Results for: passwords - Page 10

Suggested Categories:

Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Password Policy Enforcement Software
Password policy enforcement software ensures that users create strong, secure passwords that comply with organizational security standards. It enforces rules such as minimum length, complexity, uniqueness, and expiration periods to reduce the risk of unauthorized access. The software can integrate with identity management systems, prompting users to update weak or expired passwords automatically. Advanced features may include real-time breach detection, password reuse prevention, and audit trails for compliance reporting. By promoting stronger authentication practices, it enhances overall cybersecurity and minimizes vulnerabilities from weak or compromised passwords.
Self-Service Password Reset (SSPR) Software
Self-service password reset (SSPR) software enables users to reset or recover their passwords without needing IT support, improving efficiency and reducing downtime. These platforms typically use security questions, email verification, two-factor authentication (2FA), or biometrics to authenticate users and ensure their identity before allowing them to reset their passwords. Self-service password reset software helps organizations reduce help desk workloads, minimize security risks associated with weak or forgotten passwords, and enhance user experience by providing a quick and secure way to regain access to accounts. By implementing this software, companies can improve security, streamline operations, and provide a more seamless user experience.

1232 Products for "passwords" with 1 filter applied:

  • 1
    OpenText Reflection Desktop
    ...Grant or deny access based on group or role. Apply changes quickly to align with business needs. Make post-install adjustments on the fly. Replace weak, eight-character passwords with strong, complex ones. Implement best-fit multifactor authentication methods (one-time passwords (OTP), biometric, push token, mobile authentication and more).
  • 2
    SURFconext
    Let your users log in with 1 username and password to all cloud services your institution uses. Both for services that everyone uses and for services for small specialist teams. Secure, easy and privacy friendly. Find out what SURFconext can do for you as an institution, for your users and for service providers. SURFconext is open source and in full development. We offer information in various forms, such as webinars, blogs, and a Wiki.
  • 3
    Photoview

    Photoview

    Photoview

    ...Let it be using a file server like Samba or FTP, or even files from a Nextcloud instance. Multiple users can be configured, each with their own directory of photos and videos. Each user is configured with a username and password, to keep their media private. Albums and individual photos or videos can easily be shared by generating a public or password-protected link. When photos are analyzed for EXIF metadata, this information is displayed next to the photo.
  • 4
    XYGATE Identity Connector
    Managing strong passwords and credentials is often a challenge. Ensuring they are stored properly, changed regularly, meet complexity and compliance requirements, and are auditable can be overwhelming to implement and manage. Current solutions for requesting and managing user access are outdated and inefficient. Processes are manual, complex, and don’t map to the core business initiatives driving change within the enterprise.
  • 5
    Maccy

    Maccy

    Maccy

    ...You can open and search your entire clipboard history in just a fraction of a second. Nothing should distract you from what you're focused on. Maccy respects your privacy. If your password manager removes a copied password from the clipboard, so will Maccy. Everything is stored on your computer. Maccy is built using native macOS UI. It is minimalistic. It looks and feels exactly as you'd expect. Don't get distracted by a sophisticated design. Maccy is an open source application using the MIT license. It is and will always be free. ...
  • 6
    Photo Album Private Manager
    ...Photo Album is the best photo management solution to manage your photos and videos with strong privacy features, and lots of functionalities to organize, create slideshows, and sync photos and videos. Customizable 4-digit to 10-digit passcode to log in to the app. Three layers of privacy with passcode, password, and invisible mode for private albums. Supports Face ID and Touch ID to log in to the app. Intruder break-in report with photo, date, and time. Report all who tried to break into the app. App access report with photo, date, and time. Report of all who logged into the app. PIN and password reset option with a unique secret key. ...
    Starting Price: Free
  • 7
    Cryptainer Enterprise

    Cryptainer Enterprise

    Cypherix Software

    ...This way Cryptainer Enterprise installs with the same license key can open the vault. Other Cryptainer installs will not be able to access your data even with the password. Administrative module provides single point control and monitoring of distributed vaults. A must have for every business.
    Starting Price: $139.90
  • 8
    Mobile Miner

    Mobile Miner

    Mobile Miner

    ...Mobile Miner makes the process easy by allowing you to mine cryptocurrency on all of your devices including your desktop. The cryptocurrency that you mine will be deposited directly into a wallet that you own and control the password too. Remember to keep your wallet password safe, as it is the key to accessing your cryptocurrency mining rewards and where the mining pool will distribute your contributions. Using your household devices, Mobile Miner can help you mine cryptocurrency. The processing power from your device is used to perform calculations necessary to keep cryptocurrency decentralized. ...
    Starting Price: Free
  • 9
    Adolix Email Backup
    ...Adolix Email Backup built-in scheduler allows users to select what email client to backup and for each of them what components to save. Everything is saved to a single archive that can be protected by a password. Because it's very common to use a remote server to keep important data, Adolix Email Backup can back up your email information to a FTP server. All you need to do is to configure it by entering your username and password.
    Starting Price: $24.95 one-time payment
  • 10
    SysTools USB Blocker Software
    ...This software is able to disable and enable all USB ports from any system. USB Port Locker software free download on any version of Windows operating system. Option to recover lost user password using the email address. Need to set a new password for USB ports blocking & unblocking. Need to re-login into the user machine to block USB ports. USB Lock tool serves a very important function of blocking USB ports that restricts unwanted users from using USB devices on them like; pen drives, flash drives, USB drives, etc. Also, no data extract can be carried out from the machine in your absence. ...
    Starting Price: $29 per month
  • 11
    Supaboost

    Supaboost

    Supaboost

    ...Built on Next.js, Supabase, and Lemon Squeezy, it offers a robust foundation for creating scalable and secure applications. Supaboost provides built-in authentication with support for email/password, OAuth providers like Google and GitHub, and password reset functionality. It incorporates server-side rendering using the package, enhancing performance and security by reducing client-side data exposure. The platform utilizes useHooks to minimize the number of fetches required from Supabase, improving performance and code readability. ...
    Starting Price: €150 one-time payment
  • 12
    Website-Blocker

    Website-Blocker

    Website-Blocker

    Website-Blocker is a Chrome-based browser extension designed to help parents protect their children from harmful online content by restricting access to selected websites. It offers password-based browsing control, requiring a password to access blocked sites or the entire browser. The extension also features timer-based browsing, allowing parents to set daily limits on website usage. Recurring schedules can be configured for automated website access windows, promoting disciplined browsing habits. With cloud-based settings, parents can sync restrictions across multiple devices for consistent control. ...
    Starting Price: $5/month
  • 13
    SBS Training Database

    SBS Training Database

    Sunday Business Systems

    ...Certification Requirements. Re-Certification Requirements. Document revisions trigger training requirements. Email Reports directly to affected employees. User login: define user passwords and privileges. Install on your local server or leverage our Cloud QMS solution.
    Starting Price: $295 one-time payment
  • 14
    Sqwarkr

    Sqwarkr

    Sqwarkr

    ...Drafts allow you to get everything ready and then post when it's time. Access is granted through the platform so if someone leaves the company, just disable their account without changing any social passwords. We encourage you to make a profile for each user. No passwords need to be shared.
  • 15
    Themis

    Themis

    Cossack Labs

    ...Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 16
    WALLIX Bastion
    ...WALLIX Bastion delivers leading session management, secrets management, and access management features to secure IT and OT environments, enable Zero Trust and Just-In-Time policies, and to protect internal and external access to sensitive data, servers, and networks in industries ranging from healthcare to finance to industry and manufacturing. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion is available both on-premise and in cloud environments for complete flexibility, scalability, and the lowest market total cost of ownership. WALLIX Bastion PAM natively integrates with a full suite of security solutions
  • 17
    Transmit Security

    Transmit Security

    Transmit Security

    The Future of Authentication Is Passwordless. Agile. Instant. Versatile. Eliminate passwords to deliver powerful identity experiences that delight you and all your users. Wherever, whenever. Strong and seamless customer authentication from any device or channel. Use the mobile as the authenticator. Powered by a network of trust to identify each and every user. This is instant technology and installation that gives the ultimate experience and impact.
  • 18
    Hyperping

    Hyperping

    Hyperping

    ...Instantly alert your team and communicate incidents with the integrations you love. Publish updates about incidents or maintenances and send notifications to your users. Set a password to share an internal status page with your teammates and collaborators. Arrange your monitors, status pages and teammates into specific projects. Change the method, parameters or headers of your HTTP monitors. Setup internal status pages and protect them with a password.
    Starting Price: $79 per month
  • 19
    Lightfolio

    Lightfolio

    Lightfolio

    ...Stand out from the crowd and impress your clients with your unique designs. A proofing platform you and your clients will love. View, select and communicate all online. Enable watermarks, downloads, favorites and password protection. Deliver photos to your clients using online downloads. Control file size and restrict access with a personalized password--all at the click of a button. Organize your client photo galleries into a central repository. This gives your clients an easy way to find all of your published galleries. Customize your directory by choosing from several themes and use the SEO settings to improve your search engine rankings. ...
    Starting Price: $5 per month
  • 20
    Dropvault

    Dropvault

    Apptimi

    ...Encryption can be difficult to use and you worry about losing or sharing the key. DropVault takes care of these problems with a great, easy-to-use app that just requires a team member or customer to enter their password. We then retrieve the key and decrypt your documents and messages. We also give you the option to add ever better security, add in trusted (or blocked) locations, enable two factor authentication on any account, require strong passwords and much more. It's sharing with security that makes sense.
    Starting Price: $10 per month
  • 21
    SafeConsole

    SafeConsole

    DataLocker

    ...Keep the productivity benefits of USB storage devices – without the risks of malware, data leaks and breaches. Available as an on-premises software or as a DataLocker hosted cloud service with worldwide locations. Enforce policies such as password rules, file-type restrictions or geographic boundaries. Reset passwords, switch devices into read-only mode, and even remotely wipe them in case of loss or theft. Monitor all your encrypted drives, including their location anywhere in the world. Integrate with Active Directory to track users, assigned devices and connected computers with ease. ...
    Starting Price: $28 per device per year
  • 22
    Authy

    Authy

    Twilio

    Enable 2FA for your favorite sites. Go beyond the password and protect yourself from hackers and account takeovers. Simple to setup, secure cloud backup, multi device support. Defeat cyber criminals & avoid account takeovers with stronger security, for free! Watch the video below to learn more about why you should enable 2FA for your accounts. Relying on just usernames and passwords to secure your online accounts is no longer considered safe.
  • 23
    AppSmart Identity
    ...AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. ...
  • 24
    Coresender

    Coresender

    Coresender

    We get your emails delivered in seconds. Your customers never have to wait for the emails they are expecting or need immediately, like password resets, order confirmations etc. We do all the hard work to place your emails straight in your recipient’s inbox, so you can focus on delighting even more customers and growing your business. Transactional emails, such as password resets, email confirmation links, order receipts must be delivered immediately. We ensure that they are always our top priority. ...
  • 25
    Knox

    Knox

    Pinterest

    Knox is a secret management service. Knox is a service for storing and rotation of secrets, keys, and passwords used by other services. Pinterest has a plethora of keys or secrets doing things like signing cookies, encrypting data, protecting our network via TLS, accessing our AWS machines, communicating with our third parties, and many more. If these keys become compromised, rotating (or changing our keys) used to be a difficult process generally involving a deploy and likely a code change. ...
  • 26
    NoPass

    NoPass

    NoPass

    NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. ...
    Starting Price: $2
  • 27
    Nexsign

    Nexsign

    SAMSUNG SDS

    Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. ...
  • 28
    Zillet

    Zillet

    Zillet

    ...We cannot recover your funds or freeze your account if you visit a phishing site or lose your private key. When you open an account with a bank or exchange, they create an account for you in their system. The bank keeps track of your personal information, account passwords, balances, transactions and ultimately your money. The bank charge fees to manage your account and provide services, like refunding transactions when your card gets stolen. The bank allows you to write a check or charge your debit card to send money, go online to check your balance, reset your password, - and get a new debit card if you lose it. ...
  • 29
    bit.io

    bit.io

    bit.io

    ...If the repo is public, you can query the data in a snap. Here’s a few examples of the various ways to use data in bit.io. Secure by default, Stop accidentally leaving your database open to the internet with a default password, or no password at all. With bit.io, your data is secure in motion (with TLS/SSL) and at rest (encrypted on the disk). Revoke access with the click of a button rather than an arcane SQL statement. Check out our sample repo! feel free to play around and create your own repo using our data.
  • 30
    VoodooPad

    VoodooPad

    VoodooPad

    VoodooPad is a place to write down your notes and thoughts. Ideas, images, lists, passwords, your mom's apple pie recipe. Include anything you need to keep track of and organize, and VoodooPad will grow with you without getting in the way. Drag and drop folders, PDFs, applications, or URLs into VoodooPad, and they will link up just like on the web. And with powerful search, nothing will be lost or out of reach. Organize your shopping, travel, and home repair by importing coupons, important receipts, & travel documents into VoodooPad. ...
    Starting Price: $24.99 one-time payment