Alternatives to SignPath

Compare SignPath alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SignPath in 2024. Compare features, ratings, user reviews, pricing, and more from SignPath competitors and alternatives in order to make an informed decision for your business.

  • 1
    StrongDM

    StrongDM

    StrongDM

    StrongDM is a People-First Access platform that gives technical staff a direct route to the critical infrastructure they need to be their most productive. End users enjoy fast, intuitive, and auditable access to the resources they need, and administrators leverage simplified workflows to enhance security and compliance postures. - We open up a clear, direct path that gives individualized access to the right people and keeps everyone else out. - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Compare vs. SignPath View Software
    Visit Website
  • 2
    Securden Password Vault
    Store, manage, and share passwords, files, SSH keys, and DevOps secrets among IT teams. Enforce password security best practices. Ensure compliance with industry standards using comprehensive audit trails. • Centralized repository for passwords, SSH keys, DevOps secrets, and sensitive files. • Enforce password security best practices like periodic password resets. • Generate and assign unique & strong passwords to IT assets. • Share resources with IT teams and collaborate seamlessly • Eliminate hard-coded credentials with API-based application password management. • Control ‘Who’ has access to ‘What’ with granular controls. • One-click remote access to IT assets through native apps & web-based sessions. • Track all privileged activities with comprehensive Audit trails. • Demonstrate compliance with industry standards using customized reports on privileged access. • Check for breached passwords through dark web monitoring. • Auto-fill credentials on websites.
    Compare vs. SignPath View Software
    Visit Website
  • 3
    Dropbox Sign
    eSignatures for everyone. Dropbox Sign (formerly HelloSign) is the most simple and secure way to get documents signed. With Dropbox Sign, contracts are signed on average 80% faster than traditional paper-based contracts and just as legally binding. Built-in reminders and advanced signer options significantly improve document completion rates. Personalize the signing experience for your customers. Easily add your company logo, color, and custom messaging to stay on-brand. Documents that you send out frequently can be saved as reusable templates. Templates are excellent to speed up the signing process and streamline data entry. Documents signed with Dropbox Sign are more secure than pen and paper. An affixed (court admissible) audit trail ensures that actions are tracked and time-stamped. Account admins have the power to manage document permissions and configure team settings from a centralized dashboard, keeping everything more organized and secure.
    Leader badge
    Starting Price: $100 per month
  • 4
    CodeSign Secure

    CodeSign Secure

    Encryption Consulting LLC

    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD and streamlined workflows for hands-free code signing.
  • 5
    CodeSign
    Code signing is a proven security practice to protect and extend the trust-based usage of software systems and applications. Organizations that publish as well as consume software, need a secure code signing mechanism to ensure software authenticity. The objective is to ascertain that valid software is not taken over as a medium by ransomware. CodeSign by Aujas provides a scalable, secure, easy to integrate DevOps-ready platform that ensures the integrity of software applications, enables allow-listing to protect internal infrastructure, protects the signing keys, provides automated audit trails, and combat ransomware. CodeSign is available both as a SaaS application and as an on-premise appliance and easily scales to hundreds of millions of file signings per year. It allows unmatched versatility to sign all file types across all platforms. Organizations use variety of software applications which are essential for running day to day business.
  • 6
    SignServer Enterprise
    One flexible platform that supports all your electronic signature use cases. Integrates with your business applications via standard interfaces. Deploy SignServer as it suits your needs - either as a turn-key software or hardware appliance or in the cloud. The SignServer platform covers all your signing use cases in one solution, including standard document signing, eIDAS advanced signing and seal, code signing for multiple formats, timestamping services and ICAO ePassport signing. Avoid managing a myriad of signing solutions and centralize all your signature processes in this multitenant solution and improve on security policy compliance. Server-side signature solutions give maximum control and security and allow you to leverage your hardware security module (HSM) investment in the best way. Signature keys are generated and used for signing in your HSM. SignServer supports most HSMs on the market - and both short-lived keys, and keys or certificates with a longer lifecycle.
  • 7
    Keyfactor Signum
    With Keyfactor Signum, sensitive keys are protected, policy is automated, and signing is integrated with your tools and build processes. Generate and store sensitive private signing keys in a centralized, FIPS 140-2 certified hardware security module (HSM) in the cloud. Define granular access and usage policies for private signing keys, and authenticate users and build servers for signing with a full audit trail. Integrate with platform-native signing tools to protect access to private signing keys, without changing workflows. Integrate with signing tools via lightweight Windows and Linux agents that are quick to install on build servers or developer workstations. Generate key attestation to comply with CA/B forum requirements to verify that keys are stored and generated in an HSM.
  • 8
    GaraSign

    GaraSign

    Garantir

    There are many excellent enterprise security tools to choose from. Some are managed on-premise, others are consumed as a service, and others still use a hybrid model. The challenge enterprises face is not a lack of tools or solutions, but rather a lack of seamless interconnectivity between these privileged access management tools and a single place to manage and audit them. GaraSign is a platform that allows enterprises to securely and efficiently integrate their security systems in a way that does not disrupt existing business processes. By factoring out what’s common, GaraSign is able to centralize and simplify the management of your enterprise’s most sensitive areas, including privileged access management (PAM), privileged identity management, secure software development, code signing, data security, PKI & HSM solutions, DevSecOps, and more. Enterprise security leaders must attend to data security, privileged access management (PAM), privileged identity management, etc.
  • 9
    Entrust TLS/SSL Certificates
    Entrust TLS/SSL Certificates provide validated identity and encryption to secure your websites, users, and data. When your website is secured by an Entrust TLS/SSL Certificate, your visitors can be confident knowing that your organization's identity as been verified and that encryption will keep their data and transactions secure. With an Entrust TLS/SSL Certificate, your visitors never see browser alerts notifying them that your website is “not secure” or that their “connection is not private.” Invest in your reputation and great user experience with an Entrust TLS/SSL Certificate. Entrust is a founding member of the CA Security Council and the CA/Browser Forum, and actively contributes to develop industry standards for TLS/SSL, S/MIME, document signing, mobile device, and code signing certificates, as well as certificate management. Trust your security to a Certification Authority that defines digital security.
    Starting Price: $199
  • 10
    SignMyCode

    SignMyCode

    SignMyCode

    SignMyCode is a one-stop shop for trusted and authentic code signing solutions, offering code signing certificates from reputed certificate authorities like Sectigo, Certera, DigiCert etc. suitable for individual developers and software organisations to safeguard their software, EXE, scripts, and apps by digitally signing them.
    Starting Price: $210.99/year
  • 11
    SSL2BUY

    SSL2BUY

    SSL2BUY

    SSL2BUY is an authorized reseller of the world's leading certificate authorities (CAs) like DigiCert, Comodo, Sectigo, GlobalSign, GeoTrust, Thawte, and RapidSSL. As a global SSL certificate and code signing certificate provider, it focuses on providing the utmost encrypted SSL security with excellent discount offers and customer support for any size of organization or individual. Get hassle-free security solutions with our low-cost SSL certificates and code signing certificates. SSL certificates protect online transactions with strong 256-bit SSL encryption, and code signing certificates help protect your software.  We offer low-cost SSL certificates, but we never compromise with your web security. All of our certificates come with modern algorithms recommended by the CA/Browser forum.
    Starting Price: $8 per year
  • 12
    ClickSSL

    ClickSSL

    ClickSSL

    ClickSSL is an platinum partner of the leading Certificate Authorities like VeriSign(now Symantec), GeoTrust, RapidSSL, Thawte and Comodo. ClickSSL offers EV SSL, Code Signing Certificate, UCC Certificate, Wildcard SSL & more SSL Certificates at market low price. ClickSSL offers SSL certificates can provide you with non-forgettable proof of your website's identity, and customer confidence in the integrity and security of your online business. Buy RapidSSL, VeriSign(now Symantec), GeoTrust, Thawte and Comodo SSL Certificates at affordable price. ClickSSL offers SSL certificates with strong 256 bit encryption at affordable price to secure your web sites, eCommerce, exchange, intranets and extranets. Our inexpensive digital certificate is supported by over 99% of current browsers. Buy SSL certificate at lowest price to establish secure environment on your site(s). Move your step ahead with HTTPS and never let down customer’s confidence.
    Starting Price: $13.21
  • 13
    GeoTrust

    GeoTrust

    GeoTrust

    GeoTrust, a leading certificate authority, provides retail and reseller services for SSL encryption, and website authentication, digital signatures, code signing, secure email, and enterprise SSL products. In today’s digital economy, every company needs web security they can trust. With more than 100,000 customers in over 150 countries, there’s good reason businesses around the world choose GeoTrust for SSL/TLS security solutions. Since 2001, GeoTrust has delivered business-class certificates to organizations of all sizes—from enterprise to single-site small business—at the best possible value. The wide range of authentication levels offered by GeoTrust allow companies to cost-effectively meet their specific security needs across virtually every major browser and mobile device, while also aligning themselves with a respected digital security brand.
    Starting Price: $149 per year
  • 14
    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb

    CheapSSLWeb is an authorized partner of Sectigo (formerly known as Comodo) and offers the cheapest SSL certificates from globally reputed Certificate Authorities like COMODO, SECTIGO, and CERTERA. We provide all types of SSL & Code Signing certificates like DV certificates, OV, and EV certificates.
  • 15
    apksigner
    The apksigner tool, available in revision 24.0.3 and higher of the Android SDK Build Tools, lets you sign APKs and confirm that an APK's signature will be verified successfully on all versions of the Android platform supported by that APK. This page presents a short guide for using the tool and serves as a reference for the different command-line options that the tool supports. For a more complete description of how the apksigner tool is used for signing your APKs. The lowest Android framework API level that apksigner uses to confirm that the APK's signature will be verified. Higher values allow the tool to use stronger security parameters when signing the app but limit the APK's availability to devices running more recent versions of Android. By default, apksigner uses the value of the minSdkVersion attribute from the app's manifest file.
  • 16
    SignTool

    SignTool

    Microsoft

    The software industry must provide users with the means to trust code including code published on the Internet. Many webpages contain only static information that can be downloaded with little risk. Some pages, however, contain controls and applications to be downloaded and run on a user's computer. These executable files can be risky to download and run. Packaged software uses branding and trusted sales outlets to assure users of its integrity, but these guarantees are not available when code is transmitted on the Internet. Additionally, the Internet itself cannot provide any guarantee about the identity of the software creator. Nor can it guarantee that any software downloaded was not altered after its creation. Browsers can exhibit a warning message that explains the possible dangers of downloading data of any kind, but browsers cannot verify that code is what it claims to be. A more active approach must be taken to make the Internet a reliable medium for distributing software.
  • 17
    iOS App Signer

    iOS App Signer

    iOS App Signer

    iOS App Signer can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
    Starting Price: Free
  • 18
    jarsigner
    The jarsigner tool has two purposes, to verify the signatures and integrity of signed JAR files and to sign Java Archive (JAR) files. A digital signature is a string of bits that is computed from some data (the data being signed) and the private key of an entity (a person, company, and so on). Similar to a handwritten signature, a digital signature has many useful characteristics, its authenticity can be verified by a computation that uses the public key corresponding to the private key used to generate the signature, it is a function of the data signed and thus cannot be claimed to be the signature for other data as well, the signed data cannot be changed. If the data is changed, then the signature cannot be verified as authentic and It cannot be forged, assuming the private key is kept secret.
  • 19
    Code Dx

    Code Dx

    Code Dx

    Code Dx Helps Enterprises Rapidly Release More Secure Software. Our ASOC platform keeps you at the forefront of speed and innovation without compromising security. All through the power of automation. Security is challenged to keep up with the speed of DevOps. Playing catch up increases the risk of a breach. Business leaders encourage DevOps teams to push the pace of innovation to keep up with new technologies such as Microservices. Development and operations teams work as fast as possible to meet the deadlines of short and frequent development lifecycles. Security tries to keep pace, but with several disparate reports to review and too many results to manage, they fall behind. In the rush to catch up, critical vulnerabilities may be missed. Centralize and harmonize application security testing across all development pipelines in a scalable, repeatable, and automated way.
  • 20
    Nexus Container
    Deploying containers successfully means balancing robust security practices, agile DevOps team needs, and compliance requirements. Nexus Container does it all — helping your development, security, and operations teams discover, continuously monitor, and fix container vulnerabilities during the entire container lifecycle. We continuously scan during build, monitor images in registries, and run automated tests for security compliance to ensure we catch vulnerabilities early in the container development cycle. If an issue is found, don’t worry, our admission controls and policy enforcement keep vulnerable images from deploying. Containers need advanced network protection for real-time security. Not only do we continuously monitor your containers to identify vulnerabilities and share available fixes once in-production, we’re the only solution that can enforce data loss protection and prevent zero-day malware and network attacks, tunneling, and breaches.
  • 21
    Fidelis Halo

    Fidelis Halo

    Fidelis Cybersecurity

    Fidelis Halo is a unified, SaaS-based cloud security platform that automates cloud computing security controls and compliance across servers, containers, and IaaS in any public, private, hybrid, and multi-cloud environment. With over 20,000 pre-configured rules and more than 150 policy templates that cover standards such as PCI, CIS, HIPAA, SOC, and DISA STIGs for IaaS services, Halo’s extensive automation capabilities streamline and accelerate workflows between InfoSec and DevOps. The comprehensive, bi-directional Halo API, developer SDK, and toolkit automate your security and compliance controls into your DevOps toolchain to identify critical vulnerabilities so they can be remediated prior to production. The free edition of Halo Cloud Secure includes full access to the Halo Cloud Secure CSPM service for up to 10 cloud service accounts across any mix of AWS, Azure, and GCP, at no cost to you, ever. Sign up now and start your journey to fully automated cloud security!
    Starting Price: Free
  • 22
    CA Endevor

    CA Endevor

    Broadcom

    Automate to accelerate software development time across the enterprise. CA Endevor provides a standardized, reliable and automated approach to securing and managing your software assets. Designed to automate the development process, CA Endevor governs software change from the very first line of modified code through deployment with change tracking. CA Endevor Integrations for Enterprise DevOps provides users additional flexibility in their choice of interface and tight coupling with their DevOps toolset. With out-of-the-box integrations to popular agile PPM tools, CI/CD and pipeline management tools, and plugins to enterprise GIT repositories, teams can adopt the same modern stacks used for distributed development while continuing to leverage the build and lifecycle automation offered by CA Endevor. Automated build and deploy at check-in with integrated production delivery.
  • 23
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 24
    Infosec Skills
    Infosec Skills cyber ranges guide learners through realistic scenarios inside the operating environments they’d encounter on the job. Launch a cyber range with a click of a button and learn how to counter the MITRE ATT&CK tactics and techniques targeting your organization today. From command line basics to advanced adversarial techniques. All Infosec Skills training maps directly to the NICE Framework to help you build role-relevant, scalable team development programs that close cyber skills gaps. Take a bottom-up approach to any training initiative by building custom learning paths covering specific NICE knowledge and skill statements, or browse and assign training from any of the 52 NICE Work Roles inside the platform.
    Starting Price: $34 per month
  • 25
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 26
    MyGet

    MyGet

    MyGet

    The Secure Universal Package Manager. Continuously govern and audit all packages in your DevOps lifecycle. Thousands of teams worldwide trust MyGet with their package management and governance. Accelerate your software team with cloud package management, robust security controls and easy continuous integration build services. MyGet is a Universal Package Manager that integrates with your existing source code ecosystem and enables end-to-end package management. Centralized package management delivers consistency and governance to your DevOps workflow. MyGet real-time software license detection tracks your teams’ package usage and detects dependencies across all of your packages. Customized usage policies ensure your teams are only using approved packages while reporting vulnerabilities and outdated packages early in your software build and release cycles.
    Starting Price: $15 per month
  • 27
    Cymune

    Cymune

    Cymune

    Incident response services are designed to assist in the remediation efforts following a cyberattack or similar damaging ordeal within a company’s IT infrastructure. Get rapid incident response services for your enterprise with our incident response 6-step plan. It helps to address a suspected data breach rapidly and minimizes the incident impact. Benefits of Incident Response with Cymune. Develop an effective breach remediation plan based on a definitive analysis of the nature and scope of the breach. Eliminate threats and prevent cyber attackers from maintaining an untiring presence on your network. Get access to a team of expert cybersecurity analysts and incident responders when you need them most. Field-tested methodologies based on standard and proven frameworks along with skilled and adaptive security experts. It’s time to take a proactive lifecycle approach and build a robust and agile foundation for your enterprise security program.
  • 28
    CyberArk Customer Identity
    Delight your customers with easy and secure access to your websites and apps that keep them loyal to your business. Expectations for great digital experiences are at an all-time high. Meanwhile, the attack surface is more porous than ever. With CyberArk Customer Identity, you can securely open up your websites and apps to customers with confidence. Seamless integration, intuitive access controls and frictionless sign-on experience. Privacy, consent and identity verification in one platform. Pre-built widgets and open APIs to reduce development effort. Secure access to business apps for human and machine identities. Secure access for machine identities within the DevOps pipeline. Reduce complexity and burden on IT while improving protection of the business. Provide secure single sign-on access to your apps and services.
  • 29
    Trelica

    Trelica

    Trelica

    Trelica’s SaaS management platform gives IT teams insight into what apps are in use and why, so you can make informed decisions about spend, information security & data privacy. Partner with users to optimize & secure the apps that allow your business to thrive, while weeding out unwanted SaaS usage. Understand all aspects of your SaaS landscape at a glance by automating application discovery and user engagement insights. Manage your SaaS inventory by tracking licenses, renewals and spend for approved apps, whilst offboarding apps with risky or redundant usage. Upgrade from one-off Excel InfoSec surveys. Define your own seamless contract lifecycle to manage third-party applications, from onboarding to end of use. Make your approach to SaaS management compliant with GDPR and the California Consumer Privacy Act within all areas of your business and effective across jurisdictions.
  • 30
    Cloudanix

    Cloudanix

    Cloudanix

    Cloudanix provides CSPM, CIEM, CWPP, and CNAPP capabilities across all major cloud providers in a single dashboard. Our risk scoring helps prioritize security threats to minimize alert fatigue from your DevOps and InfoSec teams. Our adaptive notifications ensure that the right alert reaches the right team member. 1-click JIRA integration, inbuilt review workflows, and other collaborative features increase team productivity by large. Cloudanix provides a library of automated remediation options to reduce the amount of time required to fix a problem. The solution is agentless and onboards in five minutes. Our pricing is resource based which means there are no minimums and you can bring all your different AWS accounts under our single Dashboard. We are backed by YCombinator and some amazing investors who have built and run infrastructure and security companies in the past. There is no minimum to start using Cloudanix to secure your cloud infrastructure
    Starting Price: $99/month
  • 31
    Titan Sign
    Design dynamic, responsive Salesforce signing processes with Titan’s simple drag-and-drop builder. Titan eSignatures are fully accessible and meet all requirements outlined in section 508. 100% secure and compliant with HIPAA, SOC 2, ISO, GDPR, and other leading frameworks. Sign, seal, and deliver agreements in minutes with everything tracked from Salesforce using Titan’s no-code eSignature solution. Create and track personalized quotes with intuitive drag-and-drop software for faster signing and smoother deals. Notify your salespeople and management team every time someone views, voids, or signs a document and easily track the entire signing process in Salesforce. Titan Sign also updates Salesforce records with data coming from the document or input fields once signing is completed. Even though Salesforce is a revolutionary tool, it does not have an out-of-the-box option for initiating and triggering signing processes.
    Starting Price: $12 per month
  • 32
    ThreatModeler

    ThreatModeler

    ThreatModeler

    ThreatModeler™ enterprise threat modeling platform is an automated solution that simplifies efforts associated with developing secure applications. We fill a critical and growing need among today's information security professionals: to build threat models of their organizations'​ data, software, hardware, and infrastructure at the scale of the IT ecosystem and at the speed of innovation. ThreatModeler™ empowers enterprise IT organizations to map their unique secure requirements and policies directly into their enterprise cyber ecosystem – providing real-time situational awareness about their threat portfolio and risk conditions. CISOs and other InfoSec executives gain a comprehensive understanding of their entire attack surface, defense-in-depth strategy, and compensating controls, so they can strategically allocate resources and scale their output.
  • 33
    Engity

    Engity

    Engity GmbH

    As an Identity & Access Management Solution Provider, we offer European SMEs, start-ups and grown-ups a fully scalable, managed and customizable Keycloak alternative. Engity can ensure full compliance with European data protection regulations by providing all services from European data centers. Furthermore, Engity offers standard security features such as Easy-Ensure Strong Password Check or Breached Password Detection to ensure the highest security standards. In addition to the classic authentication features such as login with username & password, MFA, SSO or biometrics, Engity also brings new solutions to the market, such as authentication environments for directories or sign-up without the need for an e-mail account.
    Starting Price: €0.01/month/user
  • 34
    Fugue

    Fugue

    Fugue

    The Fugue Platform empowers teams with the tools to build, deploy and maintain cloud security at every stage of the development lifecycle. We're so confident that you'll get immediate value with Fugue that we guarantee it. Fugue leverages the open source Open Policy Agent (OPA) standard for IaC and cloud infrastructure policy as code. Build IaC checks into git workflows and CI/CD pipelines with Regula—an open-source tool powered by OPA. Develop custom rules—including multi-resource checks—using Rego, the simple and powerful open source language of OPA. Govern your IaC security for cloud resources, Kubernetes, and containers in one place and ensure consistent policy enforcement across the development lifecycle. View the results of security and compliance checks on IaC across your organization. Access and export tenant-wide, IaC-specific security and compliance reports.
  • 35
    Hammer Cloud Platform
    Hammer Cloud Platform is a comprehensive, test automation offering that integrates functional, regression, systems integration, performance, and customer experience testing/monitoring into an intuitive, software-as-a-service (SaaS) solution. With Hamer Cloud Platform, it’s easier than ever for contact center and enterprise network teams to accelerate their software development lifecycles. Hammer Cloud Platform is geared toward infrastructure planning, application development, quality assurance (QA), DevOps, and operations teams who execute frequent tests to ensure their contact center applications are primed for business. With the rapid adoption of DevOps methodologies, regular testing has become increasingly vital. Hammer Cloud Platform eliminates defects caused by rushed release cycles and helps DevOps teams reduce mean time to repair (MTTR), slash rework costs, and provide a truly optimized experience for customers.
  • 36
    Certera

    Certera

    Certera

    Certera is modern and reputed Certificate Authority offering affordable website security, hosting and cyber security services along with digital security certificates such as SSL/TLS, Code Signing, Email Security and more, catering to the needs of individuals and SME businesses looking for reliable and cost-effective solutions to protect their websites and business.
    Starting Price: $4.99/year
  • 37
    F5 NGINX App Protect
    A modern app‑security solution that works seamlessly in DevOps environments, helping you deliver secure apps from code to customer. Today’s application landscape has changed dramatically. Modern apps are microservices that run in containers, communicate via APIs, and deploy via automated CI/CD pipelines. DevOps teams need to integrate security controls authorized by the security team across distributed environments without slowing release velocity or performance. NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as a robust WAF or app‑level DoS defense, helping you deliver secure apps from code to customer. Seamlessly integrates strong security controls with NGINX Plus and NGINX Ingress Controller. Defends against many advanced threats and evasive attacks. Reduces complexity and tool sprawl while delivering modern apps. Create, secure, and operate adaptive applications that reduce costs, improve operations, and better protect users.
  • 38
    CyberStrong

    CyberStrong

    CyberSaint Security

    CISOs of the Fortune 500 rely on CyberSaint's CyberStrong platform to achieve real-time cyber and IT risk management and continuous compliance from assessment to Boardroom. CyberStrong uses risk quantification, intuitive workflows, and executive reports to build cyber resilience through measurement and improved communication. Patented AI and ML automation eliminate manual effort, saving enterprises millions annually. The platform aligns cyber and business risk for faster, informed decision-making. Enterprises use CyberStrong as a competitive differentiator, mitigating even the most unprecedented risks while automating assessments across frameworks. CyberSaint is a Gartner Cool Vendor for Cyber & IT Risk Management, is named in Gartner's Security Operations, Cyber & IT Risk Management, and Legal & Compliance Hype Cycles, and won numerous awards including 2021 CRN Emerging Vendor, 2021 Cybersecurity Excellence Gold Winner, and 2021 Cyber Defense Magazine Global InfoSec Awards Winner
  • 39
    PowerSuite

    PowerSuite

    Unify Square

    PowerSuite’s one-of-a-kind technology provides an expansive single-pane view, spanning over six different application platforms from the top four industry-leading software vendors. PowerSuite can solve for video conferencing problems, risky security blind spots, and many other problems using machine learning proactive troubleshooting. Ubiquitous video conferencing usage is creating complexity for IT, driving increasing cost and associated support headaches. No matter if you are using Zoom, Microsoft Teams or Skype for Business or a combination we can help you achieve cost-effective room systems peace of mind. The landslide of Microsoft Teams & Slack usage has begun to create risky blind spots, hidden security gotchas of which IT & InfoSec professionals are unaware. Our solutions mitigate risk without inhibiting user efficiencies by balancing user autonomy with data protection & privacy.
  • 40
    Cloudentity

    Cloudentity

    Cloudentity

    Cloudentity increases development velocity, audit efficiency and risk mitigation by advancing fine-grained authorization policy management and delivering continuous, transaction-level enforcement across hybrid, multi-cloud and microservice environments. Externalize authorization management that empowers developers to efficiently create policy-as-code, provision standardized controls, and invoke contextual access and data exchange enforcement as close to the service as possible. Accelerate application delivery by expediting security validation with full data lineage for audit, forensics and compliance. Cloudentity provides dynamic authorization governance that delivers policy automation and adaptive control ensuring Zero Trust between users, apps, services and data. Automate app, service and API inventory, authorization policy standardization, and declarative authorization provisioning to streamline release security verification.
  • 41
    Layer7 API Management
    Get the speed and security needed to create an agile business at scale. Ensure your digital strategy has the right foundation to capitalize on new opportunities. Bring enterprise data to life at every stage of the lifecycle with Layer7®API Management (formerly CA API Management). Available as a standalone solution or as part of the full lifecycle Layer7 API Management solution, Layer7 API Management (formerly CA API Gateway) gives you the power to securely integrate and govern APIs at scale. Get industry-leading orchestration, optimization and other runtime features proven in the most demanding environments. Enhance API discovery, developer onboarding and collaboration with a central hub for your API teams. Empower your developers with the tools they need to create high-value apps. Create microservices in minutes. Design your service, apply robust logic and expose an enterprise-class API up to 10x faster than traditional coding when you use an extensible low-code development platform.
  • 42
    SANS Security Awareness
    Role-based and progressive training paths are geared towards all involved in the development process. Create a secure culture and ecosystem to mitigate vulnerabilities in critical web applications. With SANS developer training, we clarify the challenges in continuous deployment around the Secure Software Development Lifecycle (SDLC). Teach learners what to watch for in every stage of agile development and ensure your entire team, from developers to architects, managers, and testers creates web applications in a secure environment, and where to place the best security protection for your apps. By educating everyone involved in the software development process including developers, architects, managers, testers, business owners, and partners, you reduce the chances that your organization will become a victim of today’s data security threats and attacks, and ensure that your team can properly build defensible applications from the start.
  • 43
    Delinea Privileged Behavior Analytics
    Know the warning signs of privileged account abuse. A sudden increase in privileged account access by certain users or systems. Atypical access to the most privileged accounts or secrets. A high number of privileged accounts are accessed at once. Accounts accessed at unusual times of day or locations. Privileged Behavior Analytics can quickly detect anomalous behavior and instantly alert your security team to a cyber attack or insider threat before a breach catastrophe happens. Delinea Privileged Behavior Analytics uses advanced machine learning to analyze activity on privileged accounts in real-time to detect anomalies and provide threat scoring and configurable alerts. Advanced machine learning analyzes all privileged account activity so you can spot problems and measure the extent of a breach. Reducing security risks to your organization by improving security saves your department time, money, and resources and maximizes your current investment.
  • 44
    Intrinsic ID

    Intrinsic ID

    Intrinsic ID

    Intrinsic ID is the world’s leading digital authentication company, providing the Internet of Things with hardware-based root-of-trust security via unclonable identities for any IoT-connected device. Based on Intrinsic ID’s patented SRAM PUF technology, the company’s security solutions can be implemented in hardware or software. Intrinsic ID security, which can be deployed at any stage of a product’s lifecycle, is used to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military systems. Intrinsic ID technology has been deployed in more than 150 million devices. Award recognition includes the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, IoT Security Excellence Award, the Frost & Sullivan Technology Leadership Award and the EU Innovation Radar Prize. Intrinsic ID security has been proven in millions of devices certified by Common Criteria, EMVCo, Visa and multiple governments.
  • 45
    Parrot OS

    Parrot OS

    Parrot Security

    Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure. Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure. Always updated, frequently released with many hardening and sandboxing options available. Everything is under your complete control. Feel free to get the system, share with anyone, read the source code and change it as you want! this system is made to respect your freedom, and it ever will be.
  • 46
    Tenfold

    Tenfold

    Ignite Technologies

    Tenfold is an enterprise application development platform. Build and deploy your applications in the time it takes others to write their requirements. Customers who value extensibility and customization beyond the scope of Ignite’s standard release path leverage Ignite’s Tenfold Developer Edition to strike their own path forward at whatever pace and in whatever direction best aligns to their unique business needs. The Developer Edition is a source code-unlocked version to which customers can subscribe with rights to create and run derivative works. The Developer Edition is licensed on an as-is basis. Developer Editions are available within the scope of a customer’s existing license (e.g. number of users) or with expanded usage rights tailored to a customer’s specific needs for broader usage of derivative works. With the Developer Edition, you get access to the entire source code of the Tenfold product.
  • 47
    Screenly

    Screenly

    Screenly

    Frequent, hands-free software updates keep your digital signs stable and secure. Locally saved content guarantees that your content shows – even in the event of an internet outage. Create playlists quickly, and schedule your next month of content in a single sitting. If you're comfortable with Linux, don't need support, and are OK to manage one screen at a time, then choose Screenly Open Source Edition (OSE). If you want commercial-grade features, support, and the ability to easily manage any number of digital signs remotely, then choose a Screenly subscription. You will need one Screenly Player for each screen. Screenly started as a small open-source project in 2011. Today, we power over 10,000 digital signs around the world. Add images, videos, live web pages, and more to your Screenly digital signs. Log in to our online platform, and plug in the Screenly Player to your screen via HDMI.
    Starting Price: $9.95 per month
  • 48
    NuView HRMS

    NuView HRMS

    Ignite Technologies

    Customers who value extensibility and customization beyond the scope of IgniteTech's standard release path leverage IgniteTech's NuView HRMS Developer Edition to strike their own path forward at whatever pace and in whatever direction best aligns to their unique business needs. The Developer Edition is a source code-unlocked version to which customers can subscribe with rights to create and run derivative works. The Developer Edition is licensed on an as-is basis. Developer Editions are available within the scope of a customer’s existing license (e.g. number of users) or with expanded usage rights tailored to a customer’s specific needs for broader usage of derivative works. With the Developer Edition, you get access to the entire source code of the NuView product. Instructions are provided for how to build/compile and deploy, and there is documentation with detailed engineering specifications of the architecture and design decisions taken to build the product.
  • 49
    eSigns

    eSigns

    eSigns

    eSigns is an electronic signature solution, designed for both individuals as well as enterprises, which has proven to be best in streamlining workflows and closing contracts swiftly. Leveraging the advanced technology & automation, the software lets you discover the most convenient way to sign documents digitally, organize them in order and share amongst your teams as well as clientele, within few clicks from anywhere any time. Quick & Easy Say goodbye to those long waiting hours of getting your documents signed, printed and shared within or outside your organization. With eSigns its done with ease in seconds! Fully Secured eSigns adheres to ensure all your documents signed, shared and stored within the system are fully protected and encrypted. So, there’s no data breach – Stay assured! On-The-Go Solution Now, you’re all set to experience the most hassle-free way to electronically sign and send documents, from anywhere, at anytime.
    Starting Price: $9.99 per month
  • 50
    Toad DevOps Toolkit
    Boost the velocity of your DevOps pipeline. You’re expected to deploy database updates faster but database development is becoming a bottleneck in your agile DevOps workflow. Toad DevOps Toolkit makes it easy to integrate Oracle database change management into your DevOps workflow, without compromising quality, performance, or reliability. Toad DevOps Toolkit works in conjunction with automation tools like Jenkins, Bamboo, and Team Foundation Server to include database development and deployment steps as part of your existing CI/CD processes, removing the database bottleneck and speeding up project completion. You’re not locked into a single DevOps tool. Toad DevOps Toolkit integrates with virtually any continuous integration and continuous delivery tool. Run unit tests for all PL/SQL code in the build and review pass/fail status to ensure functional correctness and deploy code updates more quickly.