Best SignPath Alternatives in 2024

Find the top alternatives to SignPath currently available. Compare ratings, reviews, pricing, and features of SignPath alternatives in 2024. Slashdot lists the best SignPath alternatives on the market that offer competing products that are similar to SignPath. Sort through SignPath alternatives below to make the best choice for your needs

  • 1
    CodeSignal Reviews
    See Software
    Learn More
    Compare Both
    CodeSignal is how the world discovers and develops the skills that will shape the future. Our skills platform empowers teams to go beyond skills gaps, with hiring and AI-powered learning solutions, and helps individuals cultivate the skills they need to level up. Wherever you are on your journey, CodeSignal’s technical hiring and learning & development solutions meet you there and get you where you need to go.
  • 2
    StrongDM Reviews
    See Software
    Learn More
    Compare Both
    Access and access management today have become more complex and frustrating. strongDM redesigns access around the people who need it, making it incredibly simple and usable while ensuring total security and compliance. We call it People-First Access. End users enjoy fast, intuitive, and auditable access to the resources they need. Administrators gain precise controls, eliminating unauthorized and excessive access permissions. IT, Security, DevOps, and Compliance teams can easily answer who did what, where, and when with comprehensive audit logs. It seamlessly and securely integrates with every environment and protocol your team needs, with responsive 24/7 support.
  • 3
    Dropbox Sign Reviews
    Top Pick
    See Software
    Learn More
    Compare Both
    Everyone can use eSignatures. Dropbox Sign (formerly HelloSign), is the easiest and most secure way to have documents signed. Dropbox Sign allows contracts to be signed up to 80% faster than traditional paper-based contracts. It is also legally binding. Advanced signer options and built-in reminders significantly increase document completion rates. Personalize the signing experience for customers. To stay on-brand, you can easily add your company logo, color and custom messaging. You can save documents that you send out often as reusable templates. Templates can be used to speed up the process of signing and simplify data entry. Dropbox Sign documents are more secure than pen & paper. A court admissible audit trail (affixed) ensures that actions can be tracked and time-stamped. Account administrators have the ability to manage document permissions from a central dashboard and set up team settings. This makes everything more secure and organized.
  • 4
    CodeSign Secure Reviews
    Our platform guarantees unmatched security and high performance for all your cryptographic needs, ensuring the integrity and authenticity of your software. CodeSign Secure provides advanced insights, cloud-based HSM key management, and policy enforcement for robust practices. Experience seamless integration with Dev Ops CI/CD, and streamlined workflows for hands-free code signing.
  • 5
    Securden Password Vault Reviews
    Securden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS).
  • 6
    SignServer Enterprise Reviews
    All your electronic signature needs can be met by a single platform. Integrates with business applications using standard interfaces. SignServer can be deployed in a number of ways to meet your requirements - as a hardware appliance, software appliance or cloud-based service. SignServer is a platform that covers all of your signing needs in one solution. This includes standard document signing, eIDAS Advanced Signing and Seal, code signing for different formats, timestamping and ICAO ePassport. Centralize your signature processes and avoid managing a multitude of signing solutions. This multitenant solution will also improve security policy compliance. Server-side solutions for signatures give you maximum control and security, and let you leverage your hardware security modules (HSMs) in the best possible way. Signature keys are created and used to sign in your HSM. SignServer supports the majority of HSMs available, as well as keys with a short lifecycle and keys or certificates that have a longer one.
  • 7
    CodeSign Reviews
    Code signing is a security practice that helps to extend trust-based software system and application usage. Secure code signing is required for organizations that use and publish software. This is done to ensure that legitimate software is not stolen as ransomware. CodeSign by Aujas is a secure, scalable, and easy-to-integrate DevOps-ready platform. It ensures the integrity software applications, allows for allow-listing to protect internal infrastructures, protects signing keys, and provides automated audit trails to combat ransomware. CodeSign can be used as an on-premise appliance or as a SaaS app. It can easily scale to hundreds of millions file signings each year. It offers unmatched flexibility to sign all file types across all platforms. Organizations use a variety of software programs that are vital for their day-to-day business operations.
  • 8
    GaraSign Reviews
    There are many great enterprise security tools available. Some tools can be managed on-premise while others are available as a subscription. Others still use a hybrid model. The problem enterprises face isn't a lack in tools or solutions but a lack a seamless interconnectivity between these privileged management tools and a single place for managing and auditing them. GaraSign allows enterprises to integrate their security systems securely and efficiently in a way that doesn't disrupt existing business processes. GaraSign can centralize and simplify enterprise's most sensitive areas. This includes privileged access management (PAM), secure software development, privileged identity management, code signing, data security and PKI & SSM solutions. DevSecOps and many more. Security leaders in enterprise must be attentive to data security, privileged identity management (PAM), and other areas.
  • 9
    Keyfactor Signum Reviews
    Keyfactor Signum protects sensitive keys, automates policy, and integrates signing with your tools and build process. Create and store sensitive private keys in a cloud-based, FIPS 140-2 certified Hardware Security Module (HSM). Define granular policies for accessing and using private signing keys. Authenticate users, build servers and sign with a full audit. Integrate with native signing tools on the platform to protect access to signing keys without changing workflows. Integrate with signing software via lightweight Windows and Linux Agents that can be quickly installed on build servers or developer desktops. Create key attestations to comply with CA/B Forum requirements to verify that the keys are generated and stored in an HSM.
  • 10
    SignMyCode Reviews
    A trusted solution for obtaining Code Signing Certificates from globally reputed authorities that are compatible with signing all kinds of software,apps,EXEs  and scripts for your business's security.
  • 11
    Entrust TLS/SSL Certificates Reviews
    Entrust TLS/SSL Certificates offer validation of identity and encryption to protect your website, users, and data. Entrust TLS/SSL Certificates will secure your website so that your visitors can feel confident in knowing that your organization's identity has been verified. Also, encryption will protect their data and transactions. Entrust TLS/SSL Certificates ensure that your visitors don't see any browser alerts advising them that their website is "not secure" and that their connection is not private. Entrust is a founding member the CA Security Council, the CA/Browser Forum and actively contributes in the development of industry standards for TLS/SSL and S/MIME, code signing certificates and code management. Trust your digital security to a Certification Authority.
  • 12
    ClickSSL Reviews
    ClickSSL is a platinum partner of leading Certificate Authorities such as GeoTrust, Symantec, RapidSSL and Thawte. ClickSSL offers EV SSL and Code Signing Certificate, UCC Certificates, Wildcard SSL and more SSL Certificates at a low market price. ClickSSL's SSL certificates will provide you with irreplaceable proof of your website's identity and customer confidence in your online business' integrity and security. Secure your online business with affordable RapidSSL, GeoTrust, Thawte, Thawte, and Symantec SSL Certificates. ClickSSL offers SSL certificates at an affordable price that provide strong 256 bit encryption to protect your web sites, eCommerce, intranets, and extranets. Over 99% of all current browsers support our digital certificate. Secure your site(s) with SSL certificate at the lowest price. Take HTTPS one step further and you will never lose your customers' confidence.
  • 13
    SSL2BUY Reviews
    SSL2BUY was founded with the goal of providing online security with the help our vast experience. Our trustworth certificates protect our customers from phishing attacks and malware activities. SSL2BUY was created to provide online safety with the help of our vast experience. You can secure unlimited subdomains with the AlphaSSL Wildcard certificate. This saves you time and effort in managing multiple certificates. Your visitors will be impressed by the level of security provided by AlphaSSL Wildcard certificate. It provides seamless, secure experience and guarantees website security. To establish a secure environment for their business and show their trustworthiness, every organization should purchase an SSL certificate. Our low-cost SSL certificates offer hassle-free security solutions. SSL certificates secure online transactions with strong 256 bit SSL encryption. We offer SSL certificates at a low price, but we will not compromise your web security. All certificates are based on the latest algorithms recommended by CA/Browser.
  • 14
    CheapSSLWeb Reviews
    CheapSSLWeb is an authorized Sectigo partner (previously known as Comodo). We offer the cheapest SSL certificates from internationally reputed Certificate Authorities such as COMODO, SECTIGO and CERTERA. We offer all types of SSL & Code signing certificates such as OV certificates, DV certificates, and EV certificates.
  • 15
    GeoTrust Reviews

    GeoTrust

    GeoTrust

    $149 per year
    GeoTrust, a trusted certificate authority, offers retail and reseller services for SSL encryption. Every company today needs web security they can trust in today's digital economy. GeoTrust has over 100,000 customers in more than 150 countries. This is why businesses all over the world choose GeoTrust to provide SSL/TLS security solutions. GeoTrust has been delivering business-class certificates to all sizes of organizations, from large enterprises to small businesses with just one site. This is at the best value. GeoTrust offers a wide range of authentication levels that allow companies to meet their security needs on virtually all major browsers and mobile devices while also aligning themselves as a trusted digital security brand.
  • 16
    SignTool Reviews
    Software companies must make it possible for users to trust code, including code published online. Many webpages only contain static information which can be downloaded without risk. Some pages contain controls and programs that can be downloaded and installed on the user's computer. Downloading and running these executable files may be risky. When code is transmitted over the internet, these guarantees are not possible. The Internet cannot guarantee the identity of software creators. It cannot guarantee that software downloaded has not been altered after its creation. Browsers can display a warning message explaining the possible dangers associated with downloading data, but they cannot verify whether code is as it claims to be. To make the Internet a reliable platform for software distribution, a more proactive approach is needed.
  • 17
    apksigner Reviews
    The apksigner, available in Android SDK Build Tools revisions 24.0.3 and above, allows you to sign APKs, and confirm that the signature of an APK will be successfully verified on all versions supported by the APK. This page is a quick guide to using the tool. It also serves as a reference of the different command-line parameters that the tool supports. This page provides a detailed description of the apksigner's use for signing APKs. The lowest Android Framework API level that is used by apksigner to confirm that an APK's signing will be verified. Higher values allow apksigner to use stronger security measures when signing the app, but limit the APK to devices running the latest versions of Android. By default, the value of minSdkVersion is taken from the manifest file.
  • 18
    jarsigner Reviews
    The jarsigner software has two functions: to verify the integrity and signatures of signed JAR files, and to sign Java Archive files (JAR). A digital signature is a sequence of bits that are computed using some data (the signed data) and the private keys of an entity (a company, person, etc.). A digital signature is similar to a handwritten one in that it has many useful features. Its authenticity can be verified using the public key of the private key used to create the signature. It is a function for the data signed, and cannot be claimed as the signature for any other data. The signed data cannot also be changed. If the data has been altered, the signature cannot be verified and it cannot be forged if the private key is kept confidential.
  • 19
    iOS App Signer Reviews
    iOS App Signer allows you to (re)sign your apps and bundle them in ipa files ready for installation on an iOS device.
  • 20
    Nexus Container Reviews
    Successfully deploying containers requires balancing strong security practices, agile DevOps teams, and compliance requirements. Nexus Container helps you manage your security, development, and operations teams to find, monitor, and fix all aspects of container vulnerabilities throughout the entire lifecycle. To ensure that vulnerabilities are identified early in the development cycle, we continuously scan containers during build and monitor images in registries. Don't worry if an issue is discovered. Our policy enforcement and admission controls prevent vulnerable images from being deployed. Containers require advanced network protection to ensure security. We monitor containers continuously to detect vulnerabilities and share fixes once they are in production. We are the only solution that can enforce data protection and prevent zero-day attacks, tunneling, breaches, and other threats.
  • 21
    Code Dx Reviews
    Code Dx helps enterprises quickly release more secure software. Our ASOC platform allows you to stay at the forefront for speed and innovation, without compromising security. Automation is the key to all of this. DevOps is accelerating the pace of security. The risk of a security breach increases when you play catch-up. Business leaders encourage DevOps teams push the pace of innovation in order to keep up with new technologies like Microservices. To meet short development lifecycles, operations and development teams must work together as quickly as possible. Security tries to keep up, but with too many reports to review and too many results, they fall behind. Critical vulnerabilities can be overlooked in the rush to catch up. Automate, scaleable, repeatable and automated application security testing across all development pipelines.
  • 22
    CA Endevor Reviews
    Automate to speed up software development across the enterprise CA Endevor offers a standard, reliable, and automated way to secure and manage your software assets. CA Endevor automates the software development process. It manages software changes from the first line of modified code to deployment and change tracking. CA Endevor Integrations to Enterprise DevOps gives users more flexibility in choosing their interface and tight coupling with the DevOps toolset. CA Endevor Integrations for Enterprise DevOps provides out-of-the box integrations to popular agile tools, CI/CD, pipeline management tools, as well as plugins to enterprise GIT repositories. This allows teams to adopt the same modern stacks that are used for distributed development, while still leveraging the build and lifecycle automation offered through CA Endevor.
  • 23
    Fidelis Halo Reviews
    Fidelis Halo, a SaaS-based cloud security platform, automates cloud computing security controls. It also provides compliance across containers, servers, and IaaS within any public, private or hybrid cloud environment. Halo's extensive automation capabilities allow for faster workflows between InfoSec (DevOps) and Halo with over 20,000 pre-configured policies and more than 150 policy templates. These templates cover standards like PCI, CIS and HIPAA. The comprehensive, bidirectional Halo API, SDK, and toolkit automate security and compliance controls in your DevOps toolchain. This allows you to identify and correct critical vulnerabilities before they go into production. Free Halo Cloud Secure edition includes full access to the Halo Cloud Secure CSPM Service for up to 10 cloud service account across any mix of AWS and Azure. Get started now to automate your cloud security journey!
  • 24
    Infosec Skills Reviews
    Infosec Skills cyber ranges help learners to experience real-world scenarios in the operational environments they might encounter on the job. You can create a cyber range by clicking a button. Learn how to counter MITRE ATT&CK techniques and tactics targeting your organization today. From command line basics to advanced adversarial tactics. All Infosec Skills training is linked to the NICE Framework, which will help you create role-relevant, scalable programs to develop cyber skills gaps. You can take a bottom-up approach when creating training programs. Either browse the 52 NICE Work roles and assign training to them.
  • 25
    AVX ONE Reviews
    AVX ONE provides the most advanced SaaS platform for certificate lifecycle management. It is designed to meet the needs of enterprise PKI, IAM and security teams, DevOps teams, cloud, platform, and application teams. AVX ONE provides visibility, automation, and control over certificates and keys to enable crypto-agility. This allows users to quickly respond to cryptographic changes and threats, prevent outages, and prepare for Post-Quantum Cryptography. AppViewX is a unified platform that provides instant value through enterprise-wide CLM and Kubernetes/container TLS automation, scalable PKI-as-a-Service and easy Microsoft PKI Modernization, secure code-signing, IoT Identity Security, SSH Management, and Post-Quantum Cryptography readiness (PQC).
  • 26
    MyGet Reviews
    Secure Universal Package Manager. Continuously audit and govern all packages throughout your DevOps lifecycle. MyGet is trusted by thousands of teams around the world for their package management and governance. Cloud package management, strong security controls, and easy continuous integration build services will help you accelerate your software team. MyGet, a Universal Package Manager, integrates with your existing source codes ecosystem and allows for end-to-end package administration. Centralized package management provides consistency and governance for your DevOps workflow. MyGet's real-time software license detection monitors your teams' package usage and detects dependencies between all your packages. Your teams will only use approved packages. You can also report vulnerabilities and obsolete packages early in your software development and release cycles.
  • 27
    Venafi Reviews
    Protect all your machine identities. Are you protecting your TLS keys and certificates as well as SSH keys, code signing keys and code signing keys that are used throughout your extended enterprise? Learn how to secure this torrent of constantly changing machine identities. Keep ahead of outages and speed up DevOps security. The Trust Protection Platform powers enterprise solutions that provide visibility, intelligence, and automation to protect machine identity throughout your organization. You can also extend your protection by utilizing hundreds of integrated third-party applications (CAs) and certificate authorities (OTCs) that are out-of-the box. Multiple methods are available to find and provide keys and certificates. Security best practices for certificates should be followed and enforced. Integrate workflow management processes and management of certificate lifecycles. Combine certificate automation and orchestration of keys generated using Hardware Security Modules (HSMs).
  • 28
    CyberArk Customer Identity Reviews
    Your customers will be delighted by easy and secure access via your apps and websites. This will keep them loyal to you. Customers expect great digital experiences. The attack surface is becoming more permeable than ever. CyberArk Customer Identity allows you to securely open your apps and websites to customers. Easy integration, intuitive access controls, and frictionless sign on. All your privacy, consent, and identity verification in one platform. Pre-built widgets and APIs reduce development effort. Secure access to business apps for both human and machine identities. Secure access to machine identities within the DevOps pipeline. IT can be simplified and made easier while improving business security. Secure single sign-on access for your apps and services.
  • 29
    Cymune Reviews
    Incident response services help with the remediation of a cyberattack or other damaging incident within a company's IT infrastructure. Our 6-step plan for emergency response provides rapid response services to your enterprise. It quickly addresses a suspected data breach and minimizes the incident impact. Benefits of Incident Response with Symune - Create an effective breach remediation strategy based on a thorough analysis of the nature of the breach. - Stop cyber attackers from encroaching on your network. - Access to a team expert cybersecurity analysts and incident responders whenever you need them.
  • 30
    Cloudanix Reviews
    Cloudanix offers CSPM, CIEM and CWPP capabilities across all major cloud service providers in a single dashboard. Our risk scoring helps you prioritize security threats, reducing alert fatigue for your DevOps teams and InfoSec. Our adaptive notifications make sure that the right alerts reach the right team members. The 1-click JIRA Integration, the inbuilt review workflows and other collaborative features boost team productivity. Cloudanix offers a library of automated remediation solutions to reduce the time needed to fix a particular problem. The solution is agentless, and can be installed in just five minutes. Our pricing is based on resources, which means that there are no minimums. You can also bring all of your AWS accounts into our single Dashboard. We are backed up by YCombinator as well as some amazing investors that have built and run security and infrastructure companies in the past. Cloudanix is available at no minimum cost to secure your cloud infrastructure
  • 31
    Trelica Reviews
    Trelica's SaaS management platform provides IT teams with insight into which apps are being used and why. This allows them to make informed decisions about spending, data security, and privacy. You can partner with users to optimize and secure the apps that will allow your business to prosper, as well as weed out any unneeded SaaS usage. Automating application discovery and user engagement insights allows you to quickly see all aspects of your SaaS ecosystem. Track licenses, renewals, and spend for approved apps to manage your SaaS inventory. You can also offboard apps that are redundant or risky. Upgrade from Excel InfoSec surveys. To manage third-party applications, define your own seamless contract lifecycle. This will include onboarding and termination. Your SaaS management approach should be compliant with GDPR, the California Consumer Privacy Act, and applicable across all areas of your business.
  • 32
    ThreatModeler Reviews
    ThreatModeler™, an enterprise threat modeling platform, is an automated solution that reduces the effort required to develop secure applications. Today's information security professionals have a pressing need to create threat models of their organizations' data and software. We do this at the scale of their IT ecosystem and with the speed of innovation. ThreatModeler™, which empowers enterprise IT organizations, allows them to map their unique security requirements and policies directly into the enterprise cyber ecosystem. This provides real-time situational awareness of their threat portfolio and risks. InfoSec executives and CISOs gain a complete understanding of their entire attack landscape, defense-in depth strategy, and compensating control, which allows them to strategically allocate resources and scale up their output.
  • 33
    Titan Sign Reviews
    Titan's drag-and-drop builder allows you to create dynamic, responsive Salesforce sign-up processes. Titan eSignatures meet all accessibility requirements and section 508 requirements. HIPAA, SOC2, ISO, GDPR and other leading frameworks are all compliant. Titan's no code eSignature solution allows you to sign, seal, deliver, and track agreements in just minutes. Drag-and-drop software allows you to create and track personalized quotes for faster signing. Notify your salespeople, management team, and other stakeholders when someone views, voids or signs a contract. You can also track the signing process in Salesforce. Titan Sign updates Salesforce records once the signing process is complete with data from the document and input fields. Salesforce is a revolutionary software, but it does not offer a built-in option to initiate and trigger signing processes.
  • 34
    Hammer Cloud Platform Reviews
    Hammer Cloud Platform is a comprehensive, test automation offering that integrates functional, regression, systems integration, performance, and customer experience testing/monitoring into an intuitive, software-as-a-service (SaaS) solution. Hamer Cloud Platform makes it easier than ever to help enterprise network and contact center teams accelerate their software development lifecycles. Hammer Cloud Platform is designed for infrastructure planning, application design, quality assurance (QA), DevOps and operations teams that perform frequent tests to ensure their contact centre applications are ready for business. Regular testing is becoming more important due to the rapid adoption of DevOps methods. Hammer Cloud Platform eliminates defects due to rushed releases and helps DevOps teams cut mean time for repair (MTTR), reduce rework costs and provide a truly optimized customer experience.
  • 35
    Engity Reviews

    Engity

    Engity GmbH

    €0.01/month/user
    As an Identity and Access Management Solution Provider in Europe, we offer SMEs, startups and mature companies a fully scalable and customizable Keycloak Alternative. Engity can ensure compliance with European data protection laws by providing all services through European data centers. Engity also offers standard security features like Easy-Ensure Strong password Check or Breached password Detection in order to guarantee the highest security standards. Engity offers a variety of authentication options, including the classics such as username and password, MFA or SSO, or biometrics. It also brings to the market new solutions, such as authentication environments without the need for e-mail accounts or sign-ups for directories.
  • 36
    CyberStrong Reviews
    CyberSaint's CyberStrong platform is used by Fortune 500 CISOs to manage IT and cyber risk and ensure compliance from assessment to Boardroom. CyberStrong uses intuitive workflows and executive reports to increase cyber resilience and communication. Patented AI/ML automation reduces manual effort, which saves enterprises millions of dollars annually. The platform combines cyber and business risk to enable faster and more informed decision-making. CyberStrong is a competitive advantage for enterprises. It automates assessments across multiple frameworks and mitigates even the most extreme risks. CyberSaint is a Gartner Cool vendor for Cyber & IT Risk Management. He is listed in Gartner’s Security Operations, Cyber & IT Risk Management and Legal & Compliance Hype cycles. He has won numerous awards, including the 2021 Cybersecurity Excellence Gold winner, 2021 Cyberdefense Magazine Global InfoSec Awards Winner and 2021 Cyber Defense Magazine Emerging Vendor.
  • 37
    F5 NGINX App Protect Reviews
    Modern app-security solution that seamlessly integrates with DevOps environments. This allows you to deliver secure apps from code up to customer. The application landscape of today has changed drastically. Modern apps are microservices which run in containers and communicate via APIs. They also deploy via automated CI/CD processes. DevOps teams must integrate security controls that have been authorized by the security team across distributed environments. This will not slow down release velocity or performance. NGINX App Protection is a modern app security solution that seamlessly integrates into DevOps environments. It acts as a robust WAF (app-level DoS defense) and helps you deliver secure apps from code up to the customer. NGINX Plus and NGINX ingress controller seamlessly integrate strong security controls. Protects against advanced threats and evasive attack. Modern apps are easier to create and less complicated. Create, secure and manage adaptive apps that reduce costs, improve operations and protect users.
  • 38
    Fugue Reviews
    The Fugue Platform equips teams with the tools they need to create, deploy, and maintain cloud security at all stages of the development cycle. Fugue is a tool that will bring you immediate value. We guarantee it. Fugue uses the open-source Open Policy Agent (OPA), which is a standard for IaC, and cloud infrastructure policy as code. Regula, an open-source tool powered OPA, can be used to build IaC checks into git workflows or CI/CD pipelines. Use Rego, an open-source language that allows you to create custom rules. You can manage your IaC security for containers, Kubernetes and cloud resources from one place. This will ensure consistent policy enforcement throughout the development lifecycle. You can view the results of security- and compliance checks for IaC throughout your organization. Access and export tenant-specific IaC security and compliance reports.
  • 39
    Certera Reviews
    Certera is a modern and affordable SSL Certificate provider of the world's leading Certificate Authorities such as Certera, Sectigo, and Comodo. We offer the most affordable DV SSL, OV SSL, EV SSL, Multi-Domain SSL, Wildcard SSL, and Multi-Domain Wildcard SSL Certificate for Website Security. Code Signing and EV Code Signing Certificates for Software/App Security and Email Signing Certificates to secure email digitally.
  • 40
    Kinective SignPlus Reviews
    Kinective SignPlus™ (formerly IMM eSign Plus) offers the same functionalities of Kinective Sign™, plus a business rules-based workflow engine. It allows your team to customize and enforce critical operational processes and tasks to remain in compliance with your institution’s established policies and procedures. Enhance compliance, improve productivity, and drive organizational efficiency with our enterprise eSignature platform. No other eSignature solution provides a more seamless and fluid user experience for employees as they facilitate and manage eSignature transactions. With a smooth as silk movement of documents from your business systems into a fully prepared eSign transaction, SignPlus makes it simple and easy – as it should be!
  • 41
    PowerSuite Reviews
    PowerSuite's unique technology offers a single-pane view that spans six different applications platforms from the four most respected software vendors in the industry. PowerSuite can solve video conferencing issues, security blind spots and many other problems with machine learning proactive troubleshooting. The increasing complexity of video conferencing is driving up support costs and increasing costs. We can help you get cost-effective room systems security, no matter whether you use Zoom, Microsoft Teams, Skype for Business, or any combination. Slack and Microsoft Teams usage has led to a flurry of security issues that IT & InfoSec professionals don't know about. Our solutions balance user autonomy with data privacy and security to reduce risk.
  • 42
    Layer7 API Management Reviews
    You can create a scaleable business with speed and security. Make sure your digital strategy is well-built to take advantage of new opportunities. Layer7®, formerly CA API Management, allows enterprise data to come to life at all stages of the lifecycle. Layer7 API Management (formerly CA API Gateway), is available as a standalone or integrated solution to the Layer7 API Management full lifecycle solution. It gives you the power and security to securely integrate, govern and manage APIs at scale. Industry-leading orchestration, optimization, and other runtime features are available. These features have been tested in the most demanding environments. A central hub for API teams that facilitates API discovery, developer onboarding, and collaboration. Give your developers the tools they need for creating high-value apps. In minutes, create microservices. You can design your service, use robust logic, and expose an enterprise-class API 10x faster than traditional programming when you use an extensible low code development platform.
  • 43
    Cloudentity Reviews
    Cloudentity improves development velocity, audit efficiency, and risk mitigation by advancing finely-grained authorization policy administration and delivering continuous transaction-level enforcement across hybrid and multi-cloud environments. Externalize authorization management empowers developers to create policy-as code, provide standardized controls, invoke contextual access, and enforce data exchange as close as possible to the service. Accelerate application delivery with security validation that includes full data lineage for compliance, audit, forensics, and validation. Cloudentity offers dynamic authorization governance that provides policy automation and adaptive control, ensuring zero trust between users, apps and services. Automate the inventory of APIs, services, and apps, as well as standardization and provisioning for authorization policies. This will simplify security verification.
  • 44
    Delinea Privileged Behavior Analytics Reviews
    Be aware of the warning signs that you may be a victim to privileged account abuse. An abrupt increase in privilege account access by certain users. Unusual access to the most secretive accounts or secrets. Access to a large number of privileged accounts at once. Accounts are accessed at unusual hours or in unusual locations. Privileged Behavior Analytics detects anomalous behavior quickly and alerts your security team immediately to a cyber attack or insider threat. Advanced machine learning is used by Delinea Privileged Behavior Analytics to analyze activity on privileged account in real-time. This allows you to spot anomalies and provide threat scoring as well as configurable alerts. Advanced machine learning analyzes all activity on privileged accounts to identify problems and determine the extent of a breach. Security improvements can reduce security risks for your organization and save your department time, money and resources.
  • 45
    SANS Security Awareness Reviews
    SANS Security Awareness offers a comprehensive suite of computer-based training modules and support materials, as well as online phishing training. It is engaging and highly effective. To create a secure culture, you can host training in any learning management system. Deep insight and expertise go hand-in-hand with SANS. SANS's expertise is backed by hundreds of cyber security experts, behavior learning doctors, and scientists. This makes it a valuable tool for your organization. Trust is key when it comes to security. This is why we have assembled a team of experts who have been fighting every cyber threat.
  • 46
    Parrot OS Reviews
    Parrot is a global community of security specialists and developers that works together to create a common framework of tools to make their jobs easier, more reliable, and more secure. Parrot OS, Parrot Security's flagship product, is a GNU/Linux distribution that is based on Debian and designed with Security and Privacy as its primary focus. It provides a portable lab for all types of cyber security operations. This includes reverse engineering, pentesting, digital forensics, and reverse engineering. However, it also contains everything you need to create your own software. It is constantly updated and has many sandboxing and hardening options. You have complete control over everything. You can download the system, share it with anyone, and even read the source code. You can also make any changes you wish. This system was created to respect your freedom and will continue to be so.
  • 47
    Intrinsic ID Reviews
    IntrinsicID is the world's largest digital authentication company. It provides the Internet of Things hardware-based root of trust security via unclonable identity for any IoT device. Intrinsic ID's patent-pending SRAM PUF technology allows the company to implement its security solutions in either hardware or software. IntrinsicID security can be used at any stage of a product’s lifecycle. It is used to authenticate sensors, validate payment systems, secure connectivity and protect sensitive government systems and military systems. More than 150 million devices have been equipped with Intrinsic ID technology. The Cyber Defense Magazine InfoSec Award is one of the most prestigious awards. Other awards include the IoT Breakthrough Award and IoT Security Excellence Award, Frost & Sullivan Technology Leadership Award, and the EU Innovation Radar Prize. Common Criteria, EMVCo and Visa have certified millions of devices that provide intrinsic ID security.
  • 48
    Screenly Reviews

    Screenly

    Screenly

    $9.95 per month
    Regular, hands-free software upgrades keep your digital signs secure and stable. Your content will always be visible, even in the event that the internet goes down. You can quickly create playlists and schedule your next month's content in one sitting. Screenly Open Source Edition is for you if you are comfortable using Linux and can manage one screen at a given time. Screenly subscriptions offer commercial-grade features, support and the ability to manage any number digital signs remotely. Each screen will require one Screenly Player. Screenly was started in 2011 as an open-source project. Screenly powers over 10,000 digital signs all around the globe. Your Screenly digital signs can be customized with images, videos, live web pages, or other media. Log in to our online platform and connect the Screenly Player via HDMI to your screen.
  • 49
    Tenfold Reviews
    Tenfold is an enterprise platform for application development. Your applications can be built and deployed in the same time as other developers write their requirements. Customers who value extensibility or customization beyond what is offered by Ignite can use Ignite’s Tenfold Developer Edition to forge their own path. They can do this at their own pace and in the direction that best suits their business needs. Customers can subscribe to the Developer Edition to access source code and have rights to create or run derivative works.
  • 50
    eSigns Reviews

    eSigns

    eSigns

    $9.99 per month
    eSigns, an electronic signature solution for individuals and enterprises, has been proven to be the best in streamlining workflows, closing contracts quickly, and reducing costs. The software makes it easy to use the latest technology and automation to sign documents digitally, arrange them in order, and share them with your clients and teams. It can be accessed from anywhere, at any time. Quick and Easy You can say goodbye to the long waits for documents to be printed, signed and shared within or without your organization. It's easy with eSigns! Fully Secured eSigns ensures that all documents signed, shared, and stored within the system remain protected and encrypted. There is no data breach. On-the-Go Solution Now you can sign and transmit documents electronically from anywhere at any time.