Alternatives to Keyzapp

Compare Keyzapp alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keyzapp in 2024. Compare features, ratings, user reviews, pricing, and more from Keyzapp competitors and alternatives in order to make an informed decision for your business.

  • 1
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 2
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 3
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 4
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 5
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 6
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 7
    SimpleK

    SimpleK

    ASSA ABLOY

    SimpleK is a complete, flexible and intuitive software for master key system and facility management. Mainly used by institutional locksmiths, security and facility managers, SimpleK offers efficient solutions for: Master key system design and management Key, key ring and item issuance Cylinders and core pinning Personal records and inventories Buildings, doors and floor plans SimpleK offers many advanced master keying functionalities to help you: Master Key System(Many Levels, Multiple Manufacturers Compatibility, Different Methods & Options) Manage System Expansion Calculate Core Pinning Stack(According to the system type & structure, core type, associated keys, etc.) Plan, Perform & Register Rekeying Paperless Processes! (Key Requests, Key Issuances & Returns, Deposits & Refund, etc.) SimpleK is compatible with electronic signature capture devices, allowing electronics handwritten signatures to be bound directly to digital documents.
  • 8
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 9
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 10
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 11
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 12
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 13
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 14
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 15
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 16
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 17
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 18
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 19
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 20
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 21
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 22
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 23
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 24
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 25
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 26
    mathilda

    mathilda

    Astarel

    Transform your Interview Experience. Build a stellar employer brand. Hiring should be enjoyable, easy and purposeful. That is why mathilda is designed from a 'user-first' perspective, to create a groundbreaking and intuitive solution that simplifies and shortens the hiring process. From Agency to Recruiter to Candidate, mathilda is going to be your best hiring buddy in your recruitment journey. Spend time chasing talents, not feedbacks. Reduce the chaos with us. Let mathilda® prompt you what’s overdue, chase your unresponsive colleagues (nicely, of course), automate the progress and manage all the coordination required to move a candidate to hire. My Day-In-A-Glance prioritize your urgent tasks for you, makes your day more productive and focus. That's a good reason to smile!
    Starting Price: $49 per user per month
  • 27
    Credit Hound
    Do you want to get paid faster? Our credit control software, Credit Hound, automates many of your day-to-day credit control processes and is designed to pick up where your existing accounting system stops. It significantly reduces administrative tasks and instantly shows how much you’re owed and who you need to chase. Credit Hound Dashboard provides you with an instant overview of your credit management situation. displays overdue payments broken down by not yet due, overdue and disputed invoices. highlighting the customers who’ve promised to pay and by when. Automate many of your daily repetitive tasks. Let Credit Hound do the hard work, it can automatically send reminder letters, place overdue accounts on stop and add new To-Do items to chase late payments. Displays all the information you need on one screen so you have everything to hand to chase late invoice payment. Payment tracking features provide an overview of disputed payments to avoid payment delays.
  • 28
    Liscio

    Liscio

    Liscio

    If you’re like most firms, you spend a lot of time waiting for clients to send you documents. You probably also waste countless hours searching for things across multiple different platforms. Stop chasing clients for documents and give them an easy, secure, mobile file-sharing app they’ll love. Client Experience 2.0™ begins with Liscio. And the best part is that accountants and bookkeepers can move a lot faster with Liscio. Liscio is a modern, secure, mobile solution for firms to communicate with clients and exchange sensitive information, eSignatures, and documents on the go. Clients want to text. And it’s too easy for urgent business to get buried in email. Liscio’s Real-Time Messaging is a secure hotline between you and your clients. Always know the who, what, and when with easy-to-track progress and ownership. Client-facing tasks with text alerts and automated mobile reminders for overdue items keeps clients on schedule.
  • 29
    xocashflow

    xocashflow

    xocashflow

    xocashflow is an online app that dramatically streamlines the process of chasing up overdue invoices. Designed for users of the online accounting package Xero, the system automatically determines which invoices are overdue, and by how long, and then provides you with the ability to click a single button to distribute personalized email reminders to all or most of your overdue debtors. Promising to save you from the hassle of having to chase up overdue debts one by one, so cashflow enables you and your team to instead focus on more important activities, while your aging debtors are chased up via a couple of quick clicks each day. Your time, and that of your team, should be invested into productive, high-value activity. Taking time just to chase small debts via email is a thing of the past. Free up this time, reduce your cost and enable your staff to engage in the higher-level activity. Chief among the benefits offered by xocashflow is an improved cashflow position.
    Starting Price: $10 per month
  • 30
    CreditorWatch Collect

    CreditorWatch Collect

    CreditorWatch Collect

    We work with businesses all over the world, freeing them from the drudge of chasing overdue accounts, helping them improve cash flow and provide better customer service. Business owners are faced with a constant lack of time, cash, and resources. This hinders their true passion, the reason that they started their business. They are bogged down having to manage debtors, invoices and banks, and constantly chasing cashflow. This creates financial and emotional stress. Utilizing a unique combination of smart technology and the human touch, CreditorWatch Collect (formerly Debtor Daddy) helps businesses get invoices paid, allowing them to get back to what they love. Caring about our customers and our team is at the of what we do. That’s why we have a top team of professionals from a diverse range of backgrounds, who take the time to understand and support our clients and their businesses.
    Starting Price: $89 AUD per month
  • 31
    Resourcebase

    Resourcebase

    Orchard Resourcebase

    Resourcebase is marketing-friendly platform to get everyone on the same page across your enterprise. Quick to deploy, with real people support – easy and economical to manage – and popular with end-users. The single source of truth for maximum value. Ensure users get the best of your content to get the most from their content. Now with online editing for social media. Now you and your teams can amend customized on-brand marketing materials anywhere, anytime at no cost. Localize accurately with profile driven text and images. Organize brand assets to ensure maximum accessibility, consistency and adherence, brand guides, campaign packs, logo finders and more. Fast, easy proof and approval management with detailed comment tracking with alerts, chases and reminders and full history tracking.
    Starting Price: $390 per month
  • 32
    Chaser

    Chaser

    Chaser

    Many companies struggle with outdated accounts receivable processes based on manual invoice chasing and collections. This causes high days sales outstanding (DSO) and delayed payments. When dealing with high transaction volumes, manual processes often fail, resulting in lost revenue and profit. By automating credit control, you reduce repetitive and time-consuming tasks and ensure unpaid invoices don’t fall through the cracks. Traditionally perceived as negative, the act of invoice chasing, or simply requesting to get paid for your product or services, makes people uncomfortable and causes strain and loss of time for both the business that has not paid and the business that needs to get paid. But it does not need to be that way. Chaser believes that trust is the foundation of all businesses relationships. Therefore, our solutions and services aim to make chasing for payments comfortable, easy and fast. We strive to give businesses the confidence that they will get paid for their work.
    Starting Price: $35 per month
  • 33
    Guestio

    Guestio

    Guestio

    Guestio is an application that makes it easier for content creators to interview high-quality guests for their shows. It's like Cameo but for booking interviews. Guestio streamlines the booking process to eliminate hassles and headaches. No more endless email chains or frustrating tech stacks. Now you can find, book, and communicate with top guests and show hosts all inside one easy-to-use platform. Easily browse our growing catalog of guests by using categories or tags so you’re guaranteed the perfect fit for your podcast, Youtube channel, radio show, or another content platform. Then schedule and pay without ever leaving the app. No more chasing down messages in multiple email accounts and text threads. With Guestio, you can set up text and email notifications for your guests and manage all of your scheduling communication in one convenient place.
  • 34
    DocCredit

    DocCredit

    DocFinance

    DocCredit is a software application for commercial credit risk management and for the automation of the collection process. Integrated with the main Business Information providers, it contains a company rating calculation engine that allow you to know your customer. Degree of risk determines business opportunities and guides collection efforts to seek new clients, to prioritize the more dangerous credits and to increase sales to the less dangerous clients. Automation of reminder processes with personalised workflows. Smart activity planner: emails, phone calls, visits. Automatic linking of reminders sent and replies received. Keep track of payments by risk class, business channel and client segment. Unpaid debts in relation to actions. Effectiveness of reminder/collection efforts. Overdue/turnover ratio. Probability of default, of the subject and of the industry. Internal credit line from trend analysis.
  • 35
    MRI Residential Management
    Let your property management software do the work for you. MRI Residential Management delivers data at your fingertips, intuitive user experiences, efficient workflows and unmatched abilities to adapt to the operating model of your business. Differentiate your business with a unique software ecosystem that can’t be duplicated by competitors. MRI’s open and connected approach lets you diversify your tech strategy through APIs and interoperability with partners and third party providers. Deliver unique, persona-driven experiences tailored to specific users and roles that provide an easy and intuitive user experience across the entire solution, including non-MRI products from partners and third parties. Make smarter decisions and reduce risk with automated AI-driven insights derived from all your data. With a single point of access to every part of your residential business, you can create a frictionless data experience that helps you chase opportunities, not problems.
  • 36
    askporter

    askporter

    askporter

    Free your team. Enjoy effortless property management with an all-in-one AI-powered platform, guided by a powerful digital assistant. askporter is an all-in-one property management platform that includes every tool you need to delight landlords and tenants. Managing agents can hand their tasks to a magical assistant at every step of the journey - from arranging viewings and inspections, to resolving issues and chasing rent.
  • 37
    SourceDay

    SourceDay

    SourceDay

    Streamline supplier collaboration. The relationship between buyers and suppliers is broken. Every quote, purchase order and invoice is still emailed repeatedly, updated manually and chased down daily. Our SaaS solution creates real-time visibility and accountability between you and your suppliers. Plus, it integrates with your ERP system ensuring that pricing, quantity, lead times and delivery dates are accurate. With automated workflows and accurate information, you can cut your risk. SourceDay’s cloud solution digitally transforms collaboration between buyers and suppliers. Now, you can manage your direct spend more efficiently from quotes to purchase orders to invoices and quality control. Ditch your spreadsheets. Manually managing RFQs puts you at risk for errors or a quote getting lost in your inbox. Digitizing your RFQ process makes it easy to compare quotes and make better-informed decisions.
  • 38
    BizRuleAnalyzer
    Biz Rule Analyzer will allow you to quickly search all business rules, form code and all customizations inside Encompass. Find all rules, field triggers, advanced code and form code that display a specific message, or access/set a specific field. It will also allow to save hundreds of thousands of dollars for larger teams by allowing them to collaborate on projects and immediately see each other progress, and potential inconsistencies between business rules, forms and other code. With these tools, you can significantly increase your Encompass ROI: automate common processes, increase operational efficiency, improve compliance, reduce time to close loans, and focus on growing business instead of chasing fires. Helps to have consistent Encompass version/plugin rollout across entire company. Merges multiple documents. Moves all attachments from source docs into one destination doc.
  • 39
    ZyLAB Legal Hold
    Customizable reports provide insight into which Holds a particular custodian is part of and who has acknowledged their holds (and who hasn't). Reports can be run on the fly and exported to a variety of formats. Custodians can respond to hold notices and related questionnaires from any device through the Custodian Portal. This interface allows custodians to dynamically view all of the holds they are part of without having to reach out to the legal team. Create, automate and manage your email message templates using information placeholders. Use Communication type selection and create custom questionnaires to better manage holds and custodians. Say goodbye to manual reminders thanks to custom reminder scheduling, questionnaires and tracking. Stop manually chasing custodians: make use of automatic audit reports to ensure your ediscovery process is compliant and holds up in court.
  • 40
    ShedWool

    ShedWool

    ShedWool

    Introducing ShedWool. A smart shift scheduling platform that puts scheduling at your fingertips, no matter where you schedule from or where your schedule finds you. Experience the efficiency of scheduling templates, single source messaging, labor law compliant schedules built with the touch of a button, & audit trails that automatically populate while schedules are built. Fill open shifts based on staff availability, qualifications, & hourly cost while monitoring all data from a visual dashboard. And we’re just getting started. ShedWool’s Enterprise Communication System allows managers & employees to chat in real time, shed & swap shifts, instantly get managerial approval for changes, receive pre-shift updates, & share media content. Comprehensive dashboards provide multiple data points at a glance. ShedWool’s Smart Scheduling Software effortlessly adds shifts, displays staff based on availability & qualifications, & adjusts existing schedules with the click of a mouse.
    Starting Price: $39 per month
  • 41
    Property Tree

    Property Tree

    MRI Software

    Grow better and faster with the leading cloud property management and trust accounting software for real estate agencies in Australia and New Zealand. MRI Property Tree is designed for the real estate agency of the future, with multiple trust accounts, sales, and residential and commercial modules, this rental property management software delivers leading technology to help transform the way you work – for the better. Keep your finger on the pulse with real-time statistics of property, landlords and tenant information in customizable dashboards of arrears, leases, vacancies and more. View key information at a glance including a breakdown of arrears, a summary of active and expiring leases by status and date range, upcoming and overdue rent reviews, number of vacant properties and key business metrics including staff performance by portfolio. You can also view a breakdown of trust account balances at any given time and access comprehensive reports with a single click.
  • 42
    Decision Time Meetings
    No more wrestling with incompatible tools and spreadsheets. No need for separate board portals, risk registers or OKR management software. Now you can practice good governance, manage risk and achieve strategic objectives with our all-in-one integrated software. A better way to practice good governance and transform strategic objectives into positive action. Use our smart, secure software to make governance, strategic performance and collaboration easier for everyone. Streamline board and management team meetings, improve decision-making and monitor progress against strategic objectives. Simplify how you prepare and share board meeting packs and papers with easy-to-use, secure board management software. Get a firm handle on your risks and controls, reporting and analysis that transforms the process from a chore into a vital tool. Decision Time is cloud-based, so no matter which device you’re on, everything is synced in real-time. It’s that simple.
  • 43
    Textodog

    Textodog

    Textodog

    In the travel, events and hospitality industry, conversations with all the right people are required to avoid communication breakdown. Textodog is added to your existing sales and customer service process to prevent errors, reduce call volumes and most importantly, wow clients! A group text conversation is created by leads, your sales team or with automation. Clients part of a transaction now have easy access to your customer service team. Reduce errors and service calls with group text conversations that keeps everyone in the loop. Send group text messages to couples, families and friends in the same conversation. Collaborate with your team, reply to leads and clients from one place. Keep your existing phone number or choose a new one for free. Forward your Textodog phone number to your call center or a mobile phone. Add internal notes to your conversations to keep your team in the loop.
    Starting Price: $39 per user per month
  • 44
    Rently

    Rently

    Rently

    From vacancy, through residency, to property turnover, Rently's smart home solutions enhance all leasing activities for both renters and managers. Our all-in-one platform allows real estate operators to provide best-in-class touring and resident living experiences while optimizing leasing efficiency and creating new revenue opportunities. Use smart home technology 
to enable self-guided tours
 and control access to vacant 
or occupied properties. Receive real-time alerts of suspicious activity and monitor your property with motion sensors and doorbell cameras. Control smart home devices 
and manage properties 
from anywhere in the world 
using our app or desktop portal. Receive full-coverage installation support that includes automated tools, a network of technicians, and white glove service.
    Starting Price: Free
  • 45
    PwC Enterprise Insights
    PwC Enterprise Insights uses powerful automation and analytics to identify risk, errors, issues, and opportunities across multiple platforms. Enterprise Insights helps you identify the blind spots and shed light on the risks within your enterprise system so you can quickly take action early in the process. Eliminate the need for manual monitoring and testing of controls (configurations, security, transactional) with increased precision and reduced costs. Powerful, multi-ERP analytics that identify trends, errors, control failures, and issues early in the process, saving you time and money. Creates accountability by linking analytic outputs to a workflow and routes to appropriate personnel for action. Powerful automation creating a single source of truth for managing business processes and compliance documentation, analytic and manual assessment outputs, and issue management resolution.
  • 46
    Simple Social

    Simple Social

    Simple Social App

    Social media marketing is difficult: running multiple accounts, targeting different audiences, and planning a steady stream of content can quickly become onerous chores. That’s not how social media was supposed to be. To solve this problem, we've created Simple Social – the easiest tool to manage all your social media. With Simple Social, you can manage all your accounts in one place, schedule and preview your content with a powerful drag and drop interface, and visualize your campaign and content on a calendar. With built-in image editing and support for post videos, photos, text, and locations on all major platforms, we make it easy to succeed on social media.
    Starting Price: $14.99 per month
  • 47
    RueBaRue

    RueBaRue

    RueBaRue

    RueBaRue Guest Communication Platform helps vacation rental managers optimize operations, increase revenue and provide guests with the best experience using SMS/text automation, guest messaging via text, digital guestbooks, local area guides, surveys, Google business reviews, and more. With RueBaRue, vacation rental property managers can: - Give your guests all the information they need to plan their trip and enjoy their stay in an easy-to-navigate, digital format. - Automatically send digital guestbooks, local area guides, guest satisfaction surveys, social media campaigns and more by text messaging (SMS) or email - Answer guest questions by text before and during their stay. Be in quick contact without waiting for phone calls or emails. A unified text message inbox shows and saves all messages and replies for you and your team. - Generate a starter local guide in seconds that you can customize as you please. Add personal notes to provide guests a true local’s insights.
    Starting Price: $9.99 per property per month
  • 48
    Digital Defense
    Providing best-in-class cyber security doesn’t mean blindly chasing the latest trends. It does mean a commitment to core technology and meaningful innovation. See how our vulnerability and threat management solutions provide organizations like yours with the security foundation needed to protect vital assets. Eliminating network vulnerabilities doesn’t have to be complicated, even though that’s what some companies would have you believe. You can build a powerful, effective cybersecurity program that is affordable and easy to use. All you need is a strong security foundation. At Digital Defense, we know that effectively dealing with cyber threats is a fact of life for every business. After more than 20 years of developing patented technologies, we’ve built a reputation for pioneering threat and vulnerability management software that’s accessible, manageable, and solid at its core.
  • 49
    Work Wallet

    Work Wallet

    Work Wallet

    No multiple apps on your phone, just one app software platform that does it all. Choose which tools you need, then onboard your workforce, and then easily manage your health and safety processes by going digital. Easily access your management data and create the reports you want! Customize your management dashboard by using our drag and drop system, helping your track KPIs and create reports to send digitally to your teams and management. No more chasing people, paper or wondering what's going on site, just login to your app or management portal and get the answers your need. Our award-winning health and safety software helps you empower everyone, every site and safety process together. Unify your workforce is crucial when working in today's safety culture. So, giving you an instant overview of what's going on in your business. A paperless workplace is the new normal, so helping you be more productive and compliant.
    Starting Price: $5 per month
  • 50
    Rental Property Manager

    Rental Property Manager

    Source IT Software

    Rental Property Manager (RPM) is a one-stop database for managing your rental property information. RPM is designed by a property manager to meet your unique needs. It is for real estate professionals and private property investors alike. Using RPM, you can save and manage data about your properties, tenants, and financial transactions. RPM includes advanced reporting functions that create spreadsheets with the rental information you need. Many property managers use spreadsheets or hand written records to keep track of data. This is a slow and error-prone process. Entering data into Rental Property Manager takes only minutes. Optimized data entry screens and sensible defaults makes data entry easy and pre-defined reports makes getting it out again just as fast. Rental Property Manager's customizable alerts mean that you will never miss a rent review or overdue payment again. Automatic rent calculation and payment tracking mean that you always know who owes what, down to the cent.
    Starting Price: $249.95 one-time payment