Results for: passwords - Page 5

Suggested Categories:

Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Password Policy Enforcement Software
Password policy enforcement software ensures that users create strong, secure passwords that comply with organizational security standards. It enforces rules such as minimum length, complexity, uniqueness, and expiration periods to reduce the risk of unauthorized access. The software can integrate with identity management systems, prompting users to update weak or expired passwords automatically. Advanced features may include real-time breach detection, password reuse prevention, and audit trails for compliance reporting. By promoting stronger authentication practices, it enhances overall cybersecurity and minimizes vulnerabilities from weak or compromised passwords.
Self-Service Password Reset (SSPR) Software
Self-service password reset (SSPR) software enables users to reset or recover their passwords without needing IT support, improving efficiency and reducing downtime. These platforms typically use security questions, email verification, two-factor authentication (2FA), or biometrics to authenticate users and ensure their identity before allowing them to reset their passwords. Self-service password reset software helps organizations reduce help desk workloads, minimize security risks associated with weak or forgotten passwords, and enhance user experience by providing a quick and secure way to regain access to accounts. By implementing this software, companies can improve security, streamline operations, and provide a more seamless user experience.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
View more categories (4) for "passwords"

294 Products for "passwords" with 2 filters applied:

  • 1
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age...
    Starting Price: $2
  • 2
    JotNot Signature
    ..., and checkmark annotation types to fill out forms electronically. For added security, password protect your signed document before emailing or sharing. Additionally, add a password lock to the entire app to deter access to your JotNot Signature files by unauthorized persons. Import & share documents from Email, Dropbox, Google Docs, WebDAV or iDisk. Sign PDF documents from your iPhone or iPad, add text, date, and checkmark annotations.
  • 3
    Aura

    Aura

    Aura

    Identity theft and fraud protection for your finances, personal info, and family. Easy to understand, simple to set up, and all in one place. We’ll let you know if your online accounts, passwords, social security number, and bank accounts are at risk, and work with you to keep them safe. When it comes to fraud protection, every second matters. If we detect changes to your credit or bank accounts, we alert you up to 4X faster than our competitors. Stream, shop, and bank online privately...
    Starting Price: $10 per month
  • 4
    F-Secure TOTAL
    .... Password management and online identity protection with real-time data breach alerts. Our award-winning anti­virus protects you from more than viruses and malware. Keep your money safe while banking and shopping online with banking protection. Block web­sites that try to scam you out of your money or personal information with Browsing protection. Set healthy boundaries for your children on their personal devices. Keep them safe from harmful online content and moderate their screen time.
    Starting Price: €39.99 per year
  • 5
    Kaspersky Total Security
    ...-time antivirus works to guard you from common threats like worms & trojans to complex ones like botnets, rootkits & rogues. Advanced anti-malware neutralizes threats including spyware, adware, keyloggers, spear phishing & hard-to-detect fileless attacks. Make payments via an encrypted browser. Stop identity thieves with Anti-Phishing. Secure your passwords in a private vault.
  • 6
    ESET Secure Authentication
    ESET Secure Authentication (ESA) adds Two Factor Authentication (2FA) to Microsoft Active Directory domains or local area network, meaning a one-time password (OTP) is generated and provided along with the generally required username and password. Or a push notification is generated and has to be approved on the user's cell phone running Android OS, iOS, or Windows once the user has successfully authenticated using their general access credentials. The mobile application of ESET Secure...
  • 7
    MonoDefense

    MonoDefense

    KeepSolid

    ... on social media, forums, etc. Don’t risk becoming the target of cyber-bullying, witch-hunting, or thought-policing for your opinions. Take part in online discussions and express your point of view freely and without fear. We will protect your data, personal information, and devices from cyber criminals. AES-256 encryption will render your internet traffic, passwords, and sensitive data unreadable to third parties. Firewall capabilities will keep you away from malicious websites.
    Starting Price: $11.99 per month
  • 8
    BotDelive

    BotDelive

    BotDelive

    ... apps are already installed on millions of devices. Why not use them? BotDelive offers a quick way of 2FA. With only answering the yes/no questions your users can authorize their own accounts. Authenticate users via BotDelive instead of e-mail and password. You can require only once the password and then BotDelive will handle all requests for you. Send important push notifications via chat apps. BotDelive ID is reliable.
    Starting Price: Free
  • 9
    Keyote

    Keyote

    TeskaLabs

    ... the use of keys with biometry such as a fingerprint, Face ID, etc. So even if the phone is lost or stolen, your keys are still safe. Passwords are dead. People have to remember long passwords, and they have to change them frequently. We believe that there is a simpler way how to login: a smartphone. Contemporary mobile phones contain a powerful security chip, which in combination with a biometry authentication such as fingerprint or Face ID allows a user to login very securely and conveniently.
  • 10
    Photo Album Private Manager
    Manage your photos and videos and keep your private albums invisible. Looking for the best way to manage your photos and videos? Photo Album is the best photo management solution to manage your photos and videos with strong privacy features, and lots of functionalities to organize, create slideshows, and sync photos and videos. Customizable 4-digit to 10-digit passcode to log in to the app. Three layers of privacy with passcode, password, and invisible mode for private albums. Supports Face ID...
    Starting Price: Free
  • 11
    Nexa|Voice
    ... of quality biometric software and solutions for over twenty-five years. High-performance biometric speaker recognition for convenient and secure multifactor authentication. The Knomi mobile biometric authentication framework is a collection of biometric SDKs running on mobile devices and a server that together enable strong, multi-factor, password-free authentication from a mobile device using biometrics. Knomi offers multiple biometric modality options, including facial recognition.
  • 12
    Maryfi

    Maryfi

    Maryfi

    Other Wi-Fi-enabled devices including laptops, smartphones, music players, and gaming systems can see and join your Maryfi hotspot just like any other Wi-Fi access point and are kept safe and secure by password-protected WPA2 encryption. MaryFi works in case you are using a proxy or even vpn connection. You can connect any WI-FI enabled device to a MaryFi connection. this includes but is not limited to smartphones, Android, Mac iOS, iPad, iPod, iPhone, and Apple TV. With Maryfi, users can...
    Starting Price: Free
  • 13
    MemberLeap

    MemberLeap

    Vieth Consulting

    MemberLeap by Vieth Consulting is an easy to use proprietary association management software. MemberLeap is offered in month-to-month subscription plans and packed with a range of features for efficiently managing associations. These include member database, member billing, event registration, and an online store, among so many others.
    Starting Price: $50.00/month
  • 14
    Degoo

    Degoo

    Degoo

    Activate the top-secret feature with zero-knowledge encryption to take security to the highest level. Let our AI show you the best moments of your life. Your private Degoo feed for all your memories. Completely private and secure, only you have access to your photos. Access millions of WiFi passwords and hotspots. Buy mobile data directly in the app for Internet access everywhere. Your Degoo feed lets you remember your loved ones, family, friends, road trips, all those precious moments...
    Starting Price: $3 per month
  • 15
    GT TMS

    GT TMS

    GlobalTech

    ..., from the preparation of the load to its delivery to the final consumer. With GT TMS™ it is possible to configure the required workflow for each client. For national and international deliveries, a network of local representatives or agents is a key asset. GT TMS™ generates an intelligent management of this relationship, giving them access to the system through username and passwords.
  • 16
    VIPole

    VIPole

    VIPole

    Message editing and deleting, auto-delete messages, chat window clearing and complete history wiping. Disconnecting devices remotely, fake secret phrase, auto lock and auto logout on inactivity. Hidden and blacklist contacts, individual visibility settings for contacts, configurable contact authorization. Assign tasks to yourself and colleagues, track the progress. Store and organize passwords, securely share them with contacts. Foster collaboration by setting goals for the team and monitoring...
    Starting Price: $5.99 per month
  • 17
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to...
  • 18
    Basaas

    Basaas

    Basaas GmbH

    With Basaas you can support every colleague with a device-independent digital workplace and distribute your apps for teams or departments. Combine all your apps into a tailor made and integrated enterprise solution. Integrate your existing apps and internal solutions as well. You can easily provide access to all apps, data and information in one place and simplify remote work with a device-independent workplace. The built-in password manager simplify access to all apps.
    Starting Price: $6.50
  • 19
    Mirror

    Mirror

    Canfield Scientific

    ... for iPad® combines powerful image based patient communications with the convenience of a tablet. Access your complete Mirror database of client images and data from anywhere in the facility. Stay connected as your clients consider the possibilities of aesthetic treatments. By accessing a secure, password-protected web portal, clients can view their photographs, treatment recommendations, and progress of treatments in the privacy of their own home.
  • 20
    Alcodes

    Alcodes

    Right Scale

    ...'s business via text notes. Thus, Alcodes acts as a Promotional SMS service provider at an individual as well as a business level. Over here, you can advertise your product or services using bulk SMS marketing and reach your customers directly. Alcodes (Bulk SMS provider) serves you with the facility of One Time Password, which is inbuilt with a most secure network.
  • 21
    SecurePass

    SecurePass

    eMudhra

    SecurePass IAM provides robust security measures like credential vaulting, session monitoring, and least privilege enforcement. This reduces the risk of unauthorized access, ensuring your organization's data remains secure By automating processes like user provisioning, access certifications, and password management, SecurePass IAM simplifies access management. This leads to increased operational efficiency and productivity within your organization With its built-in analytics, reporting...
  • 22
    IT Glue

    IT Glue

    Kaseya

    ... of separation. Link related items together, so that all the information you need is at your fingertips. Secure your world with an immutable audit trail and next-generation password management engine, which is fully integrated and linked with all of your documentation.
    Starting Price: $29 per user per month
  • 23
    Cryptobox
    The secure solution for file sharing and collaboration. Cryptobox is the ANSSI Restricted Delivery collaborative work and file transfer solution that encrypts your data from end to end, available in any environment, Cloud or On Premise. Your documents are then accessible in a completely secure way from your PC, smartphone and tablet. No risk of hacking your data since it is encrypted from your terminal to storage and your password is not stored on any server. Your teams regularly exchange...
    Starting Price: $5 per user per month
  • 24
    BitBay

    BitBay

    BitBay

    ... currency. We have created your individual currency wallets. Place an order on the exchange or use instant transaction. Hidden password. Security support. Https connection encryption. BitBay operates under the rules of financial, operational and legal safety, as well as AML and KYC regulations. All transactions are processed via encrypted HTTPS connections with the use of safe TLS protocols and encryption algorithms.
  • 25
    Snappy

    Snappy

    Snappy

    ... track of your snapshots, while keeping the desktop clean. Sharing a snap is simple, secure and fast. With SnappyLink you get a unique URL to send around, visible on all devices. Aditionally, you can set a password for your shared snap and/or set a self-destruct timer on it.
  • 26
    MugenHR

    MugenHR

    MugenHR

    Being a flexible, scalable and ability to integrate with third-party software are cornerstones of any software platform. Our architecture has proven that by processing tons of data already. MugenHR provides multi-level security. Role-based access control (RBAC) prevents data integrity by allowing access to certain data to specific people through configuration. There is an encryption process for passwords as well as the database. MugenHR is designed keeping collaboration in mind. Supported...
  • 27
    MobileID.io

    MobileID.io

    ARIADNEXT

    Digital identity is defined as the identity of an entity on the web. It is the technological link between a real entity (a person, a company, an organization) and virtual entities, i.e. its digital representations. The digital identity thus allows the identification of an individual online, as well as his or her connection to services offered on the web. Gone are the lists of identifiers and passwords to remember to authenticate oneself online, from now on digital identity makes it possible...
  • 28
    CoverMe

    CoverMe

    CoverMe

    Disposable phone numbers for text messages and calls for your different businesses and social life. Messages can be set to self -destruct as soon as you want. No one can snoop your conversation. A safe vault to lock your private photos, videos, passwords, notes and documents with cloud backup. Disguise CoverMe with a news reader app. Hide everything from prying eyes. Make international calls and send texts to any phone numbers worldwide with the lowest cost. Let you send messages and make calls...
  • 29
    CryptoDefender

    CryptoDefender

    BlockSafe Technologies

    Prevents malware from spying on what you type. The keystrokes are secured between the kernel and the wallet application using military grade encryption. Now, the password you enter to logon or decrypt your secret key is safe. Prevents malware from monitoring the clipboard to spy on, copy and paste the contents of the clipboard. So the destination address to which a crypto transaction is sent to is not modified. Prevents screen-scraping malware from taking screenshots of information...
    Starting Price: $5.99 per 2 devices per month
  • 30
    swIDch

    swIDch

    swIDch

    swIDch’s OTAC technology combines elements of the three most common authentication systems, user ID/passwords, RSA hardware/ software for generating authentication codes, and tokenization. Based on the world’s first 1-way dynamic authentication technology, OTAC sets a new standard for authentication in cyber security beyond the limitations of existing authentication methods. swIDch is an authentication technology expert to help every person and every organization have secure access...