Alternatives to Knox

Compare Knox alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Knox in 2026. Compare features, ratings, user reviews, pricing, and more from Knox competitors and alternatives in order to make an informed decision for your business.

  • 1
    Onspring

    Onspring

    Onspring GRC Software

    Onspring is an award-winning GRC automation and reporting software. Our SaaS platform is known for flexibility and ease of use for end-users and administrators. Simple, no-code, drag-and-drop functionality makes it easy to create new applications, workflows, and reports independently without IT or developers. - Manage a centralized risk register with multiple hierarchies - Keep tabs on financial impacts & probabilities based on risk tolerance - Capture & relate financial, operational, reputational & third-party risks - Map controls to regulations, frameworks, incidents & risks - Remediate findings through workflows or the POA&M process Ready-made products get you started in as quickly as 30 days: - Governance, Risk & Compliance Suite - Risk Management - Third-party Risk - Controls & Compliance - Audit & Assurance - Policy Lifecycles - CMMC - BC/DR FedRAMP moderate environment available.
    Starting Price: $20,000/year
  • 2
    StandardFusion

    StandardFusion

    StandardFusion

    A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.
    Starting Price: $1800 per month
  • 3
    NXT1 LaunchIT
    NXT1 LaunchIT is the developer’s platform to build and operate secure SaaS, enabling instant availability by streamlining and automating every aspect of cloud infrastructure management required for SaaS delivery and sales – simply code and deploy. LaunchIT adheres to CISA’s Secure by Design guidelines and provides a direct path to FedRAMP compliance-readiness at a fraction of the traditional time and cost required, establishing new, impactful sales opportunities into state and federal government agencies. Built on Zero Trust principles, with integrated CI/CD management, multi-account and multi-region support, comprehensive performance management and observability, full ecommerce support, and GitHub integration, LaunchIT accelerates time to revenue for technology startups, legacy application migrations, enterprise expansions, systems integrations, and independent software development. Get started with a 15-day free trial.
    Starting Price: $55/month
  • 4
    6clicks

    6clicks

    6clicks

    6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia.
  • 5
    ID.me

    ID.me

    ID.me

    ID.me simplifies how individuals prove and share their identity online. The ID.me secure digital identity network has over 98 million members, as well as partnerships with 30 states, 10 federal agencies, and over 500 name-brand retailers. The company provides identity proofing, authentication and community verification for organizations across sectors. The company's technology meets the federal standards for consumer authentication and is approved as a NIST 800-63-3 IAL2 / AAL2 conformant credential service provider by the Kantara Initiative. ID.me's Identity Gateway also has a Federal Risk and Authorization Management Program (FedRAMP) Moderate Authority to Operate (ATO). ID.me is the only provider with video chat and is committed to "No Identity Left Behind" to enable all people to have a secure digital identity.
  • 6
    Splunk Cloud Platform
    Turn data into answers with Splunk deployed and managed securely, reliably and scalably as a service. With your IT backend managed by our Splunk experts, you can focus on acting on your data. Splunk-provisioned and managed infrastructure delivers a turnkey, cloud-based data analytics solution. Go live in as little as two days. Managed software upgrades ensure you always have the latest functionality. Tap into the value of your data in days with fewer requirements to turn data into action. Splunk Cloud meets the FedRAMP security standards, and helps U.S. federal agencies and their partners drive confident decisions and decisive actions at mission speeds. Drive productivity and contextual insights with Splunk’s mobile apps, augmented reality and natural language capabilities. Extend the utility of your Splunk solutions to any location with a simple phrase or the tap of a finger. From infrastructure management to data compliance, Splunk Cloud is built to scale.
  • 7
    AvePoint

    AvePoint

    AvePoint

    AvePoint is the only full-suite data management solutions provider for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service user base in the Microsoft 365 ecosystem. Over 7 million users worldwide trust AvePoint to migrate, manage, and protect their cloud investments. Our SaaS platform is enterprise-grade with hyper scale, robust security and support. We are available across 12 Azure data centers, our products are in 4 languages, we offer 24/7 support and boast market-leading security credentials such as ISO 27001 and FedRAMP in-process. Our comprehensive and integrated product portfolio provides extra value to organizations leveraging Microsoft that want a consistent experience without the pain of having to manage multiple vendors. Automate governance to scale adoption and IT operations while simplifying oversight and collaboration. Reduce more risk by improving process, content security, and compliance across more collaboration platforms.
  • 8
    Ubuntu

    Ubuntu

    Ubuntu

    Better security. More packages. Newer tools. All your open source, from cloud to edge. Secure your open source apps. Patch the full stack, from kernel to library and applications, for CVE compliance. Governments and auditors certify Ubuntu for FedRAMP, FISMA and HITECH. Rethink what’s possible with Linux and open source. Companies engage Canonical to drive down open source operating costs. Automate everything: multi-cloud operations, bare metal provisioning, edge clusters and IoT. Whether you’re a mobile app developer, an engineering manager, a music or video editor or a financial analyst with large-scale models to run — in fact, anyone in need of a powerful machine for your work — Ubuntu is the ideal platform. Ubuntu is used by thousands of development teams around the world because of its versatility, reliability, constantly updated features, and extensive developer libraries.
  • 9
    Anitian FedRAMP Comprehensive
    Anitian’s FedRAMP Comprehensive solution combines best-of-breed web security technologies, compliant-by-design integrations, and guidance from FedRAMP experts to help SaaS providers Navigate, Accelerate, and Automate their FedRAMP program. Rely on Anitian’s proven expertise to guide you through every step of the FedRAMP process. Obtain FedRAMP authorization in half the time and at half the cost using Anitian’s unique combination of automation and in-person assistance. Use Anitian’s pre-built security stack and automation tools to eliminate much of the manual, complex work typically required for FedRAMP authorization. Depend on Anitian’s compliance team to keep both your internal and external stakeholders fully appraised of project status, required actions and critical path dependencies.
  • 10
    HRTec Assessment System
    HRTec is one of the industry’s most experienced and trusted small business in providing a robust, flexible, and FedRAMP secure assessment platform offering scientifically researched and tested survey items/factors, a variety of customizable surveys and action-oriented reports, analysis of qualitative data, executive summaries, and action planning. Through workplace assessments, HRTec identifies effective approaches to remedy current issues and provide strategies that contribute to mission success. Having surveyed more than 17 million employees and provided more than 200,000 reports, our surveys don’t just report outcomes—they drive meaningful action. As an added benefit, HRTec’s Federal High Impact Virtualized Environment (FedHIVE) provides a FedRAMP High Impact Baseline Provisional Authority to Operate (P-ATO) secure cloud environment. Approved by DoD, DHS, and GSA, FedHIVE sets the standard for secure cloud solutions in the Federal and State space.
  • 11
    SafeLogic

    SafeLogic

    SafeLogic

    Do you need FIPS 140 validation or FIPS 140 certification for your technology to enter new government markets? Get a NIST certificate in just two months and make sure it remains active over time with SafeLogic's FIPS 140 simplified solutions. Whether you need FIPS 140, Common Criteria, FedRAMP, StateRAMP, CMMC 2.0, or DoD APL, SafeLogic helps you maximize your public sector business. Companies selling technology that performs encryption to the federal government must obtain NIST certification per its FIPS 140 regulation that confirms their cryptography has been tested and approved for use by government agencies. FIPS 140 validation has been so successful, that it has been adopted as mandatory by several additional security regulations including FedRAMP, StateRAMP, CMMC v2, Common Criteria, and DoD APL.
  • 12
    Constellation GovCloud

    Constellation GovCloud

    Constellation GovCloud

    Constellation GovCloud is a platform designed to host SaaS solutions seeking FedRAMP moderate authorization to operate within federal government agencies and/or StateRAMP authorization to operate within state and local government organizations. The US public sector technology market is massive and presents a great opportunity for the right companies at the right time. The Constellation team works with you to quantify the business opportunity that’s accessible to you if you entered or expanded into this market, with insights and approaches for revenue acceleration while optimizing your existing channel infrastructure. Detailed analysis of your business opportunity relative to compliance requirements, technical maturity, and competitive ecosystem positioning. Discovering and remediating cryptographic assets that are non-compliant, and instrumenting your solutions with a continuous capability to demonstrate cryptographic SBOM remediation.
  • 13
    SentrIQ

    SentrIQ

    SentrIQ Labs

    SentrIQ is an AI-native compliance automation platform that helps cloud and SaaS companies turn technical evidence into assessor-ready packages faster. Instead of relying on manual spreadsheets, screenshots, and static documents, SentrIQ ingests artifacts like policies, cloud configurations, scan results, tickets, and identity data, maps them to security requirements, identifies gaps, and generates structured compliance documentation tied back to real evidence. The platform is built to support complex public-sector and regulated compliance efforts, especially federal authorization workflows such as FedRAMP and CMMC. Examples of functionality include automated control mapping, evidence traceability, draft narrative generation, readiness gap detection, machine-readable export support, and continuous alignment between changing infrastructure and compliance documentation.
  • 14
    DX360

    DX360

    NetImpact Strategies

    DX360 cybersecurity products are designed to cater specifically to the cybersecurity needs of federal organizations. With our Software-as-a-Service (SaaS) solutions, we provide a comprehensive approach to managing Information Technology (IT) and cyber risk, offering intelligent workflow, automated control selection, assessment, and continuous compliance monitoring. Our cybersecurity solutions are tailored to support the complex cybersecurity requirements of the federal government, enabling organizations to stay ahead of the ever-evolving threat landscape by continuously managing cyber risk and compliance through automation. We simplify IT security compliance in the government sector by delivering comprehensive solutions aligned with laws, regulations, and mandates such as FISMA, FedRAMP, NIST 800-83, CIRCIA, and C-SCRM. By leveraging DX360, agencies can take full control of their cyber risk management, ensuring the protection of their IT portfolio.
  • 15
    Microsoft 365 GCC
    Microsoft 365 Government Community Cloud (GCC) is a cloud-based productivity and collaboration platform tailored for U.S. government agencies and eligible contractors, providing the core Microsoft 365 tools within a secure, regulated environment designed to meet federal compliance requirements. It operates as a separate instance of Microsoft 365, built on Azure infrastructure but logically isolated from commercial environments to ensure enhanced security, data protection, and regulatory alignment. It is certified to standards such as FedRAMP and DFARS, enabling organizations to handle Controlled Unclassified Information (CUI) and other sensitive data while maintaining compliance with government mandates. Data is stored within U.S.-based data centers and managed under strict access controls, including restrictions to screened U.S. personnel, ensuring data sovereignty and security.
  • 16
    Apache Knox

    Apache Knox

    Apache Software Foundation

    The Knox API Gateway is designed as a reverse proxy with consideration for pluggability in the areas of policy enforcement, through providers and the backend services for which it proxies requests. Policy enforcement ranges from authentication/federation, authorization, audit, dispatch, hostmapping and content rewrite rules. Policy is enforced through a chain of providers that are defined within the topology deployment descriptor for each Apache Hadoop cluster gated by Knox. The cluster definition is also defined within the topology deployment descriptor and provides the Knox Gateway with the layout of the cluster for purposes of routing and translation between user facing URLs and cluster internals. Each Apache Hadoop cluster that is protected by Knox has its set of REST APIs represented by a single cluster specific application context path. This allows the Knox Gateway to both protect multiple clusters and present the REST API consumer with a single endpoint.
  • 17
    Microsoft 365 GCC High
    Microsoft 365 Government Community Cloud High (GCC High) is a highly secure, compliance-focused cloud productivity platform designed specifically for U.S. federal agencies and defense contractors that handle sensitive or regulated data, extending the core Microsoft 365 applications within a hardened, government-only environment. It runs on Azure Government infrastructure and is logically isolated from commercial Microsoft 365 environments, ensuring that all customer data is stored exclusively in U.S.-based data centers and accessible only by screened U.S. personnel, reinforcing strict data sovereignty and access controls. It is built to meet the most stringent regulatory standards, including FedRAMP High, DFARS, ITAR, CMMC, and Department of Defense security requirements, making it suitable for handling Controlled Unclassified Information (CUI) and other export-controlled or defense-related data.
  • 18
    Salesforce Government Cloud
    Government cloud plus is designed to meet the security needs of U.S. federal, state, and local customers, U.S. government contractors, and federally funded research and development centers. (FFRDCs) so organizations can focus on what matters most — the mission. Improve customer satisfaction and employee efficiency through easy-to-use business applications for federal, state, and local agencies, government contractors, and aerospace and defense organizations. Rigorous security monitoring and remediation program aligned with FedRAMP and DoD requirements - including annual third-party assessments (3PAO) to evaluate security controls. Get direct access to our highly skilled U.S. citizen support team for expert answers fast – whether you have how-to questions, technical issues, or need to troubleshoot code.
  • 19
    Xacta

    Xacta

    Telos

    Xacta® is an IT and cyber risk management platform designed to help you meet the complex challenges of managing IT and cyber risk with intelligent workflow, automated control selection and assessment, and continuous compliance monitoring. Deployed at some of the world’s most security-conscious organizations, Xacta enables you to continuously manage your cyber risk and security compliance initiatives through the power of automation. Xacta administers the key elements of more than 100 leading regulations and policies for IT security compliance in government and commercial markets, including the NIST RMF, RMF for DoD IT, CNSS 1253, NIST CSF, and FedRAMP. Streamline compliance process for the leading government and industry standards and frameworks. Dynamically map IT assets, vulnerabilities, and controls sets (map once, comply with many standards).
  • 20
    Hathr AI

    Hathr AI

    Hathr AI

    HIPAA-compliant AI Chat Tool, API, and Enterprise Solutions powered by Anthropic's Claude, Hathr AI empowers healthcare providers, insurers, and anyone who needs to deal with HIPAA Controlled Data to automate and streamline operations without compromising on data security. Hosted in AWS GovCloud's FedRAMP high environment and Hathr AI helps teams ensure that all data interactions remains confidential and protected against unauthorized access. It allows users to automate tasks such as patient note summarization, pre-authorization writing, and insurance claim submissions on a unified interface. Leveraging models, such as Claude 3.5 Sonnet, Hathr AI provides a private, HIPAA-compliant AI environment, ensuring that sensitive data remains within control. Teams can retrieve and summarize information from extensive medical records, enabling informed clinical decisions.
    Starting Price: $45/month
  • 21
    Issio

    Issio

    Issio Solutions

    Issio is a company dedicated to delivering the latest technology and outstanding customer support to VA Health System frontline employees, managers and leadership. Issio’s technology is designed to be easy to learn and use and to help every individual who interacts with it. Issio’s ultimate goal is to help our users optimize efficiency, communication, safety, and quality of care. Issio meets the FedRAMP security requirements and is an authorized cloud service provider for the federal government and VA. Our support staff is with you on every step of your journey of growth, starting the moment you make the switch from spreadsheets or any other staffing software.
  • 22
    RegScale

    RegScale

    RegScale

    Shift left security with compliance as code. End audit fatigue by automating every phase of your control lifecycle. RegScale’s CCM platform delivers always-on readiness and self-updating paperwork. Integrate compliance as code into the CI/CD pipelines, speed certification, reduce costs, and future-proof your security posture with our cloud-native solution. Determine where to get started on your CCM journey and move your risk and compliance program into the fast lane. Integrate compliance as code to generate outsized ROI and rapid time-to-value in 20% of the time and money of legacy GRC tools. The fastest way to FedRAMP with automated generation of artifacts, simplified assessments, and industry-leading support for compliance as code with NIST OSCAL. With dozens of integrations with leading scanners, cloud hyper-scalers, and ITIL tools, we provide plug-and-play automation for evidence collection and remediation workflows.
  • 23
    Rizkly

    Rizkly

    Rizkly

    Cybersecurity and data privacy compliance is now a continuous process and there’s no turning back. Rizkly is the answer to firms that must meet these growing requirements in an efficient and effective manner to keep growing the business. Rizkly keeps you on top of compliance with a smart platform and expert guidance. Our platform and experts guide and help you achieve timely compliance with EU privacy laws. Protect healthcare data and switch to a faster, more affordable path to privacy protection and cyber hygiene. Get a prioritized PCI compliance action plan and the option to have an expert keep your project on track. Gain from our 20+ years of SOC audit and assessment experience. Move faster with a smart compliance platform. Rizkly is your OSCAL compliance automation platform. Import your existing FedRAMP SSP and say bye to editing Word SSP fatigue. Rizkly is the efficient path to achieving FedRAMP authorization and continuous monitoring.
  • 24
    mLINQS

    mLINQS

    mLINQS

    Relocation cost management does not have to be expensive or complicated anymore. mLINQS cloud-based, FedRAMP authorized, permanent change of station (PCS) solution fully automates the expense management and policy compliance processes, so your team can better focus on its real jobs – mission accomplishment and transferee satisfaction. Automates expense management from the order, amendments, receipts, vouchers, payments, de-obligations, to taxes. Fully configurable to meet all federal, IRS, and corporate/agency relocation regulations, including FTR, JTR, DSSR, and FAR. Tracks and stores all relocation data in a central repository for inspecting, transforming, and modeling data for analysis in supporting management decision-making. From uploading a picture of a receipt on a phone to submitting expense documents for approval to calculating all the taxes to aggregating costs into a quarterly report, mLINQS manages it all.
  • 25
    AccuKnox

    AccuKnox

    AccuKnox

    AccuKnox provides a zero trust Cloud Native Application Security (CNAPP) platform. AccuKnox is built in partnership with SRI (Stanford Research Institute) and is anchored on seminal inventions in the areas of container security, anomaly detection, and data provenance. AccuKnox can be deployed in public and private cloud environments. AccuKnox runtime Security helps you discover the application Behavior of the workloads running in a public cloud, private cloud, or on-prem in VM/BareMetal or local Kubernetes orchestrated cluster or unorchestrated pure-containerized cluster. If any ransomware attacker tries to compromise the security of the pod and gets access to the vault pod, they can do a command injection and encrypt the secrets stored in the volume mount points. Then the organizations have to pay millions of dollars to get back their secrets decrypted.
    Starting Price: $999 per month
  • 26
    Samsung Knox Suite
    Knox Suite is an all-in-one enterprise mobility solution designed to secure, deploy, manage, and analyze work devices across their entire lifecycle. Built on the Samsung Knox platform, it enables organizations to safeguard device fleets and corporate data by detecting vulnerabilities, enforcing security patches, verifying device integrity remotely, and locking or wiping devices when needed. Deployment is streamlined with automated enrollment options, such as QR-code setup or bulk provisioning by certified resellers, and devices seamlessly integrate into the Knox ecosystem with a unified single-sign-on admin experience. Device and app management is handled centrally: IT teams can define granular policies by location, time, network status, or device state; control OS versions and updates; distribute, configure, or remove apps; and lock down lost or stolen devices.
  • 27
    Accellion

    Accellion

    Accellion

    The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.
    Starting Price: $15.00/month/user
  • 28
    Microsoft 365 Government
    Microsoft 365 Government is a cloud-based productivity, security, and collaboration platform specifically designed to meet the strict compliance and regulatory requirements of U.S. government agencies and contractors handling controlled or sensitive data. It provides the same core capabilities as standard Microsoft 365 but operates within isolated government cloud environments (GCC, GCC High, and DoD) that are built to comply with standards like FedRAMP High, CJIS, IRS 1075, DFARS, and DISA security guidelines. It ensures that customer data is stored within the United States, logically segregated from commercial environments, and accessible only to screened U.S. personnel, providing an additional layer of security and trust. It supports secure collaboration, remote work, and workflow automation while integrating advanced security features such as threat protection, data loss prevention, and identity management.
  • 29
    Ezeelogin

    Ezeelogin

    Ezeelogin

    Setup a self-hosted Jump server (also called “Bastion Host” or “Jump host”) quickly to manage SSH access to your Linux servers, Routers, Switches, and Cloud instances. Our jump box software has features like 2-factor authentication, SAML Authentication, SSH session recording, Identity and Access Management (IAM), RBAC, Privileged Access Management (PAM), SSH key rotation, and root password management, and much more. It would help you meet security compliances such as PCI, NIST, ISO 27001, and more, to know more visit us. Many companies, including fortune 500 companies are using Ezeelogin SSH Jump Server to meet various security compliances such as PCI DSS 3.2, ISO 27001, GDPR, HIPAA, FFIEC, NIST, FedRamp, SOC, SOX, and much more while accessing Linux servers, Routers, Switches, Cloud instances & containers they manage over ssh. Save millions of dollars annually managing and administering your server infrastructure and cloud instances. Moreover, security is priceless.
    Starting Price: $1.99 per month
  • 30
    Virtual Employee Network (VEN)

    Virtual Employee Network (VEN)

    Relocation Management Worldwide

    RMW utilizes our cloud-based GSA FedRAMP authorized Virtual Employee Network (VEN) to fully automate/modernize permanent change of station operations across the federal government. Our intuitive software allows stakeholders (traveler, approving officials, travel office, HR office) to work collaboratively to build travel authorization (TA), amendments, manage HHGs, and allow employees to self-initiate voucher submissions via Q&A interview. VEN utilizes APIs to auto-calculate TA cost estimate and PCS voucher payments. A travel portal allows travelers and travel office to submit and process vouchers via automated workflow. Report module gives agencies visibility into all relocation associated expenses (obligation, voucher disbursements, HHGs invoicing) and taxes (WTA, FICA, Medicare, State, Local, W2) that support audit readiness and used for decision support and metric analysis. VEN business rules are configured IAW FTR, JTR, DSSR, and FAR regulations along with agency specific policies.
  • 31
    Liam

    Liam

    Compufram

    Robust Capabilities. Liam simplifies complex lifecycle asset management by providing Barcode Scanning. Scan barcodes and QR codes to quickly auto populate forms and view relevant information. Data Visualization. Uncover hidden data insights and view performance data with Power BI. Enterprise Security. Enjoy advanced security and, for government customers, FedRAMP Moderate and High compliance. Geospatial Data. Track current asset location, deployment history, and site information. Inspections. Perform asset inspections, view historical results and unlock hidden data insights. Repair Management. Create work orders, manage replacement parts, and track contractor and vendor work. >40% Faster Inspections (on average), 99.9% System Uptime (Microsoft SLA). 100% FedRAMP Moderate Impact Compliance. Quickly Complete Field Inspections. Skip the Data Entry. Complete and view inspections on any asset from one pane of glass. Online or offline.
    Starting Price: $50 per user, per month
  • 32
    InfoStrat

    InfoStrat

    InfoStrat

    Having developed Microsoft Grants Manager Plus and its predecessors Microsoft Grants Manager and Microsoft Stimulus360 for Microsoft Corporation, we are the most experienced Microsoft partner in implementing these solutions. ​ InfoStrat Grants Manager Plus provides grantors with an all-in-one, integrated solution that simplifies the grants process from initial solicitation through review, scoring, award, payment processing and post award. Because Grants Manager Plus can be deployed on the Microsoft Cloud for Government, it is FedRAMP compliant, In addition to federal agencies, the solution accelerator is suitable for state & local agencies, educational institutions, associations and international government agencies.
  • 33
    PaymentKnox
    nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments. Founded and led by Alon Cohen, Founder & former CEO of CyberArk (NASDAQ: CYBR), nsKnox solutions help organizations avoid significant financial losses, heavy fines, and reputational damage. Cybercriminals today are using ever-more sophisticated techniques, such as vendor impersonation, business email compromise (BEC), and social engineering, to divert outgoing corporate payments to their own fraudulent accounts. As their success rates grow so does the financial damage incurred by targeted organizations. PaymentKnox™ for Accounts Payable introduces a technology-driven approach that enables organizations to minimize the risk of human error and prevent unauthorized payments.
  • 34
    CoreStack

    CoreStack

    CoreStack

    CoreStack, an AI-powered multi-cloud governance solution, empowers enterprises to rapidly achieve Continuous and Autonomous Cloud Governance at Scale. CoreStack enables enterprises to realize outcomes such as 40% decrease in cloud costs and 50% increase in operational efficiencies by governing operations, security, cost, access, and resources. CoreStack also assures 100% compliance with standards such as ISO, FedRAMP, NIST, HIPAA, PCI-DSS, AWS CIS & Well Architected Framework (WAF). CoreStack works with many large global customers across multiple industries including Financial Services, Healthcare, Retail, Education, Telecommunications, Technology and Government. CoreStack was recognized as IDC Innovator in Cloud Management Solutions and in the Gartner Magic quadrant for Cloud Management Platforms in 2020. CoreStack is a Microsoft Azure Gold & Co-Sell Partner and Amazon AWS Advanced Technology Partner.
    Starting Price: $49.00 per month
  • 35
    Permuta

    Permuta

    Permuta

    Permuta offers advanced, secure, user-friendly COTS products for military and federal agencies, addressing various workforce challenges in HR, operations, training, security, medical, assets, and more. Our application bundles, DefenseReady and FederalReady, are available through multiple contracts and can operate on-site or in a compliant IL5 DoD cloud. ✓ Workforce & Asset Management Software. ✓ Proven To Enhance Readiness & Decision Making. ✓ COTS Software For Military & Federal Civilian Agencies. ✓ Hosted In A Fedramp Compliant Il6 Dod Cloud Or Lower.
  • 36
    Kiteworks

    Kiteworks

    Kiteworks

    The only security platform authorized by FedRAMP that provides support for file sharing, managed file transfer, and email data communications to meet the compliance requirements of standards such as CMMC 2.0, ITAR, IRAP, NIS 2, HIPAA, and others. A content communication “tool soup” ratchets up cost and resource inefficiencies. Managing zero-trust security policies centrally is virtually impossible, and organizations lack consolidated security and compliance visibility over the communications of sensitive content, which increases security and compliance risks. Compliance and security risks increase due to the lack of governance. Organizations must control and track who can access content, who can edit it, to whom it can be sent and shared, and where it is sent and shared. Cybercriminals and malicious insiders target sensitive content like PII, IP, financial documents, and PHI because it can be monetized or even weaponized.
  • 37
    Spectro Cloud Palette
    Spectro Cloud’s Palette is a comprehensive Kubernetes management platform designed to simplify and unify the deployment, operation, and scaling of Kubernetes clusters across diverse environments—from edge to cloud to data center. It provides full-stack, declarative orchestration, enabling users to blueprint cluster configurations with consistency and flexibility. The platform supports multi-cluster, multi-distro Kubernetes environments, delivering lifecycle management, granular access controls, cost visibility, and optimization. Palette integrates seamlessly with cloud providers like AWS, Azure, Google Cloud, and popular Kubernetes services such as EKS, OpenShift, and Rancher. With robust security features including FIPS and FedRAMP compliance, Palette addresses needs of government and regulated industries. It offers flexible deployment options—self-hosted, SaaS, or airgapped—ensuring organizations can choose the best fit for their infrastructure and security requirements.
  • 38
    Google Cloud Assured Workloads
    You don’t have to choose between supporting regulatory compliance and using the latest, most innovative cloud services. Help manage the requirements for your regulated workloads with just a few clicks. Reduce costs and risk through simplified management of required controls. The FedRAMP High platform controls support access controls for first and second-level support personnel who have completed enhanced background checks and are located in the US. The CJIS platform controls support access controls for first- and second-level support personnel who have completed state-sponsored background checks and are located in the US. Escorted session controls are also used to supervise and monitor support actions by non-adjudicated staff.
  • 39
    Ignyte Assurance Platform

    Ignyte Assurance Platform

    Ignyte Assurance Platform

    Ignyte Assurance Platform is an AI-enabled integrated risk management platform that helps organizations from different industries implement simplified, measurable, and repeatable GRC processes. One of the main objectives of this platform is to ensure that users are able to easily keep up and comply with changing regulations, standards, and guidelines related to cybersecurity. Ignyte Assurance Platform provides users with automated ways of continuously monitoring and assessing how their organization is adhering to the requirements specified under GDPR, HIPAA, PCI-DSS, FedRAMP, FFIEC, FISMA, and PCI-DSS. Security frameworks and regulations are automatically mapped to the internal controls and policies they are implementing. The compliance management platform also offers audit management capabilities that make it easy for users to gather and organize the pieces of information and evidence needed by external auditors.
  • 40
    AWS GovCloud
    Amazon's Regions designed to host sensitive data, regulated workloads, and address the most stringent U.S. government security and compliance requirements. AWS GovCloud (US) gives government customers and their partners the flexibility to architect secure cloud solutions that comply with the FedRAMP High baseline; the DOJ’s Criminal Justice Information Systems (CJIS) Security Policy; U.S. International Traffic in Arms Regulations (ITAR); Export Administration Regulations (EAR); Department of Defense (DoD) Cloud Computing Security Requirements Guide (SRG) for Impact Levels 2, 4 and 5; FIPS 140-2; IRS-1075; and other compliance regimes. AWS GovCloud (US-East) and (US-West) Regions are operated by employees who are U.S. citizens on U.S. soil. AWS GovCloud (US) is only accessible to U.S. entities and root account holders who pass a screening process. AWS GovCloud (US) Regions can help customers address compliance at every stage of their cloud journey.
    Starting Price: $0.02 per GB
  • 41
    Knox

    Knox

    Pinterest

    Knox is a secret management service. Knox is a service for storing and rotation of secrets, keys, and passwords used by other services. Pinterest has a plethora of keys or secrets doing things like signing cookies, encrypting data, protecting our network via TLS, accessing our AWS machines, communicating with our third parties, and many more. If these keys become compromised, rotating (or changing our keys) used to be a difficult process generally involving a deploy and likely a code change. Keys/secrets within Pinterest were stored in git repositories. This means they were copied all over our company's infrastructure and present on many of our employees laptops. There was no way to audit who accessed or who has access to the keys. Knox was built to solve these problems. Ease of use for developers to access/use confidential secrets, keys, and credentials. Confidentiality for secrets, keys, and credentials. Provide mechanisms for key rotation in case of compromise.
  • 42
    Hypori

    Hypori

    Hypori

    Hypori is a secure virtual workspace platform that enables employees to access enterprise apps and data from personal mobile devices with total privacy. It streams pixels instead of data, ensuring that no sensitive information is stored or transmitted on the device. Hypori is designed to simplify Bring Your Own Device (BYOD) adoption by protecting personal privacy while maintaining organizational security and compliance. The platform supports industries with stringent requirements such as defense, government, healthcare, and other regulated sectors. Hypori meets robust certifications including FedRAMP High, CMMC, HIPAA, and others. It offers role-based virtual workspaces that isolate corporate data from personal apps, reducing risk and liability.
  • 43
    Dynamics 365 Customer Insights
    Reduce cost-per-conversion using AI-driven insights and automated workflows with personalized recommendations that maximize customer lifetime value. Easily balance privacy and personalization with consent data that’s automatically updated and classification labels that help keep information secure. Ingest transactional, behavioral, and demographic data to create deep insights and complete, up-to-date customer profiles that honor customer consent. Shorten sales cycles, reduce churn, and keep customers for life by acting on customer signals and feedback in real time. Exceed privacy standards and comply with the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) regulations and accessibility guidelines. The enterprise-grade solution has received more than 70 security and compliance certifications including ISO, EU Model Clauses, HITRUST, SOC, HIPAA, FERPA, and FedRAMP.
    Starting Price: $1,000 per tenant per month
  • 44
    Samsung Blockchain Wallet
    Keep your valuables safe and secure with Samsung Blockchain. With added protection from Knox, Samsung Blockchain Keystore and Wallet keeps your virtual assets secure. Also, Private Share ensure that your valuable data and information are managed and shared without risking your privacy. Samsung Blockchain Wallet brings secure virtual asset management to mobile. Support for major and non-major virtual assets are regularly updated and include favorites like Bitcoin, Ethereum, ERC20, Tron and more. The future of data security lies in blockchain tech. Samsung Blockchain keeps your private key in a single, secure location and provides encryption for your data files with this private key. With additional protection from Samsung Knox and Trusted Execution Environment (TEE), your virtual assets are protected and your files are shared securely with private share.
  • 45
    Azure Media Services
    Use high-definition video encoding and streaming services to reach your audiences on the devices they use. And enhance content discoverability and performance with AI. All while helping to protect your content with digital rights management (DRM). Multi-channel pipeline that orchestrates video and audio analysis and incorporates cues into a single timeline. Web interface for easy evaluation and integration, plus easy-to-use web widgets and REST APIs. Intuitive customization and management features, letting you train and fine-tune selected models to improve indexing accuracy. Compliance with regulations including HIPAA, ISO 27001-27018, FedRAMP, HITRUST, and PCI. Increase the discoverability of your audio and video content by automatically extracting advanced metadata. Enhance your apps with new forms of detectable content like spoken words, written text, and faces, as well as speakers, celebrities, and emotions.
    Starting Price: $0.02003 per minute
  • 46
    Knox

    Knox

    Knox Custody

    Bitcoin custody that is insured to the full value of holdings for the risk of theft and loss, including collusion. No need to blindly trust Knox. We made it such that we cannot be evil and only focus on warehousing services. Collusion-resistant private key management is the nut we’ve cracked after years of R&D to isolate critical risks. For insurance, the devil is in the details. Most policies covering Bitcoin theft and loss fall short and provide a false sense of security. All Knox custody accounts are insurable up to the full value of holdings. Insurance limits are exclusively allocated to each client account. Signed certificates attesting to our insurance guarantees. For CFOs and executive teams who want bitcoin in their corporate treasury. Whether you are a small business or a listed enterprise, we will help you efficiently buy and securely custody bitcoin.
  • 47
    RAMP

    RAMP

    Shanrohi Technologies

    RAMP is an integrated garage management software which rapidly cuts down on the admin time and helps you focus more on fixing cars. It is a smart car service software with all the features useful for day to day auto service management process. Accelerate your workshop business success with RAMP. RAMP's cloud based application offers you complete data security and control. It is fully automated and offers secure online and local data backups. RAMP's cloud based application offers you complete data security and control. It is fully automated and offers secure online and local data backups. Just pay as you go!
    Starting Price: $150 per month
  • 48
    CircleCI

    CircleCI

    CircleCI

    Automate your development process with CI hosted in the cloud or on a private server. Take control of your code and manage every source of change. CircleCI means change validation, at every step. Trust that you can release updates right when your customers need them, with the certainty they’ll work every time. The power to create without limits. Code in every language and across multiple execution environments. If you can write it, we can build, test, and deploy it. With flexible environments and thousands of pre-built integrations, your pipelines never limit the possibility of what you can deliver. We’re the only CI/CD platform that’s FedRAMP certified and SOC 2 Type II compliant. Built-in features like audit logs, OpenID Connect, third-party secrets management, and LDAP give you complete control of your code.
    Starting Price: $50 per month
  • 49
    Query Federated Search
    Query is a federated search platform delivering a single search bar to access all your security-relevant data, wherever it is stored. The Query Federated Search Platform unlocks access to and value from cybersecurity data wherever it is stored (in the cloud, third-party SaaS, or on-prem), regardless of vendor or technology, and without requiring centralization. This leads to massive cost savings, more efficient security operations across real-time and historical data sources, and reduced security analyst ramp-up time.
  • 50
    Relution

    Relution

    Relution

    Manage iOS, Android, and Windows 10/11 devices. Secure via restrictions and configurations. Use Apple DEP & VPP, Android Enterprise & Samsung Knox. Inventory and manage native and public Apple, Android, and Windows mobile apps. Review, approve, and publish apps for usage on mobile devices. Enable employees, partners, and external stakeholders to access your enterprise apps through your own app store in your corporate identity. Manage your Apple iOS and Android tablets easily and securely and deploy the right apps in your school. Companies, Authorities and Teams of every size benefit from Relution's Mobile Device and App Management. Resellers, Educational Institutions and IT Retailers use Relution to provide the service to their customers. Relution is one of the most relevant IT applications in the digital education space. For over 10 years, Relution has been the mobile device management solution for privacy-compliant and cross-platform device management.
    Starting Price: $2 per month