Business Software for Keycloak

  • 1
    OpenVPN Reviews

    OpenVPN

    OpenVPN

    Free Up to 3 Users
    198,256 Ratings
    See Software
    Learn More
    Over 15,000 businesses worldwide trust Access Server from OpenVPN for a self-hosted VPN to securely extend their private network to their remote workforce over the internet. That means your remote and hybrid workforce will have access to their business resources with top network security, without adding hundreds of hours of setup and maintenance time to your to-do list. OpenVPN Access Server is a full-featured SSL self-hosted VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.
  • 2
    Psono Reviews

    Psono

    esaqa GmbH

    Free
    92 Ratings
    See Software
    Learn More
    Psono, a self-hosted and open-source password manager, prioritizes keeping your data secure. It encrypts and stores your credentials in a manner accessible only to you, while also offering encrypted access-sharing with your team. Boasting a range of features, Psono facilitates easier data management and password accessibility than ever before. Its multi-level encryption begins with client-side encryption, ensuring genuine end-to-end encryption for password sharing, and is further bolstered by SSL and storage encryption. The complete code is subject to transparent public audit possibilities, underscoring that true security stems from precise encryption rather than the obfuscation of security weaknesses. Opting for a self-hosted credential manager like Psono allows you enhanced access control and eliminates dependency on public services for data storage, asserting itself as one of the most secure password managers that genuinely prioritizes client online safety on user-hosted servers.
  • 3
    KrakenD Reviews
    Top Pick
    Top Pick See Software
    Learn More
    Engineered for peak performance and efficient resource use, KrakenD can manage a staggering 70k requests per second on just one instance. Its stateless build ensures hassle-free scalability, sidelining complications like database upkeep or node synchronization. In terms of features, KrakenD is a jack-of-all-trades. It accommodates multiple protocols and API standards, offering granular access control, data shaping, and caching capabilities. A standout feature is its Backend For Frontend pattern, which consolidates various API calls into a single response, simplifying client interactions. On the security front, KrakenD is OWASP-compliant and data-agnostic, streamlining regulatory adherence. Operational ease comes via its declarative setup and robust third-party tool integration. With its open-source community edition and transparent pricing model, KrakenD is the go-to API Gateway for organizations that refuse to compromise on performance or scalability.
  • 4
    Kasm Workspaces Reviews
    Top Pick

    Kasm Workspaces

    Kasm Technologies

    $0 Free Community Edition
    126 Ratings
    See Software
    Learn More
    Kasm Workspaces streams your workplace environment directly to your web browser…on any device and from any location. Kasm is revolutionizing the way businesses deliver digital workspaces. We use our open-source web native container streaming technology to create a modern devops delivery of Desktop as a Service, application streaming, and browser isolation. Kasm is more than a service. It is a platform that is highly configurable and has a robust API that can be customized to your needs at any scale. Workspaces can be deployed wherever the work is. It can be deployed on-premise (including Air-Gapped Networks), in the cloud (Public and Private), or in a hybrid.
  • 5
    StrongDM Reviews

    StrongDM

    StrongDM

    $70/user/month
    91 Ratings
    See Software
    Learn More
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 6
    Bitwarden Reviews
    Top Pick
    With an open source, end-to-end encrypted approach to password management, Bitwarden empowers enterprises and individuals to securely store and share sensitive data. Accessible from any location, on any device, Bitwarden can be deployed in cloud-based and on-premise environments. Strengthen your security with MFA, vault health reports, enterprise policies, and event logs. SSO, SCIM, and directory service integrations make it easy to integrate Bitwarden into your enterprise environment.
  • 7
    Skycloak Reviews
    Many developers are unaware that the most powerful tool for managing users, handling authentication and authorization, and even designing custom login and signup pages is completely free and open source: Keycloak 🤯. However, being free means you’re responsible for setting it up and maintaining it as your application scales. This creates several challenges that we aim to solve: Awareness: Developers and businesses are often unaware that Keycloak can address all their IAM needs. Cost: Many businesses are paying significant costs with current IDaaS providers. Maintenance: Businesses already using Keycloak face challenges in managing maintenance overhead and meeting compliance requirements for sensitive data. Skycloak is a managed Keycloak service that provides enterprise-grade identity and access management capabilities without the complexity of managing your own infrastructure. It combines the robust features of Keycloak with additional tools and services to enhance your security and development experience.
  • 8
    DataClarity Unlimited Analytics Reviews
    The world's only free modern embeddable data and analytics platform that provides a self-service, powerful, secure & seamless end-to-end experience. DataClarity Unlimited Analytics Benefits: SIMPLIFIED DATA INTEGRATION – Easily connect, join, curate, cache & catalog diverse data through drag and drop, custom SQL builder and AI-powered data profiling. | INTERACTIVE REPORTS & DASHBOARDS – craft compelling storyboards using 80 stunning visualizations, geospatial maps & flexibility to bring your own charts. | REAL-TIME ANALYSIS – Perform advanced analysis & data exploration using drill-down, drill-through, filters, built-in statistical & predictive models, or your own Python and R code. | SMOOTH APPLICATION INTEGRATION – Achieve seamless integration with robust APIs, tailor-made configurations and flexible embedding features. | SECURITY and GOVERNANCE – Comply with your security guidelines, governance standards, multitenancy, row-level data protection, and SSO (Single Sign-On). DataClarity Unlimited Analytics is tailored for ISVs , SaaS providers, consultancies, and IT teams and includes: free forever software license, free version updates & access to support resources, and optional paid 24/7 production support with SLA.
  • 9
    Alithya GoTest Reviews
    Alithya GoTest is a collaborative test hub that is easy and quick to master and integrate, ensuring the quality of any professional digital solutions for companies requiring reliability without compromises. Through the GUI, our solution allows you to collaborate, execute and fix your tests and communicate at all levels to ensure test plans and test results are provided with the right level of details. Alithya GoTest is platform-agnostic and will allow you to seamlessly test desktop, web and mobile applications. You will not have to spend months building, maintaining and integrating your test platform into your development workflow, which allows your development team to focus on delivering value and quality. Compared to more traditional solutions, Alithya GoTest is the only tool on the market that allows you to completely test your software from end-to-end using continuous testing in a DevOps process. Contact our top-notch bilingual support team or use our consulting, coaching or online training resources to get up to speed in no time. Benefit from our growing list of pre-made test suites for professional ERP platforms like Oracle Fusion Cloud to ensure updates are not breaking your software solution.
  • 10
    awork Reviews

    awork

    awork GmbH

    $8 per month
    awork is an automatic project management tool for teams. It bundles your to-do’s into practical lists, agile kanban boards, or onto the intuitive timeline, which are all located in one central hub. awork supports your team with their daily project work and keeps you updated through smart notifications, and even fully automated on autopilot. Thanks to the integrated time tracking system, not only can you analyse your tracked times, you can also directly make them billable. As the first GDPR-compliant alternative from Germany, awork is able to keep up with providers from Silicon Valley, while also setting new benchmarks.
  • 11
    kPow Reviews

    kPow

    Factor House

    $2,650 per cluster per year
    We know how simple Apache Kafka®, can be when you have the right tools. kPow was created to simplify the Kafka development experience and save businesses time and money. kPow makes it easy to find the root cause of production problems in a matter of clicks and not hours. With kPow's Data Inspect and kREPL functions, you can search tens of thousands messages per second. Are you new to Kafka kPow's Kafka UI is unique and allows developers to quickly understand the core Kafka concepts. You can upskill new members of your team and increase your Kafka knowledge. kPow offers a range of Kafka management features and monitoring capabilities in a single Docker Container. You can manage multiple clusters and schema registries. Connect installs with one instance.
  • 12
    formsflow.ai Reviews

    formsflow.ai

    AOT Technologies

    $495
    formsflow.ai is a Low Code Platform to build forms, approval workflows, and automations swiftly. It doesn’t matter how you like to build applications - no code, low-code or pro-code, formsflow.ai supports all of it, letting you switch between different development approaches. This makes formsflow.ai friendly to developers, business technologists and business users alike. You can build form and workflow apps with a combination of AI prompted development via Flow-E the AI assistant, drag and drop elements, and scripting. formsflow.ai features: - SaaS and On-premise options. - Product packages with progressive tiers. - Usage based pricing with no restrictions on user seat count - Multi tenancy - Form Bundling Under-the-hood: - Powerful workflow and decision engines to build nuances and scale into your workflows. - An integrations module that can help you connect natively to 1000s of Apps. - A secure best-in-class identity management system, bring in your own module if required.
  • 13
    Flexopus Reviews

    Flexopus

    Flexopus

    Upon request
    Flexopus is a flexible booking system that offers a user friendly and efficient way to book dynamic workspaces, parking spaces, and meeting areas. This desk-sharing software integrates seamlessly into your company and adapts to your exact requirements. Flexopus allows you to customize the daily activities of your hybrid team according to your preferences. We host your data exclusively on our servers in Germany (no AWS or Co.). Flexopus is 100% compliant with the DSGVO requirements for the storage, transfer, and processing of personal data.
  • 14
    Camunda Reviews
    Camunda helps organizations coordinate and automate processes involving people, systems, and devices—removing complexity, improving efficiency, and making AI workflows operational. Designed for both business and IT teams, Camunda’s platform runs any process with the speed and scale needed to stay competitive while meeting security and governance standards. More than 700 companies, including Atlassian, ING, and Vodafone, use Camunda to design, automate, and optimize core business processes. Learn more at camunda.com.
  • 15
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 16
    Simplifier Reviews

    Simplifier

    Simplifier AG

    €16.90 / month / user
    Simplifier helps companies with SAP modernization by providing a leading low-code platform for enterprise application development. They specialize in rapid app creation, integrating SAP and non-SAP systems, and optimizing business processes. Their platform offers intuitive UI design, pre-built interfaces, and comprehensive training for cost-effective, efficient solutions.
  • 17
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress offers a comprehensive Authentication API tailored for B2B needs. While authentication may seem straightforward at first glance, the intricacies of authorization can quickly escalate, making it unwise to navigate this complexity alone. Achieving robust authorization is a time-consuming endeavor; an average software team might spend around 840 hours developing authorization logic for basic scenarios, and this effort can multiply as additional features are integrated into the application. Lacking the necessary expertise exposes your organization to significant security vulnerabilities, potentially leading to breaches of user data, non-compliance with regulatory standards, and substantial financial repercussions. * Secure authorization API—Rather than constructing your own authorization framework, leverage our API for seamless integration. * Granular permissions—Establish various access levels and categorize them according to user roles, allowing for as much detail as needed. * Identity Provider integrations—Effortlessly connect your chosen identity providers through a straightforward API call. * SSO and comprehensive user management—Enjoy streamlined single sign-on capabilities along with complete control over user administration, ensuring a secure and efficient user experience.
  • 18
    TAS Insight Engine Reviews

    TAS Insight Engine

    Precognox

    €550 EUR / month / user
    It is all about getting insight. TAS Insight Engine gives you all the information you need to make the right business decisions. In order to support business decision making, getting insight is a type of information extraction from enterprise data. It is clear why insight is so important in today's business world. Understanding your data and getting answers are crucial to meet the challenges of today's market. Every sector and every area is important. TAS Insight Engine combines the best of text analytics, natural language processing (NLP), and machine learning (ML) to make this possible.
  • 19
    Elastic Observability Reviews
    Leverage the most extensively utilized observability platform, founded on the reliable Elastic Stack (commonly referred to as the ELK Stack), to integrate disparate data sources, providing cohesive visibility and actionable insights. To truly monitor and extract insights from your distributed systems, it is essential to consolidate all your observability data within a single framework. Eliminate data silos by merging application, infrastructure, and user information into a holistic solution that facilitates comprehensive observability and alerting. By integrating limitless telemetry data collection with search-driven problem-solving capabilities, you can achieve superior operational and business outcomes. Unify your data silos by assimilating all telemetry data, including metrics, logs, and traces, from any source into a platform that is open, extensible, and scalable. Enhance the speed of problem resolution through automatic anomaly detection that leverages machine learning and sophisticated data analytics, ensuring you stay ahead in today's fast-paced environment. This integrated approach not only streamlines processes but also empowers teams to make informed decisions swiftly.
  • 20
    ISO2HANDLE Reviews
    Are you a risk or quality manager in search of a powerful solution to your problems? ISO2HANDLE gives you superpowers to control your quality, safety and HR processes. ISO2HANDLE can be used by businesses in any industry. Our software provides capabilities such as risk and resource management, complaint management (including task management), risk assessment, registrations and notifications, document management (including audits), onboarding, evaluations of employees, expense claims, leave requests, and environmental measures. You can generate reports with just one click. This makes audits easy. We are proud to support hundreds of companies around the world from our base in the Netherlands.
  • 21
    SSOReady Reviews
    Implement enterprise single sign-on in less than a day with SSOReady, which seamlessly integrates with the identity services that your customers rely on. After configuring SSOReady, you will gain immediate access to all major identity providers. With only two API calls, you can enable multi-tenant SSO support while continuing to utilize your existing tech stack. Users can be programmatically provisioned and de-provisioned through a single, unified API that interfaces with your customers' identity providers. Acting merely as an authentication middleware layer, SSOReady does not claim ownership of your users and does not bind you to any specific technology, facilitating a smoother onboarding process. This design encourages us to maintain your loyalty over time, as switching providers becomes easier for you. SSOReady simplifies the integration by requiring you to only redirect users to a designated URL. Additionally, its SDKs conveniently generate this URL for you, allowing you to redirect users using any suitable method within your tech stack, enhancing flexibility and ease of use. Ultimately, SSOReady empowers you to streamline your authentication process while maintaining control and adaptability.
  • 22
    Auth.js Reviews
    Auth.js is a library for authentication that is open-source and crafted to work effortlessly with contemporary JavaScript frameworks, delivering a secure and adaptable authentication process. It accommodates a range of authentication techniques, such as OAuth options like Google and GitHub, traditional credentials, and WebAuthn, enabling developers to select the best-fitting method for their projects. This library is compatible with various frameworks, including Next.js, SvelteKit, Express, Qwik, and SolidStart, which allows for the implementation of authentication across diverse platforms. Additionally, Auth.js comes with built-in integration for widely-used databases like Prisma, Drizzle ORM, Supabase, Firebase, and TypeORM, making user data management straightforward. To ensure the safety of user information, it features security measures such as signed cookies, validation of CSRF tokens, and encrypted JSON Web Tokens (JWTs). Furthermore, Auth.js is optimized for performance in serverless settings, and it provides thorough documentation along with examples to assist developers. Overall, its versatility and robustness make Auth.js an excellent choice for building secure authentication systems in a variety of applications.
  • 23
    Pomerium Reviews

    Pomerium

    Pomerium

    $7 per month
    Pomerium serves as a secure, clientless solution that allows users to access web applications and services effortlessly, bypassing the necessity of a corporate VPN. By focusing on enhancing developer productivity, it removes convoluted user access processes that can obstruct workflow efficiency. Unlike traditional client-based tunneling solutions, Pomerium ensures rapid connections with minimal latency while maintaining robust security and privacy standards. Utilizing contextual information for access control, it adopts the principle of continuous verification, embodying a zero trust framework where each action is assessed based on contextual elements before approval or rejection. This method stands in stark contrast to NextGen VPNs, which typically only confirm authentication and authorization at the beginning of a session. Furthermore, Pomerium facilitates secure access to various platforms, including web applications, databases, Kubernetes clusters, internal tools, and legacy systems, making it an ideal choice for both individuals and teams of any size. With its innovative approach, Pomerium is revolutionizing the way organizations manage access to their digital resources.
  • 24
    authentik Reviews

    authentik

    authentik

    $0.02 per month
    Authentik serves as an open-source identity provider that consolidates all your identity management needs into a singular platform, effectively replacing solutions like Okta, Active Directory, and Auth0. Authentik Security operates as a public benefit company focused on enhancing the open-source initiative. By utilizing a self-hosted, open-source identity provider, you are able to emphasize security and maintain control over your most confidential information. With authentik, the reliance on third-party services for your identity management is eliminated, offering greater peace of mind. You can seamlessly integrate authentik into your existing environment, tailoring it to meet diverse requirements. Our APIs and fully customizable policies empower you to automate workflows effectively. Deployment and scaling are made easier with our prebuilt templates and compatibility with Kubernetes, Terraform, and Docker Compose. You can avoid depending on external services for essential infrastructure and safeguard your sensitive data from the public internet. Take advantage of our pre-built workflows, or opt to modify every stage of authentication through flexible templates, infrastructure as code, and extensive APIs, ensuring a personalized experience. This flexibility allows you to adapt authentik to suit your unique organizational needs while enhancing security measures.
  • 25
    Collate Reviews
    Collate is a metadata platform powered by AI that equips data teams with automated tools for discovery, observability, quality, and governance, utilizing agent-based workflows for efficiency. It is constructed on the foundation of OpenMetadata and features a cohesive metadata graph, providing over 90 seamless connectors for gathering metadata from various sources like databases, data warehouses, BI tools, and data pipelines. This platform not only offers detailed column-level lineage and data profiling but also implements no-code quality tests to ensure data integrity. The AI agents play a crucial role in streamlining processes such as data discovery, permission-sensitive querying, alert notifications, and incident management workflows on a large scale. Furthermore, the platform includes real-time dashboards, interactive analyses, and a shared business glossary that cater to both technical and non-technical users, facilitating the management of high-quality data assets. Additionally, its continuous monitoring and governance automation help uphold compliance with regulations such as GDPR and CCPA, which significantly minimizes the time taken to resolve data-related issues and reduces the overall cost of ownership. This comprehensive approach to data management not only enhances operational efficiency but also fosters a culture of data stewardship across the organization.
  • Previous
  • You're on page 1
  • 2
  • Next