Alternatives to Sunlight

Compare Sunlight alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Sunlight in 2026. Compare features, ratings, user reviews, pricing, and more from Sunlight competitors and alternatives in order to make an informed decision for your business.

  • 1
    KrakenD

    KrakenD

    KrakenD

    KrakenD is a high-performance API Gateway optimized for resource efficiency, capable of managing 70,000 requests per second on a single instance. The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance. It supports various protocols and API specifications, with features like fine-grained access controls, data transformation, and caching. Unique to KrakenD is its ability to aggregate multiple API responses into one, streamlining client-side operations. Security-wise, KrakenD aligns with OWASP standards and doesn't store data, making compliance simpler. It offers a declarative configuration and integrates with third-party logging and metrics tools. With transparent pricing and an open-source option, KrakenD is a comprehensive API Gateway solution for organizations prioritizing performance and scalability.
    Leader badge
    Compare vs. Sunlight View Software
    Visit Website
  • 2
    OpenVPN

    OpenVPN

    OpenVPN

    Access Server gives you the ability to rapidly deploy a secure remote access solution with a web-based administration interface — all on general purpose computing hardware or virtual machines. Your team will have access to the built-in OpenVPN Connect App and bundled connection profiles. All without adding a ton of extra work to your IT to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control. OpenVPN also has a cloud-delivered solution called CloudConnexa.
    Starting Price: Free Up to 3 Users
  • 3
    Ambassador

    Ambassador

    Ambassador Labs

    Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance. - Enhanced Security: Protect your APIs from unauthorized access and malicious attacks with robust security features. - Improve Productivity & Developer Experience
  • 4
    StorMagic SvSAN
    StorMagic SvSAN is simple storage virtualization. It provides high availability with two nodes per cluster, and boasts users among thousands of organizations to keep mission-critical applications and data online and available 24 hours a day, 365 days a year. SvSAN is a lightweight solution that has been designed specifically for small-to-medium-sized businesses and edge computing environments such as retail stores, manufacturing plants and even oil rigs at sea. SvSAN is a simple, 'set and forget' solution that enables lightweight high availability as a virtual SAN (VSAN) with a witness VM that can be local, in the cloud, or as-a-service, and support up to 1,000 2-node clusters. It gives organizations choice and control by allowing configurations of any x86 servers and storage types, even mixed within a cluster. Plus, SvSAN eliminates downtime with synchronous mirroring and no single point of failure, and non-disruptive hardware and software upgrades
  • 5
    Morgan Solar Sun Studio
    Analyze and compare the performance of different light management technologies. Explore conceptual designs and the interaction with surroundings. Design strategies to generate electricity, provide shading and reduce operating costs. Reduce solar heat gain and glare to improve human comfort and wellness. Use sunlight to your advantage. We can help identify what matters to you and then work with you to develop a customized proposal.
  • 6
    Lucibel

    Lucibel

    LUCIBEL

    Lucibel has designed an innovative lighting solution allowing the synchronization of circadian rhythm by simulating sunlight and its impact on the body. Cronos lighting varies in intensity and color temperature, determined by a programmed daily scenario, ensuring an optimal visual comfort at all times. This scenario was defined in collaboration with a team of neurobiologists and doctors, it is reproducing the natural light cycle on a 8 to 10 hours, depending on the customer needs. In order to validate the benefits of the Cronos technology, Lucibel tested it within a clinical study. The study has been conducted by a medical team during 28 days on 70 employees from Nexity group. The results are impressing : under Cronos lighting, 75% of the participants have seen their performances improve, their drowsiness reduce and had a better quality sleep.
  • 7
    Sweet Home 3D
    Sweet Home 3D is a free interior design application that helps you draw the plan of your house, arrange furniture on it and visit the results in 3D. Insert doors and windows in walls by dragging them in the plan, and let Sweet Home 3D compute their holes in walls. Add furniture to the plan from a searchable and extensible catalog organized by categories such as kitchen, living room, bedroom, bathroom. Change color, texture, size, thickness, location and orientation of furniture, walls, floors and ceilings. While designing the home in 2D, simultaneously view it in 3D from an aerial point of view, or navigate into it from a virtual visitor point of view. Create photorealistic images and videos with the ability to customize lights and control sunlight effect according to the time of day and geographic location. Extend the features of Sweet Home 3D with plug-ins programmed in Java, or by developing a derived version based on its Model View Controller architecture.
  • 8
    CompuWeigh

    CompuWeigh

    Paradigm Software

    Paradigm Software, L.L.C. offers a complete weighing and routing solution with many optional modules to allow for your organization to grow without outgrowing your software. All settings and ticket layouts are stored in the database. Audit schema will keep a complete history of record changes. All configuration settings and lookup tables are stored in the database. Automated error tracking and all log files are stored in the database and message queued to your central server. Default data entry by account, truck or transaction to reduce errors and speed up transaction processing. Support for direct TCP/IP, Serial or USB communication with capable hardware. A popular unattended terminal includes a thermal receipt printer, color LCD monitor (sunlight readable at 1550 nits), keyboard/keypad, proximity card reader, and an intercom system. Each terminal is built to meet your business requirements with your environment and climate in mind (heater, fan, exhaust, air conditioner).
  • 9
    Intel RealSense

    Intel RealSense

    Intel RealSense

    It's easy to build the future with the open-source Intel® RealSense™ SDK 2.0 and other tools available provided in one package. Supporting various platforms and programming languages. Get started fast with depth development. Intel RealSense ID SDK is open-source, created with the developer in mind. It is designed to plug into your user authentication systems. Latest cross-platform firmware for Intel RealSense depth cameras. Choose your device family on the right. Learn about our ongoing innovation and research for the most comprehensive computer vision portfolio on the market. Intel RealSense ID authenticates users in less than a second with a glance. It combines industry-leading hardware and software design to ensure reliability in varied conditions. It supports every skin tone and shade reliably and allows a natural interaction for most people. Intel RealSense ID also works in lighting conditions from complete darkness to strong sunlight.
  • 10
    Style Art AI

    Style Art AI

    Style Art AI

    Style Art AI enables text-to-image and image-to-image generation in a wide variety of artistic styles with no drawing skills required. Users can either upload a photo or enter a text description (for example, “a young couple standing close together in summer outfits, warm sunlight, 3D jewelry box figurine style”) and select from more than 30 visual styles, such as classic animation, Pixar, Disney, chibi, 3D figurine, or a custom style mix. The platform is powered by the latest “ChatGPT 4o” vision model and supports parameters like image size, color preference, and composition. In “image-to-image” mode, users can upload one or more source images and direct the AI to replace backgrounds, swap clothing or accessories, merge elements from different sources, or blend multiple styles into one unique image. The tool emphasizes creative freedom; prompts like “merge spring, summer, autumn, and winter into one image so each occupies a quarter and reflects the passage of time” are supported.
    Starting Price: $9.99 per month
  • 11
    VMware Cloud Director
    VMware Cloud Director is a leading cloud service-delivery platform used by some of the world’s most popular cloud providers to operate and manage successful cloud-service businesses. Using VMware Cloud Director, cloud providers deliver secure, efficient, and elastic cloud resources to thousands of enterprises and IT teams across the world. Use VMware in the cloud through one of our Cloud Provider Partners and build with VMware Cloud Director. A policy-driven approach helps ensure enterprises have isolated virtual resources, independent role-based authentication, and fine-grained control. A policy-driven approach to compute, storage, networking and security ensures tenants have securely isolated virtual resources, independent role-based authentication, and fine-grained control of their public cloud services. Stretch data centers across sites and geographies; monitor resources from an intuitive single-pane of glass with multi-site aggregate views.
  • 12
    Kubestone

    Kubestone

    Kubestone

    Welcome to Kubestone, the benchmarking operator for Kubernetes. Kubestone is a benchmarking operator that can evaluate the performance of Kubernetes installations. Supports a common set of benchmarks to measure, CPU, disk, network and application performance. Fine-grained control over Kubernetes scheduling primitives, affinity, anti-affinity, tolerations, storage classes, and node selection. New benchmarks can easily be added by implementing a new controller. Benchmarks runs are defined as custom resources and executed in the cluster using Kubernetes resources, pods, jobs, deployments, and services. Follow the quickstart guide to see how Kubestone can be deployed and how benchmarks can be run. Benchmarks can be executed via Kubestone by creating custom resources in your cluster. After the namespace is created you can use it to post a benchmark request to the cluster. The resulting benchmark executions will reside in this namespace.
  • 13
    Tencent Cloud Message Queue
    CMQ can efficiently send/receive and push tens of millions of messages and retain an unlimited number of messages. It features an extremely high throughput and can process over 100,000 queries per second (QPS) with one single cluster, fully meeting the messaging needs of your businesses. When each message is returned to the user, CMQ writes three copies of the message data to different physical servers so that when one of the servers fails, the backend data replication mechanism can quickly migrate the data. CMQ supports HTTPS-based secure access and utilizes Tencent Cloud's multi-dimensional security protection to defend against network attacks and protect the privacy of your businesses. Plus, it supports managing master/sub-accounts and collaborator accounts for fine-grained resource access control.
  • 14
    Tetrate

    Tetrate

    Tetrate

    Connect and manage applications across clusters, clouds, and data centers. Coordinate app connectivity across heterogeneous infrastructure from a single management plane. Integrate traditional workloads into your cloud-native application infrastructure. Create tenants within your business to define fine-grained access control and editing rights for teams on shared infrastructure. Audit the history of changes to services and shared resources from day zero. Automate traffic shifting across failure domains before your customers notice. TSB sits at the application edge, at cluster ingress, and between workloads in your Kubernetes and traditional compute clusters. Edge and ingress gateways route and load balance application traffic across clusters and clouds while the mesh controls connectivity between services. A single management plane configures connectivity, security, and observability for your entire application network.
  • 15
    Appvia Wayfinder
    Appvia Wayfinder is a trusted infrastructure operations platform designed to increase developer velocity. It enables platform teams to operate at scale by providing self-service guardrails for standardisation. Supporting integration with AWS, Azure, and more, Wayfinder offers self-service provisioning of environments and cloud resources using a catalogue of manageable Terraform modules. Its built-in principles of isolation and least privilege ensure secure default configurations, while granting fine-grained control to platform teams over underlying CRDs. It offers centralized control and visibility over clusters, apps, and cloud resources across various clouds. Additionally, Wayfinder's cloud automation capability supports safe deployments and upgrades through the use of ephemeral clusters and namespaces. Choose Appvia Wayfinder for streamlined, secure, and efficient infrastructure management.
    Leader badge
    Starting Price: $0.035 US per vcpu per hour
  • 16
    Aserto

    Aserto

    Aserto

    Aserto helps developers build secure applications. It makes it easy to add fine-grained, policy-based, real-time access control to your applications and APIs.
 Aserto handles all the heavy lifting required to achieve secure, scalable, high-performance access management. It offers blazing-fast authorization of a local library coupled with a centralized control plane for managing policies, user attributes, relationship data, and decision logs. And it comes with everything you need to implement RBAC or fine-grained authorization models, such as ABAC, and ReBAC. Take a look at our open-source projects: - Topaz.sh: a standalone authorizer you can deploy in your environment to add fine-grained access control to your applications. Topaz lets you combine OPA policies with Zanzibar’s data model for complete flexibility. - OpenPolicyContainers.com (OPCR) secures OPA policies across the lifecycle by adding the ability to tag, ver
  • 17
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 18
    StarWind HyperConverged Appliance
    StarWind HCA comes fully pre-configured and fine-tuned to your requirements by StarWind Engineers. StarWind assists with the migration to its solution at no extra cost. There are no hidden costs or licensing pitfalls: StarWind HCA comes with standardized, transparent licensing. It’s a unique StarWind practice not offered by any other HCI vendor for free. StarWind Command Center, a single-pane-of-glass management and monitoring web UI, is also included together with every StarWind HCA license. Control your hardware resources (networking, storage) and software resources (workload, VMs, backups) from a unified convenient dashboard in the form of a neat HTML5-based user interface. StarWind has picked only the highest quality components from the most trusted hardware vendors on the market. The need for a dedicated, old-fashioned, cord-jungle of a datacenter is no more. All the essentials are included in a space-savvy HCI platform that is a fire-and-forget solution.
  • 19
    Calico Enterprise
    A self-managed, active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise is the industry’s only active security platform with full-stack observability for containers and Kubernetes. Calico Enterprise extends the declarative nature of Kubernetes to specify security and observability as code. This ensures consistent enforcement of security policies and compliance, and provides observability for troubleshooting across multi-cluster, multi-cloud and hybrid deployments. Implement zero-trust workload access controls for traffic to and from individual pods to external endpoints on a per-pod basis, to protect your Kubernetes cluster. Author DNS policies that implement fine-grained access controls between a workload and the external services it needs to connect to, like Amazon RDS, ElastiCache, and more.
  • 20
    TruLens

    TruLens

    TruLens

    TruLens is an open-source Python library designed to systematically evaluate and track Large Language Model (LLM) applications. It provides fine-grained instrumentation, feedback functions, and a user interface to compare and iterate on app versions, facilitating rapid development and improvement of LLM-based applications. Programmatic tools that assess the quality of inputs, outputs, and intermediate results from LLM applications, enabling scalable evaluation. Fine-grained, stack-agnostic instrumentation and comprehensive evaluations help identify failure modes and systematically iterate to improve applications. An easy-to-use interface that allows developers to compare different versions of their applications, facilitating informed decision-making and optimization. TruLens supports various use cases, including question-answering, summarization, retrieval-augmented generation, and agent-based applications.
    Starting Price: Free
  • 21
    AWS Network Firewall
    With AWS Network Firewall, you can create firewall rules that provide fine-grained control over network traffic and easily deploy firewall security across your VPCs. Automatically scale your network firewall to protect your managed infrastructure. Protect your unique workloads with a flexible engine that can define thousands of custom rules. Centrally manage security policies across existing accounts and VPCs and automatically enforce mandatory policies on new accounts. With AWS Network Firewall, you can define firewall rules that provide fine-grained control over network traffic. Network Firewall works together with AWS Firewall Manager so you can build policies based on Network Firewall rules and then centrally apply those policies across your virtual private clouds (VPCs) and accounts. Inspect traffic flows using features such as inbound encrypted traffic inspection, stateful inspection, protocol detection, and more.
  • 22
    iLock Security Services
    Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure. Provides foundation for orb2 for Java Security Services.
  • 23
    Google Cloud Identity and Access Management (IAM)
    Fine-grained access control and visibility for centrally managing cloud resources. Identity and Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage Google Cloud resources centrally. For enterprises with complex organizational structures, hundreds of workgroups, and many projects, IAM provides a unified view into security policy across your entire organization, with built-in auditing to ease compliance processes. We recognize that an organization’s internal structure and policies can get complex fast. Projects, workgroups, and managing who has authorization to do what all change dynamically. IAM is designed with simplicity in mind: a clean, universal interface lets you manage access control across all Google Cloud resources consistently. So you learn it once, then apply everywhere.
  • 24
    Container Service for Kubernetes (ACK)
    Container Service for Kubernetes (ACK) from Alibaba Cloud is a fully managed service. ACK is integrated with services such as virtualization, storage, network and security, providing user a high performance and scalable Kubernetes environments for containerized applications. Alibaba Cloud is a Kubernetes Certified Service Provider (KCSP) and ACK is certified by Certified Kubernetes Conformance Program which ensures consistent experience of Kubernetes and workload portability. Kubernetes Certified Service Provider (KCSP) and qualified by Certified Kubernetes Conformance Program. Ensures Kubernetes consistent experience, workload portability. Provides deep and rich enterprise-class cloud native abilities. Ensures end-to-end application security and provides fine-grained access control. Allows you to quickly create Kubernetes clusters. Provides container-based management of applications throughout the application lifecycle.
  • 25
    P0 Security

    P0 Security

    P0 Security

    Find and fix vulnerabilities, request and grant privileged access. You should never need to trade off infrastructure security against developer velocity. Process access escalations in minutes. No more tickets, better-scoped permissions, and automatic expiration. P0 Security enables engineers to request just-in-time, fine-grained access to any cloud resource, without becoming an expert in the language of cloud IAM. DevOps teams can automate provisioning and expiry of access, without needing to constantly update static IDP groups. Provide developers just-in-time, short-lived, and fine-grained access to a production stack (AWS, GCP, Kubernetes) for deploying or troubleshooting services. Automate periodic access reviews of your cloud environment, and accelerate compliance for SOC2 and ISO 27001, without overburdening your teams. Provide engineers and customer success teams just-in-time and short-lived access to customer data in a cloud environment, or in a data warehouse.
    Starting Price: $25 per month
  • 26
    Apache Sentry

    Apache Sentry

    Apache Software Foundation

    Apache Sentry™ is a system for enforcing fine grained role based authorization to data and metadata stored on a Hadoop cluster. Apache Sentry has successfully graduated from the Incubator in March of 2016 and is now a Top-Level Apache project. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoop cluster. Sentry currently works out of the box with Apache Hive, Hive Metastore/HCatalog, Apache Solr, Impala and HDFS (limited to Hive table data). Sentry is designed to be a pluggable authorization engine for Hadoop components. It allows you to define authorization rules to validate a user or application’s access requests for Hadoop resources. Sentry is highly modular and can support authorization for a wide variety of data models in Hadoop.
  • 27
    AWS Personal Health Dashboard
    AWS Personal Health Dashboard, technology and tools to monitor, manage, and optimize your AWS environment. AWS Personal Health Dashboard provides alerts and remediation guidance when AWS is experiencing events that may impact you. While the Service Health Dashboard displays the general status of AWS services, Personal Health Dashboard gives you a personalized view into the performance and availability of the AWS services underlying your AWS resources. The dashboard displays relevant and timely information to help you manage events in progress, and provides proactive notification to help you plan for scheduled activities. With Personal Health Dashboard, alerts are triggered by changes in the health of AWS resources, giving you event visibility, and guidance to help quickly diagnose and resolve issues. AWS Personal Health Dashboard gives you fine-grained access control so that you can setup permissions based on event metadata.
  • 28
    Oracle Blockchain
    Reliably share trusted data with multiple parties using Oracle Blockchain Platform Cloud Service. The solution offers ready-to-use code for running smart contracts and maintaining a tamper-evident blockchain—built on the industry’s leading open source Hyperledger Fabric blockchain platform. Easily add or remove resources to meet changes in demand and scale the compute capacity—up or down—to meet evolving needs. Customers are charged only for usage. Multiple participants can contribute to the blockchain network with the easy-to-configure RAFT consensus algorithm. The fine-grained access control functionality allows access to each piece of large datasets stored in the cloud. With this feature, smart contract developers can manage permissions’ access to easily define identities, groups, and resources. With just a few clicks, set up a permissioned blockchain—no coding required. There’s no need to manually provision hardware, software, manage certificates, or configure network components.
    Starting Price: $0.215 per hour
  • 29
    LynxSecure

    LynxSecure

    Lynx Software Technologies

    LynxSecure® is a programmable processor partitioning system that uses hardware virtualization capabilities to isolate computing resources. Its unique least-privilege design and fine-grained distributed resource control model serves as the foundation to the Lynx MOSA.ic™ Modular Development Framework. To earn the trust of our customers, partners, and stakeholders in the creation of innovative software platforms that cost-, risk- and time-reduce the development and deployment of safe, secure, connected mission-critical systems for use in manned and autonomous military, aerospace, and federal systems. Rather than attempting to shape system behavior indirectly by issuing commands to platform APIs according to a programming manual, LynxSecure allows developers to directly control system behavior through a unique system architecture specification written by the developer and enforced solely by the processor.
  • 30
    Symatec Secure Access Cloud
    Symantec Secure Access Cloud is a SaaS solution that enables more secure and granular access management to any corporate resource hosted on-premises or in the cloud. It uses Zero Trust Access principles in delivering point-to-point connectivity without agents or appliances, eliminating network level threats. Secure Access Cloud provides point-to-point connectivity at the application level, cloaking all resources from the end-user devices and the internet. The network-level attack surface is entirely removed, leaving no room for lateral movement and network-based threats. Its simple-to-set, fine-grained and easy-to-manage access and activity policies prevent unauthorized access to the corporate resources by implementing continuous, contextual (user, device and resource-based context) authorization to enterprise applications allowing secured employee, partners and BYOD access.
  • 31
    Turnkey

    Turnkey

    Turnkey

    We help you build better crypto products. Create thousands of embedded wallets, get rid of manual transaction flows, and automate on-chain actions, all without compromising on security. Create thousands of non-custodial wallets across blockchains with a simple API call. Build even the most complex crypto products by signing the transactions you need. Protect your assets with fine-grained policies and approval workflows. We’re developer-first at our core and obsess over giving you the easiest APIs and SDKs. We’ve done away with passwords to ensure the highest level of security. Your account is virtually unfishable with our hardware-based WebAuthn authentication. Our policy engine provides fine-grained controls for how users can access private keys. All actions on your account are checked against your custom policies and approval workflows while leaving an audit trail. Leveraging secure, isolated environments and verifiable data stores, we ensure you have control over your assets.
    Starting Price: $0.10 per signature
  • 32
    Libreplan

    Libreplan

    Libreplan

    With LibrePlan you identify the tasks which make up a project and estimate the hours needed to accomplish them. You do it by creating hierarchical structures (WBS) with containers and leafs in a graphical and powerful way. LibrePlan gives you the flexibility to choose the level of the WBS tree at which you create Gantt tasks. You can do coarse or fine-grained planning. Once created the planning tasks you are provided with an interactive interface to create the Gantt chart. Collaborative planning is enforced by allowing to involve actively the workers in the projects by binding them to a type of LibrePlan users, called bound resources. A bound resource is a special worker linked to a user. Workers are the resources planned in the projects and, by becoming bound resources with users associated to them, they can help in the project planning by tracking data.
    Starting Price: $20 per user per month
  • 33
    Acquven LMS

    Acquven LMS

    Acquven Business Solutions

    SpriteLMS™ is an easy-to-use application that helps create, manage, deliver and track training. It is scalable and compatible across desktops, mobiles and tablets. Undergo training assigned. Search and register for available training. Approvals and e-signatures of training and supporting documentation. System configuration & maintenance, user management & fine-grained access control. Search & self-registration of available training.
  • 34
    BastionZero

    BastionZero

    BastionZero

    Infrastructure teams must manage painful VPNs, homegrown bastion hosts, overprivileged certificate authorities, and long-lived credentials that present huge security risks. Infrastructure teams can easily configure, manage and secure fine-grained access controls to infrastructure targets in any cloud or on-prem environments. A single system for access all of your targets (servers, containers, clusters, databases, webservers) so you don’t have to manage an ever-growing set of systems. Provide zero-trust access to your targets by putting them behind your SSO and adding an independent MFA. Stop managing passwords. Use policy to control which users can log into which target under which role or user account. Capture the specific commands that a user ran on a target under a role or account via BastionZero’s access logs, command logs and session recordings.
    Starting Price: $300 per month
  • 35
    ReByte

    ReByte

    RealChar.ai

    Action-based orchestration to build complex backend agents with multiple steps. Working for all LLMs, build fully customized UI for your agent without writing a single line of code, serving on your domain. Track every step of your agent, literally every step, to deal with the nondeterministic nature of LLMs. Build fine-grain access control over your application, data, and agent. Specialized fine-tuned model for accelerating software development. Automatically handle concurrency, rate limiting, and more.
    Starting Price: $10 per month
  • 36
    Remotion

    Remotion

    Remotion

    Remotion is a programmatic video creation framework that lets you make real MP4 and other video formats using React code by treating video as a function of frames and rendering components over time, leveraging familiar web technologies such as CSS, Canvas, SVG, and JavaScript to design, animate, and parameterize dynamic content with data, APIs, and interactivity. It includes tools like Remotion Studio for previewing and rendering, Remotion Player for embedding and reacting to data at runtime, Remotion Lambda for scalable server-side or serverless rendering, and additional components like timeline editing, recorder tools, and editor starter templates for building custom video editing applications with React and TypeScript. It supports scalable rendering locally or in the cloud, dynamic editing of props through a visual interface, and fine-grained animation via React hooks and interpolation utilities.
    Starting Price: $100 per month
  • 37
    Standard Fleet

    Standard Fleet

    Standard Fleet

    Export detailed Supercharge expenses from your fleet vehicles for a selected date range, for work expense reports or Turo reimbursements. Remotely send a guest driver access to a vehicle, with an expiration date. Plus, automatically get a summary of supercharging during that period. See battery health, tire, and other maintenance alerts from all the vehicles in your fleet, without being physically inside the car. Know where your vehicles are and how much battery they have at all times. Send commands, and intelligently charge outside of peak hours. Effectively track employee mileage, home charging, and supercharging for expenses and reimbursements. Fine-grained access controls allow for each party to have access to the precise information that they need, while keeping privacy for drivers.
    Starting Price: $15 per car per month
  • 38
    Panduit SmartZone DCIM
    SmartZone™ Cloud Software is Panduit’s next generation DCIM solution. A true cloud-native platform, built from the ground up to take advantage of cloud flexibility and scalability as well as enhanced manageability, security, and operations ease of use and efficiency to manage Data Center, Enterprise and Edge Infrastructures. Supports the management, monitoring, and alerting for power, cooling, environmental, IT, and connectivity. Its secure cloud-based platform includes encryption on data at rest and in transit, two-factor authentication, fine-grained access control, security-focused development lifecycle, and harden with multiple industry-leading security scanning and assessment solutions designed to thoroughly analyze today's complex web applications and web services for security vulnerabilities.
  • 39
    Dylan

    Dylan

    Dylan

    It is dynamic while providing a programming model designed to support efficient machine code generation, including fine-grained control over dynamic and static behaviors. Describes the Open Dylan implementation of the Dylan language, a core set of Dylan libraries, and a library interchange mechanism. The core libraries provide many language extensions, a threads interface, and object finalization, printing and output formatting modules, a streams module, a sockets module, and modules providing an interface to operating system features such as the file system, time and date information, the host machine environment, as well as a foreign function interface and some low-level access to the Microsoft Win32 API.
    Starting Price: Free
  • 40
    Obot MCP Gateway
    Obot is an open-source AI infrastructure platform and Model Context Protocol (MCP) gateway that gives organizations a centralized control plane for discovering, onboarding, managing, securing, and scaling MCP servers, services that connect large language models and AI agents to enterprise systems, tools, and data. It bundles an MCP gateway, catalog, admin console, and optional built-in chat interface into a modern interface that integrates with identity providers (e.g., Okta, Google, GitHub) to enforce access control, authentication, and governance policies across MCP endpoints, ensuring secure, compliant AI interactions. Obot lets IT teams host local or remote MCP servers, proxy access through a secure gateway, define fine-grained user permissions, log and audit usage, and generate connection URLs for LLM clients such as Claude Desktop, Cursor, VS Code, or custom agents.
    Starting Price: Free
  • 41
    Ortelium

    Ortelium

    Olfasense

    Unlock the value of your environmental data with the ease and flexibility of our cloud-based software. Ortelium is a cloud-based software solution supporting organizations in monitoring and managing environmental data to facilitate regulatory compliance, allocate resources more economically and improve relations with local communities. Ortelium allows you to combine data feeds from IoT-enabled sensor systems and analyzers, environmental observations made by people as well as impact assessment through dispersion modeling, providing a holistic view of the environmental footprint. With fine-grained data access options, different user groups can be configured to receive individual restricted access to information and features relevant to them. The modular system architecture of Ortelium ensures that we can provide a tailored solution for your individual goal and budget.
  • 42
    SGNL

    SGNL

    SGNL

    As the enterprise and workforce evolve, access must be intelligent and dynamic. SGNL ensures that your most valuable resources are being accessed by the right people, at the right time, in the right context. Enterprise use cases require a fine-grained approach. By building a deep understanding of your business, SGNL is able to drive smart, realtime access decisions. Scalable access policies should be understandable by all stakeholders. SGNL enables this through an intuitive, human-readable policy builder. SGNL connects to, and complements, your existing identity and business systems—with a broad array of simple, easy-to-implement integrations.
  • 43
    Chain Cloud
    Chain Cloud is a decentralized infrastructure protocol designed for developers to access blockchain networks on-demand. Permissionless infrastructure is designed for you to retain control of your funds and keys. Designed to deploy your requested blockchain node without any technical knowledge. Join a network of computing resources for Chain Protocol and earn XCN. Using Chain Cloud, developers can access public blockchain networks to easily build their applications and projects with RPC API endpoints and complete automated nodes. Focus on shipping and scaling your product instead of building and maintaining ledger infrastructure. Ledgers do not require code changes, even if you add new features, transaction types, and even products to your ledger. Architected for the enterprise, Chain scales as your business does. Get unmatched insights into your business with fine-grain tracking and powerful analytics with Archive Node capabilities.
    Starting Price: Free
  • 44
    Enpass

    Enpass

    Enpass Technologies Inc.

    Enpass believes your data belongs to you. Compliance-friendly Enpass Business secures passwords and passkeys in vaults on your organization’s own infrastructure or trusted business cloud, providing greater security than proprietary, SaaS-hosted solutions. Enpass is highly customizable for users, and a powerful Admin Console provides fine-grained control over vault sharing, password generation, and employee security. ISO 27001 certified, zero-knowledge AES-256 encryption on 100% of data.
    Starting Price: $2.99/month
  • 45
    Imply

    Imply

    Imply

    Imply is a real-time analytics platform built on Apache Druid, designed to handle large-scale, high-performance OLAP (Online Analytical Processing) workloads. It offers real-time data ingestion, fast query performance, and the ability to perform complex analytical queries on massive datasets with low latency. Imply is tailored for organizations that need interactive analytics, real-time dashboards, and data-driven decision-making at scale. It provides a user-friendly interface for data exploration, along with advanced features such as multi-tenancy, fine-grained access controls, and operational insights. With its distributed architecture and scalability, Imply is well-suited for use cases in streaming data analytics, business intelligence, and real-time monitoring across industries.
  • 46
    Gen-3

    Gen-3

    Runway

    Gen-3 Alpha is the first of an upcoming series of models trained by Runway on a new infrastructure built for large-scale multimodal training. It is a major improvement in fidelity, consistency, and motion over Gen-2, and a step towards building General World Models. Trained jointly on videos and images, Gen-3 Alpha will power Runway's Text to Video, Image to Video and Text to Image tools, existing control modes such as Motion Brush, Advanced Camera Controls, Director Mode as well as upcoming tools for more fine-grained control over structure, style, and motion.
  • 47
    Multifactor

    Multifactor

    Multifactor

    Multifactor is a next-generation account-sharing and access-management platform built around zero-trust, post-quantum cryptography, and fine-grained permissioning. Rather than simply sharing credentials, users store their online accounts (passwords, passkeys, 2FA codes) in a secure vault and grant access to humans or AI agents by sending controlled links. Access can be revoked instantly, and the underlying credentials remain hidden. You can define precise permissions (for example, “read transactions” but not “initiate transfers”), capture detailed non-repudiable audit trails of every action, and enjoy built-in encryption and post-quantum security architecture that ensures only authorized parties ever gain access. The platform can also operate as a full identity-and-access-management suite, supporting authentication (biometrics, hardware tokens), authorization, access auditing, device and network endpoint enforcement, and secure account/resource sharing.
    Starting Price: Free
  • 48
    Athina AI

    Athina AI

    Athina AI

    Athina is a collaborative AI development platform that enables teams to build, test, and monitor AI applications efficiently. It offers features such as prompt management, evaluation tools, dataset handling, and observability, all designed to streamline the development of reliable AI systems. Athina supports integration with various models and services, including custom models, and ensures data privacy through fine-grained access controls and self-hosted deployment options. The platform is SOC-2 Type 2 compliant, providing a secure environment for AI development. Athina's user-friendly interface allows both technical and non-technical team members to collaborate effectively, accelerating the deployment of AI features.
    Starting Price: Free
  • 49
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 50
    Yi-Lightning

    Yi-Lightning

    Yi-Lightning

    Yi-Lightning, developed by 01.AI under the leadership of Kai-Fu Lee, represents the latest advancement in large language models with a focus on high performance and cost-efficiency. It boasts a maximum context length of 16K tokens and is priced at $0.14 per million tokens for both input and output, making it remarkably competitive. Yi-Lightning leverages an enhanced Mixture-of-Experts (MoE) architecture, incorporating fine-grained expert segmentation and advanced routing strategies, which contribute to its efficiency in training and inference. This model has excelled in various domains, achieving top rankings in categories like Chinese, math, coding, and hard prompts on the chatbot arena, where it secured the 6th position overall and 9th in style control. Its development included comprehensive pre-training, supervised fine-tuning, and reinforcement learning from human feedback, ensuring both performance and safety, with optimizations in memory usage and inference speed.