What Integrates with OpenVPN?

Find out what OpenVPN integrations exist in 2024. Learn what software and services currently integrate with OpenVPN, and sort them by reviews, cost, features, and more. Below is a list of products that OpenVPN currently integrates with:

  • 1
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    809 Ratings
    See Software
    Learn More
    Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO.
  • 2
    Kamatera Reviews

    Kamatera

    Kamatera

    $4 per month
    149 Ratings
    See Software
    Learn More
    Our comprehensive suite of cloud services allows you to build your cloud server your way. Kamatera’s infrastructure is specialized in VPS hosting. With 24 data centers around the world, including 8 in the US, as well as in Europe, Asia and the Middle East, you can choose from. Our enterprise-grade cloud server can meet your requirements at any stage. We use cutting edge hardware, including Ice Lake Processors, NVMe SSDs, and other components, to deliver consistent performance and 99.95% uptime. With a robust service such as ours, you'll get a lot of great features like fantastic hardware, flexible cloud setup, Windows server hosting, fully managed hosting and data security. We also offer consultation, server migration and disaster recovery. We have a 24/7 live support team to assist you in all time zones. With our flexible and predictable pricing plans, you only pay for the services you use.
  • 3
    Domotz Reviews
    Top Pick
    See Software
    Learn More
    Discover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide. Try for free now!
  • 4
    Netdata Reviews
    Top Pick
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 5
    IPFire Reviews
    IPFire is an open-source firewall that uses Linux. It is robust, flexible, and state-of the-art. It is easy to use, highly performant in any scenario, extensibility, and simplicity make it accessible for everyone. IPFire places security at the top of its priorities. It is designed to prevent attacks from the Internet by preventing attacks on your network. It protects your network from attacks from the Internet and denial of service attacks with its powerful firewall engine and intrusion detection system. IPFire is a free software program that was developed by an open-source community and trusted by thousands of users around the globe. IPFire's primary goal is security. It is easy to set up a firewall engine. An intrusion prevention system prevents any attackers from entering your network. The default configuration divides the network into zones with different security policies, such as a LAN or DMZ. This allows you to manage the risks within the network and create a customized configuration for your specific needs.
  • 6
    Rublon Reviews

    Rublon

    Rublon

    $1/month/user
    2 Ratings
    Rublon allows your workforce to securely connect to your organization's servers, networks, and applications. Multi-factor authentication makes it easy to protect your data and comply with data protection regulations such as GDPR. Rublon can be deployed across your organization, enabling multi-factor authentication (MFA) for all cloud apps, VPNs servers, workstations, on-premise and internal apps.
  • 7
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 8
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 9
    Google Workspace Reviews
    Top Pick

    Google Workspace

    Google

    $6 per user per month
    13 Ratings
    G Suite has just gotten better -- Google Workspace (previously G Suite) is now available. All the tools you need to accomplish anything, all in one place. Google Workspace is an integrated workspace that's easy to use. It allows you to spend less time managing your work, and more time actually doing it. Google Workspace helps you focus on what's most important and lets you let Google do the rest. It uses best-in-class search technology and AI to help you work smarter. You can work from anywhere and on any device, even offline, with tools that help you integrate, customize, extend, and adapt Google Workspace to your team's needs. All Google Workspace plans offer a customized email for your business, similar to G Suite. It also includes collaboration tools such as Gmail, Calendar and Meet, Chat. There are many plans available that can be tailored to your business's needs. Find the right plan for your business on our pricing and plans page.
  • 10
    Microsoft Entra ID Reviews
    Microsoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control.
  • 11
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 12
    Foxpass Reviews
    Top Pick

    Foxpass

    Foxpass

    $3/User/Month
    7 Ratings
    Foxpass provides access control and infrastructure identity for companies of all sizes. Our cloud-hosted and on-premise LDAP and RADIUS and SSH key management solutions ensure employees have only the networks, servers, and VPNs that they need, and only for the period requested. Foxpass can be integrated with existing products such as Office365, Okta and Bitium to provide seamless access.
  • 13
    Microsoft Authenticator Reviews
    Top Pick
    Go passwordless. Enter your username to confirm your sign-in via your phone. It's easy! Passwords can be lost, stolen, or compromised. Authenticator adds an extra layer to your phone's security beyond your fingerprint or PIN. Authenticator allows you to sign in to Outlook, OneDrive and Office. Two-step verification protects all your accounts. You can also use the industry-standard time-based OTP (onetime password) codes to secure all your online accounts.
  • 14
    Google Authenticator Reviews
    Top Pick
    Google Authenticator generates 2-Step verification codes on your phone. 2-Step verification provides greater security for your Google Account. It requires a second step to verify your identity when you sign in. You will need a code that was generated by Google Authenticator on your phone in addition to your password.
  • 15
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 16
    ADrive Enterprise Reviews

    ADrive Enterprise

    ADrive

    $1.67 per month
    ADrive Enterprise uses cloud storage for datacenters and system administrators to free them from the burdens and costs associated with maintaining your own production storage systems. Our storage-focused teams create best-of-breed solutions using proven technology from today’s top datacenter, storage, and network manufacturers. We guarantee 99.9% uptime when we deploy enterprise-class storage systems by NetApp®, hosted at Tier IV datacenters with multiple redundant services providers. Our storage systems are top-of-the-line and have no single point of failure. We ensure that your business applications run smoothly, and we continue to service your data even if there are multiple failures of storage controllers or disk drives, power, cooling, or network systems. To ensure uptime, we connect to your offices and datacenters via redundant VPN connections. We can use your existing firewall technology.
  • 17
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 18
    EZ VPN Reviews

    EZ VPN

    EZ VPN

    $149 per year
    EZ VPNTM allows you to quickly and securely access any remote network location. EZ VPNTM allows you to connect to your office remotely and access any network location. EZ VPNTM provides a secure VPN connection that allows you to control your home automation and cameras, as well as remote desktop access. There is no need to configure complicated routers or firewalls. It works in any network environment. EZ VPNTM comes preconfigured and ensures the most secure VPN connection. EZ VPNTM safety features include a password-protected certificate and 2FA. Notifications are also available. All your connections can be managed from one web interface. The dashboard displays traffic data, user status, connection history, and more.
  • 19
    AWS Directory Service Reviews
    AWS Directory Service to Microsoft Active Directory, also known AWS Managed Microsoft Active Directory (AD), allows you to use managed Active Directory in AWS with your directory-aware workloads. AWS Managed Microsoft AD is based on Microsoft Active Directory and does not require that you synchronize or replicate your data to the cloud. You can use the standard AD administration tools, and you can take advantage of the built in AD features such as Group Policy or single sign-on. AWS Managed Microsoft AD allows you to join Amazon EC2 or Amazon RDS for SQL Server instances in your domain and use AWS End User Computing services (EUC), such as Amazon WorkSpaces with AD users and groups. AWS Managed Microsoft AD makes it simple to migrate AD-dependent Windows workloads to AWS. AWS Managed Microsoft AD allows you to use Group Policies to manage EC2 instances, and run AD-dependent apps in the AWS Cloud.
  • 20
    SolusIO Reviews

    SolusIO

    SolusIO

    $2.50 per month
    Our goal is to provide our customers and partners with the solutions they require for their digital transformation journeys. Companies across industries must use technology to improve customer experience and open new markets. It is essential that companies have an evolving IT infrastructure in order to adapt to changing needs and innovate faster. We remove the complexity of managing virtual infrastructure by providing blazing-fast, on-demand VMwares, an API and an easy-to use self-service control panel. This panel is also available for service providers. SolusIO offers a range of powerful virtualization technologies that support container-based and hypervisor virtualization. One central location allows you to manage virtual machines of KVM. In the future, OpenVZ, Virtuozzo and other support will be available.
  • 21
    V-Key Smart Authenticator Reviews
    Register for the V Key Smart Authenticator today to receive a free one-month trial. Trust is the foundation of trust in businesses and relationships. Are your employees working remotely from home? Are there many users who need access to your app or system? Multi-factor authentication (MFA) is becoming more popular in organizations. A simple password is not enough. SMS OTPs are insecure and vulnerable to phishing attacks and interception. Hardware tokens can be difficult to deploy, lose or stolen, and they need to be replaced regularly. The V-Key authenticator is a strong, flexible, and less expensive multi-factor authentication device that can be used by small and medium-sized companies. The V-Key Smart Authenticator is compatible with many enterprise apps, systems, and VPNs. In 3 simple steps, enterprise-grade multifactor authentication.
  • 22
    360 Monitoring Reviews

    360 Monitoring

    360 Monitoring

    $3.99 per month
    360deg Server Uptime Solution: Configurable dashboards with easy setup and custom tools. With world-class monitoring, you can be confident in the security of your online assets. Track server metrics such as CPU, network, disk, memory and disk usage to pinpoint problems at their source. Protect your site from malicious IPs in order to improve your sender's reputation and email delivery. Scan the log files for your applications to get data on their performance. With the 360 agent, you can browse a catalog of popular plugins or even create your own. Regular scans will help you measure your site's uptime, performance and health. With just one click, you can analyze your site in 26 locations around the world to ensure a top customer experience. Get notified via your favorite app. Be the first to find out when your website is down or not performing well. This unique crawler allows you to check the quality of entire websites and portals and identify errors.
  • 23
    SpendHound Reviews
    Save time and money by ensuring that your vendors renew their contracts. No upsells. Enjoy all features. Our renewal experts will help you save money on your software renewals by offering free calls, Slack messages, and emails. Understanding "best in market pricing" will help you avoid overpaying your vendors. Our experts can review your contracts, provide advice and negotiation techniques to help you get the best deal. Direct integrations can be done in less than 30 min. All vendor information is automatically populated. Renewal reminders are sent by email and Slack. Cost saving insights such as application duplication and underutilization, or speak directly with one of our renewal experts to get free benchmarking insights and negotiating tactics. SpendHound's renewal tracker is the most accurate on the market, thanks to a combination software, human analysis and direct integrations.
  • 24
    Oracle Identity Management Reviews
    Oracle Identity Management allows organizations to manage the entire lifecycle of user identities across all enterprise resources. This includes both inside and outside the firewall, as well as into the cloud. The Oracle Identity Management platform offers scalable solutions for identity governance and access management. This platform enables organizations to improve security, simplify compliance, and take advantage of business opportunities related to mobile and social access. Oracle Identity Management is part of the Oracle Fusion Middleware product family. This allows for greater agility, better decision making, and lower cost and risk in diverse IT environments. We now offer an innovative, fully integrated service, Oracle Identity Cloud Service, that provides all core identity and access management capabilities via a multi-tenant Cloud platform.
  • 25
    BitLaunch Reviews
    Pay crypto to get awesome cloud servers. It's simple, fast, and secure. You can instantly launch servers with BitLaunch and DigitalOcean, Vultr and Linode. Pay hourly with Bitcoin and other cryptocurrency Amazing cloud hosting providers offer high quality cloud servers. One-click setup for privacy including OpenVPN and WireGuard. Shadowsocks R as well as LAMP/LEMP and WordPress. We offer a wide range of Operating Systems, from Linux to Windows Desktop and Server. You can launch anything, from the latest Ubuntu to a Bitcoin Windows RDP. Our dedicated support team is available to assist you. We can help you configure your server or help you choose the right size. You can use our Developer API to create or manage servers for your projects. You can programmatically create and pay for crypto transactions. A simple Command-line Tool is also available to help you get started.
  • 26
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 27
    CyberArk Endpoint Privilege Manager Reviews
    Your security needs to be as agile as you are. Endpoint Privilege Manager allows users to have instant access to their local admin accounts. Your vulnerabilities are easy to be discovered by hackers. We do more by blocking credential theft before it can cause damage. There are many ransomware variants available today. Our solution has been proven to stop 100% of ransomware attacks. Temporarily raise end-user privileges to perform specific tasks on-demand and in real-time with minimal help desk involvement Stop ransomware from affecting your computer. You can take control of local admin accounts without affecting your workflow. You can work from anywhere, on any device, while protecting your assets and your reputation. You can secure every device without affecting your daily operations.
  • 28
    It'sMe Reviews
    Employees hate passwords just as much as you hate managing password vulnerability. Increased security risk, fatigue, cost, and cost are all associated with more passwords and tokens. It is time to get rid them all. 89% of security professionals believe that a more advanced multifactor authentication tool that provides continuous, behavior-based authentication would improve their company’s security posture. Acceptto offers Intelligent MFA, which intuitively authorizes users to access applications and continues authenticating after authorization. Even if hackers have already obtained passwords, we prevent account takeovers. ItsMe™, Intelligent Multi Factor Authentication, (MFA) increases security by authorizing access attempts at a registered device in real time, whether it is through a push notification, verification code (SMS/TOTP, email, etc.). You can authenticate access even if you are offline using our timed-based one-time password (TOTP), security keys, or biometric options.
  • 29
    1Kosmos Reviews
    1Kosmos allows citizens, customers, and workers to transact securely with digital services through passwordless access. The BlockID platform unites identity proofing with strong authentication to create a distributed digital identity that prevents identity fraud, account takeover, identity impersonation, and fraud while providing frictionless user experiences. BlockID is the only NIST-, FIDO2 and iBeta certified platform that performs millions upon daily authentications for some of the most important banks, telecommunications, and healthcare organizations around the globe.
  • 30
    NetThunder Reviews

    NetThunder

    NetThunder

    $50 per month
    NetThunder can be deployed in two ways. It can either be used as an appliance or as a system with connected appliances. We call this The Storm™. This allows NetThunder computing solutions to be applied in a wide range of situations. It is also future-proof. One appliance can be easily converted into The Storm™. NetThunder allows you to scale as you wish. NetThunder is a hypercoverged infrastructure that allows you to scale at will. It offers specialized modules that the controller will automatically configure for your environment, optimizing for maximum performance. It is easy to configure multiple networks and a SAN. Our subscription pricing model means no huge upfront buy-in cost. NetThunder can be deployed as an appliance or as a network of connected appliances that we call The Storm™. This allows NetThunder storage and computing solutions to be used in a wide range of situations.
  • 31
    AuthPoint Reviews
    Our multi-factor authentication (MFA), solution helps reduce the risk of network disruptions and data breach arising from lost and stolen credentials. We also deliver this important capability entirely via the Cloud for easy setup and management. AuthPoint is more than traditional 2-Factor Authentication (2FA). It uses innovative methods to positively identify users. Our large ecosystem of integrations allows you to use MFA to protect access. WatchGuard AuthPoint is the perfect solution for businesses that need MFA to protect against attacks. AuthPoint uses a push notification, QR code or one-time password (OTP), to prove your identity. Our mobile device DNA matches the authorized user’s phone when granting access systems and applications. Any attacker who attempts to clone a user's device to gain access to a protected system will be blocked.
  • 32
    AuthLite Reviews

    AuthLite

    AuthLite

    $500 per year
    AuthLite protects your Windows enterprise network authentication while staying within your budget. Unlike other multi-factor authentication solutions, AuthLite technology teaches Active Directory how to understand two-factor authentication. AuthLite allows you to continue using your existing software while adding two-factor authentication security where you need it. AuthLite reduces the vulnerability to the "Pass the Hash (PtH), attack vector on administrative accounts by limiting the privileges that a user is allowed to access. Two-factor authentication is required before the domain admins group SID can be granted. AuthLite can be used with your existing RDP servers or software. RDP client software and drivers do not need to be modified. Two-factor authentication protects your account logon even if you are offline. To support cached/offline logon, AuthLite uses strong cryptographic HMAC/SHA1 Challenge/response features of the YubiKey token.
  • 33
    RapidVPN Reviews

    RapidVPN

    RapidVPN

    $5.90 per month
    RapidVPN uses 3 protection layers (Shadow Protect) and fresh dedicated addresses for maximum privacy, security and anonymity. 100% safe and reliable. You want to stream Netflix, Hulu or Amazon Prime but you can't? Residential IP VPN will bypass all of these restrictions. Connect to one account simultaneously from up to four devices. Upgradeable to 99 connections. RapidVPN's bonus program: Receive free additional days to your subscription as a "thank you" for being a loyal client. Did you know that all RapidVPN servers are hosted on dedicated servers and not VPSs, unlike other providers. This is the fastest VPN available for streaming.
  • 34
    WLVPN Reviews
    No-traffic-logs is a policy that offers peace of mind. Our IPVanish system is independently verified to ensure the security of your data. WLVPN operates on the IPVanish network, which is one of the most reliable global VPN infrastructures available today. Our network consists of over 2,000 servers located in 75 cities and 50 countries around the world, providing access to 40,000+ IP addresses. IPVanish, WLVPN and Ziff Davis, Inc. are powered by Ziff Davis, Inc., a leading producer and distributor of digital media and internet-based products. Our expertise in VPN technologies and multi-sector SaaS allows us to scale our services with your business. We've simplified the process of connecting you and your business to the rest of the world. Use our global VPN infrastructure to reach your business' full potential.
  • 35
    SnTHostings Reviews

    SnTHostings

    SnTHostings

    $3.99 per month
    Purchase USA RDP servers and seedboxes that are fully managed. You can use it as you please, without any restrictions. SnTHostings created an exclusive panel to manage our seedbox. It is easy and fast, and we do our best to keep things simple. Our Windows RDP & seedbox have a feature that makes us 10x more efficient than our competitors. SnTHostings takes security as seriously as its support. All our servers and services are regularly updated and maintained. With our guides and custom tools we provide a simple, quick, and easy-to-understand service. It doesn't get simpler than this. The Seedbox Panel is our interactive panel where you can manage all of your seedboxes without hassle. On shared plans, there are no major restrictions. However, you should adhere to a fair use policy as the plan is shared.
  • 36
    AWS Marketplace Reviews
    AWS Marketplace is an online catalog that allows customers to discover, buy, deploy and manage third-party products, data and services within the AWS ecosystem. It offers thousands of listings in categories such as security, machine-learning, business applications, DevOps, and more. AWS Marketplace offers flexible pricing models, such as pay-as you-go, annual subscriptions and free trials. This simplifies billing and procurement by integrating costs in a single AWS bill. It also supports rapid implementation with pre-configured applications that can be launched using AWS infrastructure. This streamlined approach allows companies to accelerate innovation, reduce the time-to market, and maintain better controls over software usage and cost.
  • 37
    Live Proxies Reviews

    Live Proxies

    Live Proxies

    $45 per month
    Live provides unblocked, unique, and stable proxies that can be used for any site or use case. We strive to meet your expectations. Use our residential proxies that rotate anonymously by real peers to enhance your experience. Enjoy the same residential IPs 30 days or more. Our stable mobile IPs give you the freedom to become a mobile user. No limits, no boundaries. Get unlimited access to web data. You can navigate through proxy restrictions to facilitate your web scraping. Our proxies can be used to easily collect and analyze data, from tracking competitor prices to capturing trends in the market. By gaining valuable insights about your competitors, products, and markets, you can optimize your pricing strategy and manage inventory efficiently. Automate tasks and streamline your operations to save resources and time.
  • 38
    wolfSSL Reviews
    wolfSSL, an open-source internet security company, is best known for its embedded SSL Library. Its primary users include programmers who integrate security functionality into their devices and applications. wolfSSL uses the dual licensing model like MySQL. It is available under commercial license terms to our commercial users and open source to the open source community. wolfSSL also offers consulting and support. wolfSSL is the most widely used SSL/TLS security option in the IoT. We protect devices from the most common threat vector in the IoT, the MITM (man-in-the middle) attack. wolfSSL is popular for heavy load server-side or cloud environments where cryptography performance are critical. FIPS 140-2-enabled, wolfSSL embedded SSL is also used by government applications. Over 2 billion devices and applications are protected with wolfSSL products.
  • 39
    Acceptto eGuardian Reviews
    Acceptto monitors user behavior and transactions to create an enhanced user profile for each application landscape. This allows Acceptto to verify that access attempts are legitimate and safe. There are no passwords or tokens required. Acceptto's risk engine determines whether an attempt to access a user's account is legitimate or not. It tracks the user and device postures pre-authentication, during authentication and after-authorization. In an age where identities are constantly being attacked, we provide a continuous, step up authentication process with real time threat analytics. A dynamic level of assurance (LoA), is calculated based on a risk score that we have developed using our AI/ML algorithms. Our machine learning and AI analytics combine to automatically find the best policy for each transaction, maximising security and minimizing friction. This allows for a smoother user experience, without compromising enterprise security.
  • 40
    Censornet MFA Reviews
    An adaptive, cloud-based multifactor authentication solution that is flexible and cloud-based can secure access to many systems, services, and applications. Protect user accounts with more that a password. Reduce the risk of password reuse in the event of a large-scale data breach. Cloud-based backend is 100% secure and easy to use for all organizations. Intelligent multi-factor authentication provides a frictionless user experience and intelligently challenges users when there is high risk. Support is available for all major VPN vendors and cloud services. Passwords alone are not sufficient. Multi-Factor authentication adds an extra layer of security to user accounts and privileged accounts. It eliminates account compromises and identity-related threats. Some OTPs sent using legacy solutions are vulnerable to interception and susceptible to phishing or MITM attacks.
  • 41
    AuthControl Sentry Reviews
    AuthControl Sentry®, which has been deployed in more than 54 countries and is used by enterprises across finance, government, education, manufacturing, and healthcare, provides true multi-factor authentication (MFA) for organisations. It provides an intelligent solution to prevent unauthorised data and applications access. AuthControl Sentry®, which supports a variety of architectural requirements, has the flexibility to be used in a variety of ways and can ensure maximum adoption due to its many authentication factors. Patented PINsafe®, technology for maximum security. Supports both cloud and on-premise for a flexible architecture. Optimized customization is possible with a single tenancy and a single-tiered cloud service. Single sign-on and risk-based authentication are standard. Integrates seamlessly with hundreds if not thousands of applications. With a wide range of authenticators, you can ensure maximum adoption.
  • 42
    Acceptto Zero Trust Identity (CIAM) Reviews
    It is important to verify that your customers are real. Customers don't want to have to prove their identity and they want you not to make them do it. You can protect your customers' identities by providing a delicate balance between security and a pleasant, frictionless customer experience. Continuous, real-time identity monitoring and validation after authorization. Intelligent MFA instantly eliminates account takeover (ATO). Continuous authentication orchestrated by risk-based policy Acceptto is a revolutionary cybersecurity company that views authentication as a continuous process, rather than a single event. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes user identity and infers behavioral data to detect anomalies. This eliminates dependence on vulnerable binary authentications. We offer the most robust, secure and hack-proof identity validation technology.
  • 43
    Cysiv Reviews
    Cysiv's next generation, co-managed SIEM addresses all the problems and limitations associated with traditional SIEMs as well as other products used in a SOC. Our cloud-native platform automates key processes and improves effectiveness in threat detection, hunting and investigation, as well as response. Cysiv Command combines the essential technologies needed for a modern SOC into a unified cloud-native platform. It is the foundation of SOC-as a-Service. Most telemetry can either be pulled from APIs, or sent securely over the internet to Cysiv Command. Cysiv Connector is an encrypted conduit that allows you to send all required telemetry from your environment, such as logs, over Syslog UDP. Cysiv's threat engine uses a combination of signatures, threat intelligence and user behavior to automatically detect potential threats. Analysts can focus on the most important detections.
  • 44
    CloudConnexa Reviews
    CloudConnexa is a service that takes the complexity and high costs out of secure networking. It was built for businesses just like yours. Connect your applications, private network, workforce, and IoT device without complicated, hard-to scale hardware or self managed server software. CloudConnexa's dedicated secure overlay network blocks malicious activity by enabling Zero Trust to all applications, internet, and site-tosite networking. CloudConnexa's full-mesh network can be accessed from over 30 locations worldwide. CloudConnexa is the easiest way to implement scalable, secure network access. It has all of the features and functions that you need to connect your network and protect it.
  • 45
    Apono Reviews
    Apono's cloud-native platform for access governance allows you to work faster, more securely, and more efficiently with self-service. It is designed for modern enterprises that run in the cloud. Context helps you discover who has access to which resources. Identify access risks by leveraging context and enriched identity from the cloud resource environment. Access guardrails can be enforced at scale. Apono suggests dynamic policies that are tailored to your business requirements, streamlining cloud access lifecycles and gaining control over cloud-privileged access. Apono AI detects shadow, unused and over-provisioned access that poses a high risk. Remove standing access in your cloud environment and prevent lateral movements. These high-level accounts can be subject to strict authentication, authorization and audit controls. This will reduce the risk of insider attacks, data breaches and unauthorized access.
  • 46
    Azure Marketplace Reviews
    Azure Marketplace is an online store with thousands of ready-to-use, certified software applications, services and solutions from Microsoft as well as third-party vendors. It allows businesses to discover, buy, and deploy software within the Azure cloud. The marketplace includes a wide variety of products including virtual machine images and AI and machine-learning models, developer tools and security solutions. Azure Marketplace simplifies procurement and centralizes billing with its flexible pricing options, such as pay-as you-go, free trial, and subscription models. It supports seamless integration with Azure Services, enabling organizations enhance their cloud infrastructure and streamline workflows.
  • 47
    Keycloak Reviews
    Keycloak is an open-source identity and access management system. Easily add authentication to secure services and applications. There is no need to store users or authenticate users. All of this is available right out of the box. Advanced features like User Federation, Identity Brokering, and Social Login are available. You can find more information at about and documentation. Don't forget Keycloak! It's simple by design.
  • Previous
  • You're on page 1
  • Next