Alternatives to SecureBlackbox

Compare SecureBlackbox alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SecureBlackbox in 2026. Compare features, ratings, user reviews, pricing, and more from SecureBlackbox competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cube-IQ

    Cube-IQ

    MagicLogic Optimization Inc.

    MagicLogic provides software for every type of load planning, Cartonization and Palletization, based on twenty-five years of R&D. All software is developed in-house using powerful algorithms capable of meeting the most complex loading rules and requirements. Cube-IQ is MagicLogic’s state-of-the-art load optimization program, covering more operational requirements than any other software. Its complete database engine is built-in and is full SQL and ODBC-compliant. Cube-IQ is fully interactive, allowing drag and drop editing. It selects the right containers, cubing out loads with clear 3D diagrams. BlackBox is MagicLogic’s flagship product, providing high-speed Cartonization and advanced Mixed Palletization, including robotics. BlackBox is easy to integrate and is customizable to meet specific requirements. It loads ULDs, rolls, cylinders, tubes, and L-shapes with maximum efficiency. BlackBox adheres to complex loading rules, product configurations and groupings.
  • 2
    BLACKBOX AI

    BLACKBOX AI

    BLACKBOX AI

    BLACKBOX AI is an advanced AI-powered platform designed to accelerate coding, app development, and deep research tasks. It features an AI Coding Agent that supports real-time voice interaction, GPU acceleration, and remote parallel task execution. Users can convert Figma designs into functional code and transform images into web applications with minimal coding effort. The platform enables screen sharing within IDEs like VSCode and offers mobile access to coding agents. BLACKBOX AI also supports integration with GitHub repositories for streamlined remote workflows. Its capabilities extend to website design, app building with PDF context, and image generation and editing.
  • 3
    Secardeo TOPKI
    Digital certificates offer a high degree of security for encryption, strong authentication and digital signatures. In an enterprise PKI you need appropriate services for certificate management and key management. Secardeo TOPKI (Trusted Open PKI) is a PKI system platform for automated key distribution of X.509 certificates and private keys to all users and devices where they are required. For this, TOPKI provides components that serve for specific certificate lifecycle management tasks. The PKI software components of the TOPKI platform can be integrated with other PKI systems, Active Directory or Mobile Device Management systems. TOPKI enables a seamless adoption of managed PKI services. By this you can automatically request certificates from trusted public CAs in the cloud. Or you can use open source CAs, for example to auto-enroll internal computer certificates. The TOPKI PKI products can also enhance your existing Microsoft PKI.
  • 4
    GlobalSign

    GlobalSign

    GlobalSign

    GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption.
  • 5
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 6
    Active Directory Certificate Services (AD CS)
    This document provides an overview of Active Directory Certificate Services (AD CS) in Windows Server® 2012. AD CS is the Server Role that allows you to build a public key infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for your organization. AD CS provides customizable services for issuing and managing digital certificates used in software security systems that employ public key technologies. The digital certificates that AD CS provides can be used to encrypt and digitally sign electronic documents and messages. These digital certificates can be used for authentication of computer, user, or device accounts on a network. You can use AD CS to enhance security by binding the identity of a person, device, or service to a corresponding private key. AD CS gives you a cost-effective, efficient, and secure way to manage the distribution and use of certificates.
  • 7
    CertiNext

    CertiNext

    eMudhra

    A Certificate Lifecycle Management (CLM) with built-in Key Management. Generate and Rotate Keys Seamlessly. Encrypt & Decrypt Data Securely. CertiNext supports all AES, RSA and ECDSA keys for your key management needs to ensure that your keys, and hence, your data remains protected, always. CertiNext Key Management comes with KMIP support to help you automate key management straight from CertiNext and ensure your ecosystem is always secure. Manage your key rotation policies straight from the dashboard. Lost your keys? No problem, you can easily recover and/or reissue your lost keys CertiNext is flexible to allow you to store your keys in encrypted form within your App Server or alternately, store in secure hardware. You can even manage how keys get distributed to address your business requirements from the dashboard.
  • 8
    AWS Certificate Manager
    AWS Certificate Manager is a service that lets you easily provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services and your internal connected resources. SSL/TLS certificates are used to secure network communications and establish the identity of websites over the Internet as well as resources on private networks. AWS Certificate Manager removes the time-consuming manual process of purchasing, uploading, and renewing SSL/TLS certificates. SSL, and its successor TLS, are industry standard protocols for encrypting network communications and establishing the identity of websites over the Internet. SSL/TLS provides encryption for sensitive data in transit and authentication using SSL/TLS certificates to establish the identity of your site and secure connections between browsers and applications and your site.
  • 9
    Certificate Authority Service
    Certificate Authority Service is a highly available, scalable Google Cloud service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). Simplify the deployment, management, and security of your enterprise PKI with a cloud service that helps to automate time-consuming, risky, and error-prone infrastructure tasks, freeing you to focus on higher-value projects. Customize Certificate Authority Service to your needs by configuring custom CAs and certificates, enforcing granular access controls, automating common tasks with APIs, and integrating with your existing systems. Have peace of mind knowing that your CA service is highly available, scalable, backed by an SLA, auditable, and ready to help you achieve compliance with advanced hardware and software security controls. Create a private CA in minutes versus the days and weeks that it takes to deploy and operate your own CA.
    Starting Price: $20 per CA per month
  • 10
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 11
    Dogtag

    Dogtag

    Dogtag

    The Dogtag Certificate System is an enterprise-class open source Certificate Authority (CA). It is a full-featured system, and has been hardened by real-world deployments. It supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management, and much more. The Dogtag Certificate System can be downloaded for free and set up in less than an hour. Dogtag is a collection of technologies that allow enterprises to deploy PKI on a large scale. Certificate issuance, revocation, and retrieval. Certificate Revocation List (CRL) generation and publishing. Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA) for organizational authentication and policies. Encryption key archival and recovery. Smartcard lifecycle management. Token profiles, token enrollment, on-hold, key recovery, and format. Face-to-face enrollment with the security officer workstation interface.
  • 12
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 13
    Akeyless Identity Security Platform
    Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight.
  • 14
    StrongKey

    StrongKey

    StrongKey

    StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI management solution integrates with TLS/SSL, identity access management (IAM), digital signature, secrets management, and device management systems. StrongKey Tellaro is a comprehensive software suite that provides strong authentication, encryption, tokenization, PKI management, and digital signature management. Our open-source software includes a FIDO® Certified FIDO2 server, and we support flexible data center and cloud deployment models.
  • 15
    PKI Spotlight

    PKI Spotlight

    PKI Solutions

    PKI Spotlight is a revolutionary cybersecurity monitoring solution for identity and encryption systems, enabling unmatched visibility across enterprise public key infrastructures and hardware security modules. This real-time monitoring tool provides a vital perspective into all PKI environments in one place to improve security, availability, and recoverability while helping teams stay ahead of threats. PKI Spotlight turns retroactive remediation into proactive visibility by pre-detecting configuration and availability issues before they cause certificate outage issues, giving teams complete insight into PKI configurations and helping them review, refine, and revamp PKI with operational and configuration best practices. It improves resilience by detecting, preventing, responding to, and recovering from operational disruptions that may impact employees, customers, and suppliers.
  • 16
    Sectigo

    Sectigo

    Sectigo

    Global leader in cybersecurity solutions to secure websites, connected devices, applications, and digital identities. Sectigo is a leading provider of digital identity solutions, including SSL / TLS certificates, DevOps, IoT, and enterprise-grade PKI (Public Key Infrastructure) management, as well as multi-layered web security. As the world's largest commercial Certificate Authority with more than 700,000 customers and over 20 years of experience in online trust, Sectigo partners with organizations of all sizes to deliver automated public and private PKI solutions for securing web servers, user access, connected devices, and applications. Recognized for its award-winning innovation and best-in-class global customer support, Sectigo has the proven performance needed to secure the digital landscape of today and tomorrow. Sectigo is the market leader in SSL / TLS certificates, DevOps, IoT, enterprise-grade PKI (Public Key Infrastructure) management, and multi-layered web security.
  • 17
    Certicom Managed PKI Service
    Digital certificates are a common basis for establishing trust between communicating entities - on the Internet as well as within private networks. They are increasingly important for securing IoT applications employing wireless sensor networks and smart connected devices, with each endpoint representing a new attack surface. That growing attack surface is critical to consider when designing your security architecture. Managing an organization’s certificates with an in-house Public Key Infrastructure (PKI) is usually a time consuming and expensive endeavor. Certicom makes it easy, offering a secure and reliable hosted PKI platform which can manage certificates on behalf of an organization or an entire ecosystem. The service minimizes the up-front expense and lowers the ongoing cost of managing certificates while helping customers secure their devices and get their products to market quickly.
  • 18
    CertKit

    CertKit

    CertKit

    CertKit automates SSL certificate lifecycle management for DevOps teams and system administrators. Monitor expiration dates, auto-renew certificates, and deploy across multiple servers from a single dashboard. Key Features: - Real-time certificate monitoring and alerts - Automated renewal before expiration - Multi-server deployment automation - Support for Let's Encrypt and commercial CAs - Centralized certificate inventory Built for the upcoming 47-day certificate mandate, CertKit eliminates manual certificate management overhead. No more expired certificates causing outages. No more spreadsheet tracking. Just reliable, automated SSL management that scales with your infrastructure. Perfect for organizations managing multiple domains, load balancers, or distributed systems. Self-hosted or cloud options available. Simple, practical automation for a critical security requirement. Because certificate management shouldn't require a dedicated team.
  • 19
    Silent Break Security

    Silent Break Security

    Silent Break Security

    Depending on your needs, risk, and current security posture, Silent Break Security will work with you to develop a custom assessment plan best suited for your environment. Many of our services may be offered as a black-box, white-box, or hybrid approach. A black-box approach involves performing the assessment as an attacker, with no insider knowledge of the target or application. This approach is most representative of the process an actual hacker would go through to attack your network. A white-box approach is also offered, levering more interaction with the client to review and improve the target application or network. While this approach may be more thorough, it is also considered less representative of an actual attacker. Skilled attackers often hide their tracks in plain sight by blending malicious activity with legitimate user activity. Of course all organizations want to improve their ability to identify threats, detect attacks, and improve overall security.
  • 20
    KMail
    KMail is the email component of Kontact, the integrated personal information manager from KDE. Default settings rather compromise on features than security or privacy. End-to-end Encryption. Support for OpenPGP and S/MIME is built-in, and a setup and key generation wizard aids users in getting started with this. Transport encryption, SSL/TLS encrypted communication is of course supported, as are a number of authentication methods such as GSSAPI (Kerberos) or OAuth2. Strong isolation of HTML content. If HTML emails can’t be avoided, KMail ensures no external references can be hidden in there to leak information or compromise your privacy. Additionally KMail’s phising protections warns about suspicious links in such emails. Spam protection, so if your email server doesn’t take care of this already, KMail can integrate popular spam checkers such as SpamAssassin or Bogofilter locally.
  • 21
    SecureW2

    SecureW2

    SecureW2

    Even for organizations under 500 employees, a 2020 IBM report found credential compromise averaged $2.35M in costs. Eliminate the threat by using x.509 certificates for Wi-Fi, VPN, Web Apps, Endpoint Login & more. Leverage your existing Wi-Fi, Web, Firewall and VPN infrastructure with zero technology forklift upgrades. With SecureW2, you can verify that only trusted users and devices can access your network and applications. Enabling 802.1x in the cloud has never been easier. SecureW2 provides everything you need to use your Azure, Okta, or Google to enroll and manage certificates for secure Wi-Fi authentication. Plus it comes with the World’s only Dynamic Cloud RADIUS server, giving you everything you need for secure WPA2-Enterprise network authentication. Onboard every major operating system with ease and deliver secure connections with no IT burden. Secure your network with certificates using the generation, delivery, authentication and renewal technology.
  • 22
    KeyTalk

    KeyTalk

    KeyTalk

    KeyTalk is independent of Certificate Authorities and linked to a large number of public CAs both GMO GlobalSign and Digicert QuoVadis. Switching between CAs is simple and easy, even when thousands of certificates and end-points are involved. A vendor lock-in is therefore no longer the case. KeyTalk contains an internal CA for the generation of private certificates and keys. Did you use previously expensive public certificates for internal purposes? Or did you run into the limited functionality of Microsoft CS and other private CAs? Then, you will like our internal CA, private PKI certificate issuance. KeyTalk keeps track of the lifecycle of your certificates in a fully automated way. This way, you always have a complete and up to date overview of all your certificates, including the certificate name, SAN and validity. Also, things like used crypto keys and algorithms of internal and external certificates can be included.
  • 23
    Keyfactor Command
    Join the world’s leading enterprises running on the most complete and scalable managed PKI as-a-Service. Get all the advantages of PKI without the complexity. Whether it is securing your network, sensitive data, or connected devices, you turn to PKI as the proven technology to establish trust. But building and running your PKI is a complex and expensive undertaking. Getting it right is critical, but it’s not an easy feat. Finding and retaining the right people with the right skillsets, adherence to industry standards, and the expense of hardware and software required to run a robust PKI are all serious challenges — not to mention all that is at stake when something goes wrong. Easily organize and manage your inventory and set proactive alerts to notify users of expired or non-compliant certificates before they become a headache.
  • 24
    CyberArk Machine Identity Security
    CyberArk Machine Identity Security provides comprehensive protection for all machine identities, including secrets, certificates, workload identities, and SSH keys. The platform offers centralized visibility and scalable automation to secure these non-human identities throughout their lifecycle. Designed to help organizations reduce risk and maintain resilience, CyberArk ensures secure machine identity management across on-premises, cloud, and hybrid environments.
  • 25
    BerryCert

    BerryCert

    DigitalBerry

    With its intuitive interface, BerryCert is designed to let you manage, audit, and secure the use of digital certificates in your organization. Up to date, digital certificates are key to protecting sensitive data and securely connecting devices, machines, and applications. The increase in certificates makes it more and more difficult to manage them manually. Their misconfiguration or expiration puts you at risk by provoking outages. Forgetting to replace one certificate on a single device or server can take down your entire network. Berrycert allows you to centralize all your digital certificates and manage their lifecycle with a click. Increase security, reduce outages and service interruptions, and lessen the charge on your operational security teams with BerryCert, our digital certificate lifecycle management solution. Discover all your issued and in-use digital certificates and find them all in one simple interface.
  • 26
    Blackbox

    Blackbox

    Email Industries

    Blackbox is an email intelligence platform designed to protect email senders and service providers from bad actors and poor sender reputations. It offers exclusive access to a large database of risky email addresses that negatively impact email engagement and sender reputation. The platform uses predictive analytics to identify abusive or low-quality email addresses before they cause deliverability problems or blacklist issues. Blackbox provides a fast, flexible app and API that can be deployed via web or on-premise, allowing email marketers to improve their compliance and email list quality. Its subscription plans range from basic to custom, supporting different volume needs with a 14-day free trial. With features like spam trap detection and real-time risk scoring, Blackbox helps marketers increase revenue while maintaining a clean sender reputation.
    Starting Price: $299 per month
  • 27
    Verizon Managed Certificate Services
    When it comes to securing your business, it’s better to be safe than sorry. Devices can’t always be trusted, nor can every user that accesses your network. With Managed Certificate Services (MCS), you can immediately authenticate users and protect critical data across your infrastructure, devices, and applications, all through a centralized and trusted digital certificates source. With one of the largest IP networks supporting many Fortune 1000 companies, we understand the importance of building robust security solutions in this era of digital transformation. With MCS as your certificate manager, you can balance highly effective security while maintaining speed to business. MCS is an automated authentication service for your certificate chain, providing full lifecycle management for all digital credentials, corporate, user, application, service, device, machine, throughout the entire enterprise.
  • 28
    ManageEngine Key Manager Plus
    ManageEngine Key Manager Plus is a web-based key management solution that helps you consolidate, control, manage, monitor, and audit the entire life cycle of SSH (Secure Shell) keys and SSL (Secure Sockets Layer) certificates. It provides visibility into the SSH and SSL environments and helps administrators take total control of the keys to preempt breaches and compliance issues. Similarly, managing a Secure Socket Layer (SSL) environment can be daunting when organizations use a large number of SSL certificates issued by different vendors with varying validity periods. On the other hand, SSL certificates left unmonitored and unmanaged could expire, or rogue/invalid certificates could be used. Both scenarios could lead to service downtime or display of error messages that would destroy customer trust in data security and, in extreme cases, even result in security breaches.
    Starting Price: $595 per year
  • 29
    Blackbox Connector

    Blackbox Connector

    Full Sail Partners

    Blackbox Connector is a platform designed to seamlessly integrate Deltek Vision and Vantagepoint systems with third-party business applications without the need for coding. It offers ready-to-deploy, no-code solutions that dramatically reduce integration time and eliminate costly development efforts. The platform supports both cloud and on-premise versions of Deltek software, enabling businesses to connect their data and systems quickly. Blackbox Connector helps companies centralize and improve their data quality, addressing common challenges where multiple departments maintain separate data strategies. With its easy-to-use point-and-click interface, users can automate workflows and enhance business processes without technical expertise. This solution is backed by industry insights highlighting how poor data quality affects productivity and revenue.
  • 30
    Keyfactor EJBCA
    EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution.
  • 31
    PowerArchiver

    PowerArchiver

    PowerArchiver

    Compress, encrypt, exchange, and backup your data. Support for over 60 formats: ZIP, ZIPX, 7z, RAR, TAR, and more. Strongest possible compression with PA format. FIPS 140-2 validated 256-bit AES encryption! PowerArchiver combines many useful tools in a single package! Fastest and most feature-packed file management today! Advanced Codec Pack (.PA) is the most advanced format on the market. Encrypt, Decrypt, Sign and Verify in various AES and OpenPGP formats. FIPS 140-2 validated! Best format with strongest compression, data deduplication, and very secure encryption. Secure FTP client with all the features, including FIPS 140-2 validation! Automatically compress and encrypt files in Microsoft Office XP-2016. Access 6 different cloud services without the need to install their software! Full Enterprise Backup suite with shadow copy support, logs, network backup, and more! Mount ISO images in a virtual drive without having to burn them!
    Starting Price: $22.25 one-time payment
  • 32
    Buda

    Buda

    Buda

    Buda is a cloud-native AI agent platform designed to let organizations build and operate entire “AI companies” composed of autonomous agents that actively execute tasks rather than just generate responses. It enables users to create specialized AI agents, such as coding, sales, marketing, finance, or operations agents, that can run in parallel, collaborate, and handle real workflows like generating leads, writing code, managing CRM data, or producing reports. It provides a unified workspace where agents have access to tools like a browser, terminal, file system, and version control, allowing them to perform real actions step by step with full transparency instead of acting as black-box chatbots. A core component is its persistent “Drive,” where agents store memory, files, and context across sessions, enabling them to learn from past work and evolve over time rather than resetting after each interaction.
    Starting Price: $20 per month
  • 33
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 34
    Userify

    Userify

    Userify

    Manage team SSH keys across clouds and continents using Ansible, Chef, Puppet, Salt, CloudFormation, Terraform, or custom scripts. Userify works smoothly across multiple, geographically isolated clouds and high-latency networks. Hardened. Curve 25519 and bcrypt. PCI-DSS and HIPAA Compliant. AICPA SOC-2 Type 1 certified. Deployed by more than 3,500 companies on every populated continent. Userify SSH Key logins are passwordless: More secure. More convenient. Userify is the only key manager designed to operate on the open Internet. How do you de-provision admins when they leave? With Userify, it's one click. Userify is AICPA SOC-2 Type 1 certified and has achieved PCI-DSS and HIPAA compliance. Userify helps you get compliant with PCI-DSS Requirement 8, even on cloud systems, protect PII, and ban ec2-user forever. Userify helps you get compliant with the HIPAA Security Rule and protect critical healthcare systems and PHI by limiting internal access and authority.
  • 35
    emCA

    emCA

    eMudhra

    Server Certs, IP Certs, User Certs, Device Certs, you name it, we have it as part of our Certificate Engine. What's more, just connect to eMudhra's CertiNext and get a fully automated certificate management up and running with ease. With a 3 click process to almost any activity, user-friendly interface & strong configuration capabilities, the intuitiveness of emCA Certificate Engine is unparalleled in the industry. From setting up hierarchies, to managing cert profiles and admin settings, it's a do-it-yourself PKI platform for non-PKI people. emCA works with a number of HSM's, Databases, & Operating Systems. It allows you to leverage your cloud, hybrid, or on-prem infrastructure to optimize your cost, manage your internal compliance and security requirements, and evolves with your organization's security and cloud posture.
  • 36
    Comodo Certificate Manager
    Advanced Certificate Issuance And Lifecycle Management. Discover and manage all your SSL Digital Certificates automatically. Secure, reliable and centralized management platform. Helps you self-administer, instantly provision and control all SSL/PKI. Expired SSL certificates can cause systems to break, services to go down, and trust in your business to wane. Keeping track of digital certificates and their renewal dates is a big job and it's going to get harder. Need for a mechanism to administer certificates effectively. Flexible and reliable system for digital certificate issuance and lifecycle management. Centralizes and automates management of cryptographic keys and digital certificates. Ensures that certificates do not expire unexpectedly. Secure, tiered cloud-based administration. Microsoft Active Directory integration. Certificate Discovery Tool finds all certificates no matter who issued them. Administrative protection using two-factor authentication and IP address validation.
  • 37
    HID IdenTrust
    Comprehensive lifecycle management of every certificate in your network for on-premise or cloud-based PKI deployments. Easily migrate from existing certificate authority with policy-based automated issuance, renewal and revocation, eliminating manual processes and related errors. Enterprises increasingly rely on public key infrastructure (PKI) to secure machines, devices, and human access using keys and digital certificates. In partnership with Keyfactor, HID IdenTrust offers a way to simplify PKI and automate certificate lifecycle management at scale. HID IdenTrust delivers cloud-based managed PKI to issue public, private or U.S. Government interoperable (FBCA) digital certificates to secure websites, network and IoT devices, and workforce identities. Discover every certificate across network and cloud environments with real-time inventory of public and private CAs, distributed SSL/TLS discovery tools, and direct integration with key and certificate stores.
  • 38
    CounterMail

    CounterMail

    CounterMail

    CounterMail is a secure and easy to use online email service, designed to provide maximum security and privacy without any unnecessary complexity. You can access your email account at any time, from anywhere in the world. Your account will always be encrypted and anonymous. CounterMail's encryption works automatically and transparently, it requires no specialized computer skills or knowledge. If you are comfortable using services like Hotmail or Gmail, you will be comfortable using CounterMail's secure email! We are using a strong encryption protocol called OpenPGP, with 4096 bits encryption keys to protect your data. To the best of publicly available information, there is no known method which will allow a person or group to break OpenPGP:s encryption by cryptographic or computational means.
  • 39
    WebScanner

    WebScanner

    DefenseCode

    DefenseCode WebScanner is a DAST (Dynamic Application Security Testing, BlackBox Testing) solution for comprehensive security audits of active web applications (websites). WebScanner will test a website’s security by carrying out a large number of attacks using the most advanced techniques, just as a real attacker would. DefenseCode WebScanner can be used regardless of the web application development platform. It can be used even when application source code is no longer available. WebScanner supports major web technologies such as HTML, HTML5, Web 2.0, AJAX/jQuery, JavaScript and Flash. It is designed to execute more than 5000 Common Vulnerabilities and Exposures tests for various web server and web technology vulnerabilities. WebScanner is capable of discovering more than 60 different vulnerability types (SQL Injection, Cross Site Scripting, Path Traversal, etc.), including OWASP Top 10.
  • 40
    XGEN AI

    XGEN AI

    XGEN AI

    XGEN AI is a composable generative AI platform built specifically for ecommerce teams to deploy search, recommendation, and chat experiences with full control and no AI expertise required. The system offers modular AI components like XSearch (a natural language, conversational search that understands customer intent, synonyms, and even image cues), XRecommend (a prediction engine that tailors product catalogs to individual users in real time, targeting metrics like average order value or conversion), and XChat (an ecommerce chat assistant). It integrates seamlessly with existing ecommerce data sources and systems (CDPs, PIM, CRM) and supports configuration over black-box modeling, letting digital teams rapidly build AI-driven experiences via declarative tools. XGEN deploys models dynamically, selecting from a library of deep learning architectures based on product categories and behaviors, and continuously learns from user interactions via event-based feedback.
  • 41
    Keyhub

    Keyhub

    Remme

    Certificate Management on autopilot. Keyhub is a cloud-based platform to automatically discover, organize, and track all SSL/TLS certificates across the enterprise. Get rid of the guesswork. How many digital certificates are in your environment? 71% of organizations don't have an exact answer. You can't protect what you don't see. Real-time automatic discovery. Holistic view of certificates from multiple issuers. Private and public certificates management. Identification of issues and vulnerabilities. Expiration dates tracking and alerting. Corporate policy compliance check. Built on design thinking principles, Keyhub simplifies routine operations, reduces adoption time and streamlines digital transformation. Identify every certificate, known and unknown, with a permanent auto scan of your external and internal environments.
  • 42
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 43
    Nexus Smart ID Corporate PKI
    Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI. A corporate public-key infrastructure can issue and manage trusted identities for people, devices and services, forming the basis of information security in an organization. Smart ID provides a reliable foundation, including roles, policies and procedures, for issuing and managing trusted, certificate-based identities. Smart ID corporate PKI is a flexible and scalable solution that can be used by any organization to issue, manage and validate certificate-based digital identities for mixed endpoint environments that include people, infrastructure and things. Based on standard products that are proven in business-critical environments and made in Sweden.
  • 44
    TrackSSL

    TrackSSL

    TrackSSL

    Track your certificates. Get notified when they change or are about to expire. Keep your team alerted and monitor errors before your users do. Add your certificates through the web interface and you'll receive email notifications when there are problems such as a pending expiry, or a misconfigured host. It's a simple service to implement your ssl certificate monitoring. Ensure that infrastructure changes aren't changing your certificates under your nose. Get a notification when certificate information is updated. You decide what types of notifications you want and when. Integrate with Slack and get your notifications straight into your #devops channel. Your HTTPS connection is an extremely important part of your website but it's very rarely monitored. By adding an expiry tracker service to your website you'll add another layer of protection to ensure that you and your team are notified when there's an impending SSL expiration.
    Starting Price: $25 per year
  • 45
    JFrog Xray
    DevSecOps Next Generation – Securing Your Binaries. Identify security vulnerabilities and license violations early in the development process and block builds with security issues from deployment. Automated and continuous governance and auditing of software artifacts and dependencies throughout the software development lifecycle from code to production. Additional functionalities include: - Deep recursive scanning of components drilling down to analyze all artifacts and dependencies and creating a graph of relationships between software components. - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - Impact analysis of how an issue in one component affects all dependent components with a display chain of impacts in a component dependency graph. - JFrog’s vulnerabilities database, continuously updated with new component vulnerability data, includes VulnDB, the industry’s most comprehensive security vulnerability database.
  • 46
    Famoco OS
    Famoco OS is a secure, enterprise-grade operating system designed for mission-critical business applications. It offers a private, bloatware-free environment, eliminating third-party dependencies and ensuring full data sovereignty by operating without Google Mobile Services. Built-in encryption, strong app isolation, Verified Boot, and a Trusted Execution Environment (TEE) protect business assets and prevent unauthorized access. Famoco OS allows full hardware control, enabling management of components like NFC antennas, biometric modules, and secure elements. The user interface can be customized to enforce business-ready policies, lock down settings, and tailor navigation. The OS includes Safeguard, an alternative to Google Play Integrity, to assess device integrity and ensure applications run in secure conditions. Extended APIs support communication with secure elements, biometric modules, printers, and MRZ reading capabilities.
  • 47
    Once UI

    Once UI

    Once UI

    Once UI is an open source design system and component library built for Next.js (and paired with a matching design system in Figma), offering a flexible style system, 100+ ready-to-use UI components, and more than 75 copy-paste blocks to rapidly assemble web apps. It supports both simple static sites and more complex applications, thanks to pre-built, deployment-ready templates for portfolios, documentation sites, blogs, ecommerce stores, and dashboards (free and Pro versions). Once UI emphasizes “component-first” development, meaning developers don’t need to manually write utility-class-heavy styling (like with some CSS frameworks); instead, they use semantic variables and components that integrate design tokens for visual consistency. For creators used to tools like utility-class frameworks or component libraries, but who want faster development with fewer dependencies, Once UI simplifies building UIs without sacrificing design quality or accessibility.
    Starting Price: $128 per year
  • 48
    Encrypted Data Gateway Engine
    Authora's Encrypted Data Gateway Engine "EDGE" is a command line designed for organizations that must securely exchange large volumes of information. EDGE protects business-critical data easily and with little impact on existing systems. EDGE can also be used to protect large volumes of information stored on servers and backup media from unauthorized access. From tape backup processes to batch FTP transfers and data distribution to partners, EDGE provides robust encryption capabilities for automated data processing applications. Adding EDGE's cryptographic functions to business applications and processes allows organizations to address risk mitigation and compliance standards. Authora's Encrypted Data Gateway Engine, "EDGE", is an OpenPGP compliant command-line application. Edge elegentlyr integrates cryptogrphic functions into your existing business prosseses. Edge is platform independent and runs on Windows and on a variety of UNIX systems.
  • 49
    meshIQ

    meshIQ

    meshIQ

    Middleware Observability & Management Software for Messaging, Event Processing, and Streaming Across Hybrid Cloud (MESH). - Complete observability and monitoring of Integration MESH with 360° Situational Awareness® - Securely manage, and automate configuration, administration, and deployment - Track, trace, and analyze transactions, messages and flows - Collect, monitor, and benchmark MESH performance meshIQ delivers granular access controls to manage configurations across the MESH to reduce downtime and quick recovery from outages. Provides the ability to find, browse, track, and trace messages to detect bottlenecks and speeding up root-cause analysis. Unlocks the integration blackbox to deliver visibility across the MESH infrastructure to visualize, analyze, report, and predict. Delivers the ability to trigger automated actions based on pre-defined criteria or intelligent actions determined by AI/ML.
  • 50
    Dependency Track SaaS
    Dependency Track SaaS provided by YourSky.blue is the managed cloud solution of the popular open-source Dependency-Track. Always up to date with the latest security bulletins, it allows to easily monitor all the chain of software components through powerful dashboards and configurable alerts. It periodically scans already uploaded SBOMs for new security issues, outdated versions or licenses at risk. YourSky.blue Dependency Track SaaS is one of the most powerful and essential tool to manage software assets conveniently. The SaaS product also includes Single-Sign-On technology to facilitate integration with any enterprise identity provider.
    Starting Price: USD 10.08 per user per month