What Integrates with LoginTC?

Find out what LoginTC integrations exist in 2024. Learn what software and services currently integrate with LoginTC, and sort them by reviews, cost, features, and more. Below is a list of products that LoginTC currently integrates with:

  • 1
    SiteMinder Reviews

    SiteMinder

    SiteMinder

    $56 per month
    177 Ratings
    See Software
    Learn More
    SiteMinder's online hotel booking engine is highly-converting and allows you to increase bookings on your hotel website while reducing dependence on third-party sales channels. Get more direct online bookings without any commission. Make it easy for your guests to book. It's a simple 2-step process. Mobile-friendly, so guests can book from any device. Modern and sleek design allow you to visually present the hotel's offerings in the best possible way. Automated entry eliminates manual entry and guesswork. SiteMinder's platform helps you reach, attract and convert more visitors. SiteMinder's #1 ranking Booking Engine brings the demand right to your door. This is your chance to take control of your hotel bookings.
  • 2
    Ivanti NAC Reviews
    Pulse Policy Secure is a next-generation NAC that allows organizations to gain complete visibility and understand their security posture. It also enforces roles-based access and endpoint policy for network users, guests, and IoT devices. Pulse NAC can automate threat response to mitigate malware and unauthorized access.
  • 3
    OpenVPN Reviews

    OpenVPN

    OpenVPN

    $15 per user per year
    2 Ratings
    Others have virtualized software to run on their hardware appliances, but our solution was designed and optimized to run as a single software application. Our VPN server software is available in many formats to make it easier to deploy your VPN. Are you looking to expand your datacenter to an IaaS Cloud? Remote access to private Cloud resources and applications, or create a multicloud private overlay network? Install our VPN Server on Cloud to do it securely, quickly, and easily. Are you ready to transform your datacenter into a virtualized environment. If so, we made it easier to install our Server software by packaging it as a virtual appliance in two of the most popular hypervisor solutions: Microsoft Hyper-V and VMware ESXi 5.0. VPN Server is available for both 32-bit Linux Operating Systems and 64-bit Linux Operating Systems. Red Hat Enterprise Linux and CentOS, Ubuntu, Debian and openSUSE are supported.
  • 4
    WatchGuard Network Security Reviews
    Our unique approach to network security is to bring enterprise-grade, best-in-class security to all organizations, regardless of their size or technical expertise. Our award-winning Unified Threat Management platform (UTM) is ideal for distributed businesses and midsize businesses. It was designed from the ground up to be easy to use, deploy, manage, and maintain, as well as provide the best security possible.
  • 5
    Radius Reviews

    Radius

    Radius Bob

    $34 per month
    1 Rating
    CRM for insurance agencies. Never lose a lead or client again due to misplaced information or a hard drive crash, corrupted spreadsheet, or a tipped-over file cabinet. Radius makes it easy to organize and manage all your leads and clients. Radius is an all-in-one solution for your Agency. Radius is the best email marketing software for your Agency. Radius can send autoresponders, drip marketing, mass emails, and SMS/Text messages. Each Radius Lead and Client has their own history, tasks, reminders, notes, information, file storage, and information. Radius Dropbox also helps you stay organized by automatically importing your emails. Integrate Radius into your business. You can define custom form fields, lead temperatures, client status, and many other things. Integrate Radius with your website or third-party app, such as a quote engine, lead vendor, or third-party app.
  • 6
    pfSense Reviews
    The pfSense project provides a free network firewall distribution. It is based on FreeBSD's operating system with a custom kernel. Third-party free software packages are also included. The package system allows pfSense software to offer the same functionality as or more common commercial firewalls without any artificial limitations. It has replaced every major commercial firewall in many installations around the globe, including Check Point and Cisco PIX, Cisco ASA and Juniper.
  • 7
    GlobalProtect Reviews
    Modern workers are more mobile than ever. They can access the network from anywhere, on any device, at anytime. Advanced threats can't be stopped by endpoint antivirus and VPN technologies. GlobalProtect subscriptions allow you to extend next-generation firewall capabilities. This will give you greater visibility into all traffic and users, devices, applications, and devices. GlobalProtect allows organizations to extend consistent security policies across all users. It also eliminates remote access blindspots, strengthens security, and can be used to create security policies for all users. GlobalProtect protects your mobile workforce using the capabilities of your Next-Generation Firewall. It inspects all traffic, incoming and outgoing. To ensure transparent access to sensitive data, enable an IPsec/SSL VPN connection between multiple endpoints and operating system. Quarantine compromised devices with immutable properties on internal and externe networks.
  • 8
    Windows 7 Reviews
    Microsoft has created Windows 7, an operating system for PCs. Windows 7 is not as up-to-date as Windows 10/11. Windows 7 was actively supported from October 2009 to January 2020. Many organizations still use Windows 7 even though it is no longer supported. It is recommended that you upgrade to Windows 10/11.
  • 9
    Freshdesk Reviews
    Top Pick

    Freshdesk

    Freshworks

    $15.00/month/user
    31 Ratings
    1) Customer delight made super easy Manage conversations across multiple channels Deliver fast and consistent customer service across email, phone, chat, WhatsApp Business, and other social media channels from a single view. 2) Boost your agent productivity Cut down on manual and repetitive tasks using advanced automation rules, and solve customer queries faster without increasing your agent strength. 3) Deliver seamless self-service Help customers help themselves by publishing a branded knowledge base and offering instant resolutions using AI-powered chatbots. 4) Stay on top of your CSAT goals Use customizable analytics and reports to track team performance, identify bottlenecks before they snowball, and keep tabs on your team's CSAT goals. Enable frictionless remote work for your support team 1) An intuitive and easy-to-use platform that does not require a complicated onboarding process 2) Cloud-based solution that empowers agents to work conveniently on their laptops or phones 3) 650+ cutting-edge applications that you can easily integrate with and build robust support workflows
  • 10
    Dropbox Reviews
    Top Pick

    Dropbox

    Dropbox

    $12.50 per month per user
    217 Ratings
    Dropbox Business is more than secure file storage. It's a smart workspace that brings together teams, tools, content, and other resources. You can create, store, and share cloud content using Google Docs, Sheets and Slides, Microsoft Office files and Dropbox Paper. Dropbox Spaces allows you to combine cloud content and files, so your PowerPoints can live alongside your Trello boards, Google Docs, and other tools. Access your team's work easily from any computer, mobile device or web browser. Connect tools such as Zoom and Slack to keep your team's files and conversations in one place. Intelligently suggested folders and files keep your team one step ahead. They will have the content they need when they need it. Dropbox offers a secure, distributed infrastructure with admin tools to control and visibility. Keep your company's data safe with Dropbox.
  • 11
    Windows 10 Reviews
    You will need a license to install Windows 10 before you can get started. The media creation tool can be downloaded and run. The instructions below provide more information about how to use this tool. If you're installing Windows 10 on a Windows XP/Windows Vista PC or if you need to create media to install Windows 10, see the Using the tool (USB flash drive or DVD), to create media to install Windows 10 to a different computer section below. You have a license to download Windows 10 and are upgrading your PC from Windows 7/Windows 8.1.
  • 12
    WatchGuard Firebox Cloud Reviews
    It's a fact that businesses are migrating their services from on-premises servers to the cloud. Email servers, web servers and customer relationship management (CRM) systems are all moving to the public cloud. Security is crucial with so much sensitive data moving into the cloud. WatchGuard's Firebox Cloud allows network managers to extend their security perimeter to include the cloud and protect servers in a public cloud environment. WatchGuard Firebox Cloud provides protection for WatchGuard's Firebox Unified Threat Management appliances in public cloud environments. Firebox Cloud can be quickly and easily deployed to protect Virtual Private Clouds (VPCs) from botnets, SQL injection attempts, cross-site scripting, and other intrusion vectors.
  • 13
    Windows 11 Reviews
    Windows 11 offers a creative and calm environment where you can pursue your passions with a new experience. Windows 11 offers a refreshed Start menu and new ways to connect with your favorite people, news and games. Windows 11 is the place where you can think, express and create naturally. You can access all the apps you need, multitask easily with snap layouts, desktops, or a more intuitive redocking experience. Microsoft Teams allows you to instantly connect with the people you care about from your desktop. No matter what device they are using, you can call or chat for free. Microsoft Edge and a variety of Widgets allow you to stay on top of the latest news, information, entertainment, and other important information. The new Microsoft Store makes it easy to find the apps and shows you want in the Microsoft Store.
  • 14
    Sophos UTM Reviews
    Sophos UTM increases threat prevention to unmatched levels. The deep learning neural network that is part of Sophos Sandstorm's artificial intelligence detects known and unknown malware, without the need for signatures. Sophos UTM 9.4 was the first product to feature our next-generation cloud sandboxing technology. Sandstorm offers a new level of ransomware protection and targeted attack protection. It can identify evasive threats quickly and accurately before they reach your network. It's an enterprise-grade protection solution without the complexity or price tag.
  • 15
    Barracuda SSL VPN Reviews

    Barracuda SSL VPN

    Barracuda Networks

    Your remote workers and road warriors require a fast, flexible, reliable, and completely secure way of connecting to your internal enterprise applications, information, and network resources. They want to be able to access this information from anywhere in the world, from any device, at any time. The Barracuda SSL VPN provides connectivity and security to allow this access via any web browser or mobile device. Remote users can access files and applications with the Barracuda VPN. The Barracuda VPN is not like other VPN technologies. It does not require any additional client software. Logging in from the road or home requires only a web browser, and an Internet connection. After logging in, users will be presented with a portal that includes file shares and web applications. Java users can access more advanced applications such as Remote Desktop Services and Citrix XenApp.
  • 16
    Array APV Series Reviews
    Array APV Series application controllers provide the reliability, scalability and performance required to keep applications and servers in their power range. Integrated local and worldwide server load balancing as well as link load balancers ensure maximum resiliency for your application. Connection multiplexing and SSL offload work together to provide the best end-user experience. Array's WebWall®, application security suite, protects applications by terminating connections on APV Series APDCs. Array ADCs can be used on physical or virtual appliances or public clouds. They are easy to use for any IT team and affordable for all businesses.
  • 17
    SonicWall Next Generation Firewall Reviews
    Advanced threat protection for small businesses, global enterprises, and cloud environments. Network security made infinitely more accessible SonicWall next generation firewalls (NGFW), whether you are a small business or large enterprise, provide the security, control, and visibility you need in order to maintain a strong cybersecurity posture. SonicWall's award winning hardware and advanced technology are integrated into every firewall to give you an edge against evolving threats. SonicWall firewalls can be tailored to fit the needs of any network. They are affordable and will not break the bank.
  • 18
    Juniper Identity Management Service Reviews
    Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting.
  • 19
    Check Point Infinity Reviews
    In an effort to provide better protection, organizations often implement multiple cyber security solutions. They often end up with a patchwork security system that is costly and leads to high TCO. Businesses can take preemptive measures against advanced fifth-generation attacks by adopting a consolidated security strategy with Check Point Infinity architecture. This allows them to achieve a 50% increase in operational efficiency, and a 20% reduction in security cost. This is the first consolidated security architecture that spans networks, cloud, mobile, and IoT. It provides the highest level of threat prevention against known and unknown cyber-threats. 64 threat prevention engines that block known and unknown threats powered by threat intelligence. Infinity-Vision, the unified management platform of Check Point Infinity is the first modern, consolidated cybersecurity architecture designed to protect today's most sophisticated attacks on networks, endpoints, and cloud.
  • 20
    F5 BIG-IP Reviews
    App-centric technology requires advanced technology. Apps are your business. BIG-IP application services offer the performance, availability, and security that you need to meet your business needs. Big-IP application delivery controllers will keep your apps running. BIG-IP Local Traffic Manager and BIG-IP DNS manage your application traffic and protect your infrastructure. No matter if your applications are in a private or public data center, you'll have built-in security and traffic management. BIG-IP Traffic Management, BIG IP Policy Enforcement Manager (PEM), BIG-IP Carrier Grade NAT (CGNAT), and BIG IP Diameter Traffic Management (PEM) manage your network resources to ensure that your applications perform at carrier-grade levels. They can also help you optimize your network and monetize it, improving your bottom line.
  • 21
    VMware AppDefense Reviews
    VMware AppDefense gives you 360-degree visibility into all workloads and improves the security of your applications. AppDefense helps you reduce the threat surface and prevents you from chasing after them. It models intended behavior and monitors for anomalous activity. AppDefense also provides application control, reputation scoring and security.
  • 22
    VMware Cloud Reviews
    All of your apps can be built, managed, protected, and managed on any cloud. VMware's Multi-Cloud solutions provide a cloud operating system for all applications. The world's most widely used cloud infrastructure is available to support your digital business initiatives. You can leverage the same skills that you use in the data centre, but also tap into the depth and breadth six global hyperscale public clouds providers and 4,000+ VMware Cloud Provider Partners. You get consistent infrastructure and operations for cloud native applications from the data center to the edge with hybrid cloud built on VMware Cloud Foundation. This consistency increases agility, reduces cost, and lowers risk. Modern apps can be built, managed, and maintained on any cloud. They can meet diverse needs using both public and on-premises cloud resources. You can manage both container-based and traditional VM-based workloads from one platform.
  • 23
    Citrix SD-WAN Reviews
    Digital transformation is dependent on how well your cloud, virtual, and SaaS apps perform across the enterprise and at branch locations. It is time to invest in a secure, high-performance, always-available WAN Edge solution that offers exceptional business continuity and a seamless experience.
  • 24
    Fortinet SD-WAN Reviews
    Fortinet is the SD-WAN provider with the highest market share and highest revenue. Fortinet SDWAN offers advanced routing and self-healing capabilities. It also provides flexible security using network firewalls or SASE-based cloud services. All this in one integrated solution.
  • 25
    OpenAM Reviews

    OpenAM

    Open Identity Platform

    You will need to provide seamless authentication for all sites and applications within your company if you have multiple sites or applications. If a user logs in to one of your sites, he doesn't need to enter his credentials for other sites. OpenAM can solve all these problems. OpenAM comes with more than 20 authentication module that you can customize your authentication process. You can also customize the sequence of authentication modules to provide multi-factor authentication or adaptive authentication. OpenAM also allows you to manage authorization. You can limit access to resources according to different authorization policies. OpenAM can extend any functionality, including authentication modules and user data sources. It also supports UI customization, allowing you to create individual pages for end-users with your branding.
  • 26
    Dell Enterprise SONiC Reviews
    Dell Technologies Enterprise SONiC Distribution is designed for large-scale enterprise networks that require high scalability, manageability, and global support. It was developed by the leader in Open Networking. Dell Technologies Enterprise SONiC Distribution integrates Linux-based, open-source SONiC with a targeted roadmap of features and enhancements to address the needs of tier 2 and large-scale enterprise networking environments. Dell Technologies Enterprise SONiC Distribution is enterprise-class tested and validated across software and hardware. It also integrates an ecosystem management applications. You can expect global enterprise-level support with a variety of services that meet the needs of your data center environment.
  • 27
    Cisco ASA Reviews
    The core operating system of the Cisco ASA family is Cisco Adaptive Security Appliance Software (ASA). It provides enterprise-class firewall capabilities to ASA devices in a variety of form factors - blades, standalone appliances, virtual appliances - for any network environment. ASA Software integrates with other security technologies to provide comprehensive solutions that meet constantly changing security needs.
  • 28
    Cisco ISE Reviews
    Securing the workplace where everyone and everything connects is an essential component of any zero trust strategy. Cisco Identity Services Engine (ISE), a dynamic and automated method of policy enforcement, simplifies the delivery secure network access control. ISE allows software-defined access and automates network segments within IT and OT environments.
  • Previous
  • You're on page 1
  • Next