Suggested Categories:

Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Password Policy Enforcement Software
Password policy enforcement software ensures that users create strong, secure passwords that comply with organizational security standards. It enforces rules such as minimum length, complexity, uniqueness, and expiration periods to reduce the risk of unauthorized access. The software can integrate with identity management systems, prompting users to update weak or expired passwords automatically. Advanced features may include real-time breach detection, password reuse prevention, and audit trails for compliance reporting. By promoting stronger authentication practices, it enhances overall cybersecurity and minimizes vulnerabilities from weak or compromised passwords.
Self-Service Password Reset (SSPR) Software
Self-service password reset (SSPR) software enables users to reset or recover their passwords without needing IT support, improving efficiency and reducing downtime. These platforms typically use security questions, email verification, two-factor authentication (2FA), or biometrics to authenticate users and ensure their identity before allowing them to reset their passwords. Self-service password reset software helps organizations reduce help desk workloads, minimize security risks associated with weak or forgotten passwords, and enhance user experience by providing a quick and secure way to regain access to accounts. By implementing this software, companies can improve security, streamline operations, and provide a more seamless user experience.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Compliance Software
Compliance software helps organizations ensure that their operations, processes, and reporting adhere to regulatory standards and internal policies. It centralizes compliance management by tracking regulatory changes, automating audits, and managing documentation to reduce the risk of non-compliance. Many compliance tools include features for risk assessment, incident tracking, and policy enforcement, helping businesses identify and address compliance gaps proactively. By automating compliance workflows, the software saves time and minimizes human error, ensuring more consistent and reliable compliance practices. Compliance software is essential in highly regulated industries such as finance, healthcare, and manufacturing, where adherence to standards is critical to avoid penalties and maintain trust.
View more categories (5) for "passwords"

26 Products for "passwords" with 2 filters applied:

  • 1
    MIRACL

    MIRACL

    MIRACL

    World's fastest MFA with the highest login success rate above 99%. Highly secure, password-free login in just two seconds. MIRACL works on any device or browser, removing the barriers to authentication to optimise the the user experience, decrease costs, and win lost revenue. Protect your users. Simplify their journey. MIRACL Trust offers a safer, smoother authentication experience. One step. No passwords. No problem. Traditional multi-factor authentication is slow and cumbersome. MIRACL...
  • 2
    IDSync

    IDSync

    IDSync

    Active Directory To Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad “rights” for IT staff and supports user enablement/disablement for Customer’s Active Directory. The Identity Syncronizer Active Directory to Active Directory platform enables an MSP to connect its on-premise Active Directory to its customers’ Active Directories for purposes of provisioning and synchronizing user metadata and passwords for its technicians, those who...
  • 3
    ManageEngine ADAudit Plus
    ... in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 4
    FMEA Database

    FMEA Database

    Sunday Business Systems

    ... associated with this failure mode. Assign owners and due dates. Establish verification and validation criteria. Electronic signature for management approval. User login: define user passwords and privileges. Rich set of reports. Track open actions and delinquent due dates. Free runtime version of Access is available from Microsoft. Export data to Excel for further analysis. Common, convenient software platform.
    Starting Price: $135.00/one-time
  • 5
    AVG BreachGuard
    Take control of your online privacy by protecting your personal info against data breaches and keeping it from falling into the wrong hands. Monitor the dark web non-stop for your leaked personal info and passwords. Scan your passwords to see if your personal info is at risk and get advice on how to make them stronger. Opt out from companies who try to collect and use your personal info as you browse the web. Automatically send requests to remove your personal info from data broker databases...
    Starting Price: $42.99 per year
  • 6
    SimpleumSafe
    Nowadays it is not enough "only" to encrypt your data to be protected. If you want to view, organize, or edit the encrypted files, they also must be protected. It is important not to leave any trace on the system, and even if a Trojan looks over your shoulder, it can not copy all your files to the Internet. SimpleumSafe goes a different way than most other encryption programs. After authorization with a password, the files are not provided in the file system. Otherwise they would be completely...
    Starting Price: $37.99 one-time payment
  • 7
    MD OfficeMail

    MD OfficeMail

    MD Office Mail

    Secure & Convenient HIPAA Compliant Email. HIPAA Compliant Email Hosting, Email Encryption Services, and HIPAA Compliant Fax service with no hassles. Most convenient, easy-to-use HIPAA Compliant Email Service. End-to-End Encryption – Security is strictly enforced with no compromise (unless opted by user the other way). Messages between MDOM users are plain but secure. Decryption with password not required. Intelligent Automation, Legal Archival, Customization, Forced expiration of sent...
    Starting Price: $1.89 per mailbox per month
  • 8
    FortressID

    FortressID

    Fortress Identity

    Fortress Identity provides a unified, cost effective platform that enables you to verify IDs from 195 countries and continuously KYC (know your customer) from beginning to end. The platform combines onboarding validation, compliance and due diligence, with biometric multifactor authentication that eliminates passwords and enhances the entire user experience. Validate IDs (drivers licenses, passports, National ID cards) from over 195 countries, over 7600 document types. Connect to multiple...
  • 9
    Havoc Shield

    Havoc Shield

    Havoc Shield

    For one invoice, you immediately have access to a suite of cybersecurity tools to cover training, scanning and attestation steps, all in one dashboard. Why pay for one cybersecurity tool or try to understand which you need, when we’ve brought them all together for you including vulnerability scanning, password management, penetration testing, phishing training, policy management, asset inventory and more. Havoc Shield quickly removes the fear and risk of a lacking cybersecurity program...
    Starting Price: $7 per month
  • 10
    Telivy

    Telivy

    Telivy

    ... corporate assets on-premises and cloud. Enforce policies around user authentication, validation & privileges, and address issues regarding privilege creep. Test resilience to email phishing and application password detection attempts to gain access to restricted areas and exfiltrate confidential data.
  • 11
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers...
    Starting Price: $595.00 / year
  • 12
    cidaas

    cidaas

    WidasConcepts

    ... and systems. We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 13
    Alcea RiskMgr

    Alcea RiskMgr

    Alcea Tracking Solutions

    .... Customize the look of your system & collect information exactly the way you need it. Your information is stored in a secure, password protected environment. Access to information can be restricted or managed based on group security settings – administrators can manage who sees what information. Once an item is logged into the system, everyone in the team knows who is doing what and when a resolution can be expected. No need for a meeting and no duplication of effort.
    Starting Price: $20 per month
  • 14
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    ... a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 15
    DSRAZOR for Windows

    DSRAZOR for Windows

    Visual Click Software

    .../Import/Update users, groups and computers including bulk management. Effectively manage Active Directory - no scripting required! Delete/Move unused users, groups and computers. Reset passwords in bulk. Perform mass object imports from a CSV file. Modify trustee permissions for desired Folders. Document and manage Office 365 accounts. Allow non-admins to perform Active Directory management functions. Delegate the small stuff, focus on the big stuff.
    Starting Price: $500/year
  • 16
    Imprivata

    Imprivata

    Imprivata

    Imprivata: the digital identity company. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. At Imprivata, our understanding of unique and complex healthcare workflows and IT systems has made us the world leader in trusted digital identity management for health delivery organizations. Imprivata offers enterprise access, multifactor authentication,...
  • 17
    Tectia

    Tectia

    SSH Communications Security

    ... that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 18
    LeaksID
    ... is responsible for it. You could never guess who leaked your personal documents or data, when sharing them with someone, especially if they are your closest friends or relatives. Even if you've set enough user permissions or use password-protected PDFs, someone could simply take a photo of your friend's screen while passing by. With LeaksID, you continue to work as before, while taking more control of the document workflow and being able to identify the leak source in minutes with high accuracy.
  • 19
    AtOne

    AtOne

    Flynn Group

    ... with maximum efficiency. AtOne®'s 'Employee Impact Zone' enables Management to quickly understand the level of impact an employee is having on the business. Fully integrated with Microsoft Azure Active Directory and Outlook Calendar, AtOne®'s secure single sign-on solution provides seamless access without the need to remember multiple passwords. Our developers here at AtOne People & Compliance Software understand the importance of a smooth and seamless user experience.
    Starting Price: $30000 per year
  • 20
    Sophos Cloud Optix
    ... recommendations to reduce spend, and identify indicators of compromise. Automate compliance assessments, save weeks of effort mapping Control IDs from overarching compliance tools to Cloud Optix, and produce audit-ready reports instantly. Seamlessly integrate security and compliance checks at any stage of the development pipeline to detect misconfigurations and embedded secrets, passwords, and keys.
  • 21
    Acceptto eGuardian
    Acceptto monitors user behavior, transactions, and application activity to create an enriched user profile within each application landscape and subsequently verify if access attempts are legitimate or a threat. No passwords or tokens are required. Acceptto’s risk engine calculates whether an access attempt is legitimate or not by tracking user and device posture pre-authentication, during authentication, and post-authorization. We deliver a continuous, step-up authentication process with real...
  • 22
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest...
  • 23
    HealthSafe

    HealthSafe

    HealthSafe

    ... home safe at the end of their working shift. Cyberattacks are real and happening daily accessing your business information. HealthSafe is ISO:27001 Certified Protecting Your Data. HealthSafe replace archiac pricing models dictated by user licences and costly set-up fees. No more apps, no more changing usernames and passwords and easy access to all electronic forms complimenting any business environment.
  • 24
    CRS Certus

    CRS Certus

    CRS Certus

    Your information is securely held, communications are safely encrypted. Our fully encrypted backups occur often and regularly. Flexible and secure user password security. Fast interfaces, user experience and reporting through the latest database design and web technology. User management tools aide efficient processes. Uncluttered user interfaces, multiple browser tab access, effortless data links. Our user-friendly and easy to learn user interface means no steep learning curve. Logical data...
  • 25
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access...
  • 26
    Sealit

    Sealit

    Sealit Technologies

    .... Human error accounts for over 90 percent of cyber attacks on businesses, so you need to have a system in place to minimize the risk. Our patent-pending end-to-end encryption ensures each facet of your business is protected. Our app uses biometrics as authentication which provides you a seamless protection experience. Unlike passwords, biometrics cannot be taken away from you, there’s nothing you need to remember, and you always have it with you.
  • Previous
  • You're on page 1
  • Next