Alternatives to Mass Address

Compare Mass Address alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Mass Address in 2025. Compare features, ratings, user reviews, pricing, and more from Mass Address competitors and alternatives in order to make an informed decision for your business.

  • 1
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 2
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 3
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 4
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 5
    Terradoxa

    Terradoxa

    Terradoxa

    We created Terradoxa to offer the world a new approach to digital personal services. In a world where trust is no longer decreed but earned, and challenged every day, Terradoxa creates a link of trust between people, organizations and administrations. We are citizens, engineers, caregivers and parents, we want to enable democracy to perpetuate its traditional objectives of freedom, equality and fraternity while the threat of digital dictatorship and mass manipulation becomes a reality. Europe is not immune to the use of misguided digital technology, the coupling of which with video surveillance would lock us in an open-air prison. A removable identity to guarantee anonymity by default.
  • 6
    USAJOBS

    USAJOBS

    USAJOBS

    In order to better serve the public, OPM maintains accounts on third-party websites, such as social media sites, as tools for communicating with the public. Submitting personal information (address, telephone number, email address, etc.) is discouraged and is not required to interact with OPM’s accounts on third-party websites, or to access information on any OPM social media site. Multiple successive off-topic posts by a single user or repetitive posts copied and pasted by multiple users, or spam. Federal agencies use USAJOBS to host job openings and match qualified applicants to those jobs. USAJOBS serves as the central place to find opportunities in hundreds of federal agencies and organizations. The federal government relies on more than two million Americans and foreign nationals to work in the civil service. Citizens like you help the government fulfill its essential duties in service to the American people. You can find a way to serve at USAJOBS.
  • 7
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 8
    DigitalPersona

    DigitalPersona

    HID Global

    Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail, hospitality and commercial identity management requirements.
  • 9
    Meeco

    Meeco

    Meeco

    Increase trust, reduce friction through transparent personal data enabled services. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. Data breaches, identity theft and data malpractice have taken trust to an all-time low.​ Individuals are calling for a new social contract with businesses. As individuals gain the legal rights to manage and control their data, businesses need to re-think how they collect, store and exchange their customers information. The Meeco Labs program provides organisations an opportunity to test hypotheses and prove business value prior to making substantial investments. It is a custom designed process and pathway to new products, services, experiences and business models. Utilising the Meeco Platform and API suite, consent exchanged customer or citizen data is mapped directly to internal CRM, ERP or enterprise systems.
  • 10
    CREDEBL

    CREDEBL

    CREDEBL

    Effortlessly define and tailor credentials with our user-friendly schema template. Customize credentials for employees, customers, students, citizens, or any user, incorporating detailed schema information and intuitive controls for seamless management. Seamlessly issue digital credentials and explore a comprehensive overview on the platform for efficient credential verification and management. Securely connect with and receive credentials from diverse organizations & ecosystems with a simple tap on your screen. Instantly share the verifiable proof of your digital credential certificates. Empower your identity with selective (partial) disclosure on our SSI mobile wallet. Seamlessly present only the data you choose with confidence. Alternatively, you can share your personal milestones (e.g. achievements in sports) on social media directly.
  • 11
    AwareABIS
    Aware provides software and solutions for government-sponsored, biometrics-enabled citizen identification and credentialing systems. Aware’s innovative biometric solutions provide critical support to help ensure national security and protect citizen freedoms and liberties. A decades long commitment to R+D has earned us work with more than 80 government agencies. We know biometrics, security and compliance. At the heart of what we do for citizen ID is AwareABIS™, an Automated Biometric Identification System (ABIS) used for large-scale biometric identification and deduplication, with support for fingerprint, face, and iris modalities. Its highly modular architecture allows it to be configured and optimized for either civil or criminal applications. A fully featured biometric search platform, AwareABIS is differentiated by its open architecture and configurability.
    Starting Price: $2495.00/one-time/user
  • 12
    3ntity

    3ntity

    Hypermine

    3ntity is a decentralized identity layer for the internet, giving users control of their personal data and identity whilst digital enabling trust for businesses.
  • 13
    IdRamp

    IdRamp

    idRamp

    Turn your digital identity strategy into a business asset, not a liability. Stop spending time, money, and headcount replatforming insecure identity technology. Simplify authentication complexities with decentralized zero trust Identity from Idramp. Bring order to your identity management chaos. Accelerate delivery of services to meet the speed of business. Eliminate expensive platform upgrade projects with rapid modular deployment. Relieve the pain of bespoke integration with rapid integration that automatically interoperates with existing infrastructure. Tailor your customer experience with a modular architecture that eliminates vendor stack lock-in. Add zero trust identity with automated security policies and adaptive access controls. Control extensible ecosystems with state of the art data protection. Never trust but always verify that your applications and people are safe.
  • 14
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 15
    Bitdefender Identity Theft Protection
    Bitdefender Identity Theft Protection offers continuous monitoring of your personal information, including Social Security number, credit reports, dark-web exposure, and other identity details, with real-time alerts the moment risky activity is detected. It monitors your credit at one or three major bureaus, depending on the plan, tracks changes such as a new address or a loan taken out in your name, and keeps an eye on social-media activity, medical-ID misuse, and dark-web trading of your credentials. If an identity event occurs, the service includes 24/7 access to U.S.-based certified restoration specialists who assist with freezing accounts, disputing fraudulent charges, and navigating recovery. The higher-tier plan provides up to $2 million in identity-theft insurance and adds extra protections like alerts on bank, investment, and credit-card activity, court-records monitoring, and change-of-address tracking.
    Starting Price: $7.99 per month
  • 16
    Azure-AD-External-Identities
    Azure Active Directory External Identities, part of Microsoft Entra, provides highly secure digital experiences for partners, customers, citizens, patients, or any users outside your organization with customization controls. Combine external identities and user directories in one portal to seamlessly manage access across the organization. Give both onsite and remote employees seamless access to all their apps so they can stay productive anywhere. Automate workflows for easy user lifecycle management and provisioning. Save admin time and resources with self-service identity management for external users. Simplify access to thousands of pre-integrated software as a service (SaaS) applications with single sign-on from any location, on any device.
    Starting Price: $0.00325 per month
  • 17
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 18
    ICE Integrated Country Engine
    The ICE Engine e-Government platform provides the citizen with a singular, national identity through which his or her evolving relationship with the government is viewable as a 360 degree view. RLB Systems is a specialized developer, implementer and operator of technology-based government solutions. Our mission is to assist governments to enhance the service delivery experience of its citizens. It is through this enhanced citizen experience that revenue is grown and compliance is improved. With greater disposable income, the government is able to further enhance service delivery and in so doing, win the hearts and minds of its people. We believe in continuous improvement, and technical and service delivery excellence coupled with out-of-the-box thinking. We achieve our mission by iteratively adapting our solutions to the constantly changing landscape of needs.
  • 19
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
  • 20
    Thales OneWelcome Identity Platform
    The OneWelcome Cloud Identity Platform is a flexible platform that manages all your use cases for B2C, B2B and gig workers. This core platform can be expanded with a range of identity apps that combine to meet your organization’s specific needs. OneWelcome manages the European complexity of different eID’s, privacy laws, GDPR regulations, and languages for you. Our purpose is to lower the threshold for any European citizen or company that wants to connect. Create frictionless, secure and privacy protected access for your customers. Connect and protect your business-to-business ecosystem. Delegate and manage access to business partners, suppliers and your extended workforce. Get in touch to find out what the OneWelcome Cloud Identity Platform can do for your business and benefit from business enablement, operational efficiency, enhanced customer experience, improved security and facilitated compliance.
  • 21
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 22
    RSA SecurID

    RSA SecurID

    RSA Security

    RSA SecurID enables organizations of all sizes to mitigate identity risk and maintain compliance without impeding user productivity. It ensures users have appropriate access and confirms they are who they say they are with a modern, convenient user experience. In addition, RSA SecurID provides unified visibility and control across organizations’ many islands of identity. RSA SecurID marries multi-factor authentication with identity governance and lifecycle controls to address the security challenges associated with delivering convenient access to dynamic user populations across complex environments. It evaluates risk and business context to provide identity and access assurance. Digital transformation creates unprecedented authentication, access management and identity governance challenges for organizations. After all, more users need access to more systems from more devices than ever. RSA SecurID helps organizations address these challenges—and the identity.
  • 23
    Talao

    Talao

    Talao

    Thanks to the Talao Self-Sovereign Identity Platform, European companies and citizens can build a new future where their data and digital identities stay safe and owned by themselves. Talao provides protocols, wallets and innovative tools to allow businesses to offer customers services based on their identity, their data and their digital assets. Companies proposing loyalty cards, coupons, vouchers and other membership cards need way to identify their customers in Web3 Apps. Talao's SSI solution allows brands to have access to customers’ information without compromising on users’ data security and sovereignty. The introduction of self-sovereign identity (SSI) for e-government systems can strengthen the privacy of the citizens while enabling identification also for the weakest. ID Cards, Resident Cards, Diploma, Travel credentials, health insurance card. Many use cases to ease citizen's life are possible with Talao's SSI solutions.
  • 24
    TownCloud Agenda
    We have reimagined local government software with purpose-built solutions, the ability to trial every product before your purchase, affordable monthly subscriptions, and rapid implementations. TownCloud is the solution to simplifying, modernizing, and speeding up your local government workflow. With TownCloud Revenue, there are no more recycled batch processes to run or spreadsheets to update. Skip the buzzwords, connect with your citizens. TownCloud Engage makes it easy for people to do business with you. We follow the Americans with Disabilities Act (ADA) guidelines to ensure you are accessible. Our built-in transparency tools build trust with citizens. Functionality is focused and simple so it is a pleasure to do business. Agenda provides simple and efficient creation and management of meetings, minutes, and packets. Publish your with information with a single click. Flexibly display data for your local citizens with unlimited categories and views of data.
  • 25
    Disconnect

    Disconnect

    Disconnect

    Protect yourself from malicious internet tracking, ads, web content, and other privacy threats. We power privacy for over 750 million users. With one tap, easily deploy our powerful device-wide technology. Disconnect also offers the ability to encrypt your traffic to secure it from unwanted surveillance and mask your IP address when you use public Wi-Fi, travel, or want to keep your online activity more private. Accessing and controlling your personal data is big business for criminal hackers, data brokers, and adverse nation-states. Trackers profiting from the collection and sharing of personal information are embedded in 90% of apps, 75% of websites and 25% of emails. These tracker domains are capable of serving malicious ads, content, and malware. All this unwanted traffic presents significant privacy and security threats and also slows you down. Stop tracking of your online activity and identity.
  • 26
    Nuggets

    Nuggets

    Nuggets

    Whether you’re a bank, subscription service, telco or logistics company, Nuggets self-sovereign decentralized identity helps you deliver on your regulatory expectations while building competitive advantage. While your consumers enjoy more convenience, confidence and choice. With Nuggets, consumers get back control of their data and you become a champion of trust. Nuggets ties every transaction to a verified self-sovereign decentralized identity. This means the customer is verified as legitimate before they even connect to the service. This is a gold standard in digital identity, through private, secure proof of transactions. Nuggets ties every payment to a verified digital identity, preventing fraudsters from compromising identities online. Payment providers and merchants save money from reduced fraud, as well as delivering all the payment options customers want.
  • 27
    XYGATE Identity Connector
    Managing strong passwords and credentials is often a challenge. Ensuring they are stored properly, changed regularly, meet complexity and compliance requirements, and are auditable can be overwhelming to implement and manage. Current solutions for requesting and managing user access are outdated and inefficient. Processes are manual, complex, and don’t map to the core business initiatives driving change within the enterprise. Governance is often an afterthought, leaving many enterprises vulnerable to increased security risks and potential non-compliance with external regulations or internal corporate mandates. Visibility and control of NonStop user data directly from SailPoint IdentityIQ. Quickly detect risks and entitlement issues. Automate the provisioning process. Address account compliance concerns. SailPoint certified integration. CyberArk certified integration. Integrated with XYGATE Suite.
  • 28
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 29
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 30
    FYEO

    FYEO

    FYEO

    FYEO secures enterprises and individuals from cyber attacks with security audits, real-time threat monitoring and intelligence, anti-phishing solutions and decentralized identity management. End-to-end blockchain security services and auditing for Web3. Protect your organization and employees from cyberattacks with FYEO Domain Intelligence. Decentralized password management and identity monitoring services made simple. End user breach and phishing alert system. Uncover vulnerabilities and protect both your application and your users. Identify and address cyber risks across a company before you take on the liability. Protect your company from ransomware, malware, insider threats, and more. Our team works collaboratively with your development team to identify potentially critical vulnerabilities before they can be exploited by a malicious actor. FYEO Domain Intelligence delivers real-time cyber threat monitoring and intelligence to help secure your organization.
  • 31
    IdentityX
    Daon’s IdentityX is a multi-modal, vendor agnostic and future-proof identity services platform that addresses the full customer identity lifecycle. The key to trust in a digital identity is a unified, user-centric view of identity creation, use, and management. The IdentityX Platform provides the following core functions: Identity Establishment through account origination and digital onboarding, Omni-Channel Multi-Factor Authentication via mobile, web, and call center authentication, Identity Recovery and other device and account lifecycle management functions. Daon’s IdentityX Digital Onboarding product enables quick, accurate identity establishment for a range of purposes, including Anti-Money Laundering (AML) and Know Your Customer (KYC) checks.
  • 32
    GovMetric

    GovMetric

    GovMetric

    Harness the power of the customer's voice to design services​ that meet the needs of your citizens and communities​. Understand the customer experience across all your access channels and use customer insight to drive positive change. Streamline management of formal customer interactions including complaints and FOI requests. We can help you develop a future-proof strategy for transforming customer and community engagement. We help public service organizations create opportunities for positive, meaningful citizen engagements that lead to real change in people’s lives. We work with a diverse range of organizations including local authorities, housing associations, national transport agencies, county police forces, government agencies and public bodies, education providers, and the NHS. GovMetric is more than a technology platform: we have over seventy-five years of collective customer and citizen engagement expertise. We don't settle for being just another supplier.
  • 33
    citizenserve

    citizenserve

    Online Solutions, LLC

    The way you do business is changing. The ability to work virtually with your citizens, business owners and contractors is critical. Learn how citizenserve can help you. Enjoy stress-free, organized and intelligently comprehensive licensing application and renewal solutions. Imagine code violation concerns never falling through the cracks, and full mobile access for inspectors. Allow for online permit applications, processing and payments from citizens and contractors at a distance. Streamline and simplify application, review, resubmittal, public notification and hearing processes. Automatically accept and route online citizen requests to the appropriate department or person. Enjoy stress-free, organized and intelligently comprehensive licensing application and renewal solutions. Imagine code violation concerns never falling through the cracks, and full mobile access for inspectors. Allow for online permit applications, processing and payments from citizens and contractors.
    Starting Price: $900.00/year/user
  • 34
    OpenIAM

    OpenIAM

    OpenIAM

    Identity Governance and Web Access Management. As new employees join your organization, you face the conundrum of ensuring that they are given rights to all the systems and resources they need to do their work on the day they join the firm. Similarly, when a person changes positions within the firm, access that is no longer relevant must be revoked and access that is needed for their new position must be granted. For the situation of users leaving the firm or being terminated, it is even more imperative that permissions be addressed. Access to sensitive applications and data must be disabled/removed in a timely manner with traceability to avoid the consequences of a disgruntled user.
  • 35
    GOGov

    GOGov

    GOGov

    Government Made Simple - for citizens, staff and elected officials. GOGov is used by millions of citizens in over 200+ local governments and include solutions for Citizen Requests, Code Enforcement, Citizen Notifications and Online Permitting. GOGov Code Enforcement is an innovative and easy-to-use solution for managing all your Code Enforcement cases. Manage all aspects of your code enforcement case. Create letters & citations from templates in a single click. Help process annual and recurring types of inspections. Keep citizens informed with a trusted source of alerts, notifications, and events. Easily push your critical content to all of your important channels such as Email, Mobile, Twitter, Facebook, and Website. One place to access all notifications and important information directly from your local municipality. Push content to all important channels such as Email, Mobile, Twitter, Facebook and Website.
  • 36
    Clutch

    Clutch

    Clutch

    Clutch is addressing the increasingly critical challenge of non-human identity security within modern enterprises. As digital infrastructures expand and become more complex, the management and security of non-human identities, ranging from API keys and secrets to tokens and service accounts, have emerged as a pivotal yet often neglected aspect of cybersecurity. Recognizing this gap, Clutch is developing an enterprise platform dedicated to the comprehensive protection and management of these identities. Our solution is designed to fortify the digital backbone of enterprises, ensuring a secure, resilient, and trustworthy environment for their operations. Ever expanding, outpacing human identities by a staggering ratio of 45 to 1. Holds critical privileges and extensive access, essential for mission-critical automated processes. Lacks inherent security controls such as MFA and conditional access policies.
  • 37
    AI-Surge

    AI-Surge

    AI Surge Cloud

    AI-Surge Cloud is a No-Code Decision Intelligence Platform created to address the desire for non-technical users to make sense of their AI & BI initiatives. Our innovative platform uses human-guided, no-code AI Orchestration to build prediction models trained using past real-time data for any industry, enabling citizen data scientists to make predictions with unprecedented accuracy without writing a single line of code.
  • 38
    Stable

    Stable

    Stable

    Stable is a virtual address and mailroom solution designed for businesses seeking to manage their physical mail digitally. It provides a permanent business address usable with the IRS, state agencies, banks, and vendors, ensuring that businesses never have to change addresses again. Stable offers change-of-address guidance, including pre-filled paperwork and personalized checklists, to facilitate the transition. Through its virtual mailbox, Stable digitizes all received mail, allowing users to view and manage it online. Features include scanning, forwarding, storing, shredding, and depositing checks. It accepts packages from all major carriers and provides high-quality scans of mail contents upon request. Mail can be forwarded globally, with options for bulk forwarding to reduce shipping costs. Physical mail is stored for 30 days before secure shredding, while digitized documents are stored indefinitely.
    Starting Price: $49 per month
  • 39
    Aspen IoT Analytics Suite
    AspenTech is a leading provider of enterprise asset performance management, asset performance monitoring, and asset optimization solutions. AspenTech’s suite of asset management software helps organizations to streamline engineering and maintenance processes, leading to reduce downtime and increase operational efficiency. Addresses analytics needs of everyone without technical or coding skill. Empower citizen data scientists with advanced analytics libraries. Share high value insights seamlessly between individuals and organizations.
  • 40
    Hayden AI

    Hayden AI

    Hayden AI

    The world’s most innovative cities use Hayden AI’s sensors, software, and data to improve urban mobility and quality of life for their communities. A technology-first approach to road safety and traffic flow. Convert public and private vehicles into street sensors with our AI powered perception systems and citizen app. Generate a real-time digital twin of the city by fusing mobile sensors with citizen-driven data. Enable community and stakeholder participation through accessible digital tools. Hayden AI not only scales a city’s ability to create safer, more efficient traffic flows, but also addresses the very real issues of fair and just mobility. Search for open positions and help solve complex challenges in AI. Automate complex processes and improve public services with Hayden AI’s patented suite of perception systems for city fleets. Clear congested lanes to improve road safety and traffic flow.
  • 41
    Mr Bubo City

    Mr Bubo City

    Prominent

    An excellent tool for smart cities that wish to enhance their management and their connection with their neighbors. The platform provides forms for citizens to respond through a mobile app, if they are people with possible infections positive for some virus-like "COVID-19” or “Dengue” for example, then based on the responses they provided, they can then be validated or confirmed by a doctor. You can set up a ticket typology so that the citizen, through the mobile app, can notify the relevant authorities that they are possibly infected. Allow infected citizens through the mobile app to report every "x" period of time from their own homes to the municipality, with geolocated tickets to verify the veracity of the notification.
  • 42
    Deep Identity

    Deep Identity

    Deep Identity

    Deep Identity enables you to protect your organization with a complete range of Deep Identity integration and data governance products. Built on light-weight flexible and open architecture. Trusted Identity Audit & Compliance Manager (Trusted IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Trusted Identity Manager (Trusted IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Privilege Identity Manager (Trusted PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organization. Data Governance Manager (Trusted DGM) provides complete automation for identity, data access governance and lifecycle management with integration across modules and systems. Handle Full time, Contractors profile management, Access review, N Level approval workflow, Self Service, Bulk provisioning etc
  • 43
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 44
    govDelivery

    govDelivery

    Granicus

    With mounting pressure for seamless digital experiences, our integrated communications solution can help you easily connect and engage citizens. Everything you need to easily communicate with citizens who are interested in your services and drive them to action. Unlike other options, Granicus provides an instant Network of 300 million citizen subscribers - leading to massive audience growth and stronger engagement. Easily deliver custom messages based on demographics, location, interests, and more. Bring citizen engagement to new levels by posting across email, social media, and text messaging - all with one click of a button. We offer 150+ out-of-the-box integrations with commonly used third-party systems and services. New integrations can be built quickly to connect with other niche systems.
  • 45
    MaxCASS OS

    MaxCASS OS

    Anchor Software

    MaxCASS OS is Anchor Software’s CASS™ Certified software solution for standardizing United States Postal Service®(USPS) delivery addresses, and updating mailing lists and customer databases with the most complete, correct, and current address information available. MaxCASS OS can be used for batch processing of large mailing lists, or in real-time mode for quick address look-ups. MaxCASS OS is available with integrated MaxMover functionality. By integrating MaxMover, Anchor Software’s certified interface for the USPS NCOA® program, Anchor provides its USPS certified solution for address correction / standardization, and change-of-address processing in a single pass of mailing lists. Address data quality is a key element in developing customer relationships. Address verification and validation tools are an integral part of a robust overall data governance plan and an essential tool in today's business environment.
  • 46
    CSM CXP

    CSM CXP

    CSM Technologies

    CSM's CXP, or Citizen Experience Platform, is our suite of solutions that harnesses the power of technology to deliver exceptional citizen experience. CSM has reckoned best-in-class features that enable dialogue between citizens and governments. CXP incorporates the fundamentals of citizen-government relation while blending it with standout technology.
  • 47
    ServiceNow Vaccine Management
    The ServiceNow® Vaccine Administration Management application enables organizations, such as governments and healthcare providers, to create and manage vaccination programs. Vaccine recipients can visit a self-service portal to review and provide privacy consent, use the knowledge base or Virtual Agent to address common questions, and self-schedule their appointment after responding to an eligibility questionnaire. Providers can schedule appointments for groups of eligible recipients, notify citizens and patients, administer and record vaccinations, and manage vaccination tasks. Request, reschedule, and cancel vaccination appointments, collect relevant pre-vaccination information and privacy consent, notify and remind users via email about upcoming appointments, schedule appointments for groups of eligible recipients, administer and record vaccinations.
  • 48
    Gradient Cybersecurity Mesh
    Gradient Cybersecurity Mesh stitches together hardware-based roots of trust with nation-state hardened software to eliminate the threat of credential-based cyberattacks and creates a frictionless user experience without requiring any changes to your existing infrastructure. By anchoring credentials to machines using hardware roots of trust, attackers are no longer able to steal credentials and then use them from another device to impersonate an identity. Leveraging Gradient’s secure enclave, your credentials and access control policy operations have nation-state level protection ensuring they can never be compromised. Credentials issued by GCM can be rotated in as little as ten minutes, ensuring short lived sessions that are seamlessly renewed to prevent compromize and ensure compliance with least access principles.
  • 49
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
    Starting Price: $595.00 / year
  • 50
    CivicPlus Municipal Websites
    Website and citizen engagement tools to help you build a better community. To engage your community and become the trusted source for information, you have to communicate the way citizens want. CivicPlus Municipal Websites® has everything you need to efficiently inform and empower your citizens all in one place. And at a cost that is tailored to meet your budget. Eliminate the hassle of disconnected systems and inaccurate information—instead streamline your processes all in one place. With a mobile responsive website and a variety of tools to reach your citizens, it’s easy to stay connected. Each department can control their own updates, making it easy to get content to your citizens and staff. We understand the obstacles you face in keeping your citizens engaged. Don’t get caught up on the good looks of CivicPlus Municipal Websites, look inside too. Our all-inclusive CMS software offers extensive functionality for all areas of government.