27 Integrations with LoginTC

View a list of LoginTC integrations and software that integrates with LoginTC below. Compare the best LoginTC integrations as well as features, ratings, user reviews, and pricing of software that integrates with LoginTC. Here are the current LoginTC integrations in 2024:

  • 1
    SiteMinder

    SiteMinder

    SiteMinder

    SiteMinder’s high-converting online hotel booking engine empowers you to maximize bookings from your hotel website and reduce dependency on third-party sales channels. Grow your direct online bookings with zero commission. Make booking easy for your guests. Simple 2-step booking process. Mobile-friendly so guests can book on all devices. Slick and modern design allows you to visually present your hotel’s offering in the best way possible. Remove manual entry and guesswork with automation. Reach, attract, and convert more guests with SiteMinder’s platform. SiteMinder’s #1 ranked Booking Engine brings demand right to your front door. Available with the world’s leading hotel commerce platform and designed from the ground up to optimise every step of the direct hotel booking experience, this is your chance to control your booking journey.
    Starting Price: $56 per month
    View Software
    Visit Website
  • 2
    Freshdesk

    Freshdesk

    Freshworks

    Freshdesk is a cloud-based customer service software that helps businesses provide exceptional customer service across every customer touchpoint. With Freshdesk, businesses can: - Manage customer conversations across multiple channels such as email, phone, chat, social media, etc., from a unified view - Improve agent productivity with smart workflow automation rules - Deliver seamless self-service experiences with AI-powered chatbots and branded help centers - Monitor key performance metrics with advanced analytics and custom reports Over 50,000+ customers including Hugo Boss, Toshiba, Cisco, The Atlantic, Chargebee, Grofers, and PhonePe trust Freshdesk to help them provide faster customer service with ease.
    Leader badge
    Starting Price: $15.00/month/user
  • 3
    Windows 11

    Windows 11

    Microsoft

    Windows 11 provides a calm and creative space where you can pursue your passions through a fresh experience. From a rejuvenated Start menu to new ways to connect to your favorite people, news, games, and content—Windows 11 is the place to think, express, and create in a natural way. Access all the apps you need and multi-task with ease with tools like snap layouts, desktops, and a new more-intuitive redocking experience. Connect instantly to the people you care about right from your desktop with Microsoft Teams. Call or chat for free—no matter what device they’re on. With Microsoft Edge and a multitude of Widgets you can choose from, you can quickly stay up to date with the news, information, and entertainment that matters most to you. Easily find the apps you need and the shows you love to watch in the new Microsoft Store.
  • 4
    Windows 10

    Windows 10

    Microsoft

    To get started, you will first need to have a license to install Windows 10. You can then download and run the media creation tool. For more information on how to use the tool, see the instructions below. If you are installing Windows 10 on a PC running Windows XP or Windows Vista, or if you need to create installation media to install Windows 10 on a different PC, see Using the tool to create installation media (USB flash drive, DVD, or ISO file) to install Windows 10 on a different PC section below. You have a license to install Windows 10 and are upgrading this PC from Windows 7 or Windows 8.1.
  • 5
    Ivanti NAC

    Ivanti NAC

    Ivanti

    Achieve complete visibility and Network Access Control (NAC) for all local or remote endpoints. Automatically detect, classify, profile and monitor rogue network devices and their security state. Automated, sponsored and time-based guest access. UEBA to detect IoT rogue devices, DGA attacks and MAC spoofing.
  • 6
    Dropbox

    Dropbox

    Dropbox

    Dropbox Business is more than just secure file storage—it’s a smart workspace where teams, tools, and content come together. Create, store, and share cloud content from Google Docs, Sheets, and Slides, Microsoft Office files, and Dropbox Paper alongside traditional files in Dropbox. Dropbox Spaces brings your files and cloud content together, so that your PowerPoints can live next to your Google Docs, Trello boards, and whatever tools your team wants to use. Easily access your team’s work from your computer, mobile device, or any web browser. Keep your team’s files and the conversations about them in the same place by connecting tools like Slack and Zoom. Intelligently suggested files and folders keep your team one step ahead by giving everyone the content they need, when they need it. A secure, distributed infrastructure—plus admin tools for control and visibility—keep your company’s data safe on Dropbox.
    Leader badge
    Starting Price: $12.50 per month per user
  • 7
    OpenVPN

    OpenVPN

    OpenVPN

    While others have virtualized software that is used to run on their specialized hardware appliance, our solution was conceived and has been optimized to run as a software application from the get-go. We make our VPN server software available in many forms to ease the deployment of your VPN. Do you plan to extend your datacenter into an IaaS Cloud, provide remote access to private Cloud applications and resources, or create a multi-cloud private overlay network? Do it securely, easily and quickly by installing our VPN Server on the Cloud. Have you transformed your datacenter over to a virtualized environment? If yes, we have made installation of our Server software easier by packaging it as a virtual appliance for two of the popular hypervisor solutions: VMware ESXi 5.0 and Microsoft Hyper-V. VPN Server is available on both 32-bit and 64-bit Linux Operating Systems. Red Hat Enterprise Linux, CentOS, Ubuntu, Debian, and openSUSE are supported.
    Starting Price: $15 per user per year
  • 8
    WatchGuard Network Security

    WatchGuard Network Security

    WatchGuard Technologies

    Our products provide your security systems with complete, uncompromising visibility into your network. You will find that this helps to keep pace with increasing network speed and complexity, while gaining the insight needed to better detect and contain breaches, and achieve a rapid recovery. By implementing Network Critical solutions you can improve your existing security system's network performance, therefore increasing your ROI. Firstly, SPAN ports. These have been a long-term, insufficient, solution to network security. It is remarkably easy for hackers to infiltrate routers, switches and entire networks without detection. SPAN does not provide access to real-time information either, which is another key issue that may greatly affect your network's security. This is because SPAN ports groom your data, unlike Network TAPs, that act as a window, where you can look through at any time, in real-time.
  • 9
    Radius

    Radius

    Radius Bob

    CRM for insurance agencies. Never Lose a Lead or Client again because of misplaced information, hard drive crash, corrupted spreadsheet or a tipped over file cabinet. Organize and Manage all of your Leads & Clients with Radius. An all-in-one Solution for your Agency. No need for a separate email marketing software, use Radius to send Auto Responders, Drip Marketing, Mass Emails & SMS/Text Messages. Every Radius Lead & Client has its own history, reminders & tasks, notes, information, and file storage. Also using the Radius Dropbox helps keep your organized by automatically importing emails. Integrate Radius with how you do Business. Define Custom Form Fields, Lead Temperatures, Client Status and more. Ingrate Radius with your website, quote engine, lead vendor or third party app.
    Starting Price: $34 per month
  • 10
    WatchGuard Firebox Cloud
    It’s a fact – businesses are migrating services from on-premises servers into the cloud. Email servers, web servers, customer relationship management systems (CRM), and file storage are migrating to public cloud services. With so much sensitive data moving to the cloud, security is essential. WatchGuard’s Firebox Cloud allows network administrators to extend their security perimeter to the cloud and protect servers running within a public cloud environment. WatchGuard Firebox Cloud brings the protection of WatchGuard’s leading Firebox Unified Threat Management (UTM) appliances to public cloud environments. Firebox Cloud can quickly and easily be deployed to protect a Virtual Private Cloud (VPC) from attacks such as botnets, cross-site scripting, SQL injection attempts, and other intrusion vectors.
  • 11
    pfSense

    pfSense

    Netgate

    The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and including third party free software packages for additional functionality. pfSense software, with the help of the package system, is able to provide the same functionality or more of common commercial firewalls, without any of the artificial limitations. It has successfully replaced every big name commercial firewall you can imagine in numerous installations around the world, including Check Point, Cisco PIX, Cisco ASA, Juniper, Sonicwall, Netgear, Watchguard, Astaro, and more.
  • 12
    GlobalProtect

    GlobalProtect

    Palo Alto Networks

    The modern workforce is more mobile than ever, accessing the network from any place on any device, at any time. Endpoint antivirus and VPN technologies aren’t enough to stop advanced threats. By extending next-generation firewall capabilities through the GlobalProtect subscription, you can gain greater visibility into all traffic, users, devices, and applications. With GlobalProtect, organizations can extend consistent security policies to all users, while eliminating remote access blindspots and strengthening security. GlobalProtect safeguards your mobile workforce by using the capabilities of your Next-Generation Firewall to inspect all traffic—incoming and outgoing. Enable always-on IPsec/SSL VPN connection between a variety of endpoints and operating systems to deliver transparent access to sensitive data without risk. Quarantine compromised devices with immutable characteristics on internal and external networks.
  • 13
    Windows 7

    Windows 7

    Microsoft

    Windows 7 is an operating system for PC created by Microsoft. Windows 7 is not as current as Windows 10/11. Windows 7 was actively supported from October 2009 until January 2020. Many organizations still use Windows 7, even though it is not actively supported. It's recommended to upgrade to Windows 10/11.
  • 14
    Sophos UTM

    Sophos UTM

    Sophos

    Sophos UTM drives threat prevention to unmatched levels. The artificial intelligence built into Sophos Sandstorm is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Sophos UTM 9.4 is one of the first Sophos products to offer our advanced next-gen cloud sandboxing technology. Sandstorm provides a whole new level of ransomware and targeted attack protection, visibility, and analysis. It can quickly and accurately identify evasive threats before they enter your network. And, it’s tremendous value: it’s enterprise-grade protection without the enterprise-grade price-tag or complexity. Harden your web servers and Microsoft Enterprise Applications against hacking attempts while providing secure access to external users with reverse proxy authentication. Full SMTP and POP message protection from spam, phishing and data loss with our unique all-in-one protection.
  • 15
    Barracuda SSL VPN

    Barracuda SSL VPN

    Barracuda Networks

    Your army of road warriors and remote workers require a quick, flexible, reliable and completely secure way to connect to your internal enterprise applications, information and network resources. They want to do this from anywhere in the world, at any time and from any suitable device. The Barracuda SSL VPN provides the security and connectivity to deliver this access, via a web browser or virtually any mobile device. The Barracuda SSL VPN makes it easy for remote users to access internal applications and files. Unlike traditional VPN technologies, the Barracuda SSL VPN does not require any additional client software or complicated settings. Logging in from home or the road requires only a web browser and Internet connection. Upon login, users are presented with a portal of internal web applications or file shares. More advanced applications like Remote Desktop Services or Citrix XenApp are available to users running Java.
  • 16
    Array APV Series

    Array APV Series

    Array Networks

    Array APV Series application delivery controllers provide the availability, scalability, performance, security and control essential to keeping applications and servers running in their power band. Integrated local and global server load balancing, as well as link load balancing, ensure the highest levels of resiliency for your applications, while connection multiplexing, SSL offload, caching and compression work together to deliver the fastest end-user experience possible. What’s more, by terminating connections on APV Series ADCs, applications are protected behind Array’s WebWall® application security suite. Available as physical or virtual appliances, or on popular public clouds, Array ADCs are designed to meet technical requirements while remaining simple enough for any size IT team and affordable enough for any size business.
  • 17
    SonicWall Next Generation Firewall
    Advanced threat protection, from small businesses to global enterprises and cloud environments. Discover network security made boundless. Whether you’re a small business or a large enterprise, whether in your home or in the cloud, SonicWall next-generation firewalls (NGFW) provide the security, control and visibility you need to maintain an effective cybersecurity posture. SonicWall’s award-winning hardware and advanced technology are built into each firewall to give you the edge on evolving threats. With solutions designed for networks of all sizes, SonicWall firewalls are designed to meet your specific security and usability needs, all at a cost that will protect your budget while securing your network. The SonicWall NSv Series virtual firewall offers you all the security advantages of a physical firewall with the operational and economic benefits of virtualization, including system scalability and agility, speed of system provisioning, simple management and cost reduction.
  • 18
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 19
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 20
    F5 BIG-IP

    F5 BIG-IP

    F5 Networks

    Advanced technology for an app-centric world. Apps are your business. BIG-IP application services provide the availability, performance, and security you need to meet business demands. Keep your apps up and running with BIG-IP application delivery controllers. BIG-IP Local Traffic Manager (LTM) and BIG-IP DNS handle your application traffic and secure your infrastructure. You’ll get built-in security, traffic management, and performance application services, whether your applications live in a private data center or in the cloud. BIG-IP Diameter Traffic Management, BIG-IP Policy Enforcement Manager (PEM), and BIG-IP Carrier-Grade NAT (CGNAT) manage network resources to keep your applications performing at carrier-grade levels. They also help you identify ways to optimize and monetize your network, improving your bottom line.
  • 21
    VMware Cloud

    VMware Cloud

    Broadcom

    Build, run, manage, connect and protect all of your apps on any cloud. The Multi-Cloud solutions from VMware deliver a cloud operating model for all applications. Support your digital business initiatives with the world’s most proven and widely deployed cloud infrastructure. Leverage the same skills you use in the data center, while tapping into the depth and breadth of six global hyperscale public cloud providers and 4,000+ VMware Cloud Provider Partners. With hybrid cloud built on VMware Cloud Foundation, you get consistent infrastructure and operations for new and existing cloud native applications, from data center to cloud to edge. This consistency improves agility and reduces complexity, cost and risk. Build, run and manage modern apps on any cloud, meeting diverse needs with on-premises and public cloud resources. Manage both container-based workloads and traditional VM-based workloads on a single platform.
  • 22
    Citrix SD-WAN
    Your digital transformation depends on how well your virtual, cloud, and SaaS apps perform–across the enterprise and in branch locations. It’s time for a secure, high performance, always-available WAN Edge solution that provides exceptional experience and seamless business continuity. Optimize delivery of your virtual, cloud, and SaaS applications on a secure, flexible WAN. And manage it all with ease from a single pane of glass.
  • 23
    Fortinet SD-WAN
    Fortinet is the fastest-growing SD-WAN provider in market share by revenue. Fortinet SD-WAN delivers advanced routing, self-healing capabilities, and flexible security using network firewall or SASE-based cloud-delivered services—all in a single, integrated solution. Fortinet Secure SDWAN (software-defined wide-area network) solution enables enterprises to transform and secure all WAN edges. Leveraging the Security-driven Networking approach that uses one operating system and one centralized management console, enterprises realize superior user experience, enhanced security posture effectiveness with converged networking and security, and achieve operational continuity and efficiency. Fortinet Secure SD-WAN is designed to address modern complexity and threat exposure to support customers critical business needs. It is designed to evolve to future-proof and protect investments as customers embrace a digital-first journey and support work-from-anywhere.
  • 24
    OpenAM

    OpenAM

    Open Identity Platform

    If you have multiple sites and applications in your company, probably you need to provide seamless authentication to all of them. So when user logged in at one of your sites once, he does not need to enter his credentials on other sites. So, OpenAM can help you to solve all this issues. OpenAM ships with more than 20 authentication modules, which you can use to customize your authentication process. Also, you can customize sequence of authentication modules, to provide multi-factor or adaptive authentication. OpenAM can also manage authorization, so you can restrict access to desired resources according to different authorization policies. OpenAM allows to extend just any functionality, from authentication modules to user data source. Besides, it supports UI customization to create separate end-user pages with personal branding.
  • 25
    Dell Enterprise SONiC

    Dell Enterprise SONiC

    Dell Technologies

    Enterprise SONiC Distribution by Dell Technologies is purpose-built for enterprise, cloud-level large-scale data center network environments that require the advanced scalability, manageability and global support from the leader in Open Networking. Enterprise SONiC Distribution by Dell Technologies integrates Linux-based, open source SONiC with a focused roadmap of features and enhancements to meet the needs of tier 2 cloud and large-scale enterprise networking environments. Enterprise SONiC Distribution by Dell Technologies is enterprise-class tested, validated across hardware and software, and integrates an ecosystem of partner management applications. Global enterprise-level support you expect with a choice of services that align with the unique needs of your data center environment. Proactive and preventive technologies to help get ahead of issues before impact. Comprehensive offerings for both hardware and software support.
  • 26
    Cisco ASA

    Cisco ASA

    Cisco

    Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family. It delivers enterprise-class firewall capabilities for ASA devices in an array of form factors - standalone appliances, blades, and virtual appliances - for any distributed network environment. ASA Software also integrates with other critical security technologies to deliver comprehensive solutions that meet continuously evolving security needs.
  • 27
    Cisco ISE

    Cisco ISE

    Cisco

    A critical component of any zero-trust strategy is securing the workplace that everyone and everything connects to. Cisco Identity Services Engine (ISE) enables a dynamic and automated approach to policy enforcement that simplifies the delivery of highly secure network access control. ISE empowers software-defined access and automates network segmentation within IT and OT environments.
  • Previous
  • You're on page 1
  • Next