Best Sima Alternatives in 2024
Find the top alternatives to Sima currently available. Compare ratings, reviews, pricing, and features of Sima alternatives in 2024. Slashdot lists the best Sima alternatives on the market that offer competing products that are similar to Sima. Sort through Sima alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,277 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Auth0
Okta
825 RatingsAuth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO. -
3
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. - 4
-
5
Oloid
Oloid
Modern access control can retrofit your workplace. There are many options available, including face, Bluetooth and QR codes. Easy retrofit to existing badge readers and access controls systems. Secure your assets using contactless biometrics and tailgating detection. Turn your iPhones, iPads and Android Phones into smart readers. Oloid prevents unauthorized access, and reduces dependence upon manual entry. Integration with your existing IT systems is possible for seamless user experience. Employees can use contactless biometrics and mobile credentials to gain physical access. The workplace can be made secure and frictionless for both smartphone and non-smartphone users. Oloid's rule-based access control uses computer vision to count people entering and exiting doors. Use existing security cameras to install IP cameras. -
6
Knomi
Aware
Multi-factor authentication and biometrics have been the standard for confirming identity. Aware identity verification and management solutions are Bringing Biometrics To Life™. They can be used in a variety environments, including law enforcement, healthcare, financial services, and on-site enterprise security. Aware biometrics solutions can capture all biometric factors, including fingerprints and retina scans, voice and full facial recognition. The modular architecture of Aware makes it easy to configure the system for any biometric identity management software. This is the future and present of identity verification. The Knomi framework allows for secure, convenient facial and speaker recognition to enable multifactor mobile authentication. Aware's ABIS offerings can be tailored to meet any customer need, from small, custom solutions to large-scale enterprise implementations. -
7
For a seamless, hassle-free and contactless user experience, a cloud-based, wireless door access control system is available. Modern access management system that uses the power of the cloud and mobile technology. Spintly's fully wireless, cloud-based access management system is revolutionizing the security industry. It eliminates the complexity involved in installing an access control system in a building. Installers can save over 60% on their time and costs by not having to wire. This allows them to be more productive and reduce their cost. Our vision is to make building smarter and easier by offering a frictionless access experience to users. We also aim to make buildings smarter using our fully wireless mesh platform for intelligent building devices. Spintly provides solutions for various industries with its fully wireless access control hardware and cloud-based software.
-
8
Protecsys 2 Suite
Horoquartz
Horoquartz offers a global, connected electronic safety-security solution with Protecsys 2 suite. You can prevent theft, vandalism and aggression from affecting your company's operations, and help to create a positive environment. Protecsys 2 Suite integrates access control, intrusion detection and video surveillance. It also allows for visitor management and central supervision. We offer a complete line of professional IP cameras, pedestrian and vehicle barriers, image storage solutions, and all related electronic equipment. Horoquartz is a trusted leader in electronic security for over 30 years. Our solution is used by more than 1,200 customers in all areas of activity. Secure and manage access to your premises. Prevent threats, identify perpetrators, and facilitate alarm verification -
9
Brivo
Brivo
Brivo can help your entire company achieve its physical security, scalability and cybersecurity goals. Brivo is the global leader for cloud-based access control and security systems for commercial and multifamily properties. Our mission is to provide Simply Better Security solutions that improve the user experience for property managers, tenants and employees, as well as visitors. Our SaaS platform, which has over 20 million users and 1,500 authorized dealer, has unified security across access control, mobile credentials and video surveillance. Since 2001, it has been unifying security across access control, visitor management, elevator control, identity federation and visitor management. Our SDKs and APIs are used by hundreds of software partners and end-users to expand our solutions to specific vertical markets. Brivo's Vacation Rental Property Management system is cloud-based and combines guest bookings with messaging, home automation and security to increase property appeal and value. -
10
TEKWave Visitor Management
TEKWave Solutions
TEKWave's cloud-based solutions for community, logistics and commercial gate access management provide real-time data and insights from one platform. What happens when advanced technology and human thinking meet? TEKWave. Our solutions allow you to control and monitor everything at your physical gates via digital technology. You can improve security and visitor efficiency while removing friction from the visitor experience. Every day, employees, vendors, and visitors come and go. High traffic can cause friction on your site and create security vulnerabilities that you cannot risk. TEKWave's Commercial Visitor Management System makes visitor scheduling, processing and tracking simple. It also provides a frictionless and safe way for employees and visitors to get to work every day. Any internet connection can be used to monitor and control traffic flow on your campus or facility. -
11
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
12
Genea Access Control
Genea
Genea's cloud-based access management system is designed to provide security and convenience for both tenants and building managers. The most modern platform for building access control. Tenants can manage their own access to the parking garage, base building and other access points. No more waiting for a manually provisioned card. Tenants being empowered to add and remove users saves hundreds of hours each year for property teams, which in turn reduces the time and costs associated with access control. You don't have to wait for months to get rid of your tenant's ex-employees. Automated user controls and self-service ensure that only the right people have access. This is the first access control software that was built on non-proprietary hardware. Genea allows you to manage keyholders, monitor activity and even assign mobile keys anywhere. -
13
ButterflyMX
ButterflyMX
The app is highly rated and integrates with other cloud-based systems. A powerful property management dashboard and an excellent smartphone app are all designed to make it easy to access your property throughout your building. More than 7,500 multifamily, student housing, and commercial customers rely on our products, as well as those managed by some of the most respected names in real estate. We make property access easy for residents, staff, owners, and visitors. We designed our features with you as in mind. Residents have a seamless experience at the building entrance. Property managers enjoy greater security and convenience. Developers and owners can eliminate in-unit hardware and wiring. Our keypads and video intercoms allow residents to control property access remotely from their smartphones. They can make video calls, remotely unlock the doors and gates, and grant managed access for delivery people and service providers. -
14
HID SAFE
HID Global
HID SAFE Enterprise, which is a single, central platform, advances security functions in identity management. It breaks down siloed processes and systems within organizations and allows collaboration between departments and teams. HID SAFE Visitor Manager automates all aspects of visitor lifecycles for any organization. This web-based solution allows for visitor preregistration, security background checks, access authorizations, check-in/check out, badge printing, centralized reporting and audit trail functions. HID SAFE Visitors Manager is a flexible solution that can be configured to meet each customer's specific visitor management needs. This highly scalable solution makes it easy to manage busy sites with high visitor volumes. HID SAFE Risk Analytics allows organizations to extend the power of their security data beyond traditional reporting to use it to predict security operations. -
15
Luchismart
Luchismart
Luchismart, a leading technology company, specializes in cloud-based systems that offer advanced features like time and attendance management and video surveillance. Luchismart's goal is to revolutionize how businesses manage access control and monitoring. The company focuses on providing secure, efficient solutions. Access control is one of the most important features of Luchismart. The system uses cloud-based technology to allow businesses to control and monitor their premises in real time. It provides a comprehensive set tools to manage and customize the access permissions of employees, contractors, and visitors. This ensures that only authorized individuals are able to enter restricted areas. Luchismart is a robust time and attendance system that offers access control in addition to other features. The system allows accurate tracking of employee's attendance, including clocking in and out times. -
16
Cloudvue
Johnson Controls
Johnson Controls is changing the way spaces and places are perceived. Our customers can now manage security and operations systemically by using data from both inside and outside buildings. OpenBlue, Johnson Controls' dynamic new space, is the blueprint for the future. This is how buildings become alive. Cloudvue is trusted around the globe to simplify surveillance, streamline access controls, and provide powerful intelligence that helps improve security operations and organizational efficiency. You can control your entire security system from one interface. You can easily control cameras and grant access to doors. Intelligent alerts can be set with cloud-connected hardware and centrally managed software. You can add unlimited cameras and access control points. Map views, custom floor plans, and powerful dashboards help keep data organized and scale. -
17
Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
-
18
ePortPass
ePortation
ePortPass™, a cloud-based mobile application that allows security personnel to manage and restrict access to any facility in an intuitive, common-sense way, is called ePortPass. We offer access control solutions that go beyond the gate. Surveillance, alert sensors and security rounds are just a few of the many duties that security personnel have to perform. ePortPass™, which provides real-time visibility, allows you to manage security operations efficiently. In today's highly secure environment, the resulting COP (common operational picture) of activity and incidents at a single location or across multiple locations is critical. We offer live-camera feeds, geolocation mapping services, real-time messaging, and real-time communication from both security personnel on ground and sensor technology. This allows for quality information to be dispersed within a security group. -
19
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
20
Proptia
Proptia
FreeProptia offers comprehensive visitor management, access controls, license plate recognition and intercom solutions. A seamless experience as powerful as flexible. Proptia has the tools to help you manage a commercial building, a community, or even a large complex. You can do it with ease, accuracy, speed, and efficiency. Our Security Smart Intercom Units and Software provide the ultimate solution for modern security requirements in guard-gated community, residential high-rise buildings, and business buildings. Our intercom units are state-of-the art and offer seamless communication, access control and video and audio capabilities. They also have digital keys and passes, as well as remote management features. Our cutting-edge vehicle identification system and license plate recognition software offer advanced monitoring capabilities at both entry and exit points. -
21
Alloy Access
SmartRent
Alloy Access Cloud-based access control system for multi-tenant buildings and commercial buildings. Our cloud-based access control system allows for hands-free access to meet the current needs of communities while also allowing for future expansion. Alloy Access is a frictionless platform which can be used to protect communities and assets. It integrates with property management software and customer relation platforms to keep all data in one place. Customers can create a truly connected community by combining Alloy Access and our other smart home products. Flexible Options with AlloyAccess. Alloy Access allows you to choose different access methods at each entry point. You can customize how residents, employees, and visitors access all perimeter doors and amenity spaces, garages, and units. Bluetooth locks & mobile passes. Key fobs – use existing cards or key fobs. Smart locks and custom pin -
22
MRI MIRRA
MRI Software
Data integration solution that connects access control systems at both the building and the occupier levels. One card for building access control and one card for occupier access control. Instant activations, updates, deactivations and activation. To protect people and organizations, we must meet stringent privacy, security and compliance standards. To eliminate manual, time-consuming and error-prone processes, sync data between the building and the occupier systems. Multiple access control systems are preventing you from a smooth welcome and infallible security within your building. Without integrated building and occupier systems, credential management can be time-consuming and error-prone. Occupants will appreciate the convenience of having one credential and one card that can be synchronized across both systems. It's worth more if your building is easy to manage. MRI MIRRA streamlines credentials management and improves security. Data integration between disparate access control system allows for instant card activations, modifications and de-activations. -
23
Qumulex QxControl
Qumulex QxControl
A cloud-based physical security solution that is unified and scalable for those who are serious about security. QxControl is an innovative video management and access software. QxControl allows commercial customers to manage their physical security anywhere, on any browser-enabled device, with a cybersecure and intuitive UI. Modern, intuitive user-interface that can be operated from any device with a web browser, including desktops, mobiles, and tablets, anywhere there is an internet connection. Integrators can choose from the best cameras, door controls, and analytics available on the market. They can also use existing infrastructure to upgrade legacy systems. Cybersecure gateways connected to the cloud and external cloud storage give you total control over your storage. No more old-fashioned legacy systems with their manual software updates, bulky client applications, cumbersome NVRs and insecure port forwarding. -
24
Intelli-M Access
3xLOGIC
1 RatingCost-effective security solutions that are simple to set up, manage, and scale to meet changing needs. Infinias access control systems have been trusted for many years. 3xLOGIC offers cost-effective security solutions that can be used in cloud or server-based environments. They are simple to set up, manage, and scale to your changing needs. Access control is easy and affordable with this cloud-based solution, regardless of your technical skills or business size. Users can view, monitor, and report on all events and alarms. They can also define multiple security roles and grant access privileges to individual users. The powerful rules engine allows customers to create the functionality they require such as Lock-down and First-in, Last-out, n–man rule, and many other features. -
25
Google Cloud Identity
Google
$6 per user per monthUnified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud. -
26
AppSmart Identity
AppSmart
Securely connect everyone with everything. Digital transformation requires that you connect with people, apps, and devices. AppSmart Identity provides identity management and access management for all users across all applications and interconnected systems. This allows you to securely access and manage all cloud migration services as well as all other services from one place. Users don't want multiple passwords. Single sign-on allows users to access business systems from one account. This ensures seamless user experience for all cloud migration services and cloud managed service. Users can ensure that all identities that have access to business systems are verified with strong authentication and multi-factor authentication. Policy-based MFA stops unauthorized users from accessing corporate information with passwords alone. All your cloud managed services, eg. Manage all your users, groups, and devices. -
27
Ory
Ory
$29 per monthThe missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple. -
28
OpenOTP Security Suite
RCDevs
€1.85/User/ M OpenOTP Security Suite is an enterprise-class security solution for two-factor authentication with U2F/OTP, federation and identity management (IAM). The solution combines mobile technologies with proven security standards to provide the best alternative for business and non-business users who need cost-effective solutions that support their users' mobility. It enables integration of a variety of third-party products and systems with MFA, even if they only support LDAP as an authentication backend. Try OpenOTP Security Suite if you are interested in: USER MOBILITY | PRIVACY | VPN AND WIFI SECURITY | SSO AND ADFS | FINE-GRAINED AUTHENTICATION POLICIES | ALL-IN-ONE SECURITY SOLUTIONS | EUROPEAN DATA STORAGE OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users) -
29
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
30
Kastle
Kastle
FreeAccess profiles are synced with the property and tenant directories to make management easier. App credentials for smartphones are convenient and easy to use. Smart IP cameras with AI monitor activity and send alerts if triggered. We design the system to your specifications and install it with our own technicians, to ensure that everything is done correctly and on time. Our 50-year history has taught us that we can deliver when there is no room for error. Outsourcing your security to experts can reduce risk and increase office efficiency. It can be difficult to manage access and credential administration systems. Kastle, an integrated system, is a cloud-based software with superior hardware that offers a user interface that is intuitive, robust reporting and administrative capabilities. It is easy to overlook office access control and video surveillance until an incident occurs. -
31
Visual Guard
Novalys
1.55/month/ user Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management. -
32
Leosac
Leosac
Leosac, a software company that specializes in physical access control industry, is called Leosac. We offer a modular, affordable and scalable open-source access control system and credential provisioning software. Trusted identities and physical access management that you can control for individuals and large businesses. -
33
FortiAuthenticator
Fortinet
FortiAuthenticator offers Identity Access Management (IAM) and Single Sign-On. FortiAuthenticator offers identity and access management services (IAM) to prevent breaches caused by unauthorized users accessing a network, or inappropriate access levels granted to valid users. FortiAuthenticator ensures that only the right person has access to your sensitive data and resources at the right time. FortiAuthenticator, combined with FortiToken or FIDO2 authentication, ensures that only authorized users are granted access to sensitive information. This additional layer of protection reduces the risk of data leakage and helps companies meet audit requirements related to government and business privacy regulations. -
34
OmniDefend
Softex
OmniDefend protects your employees, contractors, and vendors using universal single sign-on and strong authentication to secure business applications and processes. OmniDefend eliminates fraud by identifying and securing customer transactions online or in-person using multi-factor authentication. OmniDefend lets you quickly add authentication to a website, so that you can provide a password-free experience for your customers while securing e-commerce transactions. OmniDefend uses industry-proven standards when it comes to security. OmniDefend supports OpenId 2.0, OAuth 2.0 and SAML to ensure maximum compatibility and security when using single-sign-on applications. SCIM 2.0 enables OmniDefend to seamlessly integrate with identity management and user provisioning. -
35
OneWelcome
OneWelcome
OneWelcome Cloud Identity Platform allows you to manage all your use cases, including gig workers, B2C and B2B. You can expand this core platform with a variety of identity apps to suit your organization's needs. OneWelcome handles the European complexity of eID's and privacy laws, GDPR regulations, as well as languages, for you. Our goal is to lower the barrier for any European citizen and company who wants to connect. Your customers will have seamless, secure, and privacy-protected access. Protect and connect your business-to-business ecosystem. Manage and delegate access to suppliers, business partners, and your extended workforce. Get in touch with us to learn more about the OneWelcome Cloud Identity Platform and how it can help your business. -
36
ID Flow
Jolly Technologies
$400 per user per monthPrint photo ID cards, encode smart cards and link badges with access control systems using ID Flow ID card software. To make your card unique and unique, add logos and artwork. ID Flow ID card creator app provides all the tools you need to create ID cards that meet your needs. Add a photo to your ID badge design. You can capture photos using a webcam, digital camera or ID Flow photo ID software. You can automatically remove background from photos and crop them to fit the ID card design. Use any compatible USB biometric capture tool to capture signatures and biometrics, then save the data and print the ID card. For extra security, include fingerprint and signature images on your card design. -
37
Magic Monitor
LenelS2
All you need in one user interface. The Magic Monitor®, client offers an unparalleled user experience. It unifies access control, video surveillance and forensics, as well as live-sourced Internet feeds like weather, traffic and news. Interactive content such floor plans and maps are also available. NetBox™, OnGuard®, and OnGuard®, ecosystem products, which include access control and video management system, can both use the Magic Monitor experience. The Magic Monitor unified client gives security personnel a 360-degree view into their environment. It provides access control events, video surveillance feeds and other real-time information. Live event monitoring and one-click viewing and management of personal records is possible with NetBox and OnGuard access controls systems. This product is ideal for security operations centers, receptionists, and security desks. -
38
Nexkey
Nexkey
You don't have to worry about losing your fob or key card at home. No more searching for the right key. You can unlock any door using your Apple Watch or phone. You can instantly grant and revoke keys and schedule access for all of your doors through one platform. You can easily copy key cards and pin codes to secure your business. They will never change. Remotely allow people to enter your space. The Nexkey app will notify you when someone enters your space. You will be notified if someone enters your building after hours. Dashboards can help you streamline your business operations and allow you to see how people use your space. You can flag users who are not using the space, which will reduce turnover and eliminate security risks. Communicate with anyone who has access. Are you planning an event after hours? Or is there something wrong with the space? Nexkey allows you to let everyone know. Integrate Nexkey's access control system into the apps that you already love and use. -
39
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
40
OpenApp Smart Locks
OpenApp
Our smart locks are designed with your business in mind. Our smart locks have been able to solve unique problems in the Telecom and Logistics Industry. They can be used in many other industries as well for asset security and access control. Openapp's enterprise-grade security system is simple to use, no matter if you are a beginner or an expert in physical security. You can control, manage and share your Openapp smart locks with the Dashboard. -
41
Luckey
Sofia
Sofia Locks' PropTech access control system is Luckey. This cutting-edge technological solution radically changes the way you manage space and security. Luckey was designed with flexibility, security, and business in mind. Cloud access control for the last generation, with features for businesses. Luckey Plug&Play has been used by many companies, regardless of size or industry, as well as co-working spaces and medical centers. We can help you create a branded App that will manage your spaces. Our designers will help you to build your brand and grow your business. With our access control engine, and the RestFul API, you can create your own access control experience. Our team of developers is available to assist you in integrating access control functionality into your software. -
42
DoorFlow
NetNodes
$35 per monthCloud-based access control system for your building that integrates with your existing locks. DoorFlow can be used as a standalone system but most customers get the benefit of integration with co-working spaces management systems, sport club systems, and user directory. DoorFlow is a fully automated, set-and-forget solution that makes it stand out. Building access rights policies can be assigned to groups such as HR, Sales, or Cleaners once. Once a new employee joins your company, they automatically have the right access to the appropriate groups. This can be done either in DoorFlow or directly in systems such as Office365/Google. To implement DoorFlow and smart locks, you don't need any technical knowledge or to be a master of access control. We can help everyone, from single-door sports clubs and hotel facilities to multi-site, 100.000-person multi-site businesses, from A to Z. -
43
Freedom Access Control Software
Identiv
Identiv's IT-centric and cyber-secure Freedom Access Control software system uses encryption bridge technology at the network edge to communicate directly with geo-distributed and onsite software. Security in healthcare and education is changing. Learn how the IoT and the Industrial Internet of Things, (IIoT), cloud and mobility have an impact on security at hospitals, healthcare organisations, and campuses around the world. Freedom Access Control is built on a software-driven architecture. This allows for easy and quick changes to existing web-scale-based software without affecting the rest. The current trend to use the IoT/cloud is also supported by IT departments and IT infrastructure providers. -
44
Avigilon
Avigilon
Our video, cloud, and access control solutions seamlessly integrate with your entire video security system to give you the right information at just the right time so that you can take decisive actions. Our technology is powered by advanced AI and video analysis, so it's simple and easy to use. This allows you to focus on what really matters. Operator time is spent searching for suspicious activity. The detection rate of suspicious activities drops to less than 5% after 20 minutes. Operator time is spent verifying security events, which is something humans can do if given enough time. Operators have little time to collaborate on effective actions to prevent negative outcomes. Our video security, cloud, and access control solutions can be integrated with AI to provide you with the right information at just the right time so that you can take decisive actions. -
45
IDenticard
IDenticard
Create the perfect program for you facility and your people. Our extensive portfolio makes us your one-stop shop for everything, from robust access control and visitor management systems to branded ID cards or accessories. Create the right program for your facility. Our extensive portfolio makes us your one-stop-shop for everything, from robust access control and visitor management systems to branded ID cards or accessories. Modern panic buttons replace inefficient communication methods and empower faculty and staff to quickly get help in an emergency. To ensure maximum safety on your site, you can easily process guests. IDenticard's solutions experts will work with your to assess your site's Visitor Management requirements before helping you design the best solution for your campus. -
46
Silverfort
Silverfort
1 RatingSilverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication. -
47
CampTrac
CampTrac
CampTrac was created to help companies and organizations provide secure access to their facilities, manage visitors, and charge money for products or services using contactless smart cards, QR keys, and/or SMS keys. CampTrac allows you to manage all access control for all of your facilities through a single web-based user interface. You can also use the card readers on the walls as payment readers to charge for any products or services you wish to offer your visitors, employees, contractors, and visitors. CampTrac's built-in automatic visitor management software allows you to manage all your visitors automatically without having to interact. With the help of self-service kiosks, intelligent tools, both the user and the guest can handle tasks previously handled by administrators and receptionists. CampTrac Card is a unique encrypted, contactless smart card that staff members and guests can use to gain access to the site. -
48
AlertEnterprise
AlertEnterprise
AlertEnterprise provides a unified platform for cyber-physical security convergence by linking IT, OT, and Physical Security to prevent, detect, and mitigate risk. We help you eliminate security gaps, so that you can see all threats and vulnerabilities, and enhance your workforce's safety, data privacy, and experience. -
49
OpenAM
Open Identity Platform
You will need to provide seamless authentication for all sites and applications within your company if you have multiple sites or applications. If a user logs in to one of your sites, he doesn't need to enter his credentials for other sites. OpenAM can solve all these problems. OpenAM comes with more than 20 authentication module that you can customize your authentication process. You can also customize the sequence of authentication modules to provide multi-factor authentication or adaptive authentication. OpenAM also allows you to manage authorization. You can limit access to resources according to different authorization policies. OpenAM can extend any functionality, including authentication modules and user data sources. It also supports UI customization, allowing you to create individual pages for end-users with your branding. -
50
QuickPass Visitor Management
QuickPass
You want to reduce long lines at your gates, and speed up entry for residents and their guests. QuickPass is the most advanced visitor management software on the market. QuickPass is the best access-control solution available for high-end gated communities. QuickPass uses the most recent RFID and license plate recognition technology to streamline visitor and resident entry and eliminate the need for multiple databases. All this without compromising security. QuickBlue, also known as the app, can be integrated into any existing access control system, without the need for infrastructure upgrades or equipment. Security personnel and authorized administrative staff have instant access to accurate data, vital community information, and other important information without ever leaving their cars. QuickPass is a web-based access control system that is specifically designed to meet the needs of gated communities. Security personnel have easy access to information and can process traffic from their vehicle, driveway, or gatehouse.