Alternatives to ACI Omni-Tokens

Compare ACI Omni-Tokens alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ACI Omni-Tokens in 2026. Compare features, ratings, user reviews, pricing, and more from ACI Omni-Tokens competitors and alternatives in order to make an informed decision for your business.

  • 1
    EBizCharge

    EBizCharge

    EBizCharge

    EBizCharge is the leader in integrated B2B payments, powering payments for over 400,000 users across the United States and Canada. Payment platform that allows your business to securely accept transactions, anywhere, anytime, inside 50+ ERP, CRM, accounting, and eCommerce solutions. EBizCharge is designed to increase payment processing efficiency, eliminate double entry, reduce human error, improve security, and simplify the customer experience. EBizCharge provides online and mobile credit card processing, unlimited transaction history, customizable reports, electronic invoicing, secure encryption and tokenization, email payment links, a customer payment portal, and more. EBizCharge is PCI-compliant and uses the two methods of data encryption and data tokenization, providing you peace of mind that all data is secured. EBizCharge integrates to QuickBooks, NetSuite, SAP, Oracle, Sage, Microsoft Dynamics, Salesforce, Acumatica, Macola, Magento, WooCommerce, and many more.
    Leader badge
    Compare vs. ACI Omni-Tokens View Software
    Visit Website
  • 2
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 3
    OmniToken
    OmniToken uses the same cryptographic key management principles used for industry standards such as PCI DSS, PCI Point-to-Point Encryption (P2PE). Best practice security standards help significantly reduce your risk from card data theft. OmniToken works across your payment environment, in store or online. It's used with all other processing and value-added Worldpay services, including account updating, fraud, recurring billing and back-office tools. OmniToken is flexible and interoperable across your other third-party service providers to meet the complex needs of your enterprise.
  • 4
    FIS Tokenization
    The solution secures card payments anywhere by concealing sensitive cardholder information everywhere. FIS® Tokenization™ dynamically encrypts your card payments for ultimate security when customers pay online, with their phone or in a store. By replacing sensitive cardholder data with unique tokens that can’t be matched back to the cardholder or their account, our payment tokenization solutions can ease Payment Card Industry Data Security Standard (PCI DSS) compliance, better protect cardholders and manage your risk. Replace sensitive cardholder information with a unique token for reduced fraud risk. Enable cardholders to load card credentials to different payment apps quickly and securely. Simplify compliance by reducing the scope of systems that fall under the PCI DSS.
  • 5
    Enigma Vault

    Enigma Vault

    Enigma Vault

    Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. Enigma Vault provides the following services. Enigma Vault takes the mess out of crypto and PCI compliance. You no longer have to manage and rotate private keys nor deal with complex cryptography.
  • 6
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • 7
    ShieldConex
    Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store.
  • 8
    Visa Token Service
    Visa Token Service can help you build and maintain your digital payment experiences while protecting consumers’ sensitive information from fraud. As more consumers come to expect mobile payment solutions, Visa Token Service provides three essential tools to help you meet the demand. Visa offers standards, specifications, development tools, and turnkey mobile solutions to help partners build and deploy their own tokenized apps to cardholders. Work with us to create your own mobile payment application with the Visa Token Service SDK. Develop payment solutions that integrate directly with token management tools. Contactless mobile transactions are leading the next wave of digital payments, and Visa Token Service can make them simple and secure. With Near Field Communication (NFC) technology and Visa PayWave, secure purchases are as easy as the wave of a hand. Make convenient, on-the-go purchases with compatible iOS devices.
  • 9
    AuricVault® Tokenization

    AuricVault® Tokenization

    Auric Systems International

    The AuricVault® tokenization service secures your vitally sensitive financial and personal data by safely storing that data and replacing the data in your system with a token. Tokens are random strings of numbers and letters that have no relationship to the stored data. If someone stole all your tokens, they still would not have any of your sensitive data. Tokenization provides what is called data separation. Data separation ensures that no single entity has all the data at one time. Auric's tokenization solution provides fine-grained permissions for one or more parties to access sensitive tokenized data. Depending on your business model, using the AuricVault® tokenization service may exclude your systems and servers from PCI scope. We help businesses protect billions of dollars and millions of transactions securely, safely, and simply.
    Starting Price: $300 per year
  • 10
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 11
    Rixon

    Rixon

    Rixon

    Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.
    Starting Price: $99 per month
  • 12
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 13
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
  • 14
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 15
    PayConex

    PayConex

    Bluefin

    Bluefin’s PayConex™ gateway provides debit/credit card and ACH processing for retail, mobile, call center, Ecommerce and unattended payments in the U.S. and Canada. PayConex is backed by our suite of security solutions including PCI-validated point-to-point encryption (P2PE) for POS payments, iFrame, tokenization and hosted payment forms for Ecommerce, and ShieldConex® for securing online financial, PII and PHI data.
    Starting Price: $9.95/month
  • 16
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 17
    TokenEx

    TokenEx

    TokenEx

    Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers. TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets.
  • 18
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 19
    NDMS Merchant Account

    NDMS Merchant Account

    National Discount Merchant Services (NDMS)

    ​National Discount Merchant Services (NDMS) offers a comprehensive suite of payment processing solutions tailored for businesses across various industries. Their services encompass both in-person and online transactions, supporting credit card, debit card, and ACH payments. NDMS provides advanced features such as EMV/chip terminals, virtual terminals, mobile point-of-sale systems, and secure payment gateways. To enhance security and compliance, they offer tokenization, PCI compliance assistance, fraud prevention tools, and a secure vault for storing sensitive data. Additional services include recurring billing, chargeback management, multi-currency processing, and customizable reporting tools. NDMS caters to a wide range of industries, including retail, ecommerce, healthcare, hospitality, and high-risk sectors, ensuring flexible and scalable solutions for businesses of all sizes. ​
    Starting Price: $5.00/month
  • 20
    Swipe Gateway

    Swipe Gateway

    Swipe Gateway

    Real-time fraud scrubbing utility that helps to differentiate legitimate from fraudulent transactions. Helps ensure uninterrupted payments for customers, particularly those with recurring payments, by seamlessly updating card-on-file account information- requires customer vault and is supported on First Data North, First Data South and Payment Tech Salem. Allows merchants to use Verified by Visa and Mastercard SecureCode to verify payer’s authenticity through the gateway. PCI-compliant encrypted and tokenized customer credit card and ACH account data storage. Tokenization allows merchants to process transactions without transmitting credit card or ACH account data. Enables merchants to invoice customers via email. Customers can submit payments by following an embedded link. Invoices are generated with line detailed information and automatically convert to PDF’s that are attached and emailed to customers.
  • 21
    Adaptive

    Adaptive

    Adaptive

    Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources.
  • 22
    ALTR

    ALTR

    ALTR

    Easily and simply control your sensitive data in Snowflake today so you can get more value from it in minutes instead of months. With ALTR you can automatically discover and classify sensitive data with a checkbox on import. Add controls like data masking with a drop-down menu. Set alerts and limits on data access by user, amount, and IP address from a single screen. No on-prem hassles or added costs, no proxies to break with a platform change and no managed services disguised as SaaS. ALTR was born in the cloud and natively integrates with platforms like Snowflake. With ALTR’s complete data control, you can visualize data usage, detect anomalies and alert on them, block threats in real time, and tokenize critical data. Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 23
    Kulturra

    Kulturra

    Kulturra

    Accept credit card and ACH payments anywhere in Salesforce. Send payment requests to your customers so they can pay from their email. Drag and drop payment component or terminal, no coding necessary. Authorize, capture, void, or refund credit cards right from Salesforce. Tokenize credit card information so you don't store sensitive data. Record other types of payments such as checks, cash, wire, etc. Integrated with leading payment processors (use your existing processor or sign up for a new one directly with the processor). Fully customizable invoice templates. Options for discounts, shipping fees, taxes, credit card surcharge, or any other additional charges. Allow for down payments or multiple installments. Print or email multiple invoices at once. Automatic reminders for outstanding invoices. Works natively with Salesforce accounts, contacts, opportunities, quotes, and products. Accept payments using credit card, eCheck/ACH, check, wire transfer, cash, etc.
    Starting Price: $2,999 per year
  • 24
    Omni

    Omni

    Omni

    Omni is a platform for creating and trading custom digital assets and currencies. It is a software layer built on top of the most popular, most audited, most secure blockchain - Bitcoin. Omni transactions are Bitcoin transactions that enable next-generation features on the Bitcoin Blockchain. Our reference implementation, Omni Core is an enhanced Bitcoin core that provides all the features of Bitcoin as well as advanced Omni Layer features. With Omni it's simple to create tokens to represent custom currencies or assets and to transact these via the Bitcoin blockchain. The power and simplicity offered by Omni has helped to make it the leading Bitcoin based token protocol. Decentralized crowdfunding is easy with Omni. Crowdsale participants can send bitcoins or tokens directly to an issuer address and the Omni Layer automatically delivers the crowdfunded tokens to the sender in return - all without needing to trust a third party.
  • 25
    Preferred Payments

    Preferred Payments

    Preferred Payments

    A secure platform and API to accept payments, grow revenue and scale your business. Straight forward API documentation and dedicated developer support to integrate ECRYPT's powerful payment solutions to your software. Accept payments, manage customers and build a powerful payment stack on the ECRYPT platform. Integrate secure and simple card-present payment solutions with ECRYPT’s Cloud EMV devices. Secure hosted payment fields for software applications and websites. Reduces PCI scope and offers more customization. A secure solution to manage customers, store payment methods and keep sensitive financial data safe. Secure and store sensitive payment data with ECRYPT’s tokenization and P2PE solutions. A payment platform built for enterprises, developers and innovators. ECRYPT gives businesses the tools to manage, scale and monetize payments services. Card-present transactions are now easier and faster than ever before.
  • 26
    ShareSecret

    ShareSecret

    ShareSecret

    Auto-redaction of sensitive data, encrypted data sharing and self-destructing private chats. Share passwords, private keys, API tokens and more with peace of mind. Everything stored in our short-term vault is stored encrypted at-rest using AES-256 encryption. We don’t store keys anywhere in our system. When secrets expire, they’re evicted from our system completely, leaving no traces anywhere in our vault, logs, your email, chat, or anywhere else. ShareSecret expires data after 24 hours, or a maximum of 7 days, completely evicting the data from our system. All data is encrypted at rest with industry-standard 256-bit AES encryption in our short-term vault. Share passwords, API tokens, private keys, credit cards, and any other sensitive data. All encrypted at rest. Securely share sensitive documents like PDFs, zip files, powerpoint / keynote presentations, and anything else. Our Slack bot makes it easy to share sensitive data in Slack without compromising security.
  • 27
    Worldnet

    Worldnet

    Payjack

    Omni-channel payments as a service. Our technology, Your brand. We offer payments as a value added service to your software with our white-label solution. Worldnet's platform is a highly scalable, secure, and certified payment technology platform, which can be branded for use by other payment platforms and large enterprise merchants. Our technology is used by some of the biggest names in the industry. The emerging Intelligent Retail sector requires more than a traditional POS solution. In addition, it needs eCommerce tools for customer registration and transaction tokenization support; plus mPOS tools for in-App payment support. Our Omni-Channel solution provides you with a solution for all of these paths.
  • 28
    NETePay Hosted

    NETePay Hosted

    Datacap Systems

    NETePay Hosted is a comprehensive payments platform that consolidates payments and tokens across brick-and-mortar, eCommerce, mobile and unattended environments, all managed via Datacap’s portal. Datacap supports virtually every payment processor in North America. Dozens of plug-and-play EMV-ready devices from leading OEM providers. Datacap’s omnichannel payments solutions combine in-store, unattended, mobile, and eCommerce to create a unified, consistent payment experience across all channels. Purchase, configure and maintain Datacap products 24/7 via Datacap's product portal. Real-time reporting is available 24/7 for Datacap partners and their merchants. Remotely configure settings, pad flows, key injection, and more. Processor-proprietary Encryption methods ensure that card data is encrypted at the sale and decrypted at the NETePay Hosted without additional hops. Reduce card-present fraud with contact and contactless EMV (chip card) certifications for fixed, and mobile devices.
  • 29
    Maverick Payments

    Maverick Payments

    Maverick Payments

    We’re a full-service payment processor with innovative technology designed with your growth in mind. With Maverick, monetize payments by reselling our white-labeled payments stack. Quickly go to market with minimal to no cost or risk, all while building your brand while leveraging our infrastructure. Easily process card-not-present transactions with our straightforward API, hosted forms, and additional tools. Simply key in transactions to the virtual terminal and utilize the additional features that make the user experience more seamless, such as tokenization, electronic invoicing, automated email receipts, integration to third-party shopping carts, and CRM systems. Card-not-present payments have never been easier with Maverick’s intuitive gateway. Easy-to-use terminals and point-of-sale tools customized for the size of your business. Gather key insights and better understand your customers, and competitors, and run a more informed business.
  • 30
    EASY PAY

    EASY PAY

    Easy Pay Solutions

    Get up and running quickly with our payment widgets, or view our API code to create a seamless payment experience within your software solution. Experienced payment professionals with a proven history of helping businesses navigate & prosper in the payment processing industry for two decades. Manage payment transactions in one place without the need to connect to a gateway and pay third party fees. Swipe or key in transactions directly through your virtual, online payment terminal. Provide paid access to remote health care services for telehealth-based patients. Send electronic invoices for immediate payments via our SMS, mobile text payment platform. Save tokenized, credit card information for future payments using our PCI-compliant technology. Avoid touching vulnerable payment information by embedding our secure payment widgets. Set up recurring payments using tokenized card data for periodic or subscription-based billing.
  • 31
    b4 TransForm
    Set card entry failure limits, link expiration, and minimum lead time. Learn & apply best practices that help you win chargebacks. Eliminate paper auth forms, and manual entry & stop taking credit card details over email, fax, or phone. Create installment plans, send late payment reminders, control user access, and run detailed reports for reconciliation. Fraud prevention tools help reduce chargebacks. Send your customers a link to our secure online payment portal. Customers fill out an online authorization form indicating their charges. Verified in real-time & processed by your payment gateway, CC info is encrypted and securely stored. Integrates with all major payment gateways for fast and direct transactions. The card is tokenized & securely stored. Never see or manually key sensitive data. We pride ourselves on security. Our products are fully PCI-Compliant. All data is encrypted and securely stored.
  • 32
    Net1

    Net1

    ECI Solutions

    Simplify payment processing with a solution that directly integrates into your ECI software. Net1 integrated payment processing saves you time, reduces costly data entry errors, provides enhanced security, and increases your business cash flow. Improve the way you manage payments. Our integrated card and automatic clearing house (ACH) solutions provide quick, efficient payment processing, usually at a significantly lower cost than other payment providers. Increase productivity and accuracy with an integrated solution that automates payments and billing, removing liabilities associated with data entry errors and disjointed systems. Eliminate repetitive tasks and manual mistakes. Secure sensitive customer and business information with a solution that encrypts and protects data in the Net1 payments vault. Tokenized payments keep sensitive data safe and out of unwanted hands and minimize PCI compliance costs and effort.
  • 33
    Fidesmo Pay
    Trusted by the world’s leading payment schemes – Visa and Mastercard – Fidesmo provides oen of the most simple, scalable and secure platforms for tokenized payment. We enable a secure and convenient way to tokenize payment cards onto a variety of devices containing a secure element. We collaborate with more than 800 issuing banks offering their customers Fidesmo Pay to easily and securely tokenize their payment cards to any device. Fidesmo Pay is a pure software platform that allows device manufacturers to select which secure element they prefer based on their device features. Fidesmo Pay is future-proof and is constantly onboarding more and more banks and payment schemes allowing for device manufacturers to focus on business and commercial development rather than integrations. The Fidesmo Pay platform also for full white label solutions and customisations.
  • 34
    Payment Fusion Control Center
    Payment Fusion was listed as a validated point-to-point encryption solution (vP2PE) in September 2017. Its unique network architecture and custom software for Ingenico payment terminals supports secure transaction processing using vP2PE. As a PCI P2PE solution, Payment Fusion offers state-of-the-art security for point-of-care payment card transactions, supported by best practices that guard the integrity of key management and eliminate opportunities for device tampering in the supply chain. Payment Fusion’s Control Center helps large end-users easily maintain the ongoing requirements of vP2PE by tracking and managing all the payment terminals deployed in their organization. AxiaMed’s secure payment vault provides our partners and clients with a secure database that stores payment data on file, commonly known as “card-on-file.”
  • 35
    Randtronics DPM easyData
    DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format.
  • 36
    Ubiq

    Ubiq

    Ubiq Security

    Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.
    Starting Price: $0.001 per encrypt
  • 37
    Omni

    Omni

    Omni

    Access all of Web3 in one easy to use wallet. Omni supports more blockchains so you get more tokens, more yields, more NFTs, and more fun. Omni is the Web 3 super app that allows you to do anything you want to do in Web 3 all in one place. Forget using a different wallet for every chain. Omni supports more than 25 blockchains with no setup required. Got a Ledger and don’t want to move your tokens off it? Simply sync your Ledger with Omni and seamlessly access and manage all of your tokens and NFTs on your phone while your keys always remain on your Ledger. There has never been a better way to manage your crypto.
  • 38
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 39
    MerchantE

    MerchantE

    MerchantE

    We satisfy the full range of in-person and online payment processing needs for your business, facilitating one-time and recurring payments for all Visa, Mastercard, American Express, and Discover payment methods including credit, debit, prepaid, and ACH. Advanced security supported by proprietary tokenization services, protecting your customers' sensitive payment data during transaction processing and when stored for future use. Accepting and processing credit card, debit card and ACH payments has never been easier, and getting you paid has never been quicker. More options for how and when you pay people. From pay-on-demand to reimbursements—you set the pace. Grow faster with new tools to maximize your cash flow. Be prepared for unexpected expenses or launch your new ventures. The software you trust and the most advanced capabilities altogether.
  • 40
    OpenText Data Privacy & Protection Foundation
    OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
  • 41
    OmniWallet

    OmniWallet

    OmniWallet

    Omniwallet is a new type of web wallet which aims to combine security, usability and multi-currency support. Private keys are never sent to the server except in an encrypted form Everything is open source from the ground up! You can deploy the Omniwallet on your own server and host your own instance, or use one of the service providers that will host it for you - your money, your choice. No software to download or install, no blockchain to synchronize and verify - it just works, lightning fast. Carefully planned layout, with common operations emphasized. Beautiful and intuitive User Interface. Special care is taken to smooth out operational edge cases to prevent mistakes and ensure a painless experience for the user. Omniwallet comes with a pre-built support for Bitcoin, Omni Token and Test Omni Token. Native support for Smart Property and User-Generated Currencies.
  • 42
    Fidel

    Fidel

    Fidel

    One API to link payment cards to your applications. Two products to build unbeatable customer experiences. Link direct to customer cards through our secure SDKs and easily surface real-time transaction data from Visa©, Mastercard© and Amex©. Eliminate friction for customers and build flexible, personalized experiences. Receive granular customer transaction data in real-time. Use location and merchant data to pinpoint exactly where and when customers are spending. Protect privacy with PCI compliant SDKs that securely tokenize card data.
  • 43
    Powertech Encryption for IBM i
    Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
  • 44
    Alchemy Pay

    Alchemy Pay

    Alchemy Pay

    Cryptocurrency to card and mobile wallets with just one payment system. No matter your customers’ payment method or currency, we will settle with you in your preferred local currency to minimize your FX friction. Beyond competitive transaction fees, our payment protocol rewards you and your customers with ACH tokens for every crypto transaction. ACH Tokens are used to pay any fees related to the Alchemy Pay Platform. Integrated 2nd layer payment protocols; partners only need to integrate with Alchemy. Zero-confirmation :BTC/ETH/LTC and other longer block time crypto can be expedited to seconds with anti-fraud technology. Through the adaptation layer of the blockchain network, the ALCHEMY payment consensus protocol can be deployed seamlessly on various public networks. Integrate Lightning Network, Raiden Network, and State Channel Network into an integrated network.
  • 45
    Autonio

    Autonio

    Autonio

    NIO is an Ethereum ERC 20 token that is used to access the Autonio ecosystem/trading terminal. NIO is used as a utility token to access the Autonio Trading Terminal. As more users join the platform, the circulating supply of NIO will drop over time. However, we cannot guarantee any value increase of NIO tokens, it is up to the market to decide what price it is willing to pay for NIO tokens. You will need to input your exchange API into the Autonio Trading Terminal in order for it to trade in your exchange. All API permissions EXCEPT “withdraw” should be enabled in your exchange account settings in order for the terminal to work. The Autonio application is currently available in English and a Chinese version will be completed soon.
    Starting Price: $20 one-time payment
  • 46
    ARISE from Aurora Payments
    The ARISE payments platform offers an all-in-one gateway enabling businesses to accept payments, protect revenue, and control finances via a flexible commerce engine. It supports credit cards, debit cards, ACH, checks, and more across online, in-store, invoice, and mobile channels, all unlocked by one integration. It features embedded payments for software vendors, branded invoicing with one-click links, subscriptions/recurring payments, surcharge or cash-discount models to offset fees, and a single dashboard delivering real-time reporting, network tokenization, fraud tools, and 99.99% uptime via a cloud-native active-active architecture. Aurora positions ARISE as a “payment platform built for Main Street commerce,” with same-day virtual-terminal activation, plug-and-play terminal setup, and U.S.-based support. It emphasizes modular expansion (no re-platforming required) for merchants, SaaS platforms, ISVs, and software, enabling quick onboarding.
  • 47
    LCX STO Launchpad
    Compliant purchasing platform for token offerings for security tokens, payment tokens or utility tokens. Accelerate go-to-market, prospectus and legal documents with LCX’s legal tool kit. Management of Security Tokens on the Blockchain including smart wallet whitelisting and real-time cap-table aka token holder register. Smart contract development, audit and token generation. Combining LCX’s proprietary technology platform with a legal tool kit via our external partners to speed up STO process and reduce costs. Tokenization essentially refers to the digitization of the legal rights or ownership rights to an asset on a blockchain network. If we follow similar logic, a tokenized security would be the process of establishing financial rights in a security through the issuance of tokens on a blockchain platform.
    Starting Price: 0.15% Fee
  • 48
    Visa CLI
    Visa CLI is a command-line interface developed by Visa Crypto Labs that enables AI agents and automated workflows to execute secure card payments directly from the terminal, introducing a new model of “command line commerce.” It allows developers to integrate payments into coding environments without relying on traditional API keys or pre-funded accounts, reducing setup complexity and minimizing security risks associated with credential management. Instead of navigating graphical interfaces, users and AI agents interact through text-based commands, which are inherently more compatible with machine-driven processes and automation. Visa CLI supports programmatic payments, allowing agents to pay for services such as APIs, datasets, or digital resources on demand as part of real-time workflows. It uses secure authentication methods like tokenization and certificate-based access, helping ensure that transactions remain protected while simplifying implementation.
  • 49
    NAKA

    NAKA

    NAKA

    NAKA presents a next-generation payment ecosystem built around a fully blockchain-based, EMV-compatible payment scheme and card, allowing businesses and individuals to issue and use cards that integrate self-custody wallets, tokenized assets, and seamless fiat conversion at the point of payment. The NAKA Card supports both custodial and non-custodial models, enabling users to hold and transfer assets, spend tokenized holdings such as real estate, precious metals, fine art, or cryptocurrencies, and only convert to fiat at the moment of transaction, helping protect against inflation. The accompanying NAKA Pay app offers a unified interface for card management, asset linkage, top-ups, freezing, and tracking transactions, all without requiring a traditional bank account. For issuers, NAKA enables rapid card issuance and full customization of card features, branding, loyalty integration, and underlying rules with no additional banking licence required.
  • 50
    Samsung Pay
    If you have a business, accept Samsung Pay. It works on most of the terminals you already use, accept payments easily and conveniently. Up the screen of your Smartphone and select a card. Place your fingerprint on the Smartphone reader. Bring your Smartphone 1 cm from the terminal to make the payment. Las transacciones son validadas con tu huella digital, PIN o escáner de iris para asegurar que sólo tú puedas confirmar el pago. Samsung Pay uses secure data transmission technology. In each transaction carried out, the system creates a security token that guarantees that the information cannot be used again. Constantly monitor your Smartphone and protect you with its high security platform against any cyber attack. Samsung Pay is accepted practically everywhere that accept bank cards. It works in more places than any other mobile payment service. Know some establishments where you can use it.