mobile device, while also aligning themselves with a respected digital security brand.Starting Price: $149 per year -
16
PleaseSign
PleaseSign Pty Ltd
PleaseSign is a secure, cloud-based electronic signature platform designed to streamline document signing processes for businesses of all sizes. Proudly Australian-made and owned, PleaseSign offers a user-friendly interface that enables users to upload documents, add signature fields, and send them to recipients for electronic signatures. The platform ensures that documents are electronically signed in minutes, not days, enhancing efficiency and productivity. Key features of PleaseSign include: * SOC 2 AICPA Attestation * Private and Secure Sovereign Document Storage * Flexible, Bespoke Plans * Support that you can rely on. PleaseSign offers a 30-day free trial with access to all premium features, allowing users to experience the platform's capabilitiesStarting Price: Free -
17
Turnkey
Turnkey
We help you build better crypto products. Create thousands of embedded wallets, get rid of manual transaction flows, and automate on-chain actions, all without compromising on security. Create thousands of non-custodial wallets across blockchains with a simple API call. Build even the most complex crypto products by signing the transactions you need. Protect your assets with fine-grained policies and approval workflows. We’re developer-first at our core and obsess over giving you the easiest APIs and SDKs. We’ve done away with passwords to ensure the highest level of security. Your account is virtually unfishable with our hardware-based WebAuthn authentication. Our policy engine provides fine-grained controls for how users can access private keys. All actions on your account are checked against your custom policies and approval workflows while leaving an audit trail. Leveraging secure, isolated environments and verifiable data stores, we ensure you have control over your assets.Starting Price: $0.10 per signature -
18
The Advanced Protection Program safeguards users with high visibility and sensitive information from targeted online attacks. New protections are automatically added to defend against today’s wide range of threats. Gmail blocks over 100 million phishing attempts every day. But sophisticated phishing tactics can trick the most savvy users into giving their sign-in credentials to hackers. Advanced Protection requires you to use a security key to verify your identity and sign in to your Google account. Unauthorized users won’t be able to sign in without your username and password. Safe browsing on Chrome protects 4 billion devices against risky sites, and Advanced Protection performs even more stringent checks before each download. It flags or even blocks you from downloading, files that may be harmful. Only app installations from verified stores, like Google Play Store and your device manufacturer’s app store, are allowed.
-
19
Dropbox Passwords
Dropbox
Dropbox Passwords is currently in private beta and only available to some Dropbox customers. Dropbox Passwords (beta) provides password security by storing all your passwords in one secure place, then fills in usernames and passwords so you can instantly sign in to websites and apps. You can easily create and store unique, secure passwords as you sign up for new accounts. Features: - Sign in to apps and websites with one click - Store passwords as you sign in to sites and apps - Access your passwords from anywhere with automatic syncing to all your devices Never get locked out of your accounts again. Using this new password keeper from Dropbox, you can sign in to your favorite banking, streaming, and e-commerce sites and apps—you can even shop and checkout securely. Passwords secures your credentials with zero-knowledge encryption, so your passwords are protected from hacks and only accessible by you. -
20
AD Bridge
BeyondTrust
Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux. -
21
AllyMatter
AllyMatter
AllyMatter is a centralized enterprise knowledge management platform designed to help organizations turn scattered documentation and tribal knowledge into a searchable, governed, and scalable system that supports workflows, compliance, and collaboration across departments. It provides a central knowledge hub where teams can store policies, procedures, SOPs, training materials, playbooks, and other critical documents with advanced search so information is always findable; workflow automation including custom approval flows and notifications so changes move through review and sign-off efficiently; audit trails, version control, and acknowledgment tracking that capture who changed what and when and help with compliance; and role-based access controls and SSO integration so sensitive data stays protected and accessible to the right people only. -
22
OpenLimit CC Sign
OpenLimit SignCubes
More and more companies, authorities and private individuals are replacing paper documents with electronic ones. If this is done in an optimized manner, much money and time can be saved. An important factor for success is seamless processes. With OpenLimit CC Sign, you can sign your documents electronically and therefore avoid any interruption of workflow caused by handwritten signatures. According to the German Signature Act (SigG), the qualified electronic signature has the same legal status as a manual signature. With OpenLimit CC Sign, you can generate qualified and advanced signatures. When a signature is needed at any stage of a process, this is done with the inputting of a PIN and the click of a mouse. OpenLimit CC Sign is an extremely cost-effective work-station solution, which promises noticeable savings in terms of work and process costs. -
23
MetaCompliance Policy Management
MetaCompliance
MetaCompliance Advantage is a policy management software that enables organisations to automate and manage the key tasks associated with user awareness and engagement for information assurance, including risk assessment, the measurement of organisation wide IT security posture and policy management. From creation and management to publishing and delivery, cloud-based policy management software enables organisations to measure and demonstrate the continuing improvements in awareness, and highlight areas that require attention before they pose a risk to security and compliance. The magic of the MetaCompliance policy management software lies in its unique ability to obtain employee attestation of staff policies. This avoids the need for management to chase staff participation and sign up, saving huge amounts of time. The software will encourage the user to electronically sign the policy through levels of insistence determined by you. -
24
RocketSign
Rocket Lawyer
RocketSign is a digital signature solution by Rocket Lawyer that enables users to create, send, sign, and store legally binding documents entirely online, simplifying contract workflows without the need for printing or in-person signing. It allows users to upload documents in formats such as PDF or Word, add signature, initial, and date fields, and send them to others for signing via email, all within a streamlined interface accessible from any device. It supports multi-party signing, tracks when documents are signed, and stores completed agreements securely for easy access and recordkeeping. RocketSign integrates directly with Rocket Lawyer’s document creation tools, enabling users to generate, edit, and sign legal documents in one place, while also offering optional attorney review for additional confidence in legal accuracy. It records timestamps and maintains clear attribution of signatures, helping ensure compliance with electronic signature laws.Starting Price: $39.99 per month -
25
Constellation
Edgeless Systems
Constellation is a CNCF-certified Kubernetes distribution that leverages confidential computing to encrypt and isolate entire clusters, protecting data at rest, in transit, and during processing, by running control and worker planes within hardware-enforced trusted execution environments. It ensures workload integrity through cryptographic certificates and supply-chain security mechanisms (SLSA Level 3, sigstore-based signing), passes Center for Internet Security Kubernetes benchmarks, and uses Cilium with WireGuard for granular eBPF traffic control and end-to-end encryption. Designed for high availability and autoscaling, Constellation delivers near-native performance on all major clouds and supports rapid setup via a simple CLI and kubeadm interface. It implements Kubernetes security updates within 24 hours, offers hardware-backed attestation and reproducible builds, and integrates seamlessly with existing DevOps tools through standard APIs.Starting Price: Free -
26
Conio
Conio
Our 2 out of 3 multi-signature wallet allows you to safeguard Bitcoin and digital assets with very high-security standards: in fact, two out of three keys are required to sign a transaction, and the third is a parachute in case of unforeseen events. No need to worry in case you lose your private key. Thanks to the third key and our patented recovery system, we can restore access to your wallet and return your funds, even in unexpected situations. Thanks to on-chain transactions, recorded on the Bitcoin blockchain, and the possession of your private key, the Bitcoins you hold in your wallet are in your actual possession. Each Conio Multi-sign Wallet is protected by 3 keys: the customer’s key, Conio’s key and a third recovery key - stored offline at an independent third party. Only two of these keys are needed to sign transactions, typically yours and Conio’s. -
27
Signatys
Signatys
Signatys offers an electronic signature solution legally valid in Switzerland and internationally. Remotely collect the signatures of your customers and employees in a secure manner. Download your documents and sign them digitally from our Web desktop client or via our dedicated mobile application. Each event is monitored and stored in an audit trail to provide evidence in the event of a dispute. APIs available to be integrated into your environment and your various tools. Integration into eBanking allows documents to be signed directly from your customer area. Digitize any type of workflow requiring a signature. Signatys specializes in the management of electronic signatures for sensitive and highly confidential documents. The solution can be integrated on-site for guaranteed security or be used on our cloud instance hosted in Switzerland. -
28
Certifaction
Certifaction
Future-proof your signing with a privacy-first solution. Sign or certify your files with protected confidentiality. Stay in control with E2E encryption and local processing. Digitize your business with the next generation of eSigning. All other eSigning solutions have access to your documents, even the most confidential ones. Work time is better spent than manually printing, scanning, and mailing documents. No business should have manual signing processes when it can be done digitally in just a few clicks. Adopting eSigning shouldn’t be hard but should come with developer-friendly APIs & an easy-to-use WebApp. Your colleagues and customers should be able to sign legally valid from anywhere and at any time. A compliant eSigning should come with regulated signatures and advanced identity verification. The only solution that comes with privacy-by-design, where all your data is by default locally processed on your device.Starting Price: $190 per year -
29
SignTool
Microsoft
The software industry must provide users with the means to trust code including code published on the Internet. Many webpages contain only static information that can be downloaded with little risk. Some pages, however, contain controls and applications to be downloaded and run on a user's computer. These executable files can be risky to download and run. Packaged software uses branding and trusted sales outlets to assure users of its integrity, but these guarantees are not available when code is transmitted on the Internet. Additionally, the Internet itself cannot provide any guarantee about the identity of the software creator. Nor can it guarantee that any software downloaded was not altered after its creation. Browsers can exhibit a warning message that explains the possible dangers of downloading data of any kind, but browsers cannot verify that code is what it claims to be. A more active approach must be taken to make the Internet a reliable medium for distributing software. -
30
Edusign
Edusign
Never use a paper again to check attendance. Edusign makes it easy to track attendance, sign and take surveys. Signing attendance sheets online is possible remotely , but also face-to-face. Edusign offers your training centers a response to each context and for each device. The solutions are available on any screen and are secure. Inform the groups, speakers and learners concerned by your training. Then, create and schedule your sessions. Choose the signature mode and learners sign in 3 clicks from their pc, smartphone or tablet. Once the sessions are finished and locked, you can retrieve your certified attendance sheets. You can also download attestations and certificates. Edusign adapts to all your situations. Whether you are on a tablet, computer or smartphone, online sign-in is possible. Fast and efficient in any context, choose the solutions that suit you.Starting Price: $25/month -
31
Cygnature
Cygnet Infotech
Sign documents using various signature types like digital, electronic, biometric, national ID, and live. Have a choice of signing documents or declining documents. One can also delegate documents for signing, co-signing, assigning, and many more. Send documents of any file format like PDF, DOC., etc. and can upload from Google Drive, One Drive, or DropBox. Also, you can reuse the templates once used. Track and observe the documents sent for signing, set different signing orders, comment, and send private messages to signers. With Cygnature you get Blockchain security to the documents where all activities on a document are stored on Blockchain and all activities on the document are tracked & time-stamped. Users can quickly sign documents using Cygnature’s mobile application. Integrate e-signature APIs into your systems seamlessly and with high flexibility. All assistance is given from API documentation to the implementation process. -
32
PDF Editify
PDF Editify
PDF Editify is an online platform offering tools for filling, editing, signing, and creating PDF forms, designed for ease of use and accessibility. ✨ Key Features Fill PDF forms online Edit existing PDF documents Add digital signatures to PDFs Convert scanned PDFs to searchable ones using OCR Redact sensitive information Create fillable PDF forms 💡Use Cases Completing job applications or official forms Editing business documents on-the-go Signing contracts or agreements digitally Protecting sensitive data in shared documents Creating custom forms for surveys or data collectionStarting Price: $10/month -
33
SwissSign
SwissSign
SwissSign enables you to make your processes and business transactions even more efficient by allowing customers and employees to sign easily online. Signature service by SwissSign: The Swiss signature solution from SwissSign offers qualified electronic signatures (QES) which are ZertEs (Swiss Signature Act) and eIDAS compliant as well as advanced (AES) and simple electronic signatures (SES). The solution that suits your needs: Regardless of whether you are a private individual, SME or large company, SwissID Sign offers the right solution for you. SwissSign offers a Ready-to-Go solution (no integration necessary) and an integration solution (cloud) based on “SwissID Sign”. For companies that require a flexible and confidential solution SwissSign recommends its On-premise solution “Let’s Sign”. -
34
COLDCARD
Coinkite
Physical Security. Your seed words are stored in a specialized chip, designed to securely store secrets. All code is open source, and you can compile it yourself. Only hardware wallet with option to never be connected to a computer, for full operation: from seed generation, to transaction signing. Uses PSBT (BIP174) natively! Full-sized numeric keypad makes entering PIN easy and quick. Simple packaging, plain design, no fancy boxes, no redundant cables. Bright, 128x64 pixel OLED screen. Shows all the critical details of your transactions. Real crypto security chip. Your private key is stored in a dedicated security chip, not the main micro's flash. Lovingly soldered in Toronto, Canada. Secure supply chain verified with: tamper-evident numbered bag, with bag number recorded into device. MicroSD card slot for backup and data storage. This allows truly offline signing, by transferring the unsigned/signed transactions on sneakernet. -
35
ComplyDog
ComplyDog
ComplyDog is a hosted GDPR portal for your B2B SaaS. The General Data Protection Regulation (GDPR) requires organizations to understand their obligations, document their efforts, and regularly review compliance measures to ensure they remain effective. ComplyDog makes this easy by centralizing all your data protection and compliance efforts. When prospects ask if you are GDPR compliant, simply share a link to your compliance portal. ComplyDog lets your prospects view your GDPR compliance, request a signed Data Processing Agreement (DPA), and review your data protection and security practices. With ComplyDog, you can set up your compliance portal in one click. If you're selling SaaS, you need GDPR compliance. If you need GDPR compliance, you need ComplyDog. ✅ Get guided through GDPR compliance with checklists ✅ Share your DPA (integrates with DocuSign, Dropbox Sign) ✅ Handle data requests ✅ List out your subprocessors ✅ Showcase security ✅ Cookie widgetStarting Price: $500/year -
36
Zoho Sign
Zoho
Recognized by top-industry analysts and peer-to-peer review websites. Securely sign, send, and manage your documents from anywhere with Zoho Sign. Digitally sign documents yourself and email the signed copies to others, get documents signed on the spot, or send documents to request signatures. Zoho Sign offers military-grade encryption and ensures the highest level of data security. It complies with the most current e-signature laws: ESIGN and eIDAS. Define the signing order when sending a document to multiple recipients, and control how they receive and sign your documents. Track every step of the document signing process with our comprehensive audit trail. Receive instant alerts and notifications on the status of each document. Create personalized templates once and use them forever, saving your time and effort. Incorporate your brand image across your documents, with customized logos and emails.Starting Price: $10 per month -
37
JetSign
JetSign
Tap or click anywhere to sign with your finger. Add your e-signature, dates, and text to your document and generate a signed PDF! Send out documents for e-signature with a simple signing link that you can share in your own email or text message. You and your remote signer(s) can view and sign your document with a full audit trail. Easily fill and sign forms by editing text directly on the document - no text entry pop-ups required! Resize text, add checkmarks and X's, and clone fields with our form filler features and save as a PDF. Add one or several documents at a time including Word (doc/docx), Pages, PDF, HTML, RTF, WordPerfect, images, and 15 other file formats. We protect your documents in the cloud with leading encryption methods (AES-256), SSL hosting, and full audit trails for electronic signatures.Starting Price: Free -
38
Stellar VPN
Stellar Security
Access our VPN across all devices and operating systems for consistent protection. Our VPN service never logs your online activity, ensuring complete anonymity. You can use Stellar VPN without providing any personal identity such as email. Your data is secured with top-tier encryption, keeping your online communications private and secure. Enjoy unrestricted internet access with servers worldwide, bypassing geo-restrictions effortlessly. Stellar VPN service offers users a secure, private internet connection by encrypting data and hiding IP addresses. It shields against hackers and surveillance, enables access to geo-blocked content, and ensures privacy on public Wi-Fi networks. We have a zero-logging policy. You can use Stellar VPN without providing any personal identity such as email. You can use a generated account number to sign in. Securely connect up to 6 devices and enjoy private internet access, even when using public Wi-Fi networks.Starting Price: Free -
39
PrivateCore vCage
PrivateCore
PrivateCore vCage secures servers in untrusted environments from persistent malware, malicious hardware devices, and insider threats. Private and public clouds, such as OpenStack environments can contain thousands of compute nodes spread across geographic boundaries and in remote locations. Compromising one compute node can jeopardize the security of the entire compute infrastructure. PrivateCore vCage protects that infrastructure from persistent threats, securing servers for sensitive applications on cloud infrastructure. PrivateCore vCage technology provides a secure foundation for cloud computing by protecting servers and the virtual machines running on those servers. vCage software attests the integrity of the servers, hardens the environment to minimize the attack surface, and secures data-in-use (memory) with encryption. -
40
CleanStart
CleanStart
CleanStart is a secure container image platform and software supply chain security solution that provides organizations with lightweight, hardened, vulnerability-free base images designed to serve as a trusted foundation for building, deploying, and running modern software with improved safety and compliance. Instead of starting with general-purpose distributions that contain numerous known vulnerabilities, CleanStart offers near-zero CVE images that minimize attack surface by removing unnecessary components and embedding security from Day 0, enabling faster, safer releases and reducing the burden of ongoing patching and remediation. Every CleanStart image is continuously verified with signed attestations and Software Bill of Materials (SBOMs) that document provenance, component origins, and build environment details, giving teams cryptographically verifiable evidence of what is in their containers for auditing, compliance, and evidence-based risk management. -
41
TurboSign
TurboDocx
TurboSign is a digital e-signature solution within the TurboDocx platform that enables users to send, sign, and manage legally binding documents quickly and securely as part of a fully automated document workflow. It allows users to upload documents such as PDFs, define signature fields, and send them instantly to recipients for signing, supporting multi-party workflows and streamlined contract execution. It provides audit trails and tracking capabilities that record signature activity, ensuring compliance and transparency throughout the signing process. Designed to work seamlessly with TurboDocx’s document generation tools or as a standalone product, TurboSign enables users to move from document creation to final signature in a single, continuous workflow without switching platforms. It integrates with APIs and automation systems, allowing developers to embed signature functionality directly into applications and trigger signing processes programmatically.Starting Price: $10 per month -
42
Digital Signer
PULKITSOFT LLP
Digital Signer is a digital signature software. - Sign pdf file - Sign pdf by DSC - Sign pdf by PFX - Sign pdf by PKCS#12 - Sign pdf by Certificate Store Feature-packed, eSigning made simple & easy. Prevent and protect PDF file editing, tampering and fraud. Your documents become permanently uneditable with high-grade security. Digital Signer software protects, prevent documents tamper-proof your personal, official, Invoice, Bills, Tax forms, Business Contracts, Legal and any other document. Using this product you can quickly sign multiple PDF files (batch mode) by selecting input and output directory/folder. This is ideal for bulk signing of a large number of corporate documents rather than signing each one individually.Starting Price: $49 -
43
swipesign
swipesign
swipesign is an eSignature platform for businesses that need to send, sign, and manage documents digitally. Teams can send documents for signature in seconds, track signing status in real time, and store signed documents securely. The platform is fully compliant with eIDAS and major eSignature regulations, making it suitable for legal, HR, finance, and enterprise use cases. swipesign supports multi-party signing workflows, audit trails, and integrates into existing business processes. There is no free version or free trial — it is a paid SaaS product with subscription plans for teams and enterprises. -
44
Sign Customiser
Sign Customiser
Let your customers design and purchase unique signs on your Shopify store. Perfect for neon signs, LED signs, acrylic signs, metal signs and 2D/3D channel letter signs. Sign Customiser includes a wide range of features that are designed to help sell custom signage and also help with the logistic side with features such as manufacturer emails and SVG file generation of the sign that can be used with CNC machines.Starting Price: $49 per month -
45
Bitaps
Bitaps.com
Bitaps provides Bitcoin explorer web service allowing to track transactions, blocks and address balances. Bitcoin tools, payment processing and open API. Blockchain ledger API allows you to query information about basic entities like blocks, transactions and addresses. Mainnet and testnet blockchain explorers. Blockchain explorer is army knife for blockchain developer. Also possible to receive information about transaction unsend outputs(UTXO), contracts and timeline statistics. Generate address, convert private or public key to address. Create, verify, split or restore BIP39 mnemonic code. Calculate addresses and keys from BIP32 extended keys. Sign any message or verify message signature for address. Create, sign, verify and broadcast new transaction. Broadcast transaction to Bitcoin peer to peer network. Create and print Bitcoin gift card. Protect your privacy with coin mixer. Sell your files, pictures, notes or other digital goods. -
46
DrySign
Exela Technologies
Everyday business signatures made easy Leverage our simple, secure e-signature platform for all your business needs. Why DrySign? DrySign is a secure and easy to integrate digital signature platform that digitizes both, internal and external sign-off processes. With API keys, DrySign can be integrated with a wide variety of enterprise solutions like SalesForce to accelerate sign-offs and improve productivity. Key Benefits. Enhance Security. Smart tracking and powerful audit trails to improve compliance and mitigate risks devices. Greater Flexibility. Works on all devices and operating systems while reaching multiple signatories at one time. More Savings. Reduces the cost of printing and shipping by eliminating paper-based process. Workflow Efficiency. Eliminates the inconvenience and space requirements of signing and physically storing executed documents. Sustainable Solution. Contributes positively towards the environment by reducing the need for paper and storage.Starting Price: $7 per user, per month -
47
DATAVISION
DATAVISION IMAGE
The new Visitor Sign In -21 module very similar to our traditional sign in system except it ONLY contains the sign in functions, reports or other tasks are done on the second module, the Administrative Dashboard. Note the simplicity of the new system. The Visitor Sign In module is only used to collect sign in and sign out data. Since the unit is online, it can share functionality with other units. This means a visitor can sign in at one station and sign out at another. Reports and other functions available from the Administrative Dashboard discussed below represent the COMBINED action of all Sign In Systems. You can have as many Visitor Sign In stations as necessary. The Office Sentinel can produce visitor logs and time and attendance reports for employees and contractors based on data only for that tenant. Data is specific and private to the individual tenant. An optional visitor’s COVID-19 Vaccination status is also noted if they have a vaccination record. -
48
Microsoft Entra ID Protection
Microsoft
Microsoft Entra ID Protection uses advanced machine learning to identify sign-in risks and unusual user behavior to block, challenge, limit, or allow access. Extend risk-based adaptive access policies to help protect against malicious actors. Safeguard sensitive access with high-assurance authentication methods. Export intelligence back into any Microsoft or other security information and event management (SIEM) and extended detection and response (XDR) tools for further investigation. Elevate your identity security with a comprehensive snapshot of prevented identity attacks and common attack patterns in an easily digestible dashboard. Secure access for any identity, from anywhere, to any resource across the cloud and on-premises. -
49
Azure Confidential Ledger
Microsoft
Tamperproof, unstructured data store hosted in trusted execution environments (TEEs) and backed by cryptographically verifiable evidence. Azure confidential ledger provides a managed and decentralized ledger for data entries backed by blockchain. Protect your data at rest, in transit, and in use with hardware-backed secure enclaves used in Azure confidential computing. Ensure that your sensitive data records remain intact over time. The decentralized blockchain structure uses consensus-based replicas and cryptographically signed blocks to make information committed to Confidential Ledger tamperproof in perpetuity. You’ll soon have the option to add multiple parties to collaborate on decentralized ledger activities with the consortium concept, a key feature in blockchain solutions. Trust that your stored data is immutable by verifying it yourself. Tamper evidence can be demonstrated for server nodes, the blocks stored on the ledger, and all user transactions.Starting Price: $0.365 per hour per instance -
50
Penneo
Penneo A/S
Penneo is a certified digital trust platform designed for audit firms, law firms, and financial institutions that need efficient, compliant document signing workflows. It delivers legally binding electronic signatures compliant with eIDAS regulations, supporting national eID schemes across Scandinavia and the EU. Key capabilities include bulk signing for handling high volumes of documents, customizable signing flows with sequential or parallel routing, automated reminders, and complete audit trails that satisfy regulatory documentation requirements. Penneo integrates with CRM and ERP systems through its REST API, fitting into existing workflows. The platform is especially popular among Nordic accounting and auditing firms looking to digitize annual report and financial statement signing cycles, though it serves regulated businesses across Europe.Starting Price: €88 / month