Alternatives to SimpleK

Compare SimpleK alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to SimpleK in 2024. Compare features, ratings, user reviews, pricing, and more from SimpleK competitors and alternatives in order to make an informed decision for your business.

  • 1
    B-Line

    B-Line

    B-Line

    B-Line is an all-in-one smart building platform that helps property managers and employers automate digital access, amenity booking, space management, and HVAC controls under one platform. By seamlessly integrating with existing security and HVAC systems, our AI-powered interior positioning system provides real-time and historical data to visualize your building performance, occupancy dynamics, and move management to help to optimize your assets and enable your organization to perform at its highest level.
  • 2
    Promaster Key Manager
    For any organisation where key tracking and restricted key access security are important, ProMaster Key Manager 8 is the leading solution. Enables tracking of who has your keys and where the key holder can access, providing effective security. Many organisations large and small have selected this comprehensive software to provide the best in key tracking and management. Works with your locksmith running ProMaster Master-Keying 8 to provide lock system data updates or create stand-alone key systems. To ensure tight security, ProMaster Key Manager 8 has a wide range of security settings that your administrator may grant to each user (e.g. Data entry, issue keys, lost keys, etc.) and you may even restrict who may access each system and each key cabinet.
  • 3
    Key Wizard

    Key Wizard

    KeyWizard

    Key Wizard is a comprehensive key management software package developed for locksmiths and end-users to track detailed information on keys, keyholders and locations. The program features easy-to-navigate non-cluttered screens and uses a format similar to Microsoft Outlook. Free technical support & free upgrades for one year. Clear, easy to read screens. Multi level password protection. Manages multiple end-users and multiple key systems for most manufacturers. Customized query, reporting, and search capability. Global key search across multiple MK systems. Comprehensive hardware listings for door locations. Displays keyholder photos and signatures for identity verification. Automatic reminders for maintenance, back-ups, and overdue keys. Accurate key symbol sorting. Key authorization tracking. Customized key receipts and authorization forms. Tracking of loaned keys and key deposits. Storage of maintenance service history records. Importing and exporting of key systems.
  • 4
    Keytracker

    Keytracker

    Keytracker

    Always keep track of your organized keys and equipment with Keytracker professional management cabinets, software and accessories. No more wasted time looking for keys or equipment. Improved efficiency. Better security. Health & Safety Compliant. Quick to set up. Fast and easy access for authorized users. Keys and equipment are vital to every business, but keeping these secure while quickly accessible, without time-consuming administration, can be challenging. Keytracker products include an extensive range of secure solutions for every business that is quick & easy to use. From a basic key safe box to advanced electronic key control systems, providing efficient solutions to professionally manage business keys and equipment. Managing keys and other assets vital to daily operations can pose many challenges to any organization. In busy environments where multiple users are collecting and returning shared-use items, it is essential that assets can be easily tracked and controlled.
  • 5
    Key Organizer
    The larger the number of keys and persons, the more difficult it becomes to manage the key inventory and the key handovers in Excel™ tables. The Key Organizer is a clear appli­cation program to keep track of keys, record handovers to key recipi­ents, as well as to record doors and locks. All key transfers are logged, and handover receipts can be printed. In addi­tion, the locking func­tions of keys and locks can be recor­ded accor­ding to a locking plan. Several locking systems from several proper­ties can be managed in one view. Several users can work with the same data at the same time. Your data is not stored in a cloud, but only on your PC or in your local net­work. Thus, your sensi­tive data does not leave your house. Our program intentio­nally has no inter­net con­nection. One-time purchase without runtime limi­tation. Test without time pressure, gladly with assist­ance by e-mail.
    Starting Price: $178 one-time payment
  • 6
    KeyCop Manager

    KeyCop Manager

    CaptureTech

    The KeyCop is an intelligent key ring with an integrated RFID tag and laser-engraved barcode to which you can attach one or more keys. With the KeyCop you directly improve key management within your organization because you can easily track exactly who has a key in their possession, when they are in use, when they are returned and where the keys are located. No more lost keys thanks to the KeyCop and directly increase your company security. You can use the KeyCop for manual issuing and collection, or use it in combination with the Electronic key cabinets or Electronic lockers from CaptureTech. 24/7 Full insight into who, what, where and when? With the CaptureTech Web manager you always have a complete and reliable overview of all your assets.
  • 7
    RevBits Privileged Access Management
    Secure and Protect Privileged Accounts, Sessions and Credentials. Everywhere! RevBits Privileged Access Management is a six-in-one solution that includes privileged access, privileged session, password, service accounts, key and certificate management, as well as extensive session logging that captures keystrokes and video. RevBits Privileged Access Management native clients are available for common operating systems. As an organization’s need for comprehensive access management grows, the expansion of onboarding vendors will also increase. RevBits Privileged Access Management is built to provide comprehensive access management while reducing the growth in vendor onboarding. With five integrated access management modules in one solution, organizations are in control. Product Features:- Hardware Tokens Comprehensive Platform Coverage Customizable Password Management Extensive Audit Logs Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
  • 8
    KeyTrak

    KeyTrak

    KeyTrak

    Since 1987, KeyTrak's electronic key and asset management systems have helped businesses worldwide enhance the security of their operations while improving productivity and reducing costs. We believe the difference is in the details, which is why we take single-source responsibility for all our products. To ensure we're able to meet our customers needs, we perform all our research and development, programming, manufacturing and support in-house at our headquarters in College Station, TX. Whether you need to secure your organization's keys, assets, or inventory, there's a solution for you. First, select either our drawer-based or wall-mounted base system. Then, we'll work with you to customize it to meet your needs. Designed based on input from KeyTrak customers, KeyTrak Edge is a reengineered version of our drawer-based system. User-friendly, customizable software allows you to check out and return keys quickly and accurately.
  • 9
    BerryTMS

    BerryTMS

    DigitalBerry

    Initialization, deployment, access rights: simplify and centralize the management of fleets of security with BerryTMS. The implementation of multi-factor authentication and “zero trust” requires the use of security keys. Security keys supporting multiple protocols allow the implementation of “passwordless” authentications that are more secure and efficient than simple authentication. However, setting up authentication solutions based on physical tokens raises the question of managing their life cycle, from initialization to deployment, including fleet supervision. Deploy security keys easily, securely, and in large numbers. Manage the life cycle of the various credentials contained in the keys. Get a complete view of the use of keys in the company. Manage your keys remotely and securely in order to enroll your users. Define the type of enrollment by choosing among those proposed in the solution, enrollment at a distance, face to face, or for VIPs.
  • 10
    KeyBank Touch

    KeyBank Touch

    Morse Watchmans

    Now get touchscreen convenience with KeyBank key access control system, the safer, more secure way to manage keys. The bright 7″ touchscreen key organizer system gives you an easier-to-use interface, and we made KeyBank Touch even more capable. The new KeyAnywhere feature enables you to return a key to any key storage system in your enterprise. You can also locate which KeyBank a specific key is in, or determine who has it out, with the new KeyFind feature. We’ve also improved integration capabilities, along with many other convenient features. Of course you still get our patented SmartKey system, modular design and full scalability. We just keep making key management better. Easy to read, large buttons for convenient navigation. Status bar shows guides users on what to do, and shows what is happening. Email notifications enable a tenant or owner to be alerted when a key to their residence is removed.
  • 11
    Yandex Key Management Service
    Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.
    Starting Price: $0.0230 per month
  • 12
    IBM Security Guardium Key Lifecycle Manager
    IBM Security Guardium Key Lifecycle Manager centralizes, simplifies and automates the encryption key management process to help protect encrypted data and simplify encryption key management. It offers secure, robust key storage, key serving and key lifecycle management for self-encrypting applications and solutions using interoperability protocols including KMIP, IPP and REST. Guardium Key Lifecycle Manager helps customers meet regulations such as PCI DSS, Sarbanes-Oxley and HIPAA by providing access control, key rotation and other automated key lifecycle management processes. Provides centralized, simplified and transparent key management through the secure storage of key material and the serving of keys at the time of use. Offers simple, secure integration with supported protocols including KMIP, IPP and REST. Reduces key management costs by automating the assignment and rotation of keys.
  • 13
    StorMagic SvKMS
    We believe enterprises deserve a one-stop approach to key management. SvKMS provides a single platform that manages all your encryption keys, anywhere. Customers get an enterprise key manager for any encryption workflow, whether at the edge, data center, cloud or even multi-cloud. SvKMS has enterprise-grade features delivered in a simple to use interface, all at a surprisingly low cost. Deploy anywhere, high availability without boundaries, integrate with any workflow. Advanced key management, powerful reporting & authorization, lowest price for massive scale. Centralized management, easy configuration, effortless administration. Unify all encryption key management processes in a centralized virtual appliance. Providing widely accessible risk reduction via GUI, integrated REST API-enhanced workflows and KMIP standardization help SvKMS deliver rapid customization, logging, dashboard auditing and monitoring for all deployment scenarios.
  • 14
    Cryptomathic CKMS

    Cryptomathic CKMS

    Cryptomathic

    Managing an increasing number of cryptographic keys across business applications is becoming evermore challenging, whereas manual, decentralized processes are costly and error prone, and demonstrating compliance is time consuming. Cryptomathic's CKMS is a centralized key management system that delivers automated key updates and distribution to a broad range of applications. CKMS manages the entire lifecycle of all keys (symmetric and asymmetric), supports robust business processes and allows you to confidently comply with and pass internal & external audits. The top three challenges of key management are frequently cited as: lack of clear ownership of processes; lack of skilled personnel and the existence of isolated and fragmented systems. CKMS directly addresses all of these. It enforces specific roles and clear responsibilities for sets of keys; it frees staff from manual, repetitive tasks and allows them to concentrate on policy decisions.
  • 15
    Keyzapp

    Keyzapp

    Zapp Innovation

    Chasing after keys can waste hours each week, that’s why we built Keyzapp. Manage multiple sets of keys per property across multiple locations from any internet device. Customize our reusable smart fobs with your numbering and branding. Let automated text messages chase overdue keys for you. Smart fobs make it easy to identify and issue keys. Guided processes help everyone in the team stay consistent. Automated reminders ensure that that keys are returned before they are lost. Removes the chore of logging key custody on paper or in a database. Fits your process so it’s easy to adopt for everyone. Management information sheds light on your process, so you can manage and improve it. Look up where keys are with a couple of keystrokes. Simple, guided processes – minimal learning required. Access anytime, anywhere, from any device. Automated text messages chase up overdue keys. Easy to view & filter reports for insights on property access.
    Starting Price: $37.53 per month
  • 16
    Alliance Key Manager

    Alliance Key Manager

    Townsend Security

    Once data is encrypted, your private information depends on enterprise-level key management to keep that data safe. The solution provides high availability, standards-based enterprise encryption key management to a wide range of applications and databases. Alliance Key Manager is a FIPS 140-2 compliant enterprise key manager that helps organizations meet compliance requirements and protect private information. The symmetric encryption key management solution creates, manages, and distributes 128-bit, 192-bit, and 256-bit AES keys for any application or database running on any Enterprise operating system. Encryption keys can be restricted based on several criteria. The most permissive level requires a secure and authenticated TLS session to the key server. Individual encryption keys can be restricted to users, groups, or specific users in groups. Enterprise-wide groups can be defined and keys can be restricted to Enterprise users, groups, or specific users in groups.
    Starting Price: $4,800 one-time payment
  • 17
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 18
    XCrypt Data Encryption Platform
    Customers worldwide choose Zettaset products for use in high performance, high availability and seamlessly scalable data environments. Zettaset products are designed to function with extremely low latency to support the most demanding deployment requirements, including high-speed transactions, in-memory databases, and real-time, web-based applications. The XCrypt™ Data Encryption Platform has been designed from the ground up for optimal performance and scalability in distributed systems and elastic cloud environments. XCrypt introduces extremely low latency to the compute environment, making it ideal for in-memory stored data and transactional environments where sub-second response times are essential.
  • 19
    ARIA KMS

    ARIA KMS

    ARIA Cybersecurity Solutions

    The ARIA Key Management Server (KMS) application automatically manages the generation and distribution of encryption keys to handle all of the lifecycle requirements for key management. Highly scalable encryption key management with the ability to generate thousands of keys per minute, ARIA KMS is the ideal solution for per-data or per-application transactions. Delivers the flexibility to meet specialized encryption needs, such as software applications, hardened high availability appliances, or zero footprint PCIe adapters. Eliminates risk with automated configuration and management of KMS. Deploys encryption key management in one hour or less, with no specialized knowledge. Secures on-premises, cloud, or in-cloud deployments. Supports bring your own key (BYOK) security models.
  • 20
    Logitout

    Logitout

    Logitout

    Reduce business risk with our all-in-one cloud solution. Give your team the tools they need to track everything. Instantly view your entries in one screen keeping you in the loop within seconds. Update at any time. Need to be mobile? Too easy with our mobile scanner and intuitive web app on any device. Going cloud means fast, accurate, secure data. Access that important log easily and quickly 24/7. Requiring only internet and a mobile device, our cloud-based solution allows you the freedom to access your Dashboard from anywhere, at any time. There is no limit as to where you can utilize Logitout. Make spreadsheets a thing of the past with our digital dashboard. Going digital allows you to record and track the exact history of any item and best of all our system has notification alerts for overdue. You won’t get that from a spreadsheet. Our inbuilt notifications are automatic, if an item becomes overdue your team and the borrower will know about it.
  • 21
    Google Cloud Key Management
    Scale your security globally. Scale your application to Google’s global footprint while letting Google worry about the challenges of key management, including managing redundancy and latency. Help achieve your compliance requirements: Easily encrypt your data in the cloud using software-backed encryption keys, certified FIPS 140-2 Level 3 validated HSMs, customer-provided keys or an External Key Manager. Leverage from integration with Google Cloud products. Use customer-managed encryption keys (CMEK) to control the encryption of data across Google Cloud products while benefiting from additional security features such as Google Cloud IAM and audit logs. A cloud-hosted key management service that lets you manage symmetric and asymmetric cryptographic keys for your cloud services the same way you do on-premises. You can generate, use, rotate, and destroy AES256, RSA 2048, RSA 3072, RSA 4096, EC P256, and EC P384 cryptographic keys.
  • 22
    Tencent Cloud Key Management Service
    KMS leverages a third-party certified hardware security module (HSM) to generate and protect keys, and utilizes secure data transfer protocols, distributed clustered service deployment and hot backup for guaranteed availability. The security and quality control practices adopted by KMS are accredited by multiple compliance schemes. The Key Management Service provides you with rich management features, including key creation, enabling, disabling, rotation settings, alias settings, viewing key details, and modifying related information. KMS console is integrated with CAM and Cloud Monitor, enabling you to create keys easily for access control. Management operations and keys usages are also logged. KMS allows you to use your own key to encrypt and decrypt sensitive data by implementing Bring Your Own Key (BYOK) solution.
  • 23
    ServerAuth

    ServerAuth

    ServerAuth

    SSH Access Management for Teams. Manage and schedule SSH access to all your servers. SSH Access Restrictions. Automatically managed SSH access to each of your servers user accounts. Secure by design. At no point does ServerAuth have access to your servers or private keys. Scheduled Access. Limit users access to date ranges, days of the week and between work hours. Server GDPR Compliance Secure your clients data with scheduled SSH access. Instantly grant and revoke access to one or more servers for each of your team members allowing you to control who can access your servers, and client data. Limit access to certain times of the day, days of the week & date ranges. Increases server security by restricting access to client data. Quick and easy to modify permissions per server. Individual team-member logins to manage SSH keys. Individual Team Accounts. You'll never need to add an SSH key to a server again. Everyone in your organization gets their own account
  • 24
    KeyWin

    KeyWin

    Creone

    KeyWin6 is the latest version of the market’s most comprehensive administrative tool for securely managing keys and valuables. Through the advanced IoT technology platform via Microsoft Azure, the administrators can manage key cabinets and keys with the highest possible precision, from anywhere in the world. You now have more opportunities to control both keys, use and handling of valuables and equipment by using KeyBox, KeyRack and ValueBox together with KeyWin6. It is easy for you to provide access to individual users or groups and to connect these with the relevant keys or valuables. With its automatic registration, you can always keep track of who is using what. The developed search and filter function simplifies your daily use and creates higher precision and total understanding of the company's management of keys and items. Our KeyWin6 cloud services is built around IoT technology via Microsoft Azure. Despite the advanced, modern and secure technology.
  • 25
    Venafi

    Venafi

    Venafi

    Protect All Your Machine Identities. Are you protecting the TLS keys and certificates, SSH keys, code signing keys, and user certificates being used across your extended enterprise? Find out how you can secure this avalanche of new and constantly changing machine identities. Stay ahead of outages and accelerate DevOps security. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence and automation to protect machine identities throughout your organization. Plus, you can extend your protection through an ecosystem of hundreds of out-of-the-box integrated third-party applications and certificate authorities (CAs). Discover and provision certificates and keys using multiple methods. Apply and enforce security best practices for certificates. Integrate workflow management processes with management of certificate lifecycles. Combine certificate automation with orchestration of keys generated by Hardware Security Modules (HSMs).
  • 26
    Azure Key Vault
    Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection.
  • 27
    KeyNest

    KeyNest

    KeyNest

    KeyNest is a service that provides secure key exchange solutions for Airbnb hosts and property managers. KeyNest offers a KeyNest Points service, which makes handling keys to a property remotely a breeze. There are over 5,000 Points available, where you can store and exchange your keys with guests, contractors or friends. Here's how the KeyNest Points service works: Points: KeyNest operates a network of secure drop-off locations, often referred to as "KeyNest Points," which can include local businesses such as cafes, convenience stores, or other retail outlets. These locations serve as secure hubs where you can store and exchange your keys. Create a Booking: To use the KeyNest Points service, you need to log a key through the KeyNest website or app. This booking allows you to specify the key drop-off location and the details of your guests' arrival and departure. Secure Key Storage: Once you've made a booking, you'll securely store your keys and pass them to the guest.
    Starting Price: $12.99 AUD / key collection
  • 28
    Perfect Master

    Perfect Master

    Treskat USA

    #1 Master Key Software in use by thousands of locksmiths worldwide. In use buy thousands of locksmiths, hospitals, schools, many Las Vegas Casinos, US Military, theme parks, restaurant chains and more. Flexible: Change pin sizes, step, MAC, and even manipulate the bitting array to hold constants if you want to. Create systems for all 4, 5, 6 & 7 pin locks incl. special ones like ASSA, Emhart, Medeco (including Keymark & Biaxial) and removable core like KABA Peaks, Best Falcon A2 and A4, Sargent, Corbin, and Russwin.
  • 29
    StoRegister

    StoRegister

    StoRegister

    A Modern Definition for Self Storage Software. Experience the Future of Self-Storage Software - StoRegister is the #1 Self Storage Software that leverages advanced technologies and a modern interface to redefine the industry. With its unparalleled flexibility to manage various storage types under one platform, it serves as the most reliable solution for Small, Medium, and Large Enterprises. KEY feature of StoRegister: Multi-Facility Management Types of Users Revision of Prices and Tax Rates Localization Multiple Payment Gateway Integration Sitemap Competitor Price Comparison Intuitive Dashboard Customizable Reports Business Management 3D Sitemap of Property and Facility Storegister Open API for Developers Intuitive Dashboard StoRegister Master Search Flexible Discount System Inventory Management Logistics Management Insurance Management Services Management Manage Online Documents Electronic Signature of Documents Daily Task Management Employee Role
    Starting Price: £0.45/Unit/Month
  • 30
    MMS Paperless
    Sefin’s simple, safe and fast solutions, for electronic signatures and the digital management of any type of contract. MMS Paperless is a solution developed by Sefin that allows you to introduce the process of electronic signature contracts into your organization. Safe: electronically signed contracts can be consulted from anywhere and at anytime by authorized personnel without the risk of them being lost. Simple: usable immediately and with simplicity thanks to its easy-to-use signature processes, favoring optimization of costs management and contractual documentation archiving. The Public Digital Identity System (SPID) can be used to electronically to sign contracts, making the remote signature process much easier, more secure and faster. The digital signature of a document, deed or contract issued through a SPID identity makes the document legally valid and binding wherever. It is possible to use both a desktop version on a Web browser and a tablet app for signing contracts.
  • 31
    Gas-Trak Online (GTO)

    Gas-Trak Online (GTO)

    Gas-Trak Online (GTO)

    GTO offers a wide range of services including, but not limited to, cylinder tracking, reporting, and stock management solutions for both HVACR distributors and contractors. Are you a HVACR contractor or distributor looking for a solution to track your cylinder stock, generate reports that enable you to comply with F‑Gas regulations, and provide added value that you can pass on to your customers? GTO offers a wide range of services including, but not limited to, cylinder tracking, reporting, and stock management solutions for both HVACR distributors and contractors. Each platform is purpose-built for your needs. GTO’s distributor stock management system gives cylinder distributors full control of their cylinder fleet by tracking each cylinder quickly and easily from the time it is receipted in the branch, sold to customers, and returned empty to suppliers. The days of handwritten serial numbers are behind you; use a barcode scanner throughout the system to add accuracy and efficiency.
    Starting Price: Free
  • 32
    Clinion eTMF
    Clinion's electronic trial master file (eTMF) system has unique features that simplify storage, access, and management. The simple user interface makes it the go-to tool for clinical trial document management.
  • 33
    buzon

    buzon

    Diverza

    Choose a plan and invoice immediately! Efficiency, security and guarantee of continuity. A solution to take you by the hand and step by step in the billing process, from the simple manual capture, to the import of a flat file, in the same way that today you carry out the task of generating your receipts. Issuance and delivery. Import and export. Business addenda. Storage and backup. Certified custody. Translate. Translation types translate Text. Documents. Text translation. Spanish - detected. English Spanish. French English. Swedish Spanish Source. Translation results risk / tax. Module for the validation of validity of CFDIs and the presence of taxpayers in the "black lists" of the SAT (art. 69 and 69-B CFF). conciliation / tax Module for reconciliation, processing and issuance of Electronic Payment Receipts (REPs) of operations carried out on credit. vault / fiscal Module for synchronization with the SAT (for massive download and storage) and management of receipts issued
  • 34
    SuperKey9

    SuperKey9

    LockShop Software

    SuperKey9™ is the most comprehensive, complete and easiest master keying software available today. With SuperKey9™ you can design and manage an unlimited number of master key systems. Create master key systems for most lock manufacturers including Medeco, ASSA, Best, Arrow, Corbin, Sargent standard and removable (ic) core & many others
    Starting Price: $299
  • 35
    Alora

    Alora

    Alora Healthcare Systems

    Alora Home Health Care is a web-based solution that empowers home health agencies by allowing them to go paperless and to automate their workflow for increased accuracy, efficiency, and compliance. As an all-in-one platform for agencies that provide both skilled and non-skilled care services, Alora Home Health Care has the capability to manage multiple offices or business lines in one integrated system. Core features include electronic visit verification (EVV), integrated electronic one-click faxing, integrated telephony and workflow automation, billing for all payers, scheduling, Plan of Care (485), Point of Care, e-signature, automatic 485 generation from OASIS, and more.
    Starting Price: $295.00/month/user
  • 36
    Dojo Master Online

    Dojo Master Online

    Tsoft Software

    Dojo Master Online is the Next Generation of one of the oldest and most trusted Martial Arts School Management Systems. Dojo Master was designed and built by Black Belts for Black Belts. Because Dojo Master Online combines the safety and independence of a PC-based application with the power of the internet, you gain dozens of features that are difficult or expensive to implement in a traditional PC-based application. Dojo Master's core modules install on your PC directly from the internet. Local installation means you can continue to work, even if your internet connection is down! This also means your valuable data is stored on your local hard drive, making it much more secure that a completely web-based application. Because Dojo Master Online is integrated with the world wide web, you can process credit card and electronic check payments directly from your PC.
  • 37
    InfoMaster

    InfoMaster

    Integrated Software Engineering

    InfoMaster ERP Software is the next generation of user-friendly and comprehensive Accounting and Enterprise Resource Planning (ERP) solutions. For the past 30 years, InfoMaster has assisted many companies in their day-to-day operation, financial, accounting and reporting needs. The heritage continues today with InfoMaster ERP Software Solution. InfoMaster ERP Software adopts a task-based approach to accounting and operations. With its enhanced learning interface, real-time information inquiry and integrated design, users get up to speed with the usage and operation of the system in no time. InfoMaster makes ERP both easy and functional. At Integrated Software Engineering, we believe in keeping things simple yet functional and comprehensive. InfoMaster ERP software is designed with this in mind. We constantly focus on solutions that are Innovative, Simple and Efficient.
  • 38
    Prometheus Platform

    Prometheus Platform

    Prometheus Group

    The Prometheus platform enables out-of-the-box digital transformation for organizations using SAP, IBM Maximo, or Oracle for maintenance and operations. Prometheus solutions deliver simple, role-based workflows for all enterprise asset management tasks. All Prometheus platform solutions work on any device, online or offline. Our solutions include Planning & Scheduling, Permitting & Safety, STO Management, Mobility, Master Data, and Reporting & Analytics. Maintenance software with configurable tools designed to support the core functions of maintenance planners and schedulers. Integrated Safe System of Work (ISSOW) that enables and supports processes for electronic permit to work, lockout/tagout (LOTO), operational risk assessment, and more. Mobile asset management solution for iOS, Android, and Windows that connects maintenance technicians with your EAM, ERP, or CMMS.
  • 39
    CBD2 Estimating
    Open windows to an estimating program you can master in less than an hour. The premier management tool for controlling construction costs. Totally integrated with a simple cost-to-complete accounting system for today's small custom builder. Whether you build 10 homes a year or 200, CBD2 is designed to reduce and control direct construction costs. Automatically calculates lumber, roofs, sheetrock, foundations, stucco, brick, countertops and many other items with minimal input. Truly the fastest, easiest and most affordable estimating program available today. A preprogrammed Spreadsheet for Microsoft Excel®. Always, Always test out the Demo programs before you purchase the Full Version program to make sure that it performs to your expectations for your home building business and that it works properly on your computer. There are no Refunds after purchase due to the type of product, that being a downloadable program.
    Starting Price: $39.95 one-time payment
  • 40
    MicroNet

    MicroNet

    Microrep

    Measuring instruments for gage calibration laboratories and mechanical industry. Gage and Instrument inspection is an important factor for the accreditation of quality systems to ISO 9001, IATF 16949, and ISO 17025. Our product range is capable of inspecting solid (hard) gages such as a plain plug, thread plug, plain and thread ring, pipe thread, snap gage, indicator, electronic probe, lever type indicator, micrometer, bore gage as well as temperature, humidity, and angles. For the inspection of hard-solid gage, reference gage, master and different gages including plug gage, ring gage, thread plug gage, thread ring gage, gage block, snap gage, pipe thread gage, spline gage, external micrometer, internal micrometer, dial indicator and electronic probe.
  • 41
    Chronicles CTMS

    Chronicles CTMS

    Chronicles Research Team

    Full cycle product for Research and Development teams in Pharmaceutical Industry. The product includes Electronic Trial Master File, Trial Management, Electronic Document Management with eSignature support. That is suitable for regulated areas as it is fully compliant with 21CFR Part 11 requirements. We develop and support systems from the very begining to the ready-to-use product using modern agile methodology and feedback given by clients. Satisfaction of customers needs is our main concern. We provide automation services of quality management systems starting from SOPs development and training to systems integration and business processes adapation. Our personnel have expertise in GCP, GLP, GCLP and also have been involved in many research organizations' audits and software development. By purchasing the system you get the full package of documents, training and support. So you can focus on your business and delegate us all the technical issues.
  • 42
    CARDS ON THE SPOT (COTS)

    CARDS ON THE SPOT (COTS)

    Matica Technologies Group

    Offer your cardholders the convenience of instantly issuing debit, credit, and ATM cards in your branches. Instantly issuing payment cards has never been so easy. Visa and MasterCard, credit, debit, and ATM cards, whether contact or contactless, are instantly issued and instantly activated in as little as three clicks with Matica’s instant issuance software, Cards on the Spot™. The Cards on The Spot™ software provides a complete, fully integrated browser-based platform that can instantly issue multiple high-quality printed card types. Matica’s Cards On The Spot™ outshines all competitive products. We make it faster, easier, and more accurate than any other solution. Simply deploy, update and maintain browser-based for any card issuance need. The software integrates directly with cores and transaction processing networks. Perpetual-use branch licensing means unlimited users per branch, no cost per card, and no annual license fee.
  • 43
    Master Terminal
    Forming the core of your terminal operations, Master Terminal is an extremely stable terminal operating system (TOS) that is designed to handle all cargo types. Flexible working environments are supported, from multiple sites, terminals, and sub-terminals can all be managed within a single database. Master Terminal gives you a single, real–time view of your operations so you can make smarter decisions faster. High levels of security are ensured by bank-level encryption and the intelligent technology powering Master Terminal ensures a flexible and scalable solution you can rely on. Master Terminal facilitates sharing cargo information beyond the port “walls” across the supply chain, helping ports grow their business through increased visibility.
  • 44
    Entrust Instant Financial Issuance
    With more than 7,500 installations worldwide and over 15 years of experience, Entrust empowers financial institutions and retailers of all sizes to put ready-to-use cards into the customer’s hands instantly. Instant issuance helps you increase activation rates and card usage while improving customer satisfaction. It also helps reduce costs associated with card pre-printing, inventory management, and mailings. Support instant card issuance and replacement, queued issuance, and low-volume batch card issuance. Issue the card types you want from a choice of blank stocks from a single multi-hopper system. Create, monitor, and report on card setup, issuance and administration based on your requirements. End-to-end encryption capabilities meet PCI PA-DSS security standards protect your data in transit and at rest. Connect your business to valuable opportunities in the fast-rising self-service kiosk market.
  • 45
    NS Hoteles

    NS Hoteles

    NS Hoteles

    Monitor the cleanliness of rooms, control the amenities included per room, warehouse control, inventories and accounts payable. Reservation panel with guest information, date, room, etc. Control of Check In, Check Out, and reservation confirmation electronically. Control of cash inflows and outflows, multiple currencies, including rates in dollars, and issuance of consumption receipts with the use of miniprinters. Room management by day and hour, generating various reports and identifying opportunities, and management of room prices and services by seasons. Access the system by fingerprint(*), use of security profiles to delimit functions and compatibility with surveillance cameras. Generate graphs of expected occupancy for the night, report of rooms in status, report of income by time range.
    Starting Price: $0.99 per room
  • 46
    AIMS Parking Management
    A comprehensive parking management system in one package. The AIMS Parking Management System tracks the life of a parking ticket from the moment of issuance, through payment, and each step in between. All of your issued ticket records are displayed on the AIMS Ticket screen where you may manually enter hand-written tickets, post payments, add unlimited comments, view all transactions associated with the ticket, generate letters, attach files, make monetary adjustments, view other tickets issued to the customer, access appeals, voids, schedule hearings, and edit ticket data. Everything you need, all on one comprehensive screen. The AIMS Parking Management System simplifies your permitting operation with robust functionality. Unlimited permit types and rates can be created and managed with our easy-to-use system. Permit amounts can be defined on a daily, weekly, monthly, annual, or fixed cost basis to fit your custom needs.
  • 47
    SignOff

    SignOff

    Datawitness Online

    A Datawitness electronic signature is a process that captures the intent of a recipient to accept the contents of an online message. It is legally accepted just like a handwritten signature. When you use our electronic signature software to send your contract or agreement to a recipient for signing, you automatically capture a legally binding electronic signature without moving paper between parties. Send simple agreements with our electronic signature software and receive confirmations when they are complete. Or track every step of an ongoing exchange of documents on the way to a final agreement using Datawitness' online control panel. New electronic signature laws allow a purely electronic process for delivery of documents for signature. Datawitness uses a legally tested click wrap process that includes all steps required for binding electronic signature capture that will stand up in court.
  • 48
    ClinicMaster

    ClinicMaster

    ClinicMaster International

    Better and faster data-driven decisions due to better reporting procedures in the system. Health facilities usually can plan better for their patients when there is accurate information about them. Join many healthcare facilities to become more competitive and increase your health care business efficiency. Since 2013, ClinicMaster has empowered healthcare facilities in Africa to streamline their operations, improve efficiency and grow their clientele base. We have served over Ten million patients across 5 Countries in over 180 Healthcare Facilities.
  • 49
    pymesoft.cloud

    pymesoft.cloud

    Programación Integral, S.A.

    This is a subscription to a customizable modular business software for SMEs, which, broadly speaking, allows the management of sales, purchases, budgeting, tasks, as well as a financial module, accounting, rates, electronic invoice, handwritten signature. It is compatible with electrical, plumbing, heating and air conditioning equipment databases (Baselec, Basefon and Basefer). Multi language, currency and multi company application. WEB-SPA Software (Single Page Application). The result is a web application, which behaves very similar to a desktop application. It is a distributed, fault-tolerant, fast and scalable system that runs within an Internet browser such as (Google Chrome, Mozilla Firefox, Safari, Microsoft Edge), and does not require any installation process. . Heterogeneous. It allows you to work anywhere and on any device (computer, phone, tablet...).
    Starting Price: €38/month
  • 50
    RingBell

    RingBell

    RingBell

    With RingBell you can manage conversations with your customers or suppliers, pay or receive payments, take appointments or manage deadlines. RingBell is the quickest way to keep in touch with your customers through a loyal relationship. RingBell is a chat. Start talking with a simple interface. Send appointments or deadlines, these will be synchronized with your smartphone calendar. Define opening time in witch you'll not be able to give a quick reply or you don't want to be disturbed, alert your customers with automated replies. Expose services of your business and manage conversation for every service. Welcome remote payments or make your customer pay in your shop directly on your device. Take advantage of unique fees on Visa and MasterCard cards. Every transaction will have 1.9% fee. Send or receive payments in mobility with a simple tap. View payment status, manage refunds and view your earnings. Simply and quickly send and receive payments on your smartphone.