21 Integrations with SafeNet Trusted Access

View a list of SafeNet Trusted Access integrations and software that integrates with SafeNet Trusted Access below. Compare the best SafeNet Trusted Access integrations as well as features, ratings, user reviews, and pricing of software that integrates with SafeNet Trusted Access. Here are the current SafeNet Trusted Access integrations in 2025:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.
    Leader badge
    Starting Price: $9.99/month
  • 2
    Zoho CRM
    Zoho CRM delivers a basic and clean interface layout that has a variety of unique features that drive to help lead conversion rates. With an intuitive dashboard, the CRM can run 'macros' to streamline how a lead is contacted and tracked through the process of a sales. Administrators can monitor missed opportunities and best performing agent users, and also make business-impacting decisions using the sales report function.
    Leader badge
    Starting Price: $14.00/month/user
  • 3
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 4
    Adobe Document Cloud
    With Adobe Document Cloud — which includes the world’s leading PDF and electronic signature solutions — you can turn manual document processes into efficient digital ones. Now your team can take quick action on documents, workflows, and tasks — across multiple screens and devices — anywhere, any time, and inside your favorite Microsoft and enterprise apps. Connect to your PDFs from anywhere and share them with anyone. With Acrobat Pro DC, you can review a report on your phone, edit a proposal on your tablet, and add comments to a presentation in your browser. You can get more done without missing a beat. When Adobe Sign drives all-digital signature workflows, it’s fast and easy for anyone to create, route, and get agreements legally signed. Businesses can streamline new-hire onboarding. Individuals can get applications approved in a snap. And everyone can finish multi-step processes faster than ever.
    Starting Price: $12.99 per month
  • 5
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 6
    SQL Server

    SQL Server

    Microsoft

    Intelligence and security are built into Microsoft SQL Server 2019. You get extras without extra cost, along with best-in-class performance and flexibility for your on-premises needs. Take advantage of the efficiency and agility of the cloud by easily migrating to the cloud without changing code. Unlock insights and make predictions faster with Azure. Develop using the technology of your choice, including open source, backed by Microsoft's innovations. Easily integrate data into your apps and use a rich set of cognitive services to build human-like intelligence across any scale of data. AI is native to the data platform—you can unlock insights faster from all your data, on-premises and in the cloud. Combine your unique enterprise data and the world's data to build an intelligence-driven organization. Work with a flexible data platform that gives you a consistent experience across platforms and gets your innovations to market faster—you can build your apps and then deploy anywhere.
    Starting Price: Free
  • 7
    Accenture Cloud Trade Promotion Management
    Increased global competition makes it more difficult for companies to succeed in today’s marketplace. These organizations are now looking to drive more meaningful interactions with customers, channels, shoppers, and consumers to positively impact sales numbers. Historically, consumer products companies have had an overabundance of solutions across their front office. Accenture and Salesforce seek to address this business challenge by establishing a single system of engagement for sales processes on a single platform that integrates Salesforce capabilities with Accenture’s extensive experience within the consumer goods space. Plan and develop winning promotional campaigns with an overview of trade investments, spending, and profitability with Accenture Cloud Trade Promotion Management. Empower your management and field sales teams to help deliver more targeted and compliant promotions with Accenture Cloud Retail Execution.
    Starting Price: $120 per month
  • 8
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 9
    AWS Marketplace
    AWS Marketplace is a curated digital catalog that enables customers to discover, purchase, deploy, and manage third-party software, data products, AI agents, and services directly within the AWS ecosystem. It provides access to thousands of listings across categories like security, machine learning, business applications, and DevOps tools. With flexible pricing models such as pay-as-you-go, annual subscriptions, and free trials, AWS Marketplace simplifies procurement and billing by integrating costs into a single AWS invoice. It also supports rapid deployment with pre-configured software that can be launched on AWS infrastructure. This streamlined approach allows businesses to accelerate innovation, reduce time-to-market, and maintain better control over software usage and costs.
  • 10
    ALIP

    ALIP

    Accenture

    A powerful SaaS solution giving you a competitive edge. Deliver new and tailored products faster, speed issuance and service, and streamline business operations. Empower a digital-first strategy to fundamentally change the way you engage and interact with your customers consumers, producers and agents alike—across all stages of the policy lifecycle. The Accenture Life Insurance & Annuity Platform (ALIP) is proven in its ability to help organizations transition to the speed and agility today’s economy demands. And we are leading the way—with our innovation, R&D, cloud experience and on-going investments—for carriers like you to drive digital transformation and operational excellence that enables you to more profitably get and keep happy customers. With ALIP you get one of the most innovative, fully configurable, feature-rich solutions on the market.
  • 11
    Accenture Cloud Retail Execution
    Increased global competition makes it more difficult for companies to succeed in today’s marketplace. These organizations are now looking to drive more meaningful interactions with customers, channels, shoppers, and consumers to positively impact sales numbers. Historically, consumer products companies have had an overabundance of solutions across their front office. Accenture and Salesforce seek to address this business challenge by establishing a single system of engagement for sales processes on a single platform that integrates Salesforce capabilities with Accenture’s extensive experience within the consumer goods space. Plan and develop winning promotional campaigns with an overview of trade investments, spending, and profitability with Accenture Cloud Trade Promotion Management. Empower your management and field sales teams to help deliver more targeted and compliant promotions with Accenture Cloud Retail Execution.
  • 12
    KeyTalk

    KeyTalk

    KeyTalk

    KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included.
  • 13
    FAD

    FAD

    FAD

    FAD® is a handwritten signature on electronic media, functional equivalent to a handwritten signature on paper. It includes technological components of prevention and security. FAD is a remote identity validation and multimedia signature platform. FAD fights identity theft, promotes democracy and financial inclusion, giving certainty to any documented agreement. Validate any individual identity against the government issued identity document using advanced facial recognition techniques, liveness detection by comparing and authenticating a IDs and applying 50+ forensic and biometrics test, in seconds, utilizing the industry’s largest document library. Recognizes the individual and video records the exact moment of the acceptance, this process provides full attribution of the agreement to the signatory.
  • 14
    eID-Me

    eID-Me

    Bluink

    Remote identity verification, mobile digital identity, and better access to your services. Get verified customers, reduce fraud, comply with regulations, and more. Instantly request verified ID info (ePassport, mDL, and more) from a secure digital wallet on customer smartphones. Increase login security, reduce friction, eliminate password resets, and more. Recent events have required government organizations to accelerate digital transformation and expand online services for citizens. The rapid adoption of telemedicine and electronic medical records systems has created new opportunities to improve the health care experience of patients and increase the efficiency of health care operations. Recent events have accelerated the adoption of online retail. Having a professionally designed and easy to use digital storefront is mandatory. Planning travel, booking, boarding, and checking in are becoming mobile-centric.
  • 15
    Airside

    Airside

    Airside

    Helping businesses and individuals verify, share, and manage personal information, including COVID lab results. With digital ID, people want convenience and privacy, and organizations want access and ease. We believe both are possible. Mobile Passport was just the beginning. The Airside Digital Identity Network leverages technology trusted by the U.S. government and loved by millions of people. Data is encrypted on the user’s mobile device and cryptographic keys enable consent-driven, time-bound sharing, negating the need for local storage.” ID verification from government sources and COVID-19 health results from over 20,000 FDA-approved lab locations ensure the authenticity of user data. Safe, reliable, and cost-efficient biometric matching easily integrate into legacy systems to confirm identities and provide streamlined, touchless experiences. Make customer onboarding, KYC and AML checks, and servicing secure and more efficient.
  • 16
    Check Point Infinity
    Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks, while achieving a 50% increase in operational efficiency and 20% reduction in security costs. The first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber-threats. 64 different threat prevention engines blocking against known and unknown threats, powered by threat intelligence. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, etc.
  • 17
    Check Point IPS

    Check Point IPS

    Check Point IPS

    Intrusion Prevention Systems detect or prevent attempts to exploit weaknesses in vulnerable systems or applications, protecting you in the race to exploit the latest breaking threat. Check Point IPS protections in our Next Generation Firewall are updated automatically. Whether the vulnerability was released years ago, or a few minutes ago, your organization is protected. Check Point IPS delivers thousands of signature and behavioral preemptive protections. Our acceleration technologies let you safely enable IPS. A low false positive rate saves your staff valuable time. Enable IPS on any Check Point security gateway reducing total cost of ownership. On-demand hyperscale threat prevention performance providing enterprises cloud level expansion and resiliency on premises. Provide users with secure, seamless remote access to corporate networks and resources when traveling or working remotely.
  • 18
    Intercede MyID
    MyID® credential management software enables governments and large enterprises to issue and manage digital identities using the most secure method of multi-factor authentication to citizens, large workforces and supply-chains. Today, MyID enables the strong authentication of millions of people to the data, systems and networks they need access to. For those responsible for information security, MyID provides easy integration and control over digital identity issuance and management. For end users, whether citizens or employees, MyID enables seamless, secure access to company systems, networks and resources using multi-factor authentication via a variety of devices. Faced with ever increasing threats of cyber terrorism, identity fraud and crime, MyID® provides a cyber secure credential management software solution. Where data really matters, you will find MyID. The security, reliability and interoperability of MyID software sets it apart.
  • 19
    NetSeT Global Solutions

    NetSeT Global Solutions

    NetSeT Global Solutions

    NetSeT Global Solutions is an IT company that develops complex information systems for citizen data management. We have more than 20 years of experience, references in more than 15 countries on 4 different continents, and over 20 systems installed in the region. We represent a regional leader in the field of electronic identification, eGovernment, and specialized systems for secure communication. With its headquarters in Belgrade (Serbia), NetSeT contains a group of engineers who are experts in the field of data protection, the design of high-performance scalable systems, and software development using the most advanced tools. We are exceptionally proud of all of our team members since their hard work provides tens of millions of citizens with secure data management and guarantees a well-established level of quality of our products. The platform enables you to digitalize your processes, making them much more accessible, modern, and economic.
  • 20
    CodeSign Secure

    CodeSign Secure

    Encryption Consulting LLC

    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing.
  • 21
    Filigran

    Filigran

    Filigran

    Embrace a proactive approach with end-to-end cyber threat management, from anticipation to response. Tailored to elevate cybersecurity through comprehensive threat intelligence, advanced adversary simulation, and strategic cyber risk management solutions. Get a holistic view of your threat environment and improved decision-making for faster incident response. Organize your cyber threat intelligence knowledge to enhance and disseminate actionable insights. Access consolidated view of threat data from multiple sources. Transform raw data into actionable insights. Enhance sharing and actionable insights dissemination across teams and tools. Streamline incident response with powerful case management capabilities. Create dynamic attack scenarios, ensuring accurate, timely, and effective response during real-world incidents. Build both simple and intricate scenarios tailored to various industry needs. Improve team dynamics with instant feedback on responses.
  • Previous
  • You're on page 1
  • Next