Alternatives to AlertEnterprise

Compare AlertEnterprise alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AlertEnterprise in 2026. Compare features, ratings, user reviews, pricing, and more from AlertEnterprise competitors and alternatives in order to make an informed decision for your business.

  • 1
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 2
    Autonix

    Autonix

    Autonix

    Autonix is a Trackable Dynamic QR Code Generator frontend with a visitor management solution backend. We enable businesses to collect and view visit activity with a powerful dashboard reporting on important KPIs. Our visitor check-in options via QR Code, Kiosk, or unique web URL lets visitors have choice when checking in. Gain insights and earn trust with an easy-to-use visitor check-in system. All plans include unlimited trackers and scans. We support all kinds of types of QR Codes, styles, and export as PNG/SVG/EPS for further. Data is available in dashboard, with your Google Analytics. Visitors exportable as well. Zapier Integration and API available. Teams, SSO and more available for enterprise customers. Custom solutions and functionality capable, just request a demo and lets talk about your unique use case!
    Leader badge
    Starting Price: Free Account Available
  • 3
    Rhombus

    Rhombus

    Rhombus

    Protecting your organization has never been easier. With Rhombus, you can make your spaces safer and smarter with a platform that’s intuitive to use for your entire team. Rhombus delivers an enterprise physical security platform that combines smart security cameras, IoT sensors, and integrations with 3rd party solutions all under one unified console. Rhombus' cloud-based platform eliminates bulky hardware, is secure by default, and has built-in AI analytics so you can see, manage, and respond to threats in real-time. Built by cybersecurity experts, Rhombus simplifies security operations and is trusted by school districts, commercial real estate, healthcare facilities, Fortune 500 companies, and more.
  • 4
    Verkada

    Verkada

    Verkada

    Verkada brings the ease of use that consumer security solutions provide, to the levels of scale and protection that businesses and organizations require. By building high-end hardware on an intuitive, cloud-based software platform, modern enterprises are able to run safer, smarter buildings across all of their locations. PoE cameras are online and fully operational in minutes. No NVRs or DVRs. Store up to 365 days of footage locally. Stay ahead of emerging threats with ongoing feature and security updates. Cameras send encrypted thumbnails to the cloud and stream only when actively viewed. Store clips in the cloud indefinitely and easily share archived events with key stakeholders. Bring footage across sites into one dashboard and grant secure access to your entire team. Cameras act as sensors, leveraging the latest in AI and edge computing to uncover actionable insights in real-time. Overcome common challenges associated with physical security management.
  • 5
    HID SAFE

    HID SAFE

    HID Global

    Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations.
  • 6
    Tosi

    Tosi

    Tosi

    The Tosi Platform is a purpose-built Cyber-Physical Systems platform designed specifically to secure, connect, and control Operational Technology (OT) networks and critical infrastructure. Unlike traditional IT tools adapted for OT, Tosi was engineered from the ground up for industrial environments: it supports native industrial protocols, tolerates extreme temperatures, and requires no complicated configuration. Deployment is rapid, sites can be up and running in under five minutes with a “plug-and-go” setup, allowing organizations to connect distributed infrastructure quickly and securely without specialized IT expertise. It implements a zero-trust security model with enterprise-grade protections: end-to-end 256-bit AES encryption, hardware-based authentication (with RSA keys), no open inbound ports, and ISO/IEC 27001:2022 certification. With Tosi, you get unified, centralized management through a single interface (TosiControl), enabling visual network topology views.
  • 7
    TEKWave Visitor Management
    Get real-time data, insights, and peace of mind from one central platform through TEKWave's automated cloud solutions for community, logistics, and commercial gate access management. What happens when advanced data and technology meets innovative human thinkers? TEKWave. Our solutions provide digital control and visibility for everything at your physical gates. Enhance security, improve visitor efficiency, and eliminate friction from your visitor experience. Employees, vendors, and guests come and go all day, every day. High traffic can easily create friction in your on-site experience, as well as security vulnerabilities you simply cannot risk. TEKWave’s Commercial Visitor Management system delivers visitor scheduling, processing, tracking, and verification with ease and simplicity - as well as a frictionless, safe way for employees to go to work each day. Monitor and control traffic flow in and out of your campus or facility from any internet connection.
  • 8
    XONA

    XONA

    XONA

    XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device. With integrated multi-factor authentication, user-to-asset access controls, user session analytics, and automatic video recording, XONA is the single, secure portal that connects the cyber-physical world and enables critical operations to happen from anywhere with total confidence and trust. XONA enables users to connect to critical assets and systems from anywhere securely. See how a technician quickly logs into a XONA CSG and authenticates, allowing them to connect to an HMI and address any issues remotely.
  • 9
    AhnLab CPS PLUS
    AhnLab CPS PLUS is a unified “CPS protection” platform engineered to secure cyber-physical systems, covering operational-technology endpoints and networks as well as IT systems connected to OT. It addresses how OT environments, historically isolated and stable, have increasingly become intertwined with IT networks, increasing attack surfaces and risk for industrial operations. CPS PLUS offers extensive coverage across both IT and OT domains using a platform-centric architecture wherein multiple security modules interoperate under a central management console, AhnLab ICM. It implements a systematic threat-management workflow of identify, detect, and respond, enabling continuous asset visibility, network monitoring, vulnerability assessment, and threat detection without compromising system stability. Its multi-layered defense incorporates firewall, intrusion prevention (IPS), DDoS mitigation, sandboxing, and other protective modules.
  • 10
    RightCrowd

    RightCrowd

    RightCrowd

    RightCrowd SmartAccess is an enterprise physical identity and access management (PIAM) platform designed to intelligently manage access across large organizations. It enables businesses to control employee, contractor, and visitor identities within a single integrated system. The platform offers modular solutions including visitor management, access audits, credential management, and evacuation tracking. SmartAccess integrates seamlessly with HR systems, PACS, directory services, background checks, and other enterprise technologies. Real-time monitoring, analytics, and built-in best practices help organizations maintain compliance and security. Deployment options include managed cloud hosting on Microsoft Azure or on-premises/private cloud installations. Trusted by global enterprises and Fortune 500 companies, RightCrowd supports millions of identities across thousands of sites worldwide.
  • 11
    Sasa Software GateScanner
    Sasa Software is a leading provider of Content Disarm and Reconstruction (CDR) content sanitization technology. It's Gatescanner solutions provide unparalleled protection from known and unknown content-borne threats - on all incoming routes. GateScanner solutions include - > Secure Email Gateway with CDR > Secure web-based Managed File Transfer and Vaults - with CDR > Secure web-downloading extension for Chromium-based browsers (Chrome/Edge and others) with CDR > Secure import from portable media (USB, CD, DVD) with CDR > CDR delivered via API and ICAP Our CDR solutions are protecting hundreds of sensitive installations in government, critical infrastructure, healthcare, financial and legal services, oil, gas and energy companies, pharmaceuticals and security agencies. Sasa Software is a member of the IC3 Israeli Cyber Companies Consortium and a Gartner Cool Vendor for cyber-physical systems for the year 2020.
  • 12
    Perygee

    Perygee

    Perygee

    Imagine every important detail about your assets from location to lifecycle status to vulnerabilities is at your fingertips, in one place. It’s normalized and ready for you to take action. That’s your future with Perygee. The Perygraph is the data engine that powers the Perygee platform. Unlike other security solutions, the Perygraph is 100% customizable and it combines private and open data to enrich your asset inventory. 78% of organizations use more than 50 cybersecurity products. And still many rely on spreadsheets to keep track of non-security information like OT owner and device location. With Perygee’s import tool, you can bring together and normalize all your device, security, and organizational data in just a few clicks. You don’t have to sacrifice convenience for security. Protecting cyber-physical devices requires an understanding of the people and processes that manage their day-to-day operations.
  • 13
    Spintly

    Spintly

    Spintly

    Truly wireless, cloud-based door access control system for a seamless, hassle-free, and contactless user experience. A modern access management system that combines the power of the cloud, smartphone, and wireless technology. Spintly is transforming the physical security industry with its fully wireless, cloud-based access control system. It removes the complexity of the process of deploying an access control solution in a building. With absolutely no wiring the installers can save more than 60% of their time and cost and be more productive. Our vision is to make the built world smarter and simpler by providing a frictionless access control experience to users and to make the building smarter with our fully wireless mesh platform for smart building devices. Spintly offers solutions to various industry segments with its fully wireless access control hardware along with cloud-based software.
  • 14
    Constella Intelligence

    Constella Intelligence

    Constella Intelligence

    Continuously monitor thousands of data sources across the public, deep & dark web to gain the insights you need to detect and act on emerging cyber-physical threats before damage occurs. And accelerate your investigations by delving deeper into risks threatening your organization. Analyze monikers, enrich information with other datasets, and quickly unmask malicious actors to solve cybercrimes faster. Defending your digital assets against targeted attacks, Constella is powered by a unique combination of unparalleled breadth of data, technology and human expertise from world-class data scientists. Data to link real identity information to obfuscated identities & malicious activity to inform your products and safeguard your customers. Profile threat actors faster with advanced monitoring analysis, automated early warning and intelligence alerts.
  • 15
    SMS by KeyTech

    SMS by KeyTech

    Keytech Security Solutions

    A multi-solution platform developed based on intense expert research and the existing security difficulties organizations face on a daily basis. The solution is designed to eradicate outdated procedures, inefficient data retrieval, ongoing inconsistency in procedures, the vulnerabilities of data information, disorganization through cluttered paper documents and the time-consuming. Is a Combined effort of security procedures and managerial standards? Using cutting-edge technology to enhance the standard of security procedures. Create strong communication between administrators and field users. Bridge the gap within communities. Developed based on logic and intelligent algorithm. At SMS by KeyTech Ltd, we believe that security and facility management should be a straightforward and uncomplicated process. It should deliver efficiency, accountability, and consistency. SMS by KeyTech promises to not only revolutionize current security and facility procedures.
  • 16
    Veristream

    Veristream

    Veristream

    Enhance safety and security in all your facilities with Veristream visitor management solutions. A proven industry leader, Veristream combines the latest technology and their extensive security experience to help organizations secure every facility while enhancing the check in experience for guests at the same time. Veristream's top-rated solutions include BreezN visitor management solution for enterprises organizations and iVisitor for multi-tenant.
  • 17
    MetaDefender OT Access
    MetaDefender OT Access enables secure, just-in-time remote access to Operational Technology (OT) and Cyber-Physical Systems (CPS), allowing both internal employees and external vendors to connect safely over mutually authenticated, outbound-only TLS tunnels without exposing OT networks to inbound traffic risks. It supports various industrial and IT protocols (e.g., Ethernet/IP, MODBUS, OPC UA, S7Comm, Telnet, SSH, RDP, HTTPS), enabling compatibility across a wide range of legacy and modern OT infrastructure. Depending on deployment mode, the solution can be cloud-managed (with remote configuration via AWS-hosted services) or on-premises (with a local Management Console), making it suitable for both internet-connected and air-gapped environments. It leverages components such as an Admin UI, Windows client (or service-level client), and a Management Console (in on-site deployments) to manage connections and enforce security policies.
  • 18
    Genetec

    Genetec

    Genetec

    Genetec is a global leader in physical security and unified surveillance solutions, helping organizations protect people, property, and data. Its platform combines video management, access control, ALPR (automatic license plate recognition), and communications into one intelligent ecosystem. Built for flexibility and scalability, Genetec empowers security teams to monitor, analyze, and respond to threats in real time. The company’s Security Center SaaS delivers cloud-based, cyber-hardened protection that adapts to evolving security challenges. With over 25 years of innovation and more than 42,500 customers worldwide, Genetec continues to lead the industry in secure, unified security management. Trusted by enterprises, governments, and critical infrastructure providers, Genetec enables organizations to protect the everyday.
  • 19
    Toshiba Factory IoT Platform
    Toshiba's Meister Factory is a comprehensive manufacturing IoT solution designed to integrate, visualize, and utilize manufacturing process information managed across multiple systems, aiming to optimize entire value chains in manufacturing. Leveraging Toshiba's expertise in manufacturing, the platform provides smart manufacturing dashboards that enhance yield rates and production efficiency by utilizing IoT and big data at manufacturing sites. It employs Cyber-Physical Systems (CPS) with digital twins, utilizing data models that cover manufacturing value chains to reproduce past and current event data in detail within digital spaces. This facilitates better management of overall manufacturing processes by establishing links between factories through the Manufacturing Data Platform Connector, achieving manufacturing traceability, and visualizing production status across multiple factories.
  • 20
    DarkStax

    DarkStax

    DarkStax

    DarkStax™ platform provides flexible and easily extensible features to create digital twins of the military, industrial, or enterprise systems. It supports the integration of customer-defined, operational data-derived, and virtualization-based models into a scalable system-of-systems representative environment in cloud/on-premises computational infrastructure. DarkStax™ enables cyber-physical system modeling and cyber wargame emulation over digital twins. DarkStax™ enables the creation or incorporation of existing digital models to track the system throughout its life cycle. DarkStax™ platform provides a cost-effective environment to incorporate and assess emerging technologies and business models. DarkStax engine accelerates processes and improves data quality, analytics insights, and AI/ML models. It supports automated, process-oriented methodology used by analytic and data teams. It includes visualization web services that provide a wide array of visualization options.
  • 21
    Worksphere

    Worksphere

    Worksphere

    Easily book desks, know who's in office, welcome visitors and improve team collaboration from one intuitive platform. Use your office data to realize the full potential of flexible work. Your team can see who's in office and choose where they sit to improve productivity and collaboration. They can book the right space in seconds from their mobile device or laptop. Welcome visitors to your offices, keep track of safety and security needs, and save your team time - all while creating a great first impression. Empower your team to work safely together. Employees can provide proof of vaccination or do a daily symptom screening. Responses are private, secure and HIPAA compliant. We know how hard it can be to implement new technologies. You can set up Worksphere in under an hour. Employees love our intuitive interface and mobile app.
    Starting Price: $149 per month
  • 22
    CSA360

    CSA360

    CSA360

    Security Management: includes many aspects. Security management starts with a plan developed using standards and the knowledge of all aspects of your business, these attributes combined will drive the security plan. The security plan includes policies, procedures, and the actions of performing the plan. All well laid plans require the review of their results. Every environment is continually changing, the key is to keep up with the changing environment we live in. Most organizations are up and running smoothly, we are here to ensure you have the tools to work with. GSS is here to assist in any capacity, so you can easily run your security department. DailyLog Gordon Security Solutions provides services and software solutions assisting you to make the right decisions for your organization. Every organization is different. Allow GSS to work with you in designing the best plan and implement the right solutions to make you aware and effective, so you can reduce vulnerabilities and losses.
  • 23
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows us to verify identity and grant access to a location. Facial data will be stored on our servers only for the purpose of identification. Your personal data, including your face picture, will not be shared with third parties.
  • 24
    OCTOPUS PSIM

    OCTOPUS PSIM

    Octopus Systems

    Today’s security operations centers (SOCs) must handle vast data from physical, cyber, IoT, and Intelligence systems in real time. The Octopus Data Fusion Platform unifies all security, intelligence, and operational sources into one AI-powered Command & Control environment. Leveraging advanced data fusion and Large Language Model (LLM) AI based analytics, Octopus automates event correlation, prioritizes critical incidents, and provides an automated unified Common Operational Picture across all assets and data. As a fully Cloud-based platform, Octopus delivers a complete next-generation automated AI based Command and Control solution for security, safety, risk, and resiliency, with proven results in large customers from Government, Banking, Corporate, Utilities, Municipal, Law Enforcement, Defense, and others.
  • 25
    Protecsys 2 Suite
    With Protecsys 2 Suite, Horoquartz delivers a global, connected electronic safety and security solution. By effectively deterring intrusions, theft, vandalism, aggression and minor infractions, you ensure the continuity of your operations and create a more positive climate in the company. Protecsys 2 Suite is a software suite that integrates access control, intrusion detection, video surveillance, visitor management and centralized supervision of your system. We also offer a complete range of pedestrian and vehicle barriers, professional IP cameras, and image storage solutions, along with all the related electronic equipment. Horoquartz has over 30 years of proven expertise in the field of electronic security. More than 1,200 customers now use our solution, in all sectors of activity. Manage and secure access to your premises. Prevent threats, identify perpetrators and facilitate alarm verification.
  • 26
    EcoStruxure Security Expert
    Protect your building occupants and assets with EcoStruxure Security Expert. An integrated, role-based physical access control and intrusion detection solution that unifies your building’s security infrastructure and building management systems. With the need to protect more people and data it is easy to understand why physical access control plays a vital role in the overall security of a building. EcoStruxure Security Expert integrates role-based physical access control and intrusion detection to unify the building security infrastructure and building management systems into an easy to manage, single platform that enables faster, more efficient, and potentially life-saving decision making. Unifies access control and building management solutions reducing complexity and the time spent managing multiple systems. Turns large quantities of information into secure, customizable analysis. Backward compatibility ensures the latest offer will support prior version features and integrations.
  • 27
    COREDINATE

    COREDINATE

    Coredinate

    COREDINATE is a fully integrated, professional and innovative Workforce Management solution for security companies that want to optimize their operational processes. Make your work more efficient, more cost-effective and more controlled. Based in sunny Uffenheim, near Würzburg in Germany COREDINATE has grown year on year now serving over 650 companies Internationally. Using smartphone technology. It enables customers to digitally track officer tasks, tours and activities as they conduct patrols. All results visible through web based portal giving real time vision over operations and operatives. Built for security by security our typical clients are within the physical security man guarding arena but as we expand the type customer becomes broader as the system fits with Facility management Companies, Healthcare Field workers , cleaning and maintenance companies. All in one Guard Control Software solution Proof Of Service Proof of Presence, Increased Accountability
    Starting Price: $26.00/month
  • 28
    Trackforce

    Trackforce

    Trackforce

    Our mission is to ensure the delivery of reliable security services, improve operational efficiency and optimally manage human capital. Our solutions are built to increase workforce accountability, improve operational efficiency and enable better communication between all stakeholders. With the help of Trackforce, over 30,000 organizations from around the globe have optimized their security officer operations. Our extensive knowledge of the security industry coupled with our skilled software development team enables us to build a system capable of addressing all our clients’ physical security needs and concerns. For nearly 30 years, Trackforce has provided fully integrated security and human capital solutions to its partners and customers. Our applications require minimal computer skills, ensuring quick user adoption. Thanks to input from tens of thousands of clients, we are continuously improving our products and services.
  • 29
    OpenApp Smart Locks
    Our smart locks are designed keeping your business in mind. Solving unique challenges faced by the Telecom and Logistics Industry, have opened new channels for our smart locks in a multitude of other industries for both access control and asset security. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Openapp's enterprise-grade system is easy to use, whether you're new to physical security or an expert. The Dashboard allows you to control, manage & share your Openapp smart locks. Enjoy the privilege of instantly giving and revoking access to locks from the Dashboard, combined with the ability to view and download ‘Access logs’ anytime, from anywhere. Fleet moving critical assets? When there's a theft, the smart locks will give admins a tracking link for real-time tracking.
  • 30
    Echosec

    Echosec

    Flashpoint

    Anchored by Echosec, Flashpoint’s geospatial Open-Source Intelligence (OSINT) product, the Physical Security Intelligence (PSI) solution offers an extensive range of global open-source data fused with geospatial enrichments, integrated AI, and expert finished intelligence, so practitioners can understand critical events, protect executives, and safeguard physical assets. Accelerate investigations and enhance situational awareness with open-source data, intelligence expertise, analytical tools, and AI enrichments. Effortlessly filter out social media noise to extract meaningful information quickly, monitor the topics and locations that matter to your organization, and alert the right team members when relevant posts are detected.
  • 31
    Kastle

    Kastle

    Kastle

    Access profiles sync with property and tenant directories for ease of management. Effortless convenience of smartphone mobile app credentials. AI-enabled smart IP cameras monitor activity and send alerts when triggered. We design to meet your specifications and install the system with our own technicians to make sure it's done right and delivered on time. We've seen everything across our 50 years of history to know that we can deliver when you don't have room for error. Reduce risk and increase efficiency across offices by outsourcing your security to the experts. Credential and access administration systems can be difficult and cumbersome to manage. Kastle is an integrated system with superior hardware and easily accessible cloud-based software that provides an intuitive user interface, robust reporting, and administrative capabilities. Office access control or video surveillance can be an afterthought until your systems fail to prevent an incident.
  • 32
    Dataminr

    Dataminr

    Dataminr

    Dataminr’s AI platform detects high-impact events and potential risks as they unfold, sending real-time alerts to your global teams. Know critical information first, respond with confidence, and manage crises more effectively across your enterprise. Dataminr Pulse gives you the earliest indications of high-impact events—plus rich visual context and tools that help you collaborate and act faster—so you can better protect your people, your brand and your physical and digital assets. Dataminr Pulse streamlines your team’s collaboration, response protocols and critical information flows—enabling real-time command and control as physical and cyber risks emerge and high-impact events unfold.
  • 33
    FacilityOS

    FacilityOS

    FacilityOS

    FacilityOS is a comprehensive, modular cloud platform that streamlines and automates facility, asset, and visitor management operations, bringing together visitor check-in, contractor compliance, evacuation/emergency management, physical access credentials, logistics/package tracking, and more under one roof. It is used by thousands of sites worldwide and manages over 52 million tracked visitors, 16 million contractors processed, 1.5 million evacuees, and over 1 billion packages. Each module, VisitorOS for check-ins, ContractorOS for vendor/contractor compliance, EmergencyOS for evacuation & alerts, SecurityOS for temporary access credentials, and Logistics/Asset modules, can operate independently or integrate seamlessly for enterprise-wide visibility. FacilityOS emphasizes regulatory compliance, audit-readiness, and security in high-risk or complex environments (manufacturing, healthcare, higher ed, government).
    Starting Price: $199 per month
  • 34
    Vaccema

    Vaccema

    GET Group Holdings

    Due to the Pandemic COVID-19, GET Group developed a flexible solution aiming to help governments verify the authenticity of tests and vaccination certificates to effectively attain seamless verification, and data security. GET realized that in order for governments to ensure an effective and secure proof of vaccination, there are other areas related to the vaccination management process itself that needs to be addressed as well. Accordingly, GET established a complete solution based on the latest international guidelines and best practices that define the technological and operational methods handling the vaccination process, vaccines supply chain management, management of trusted health centers, prioritization of citizens based on who recommendations and finally the issuance of vaccination certificates in various forms (physical/digital).
  • 35
    Coconut Software

    Coconut Software

    Coconut Software Corporation

    Our cloud-based, enterprise-level appointment scheduling and visitor management platform combine your on-location and digital channels, providing self-service booking and curbside pickup, online and physical queuing, wait time tracking, callback requests and virtual meeting support as well as contact center integration. Providing this customized experience, either in person or digitally, enhances client engagement, speeds up revenue-generating opportunities, balances workforce staffing, and delivers key insights that organizations cannot capture through their calendars or CRMs alone. In fact, we are the frictionless layer on top of those technology pieces and allow for meaningful connections through a simpler engagement process. Our intuitively-built user interface will delight your clients and your staff with its simplicity and flexibility. We understand the finance industry’s security and compliance requirements—and have built Coconut to surpass them.
  • 36
    PassagePoint
    Improve your company image and streamline the visitor registration process with PassagePoint, an on-premise security platform designed to enhance the safety and security of your facility. PassagePoint’s extensive customization capabilities and add-ons are specifically designed for school districts, global corporations, multi-tenant buildings and hospitals with unique security requirements worldwide. PassagePoint’s enhanced feature set can be added as required; web pre-registration, Single Sign-On and our Control Center module to centrally manage multiple locations with unique policies and settings. This scalable architecture enables integration with external systems, such as physical access control, HL7 interface, Denied Party Screening Services and the National Sex Offender Registry to provide an additional layer of security required for enterprise-level systems. STOPware offers a wide range of hardware components supported to speed up the visitor check-in process.
  • 37
    TetherX

    TetherX

    Tether

    TetherX is PaaS (Platform as a Service) that brings all physical security devices into a single visual dashboard. TetherX revolutionizes your physical security operations, adds peace of mind that everything is working, and saves significant time responding to alarm events and finding critical evidence. TetherX ingests information from all IP and serial devices and allows sifting through hundreds of terabytes of information in seconds. Know what is happening on-site, be notified of potential issues & receive visual reports for compliance and audit tracking. Administer systems remotely, easily share information with full GDPR compliance & reduce engineer visits by 40% or more. tether is the CRM for the security industry, moving from Excel spreadsheets to real-time information in the cloud. Add a Tetherbox to each site to "Tether" the site securely to the cloud. The Tetherbox will connect to new, existing as well as most legacy physical security equipment.
  • 38
    Athena Security

    Athena Security

    Athena Security Concealed Weapons Detection System

    Athena Security is a physical security technology company that specializes in AI-powered threat detection and entryway management. Founded in 2018 and headquartered in Austin, Texas, Jacksonville Florida and SF. The company focuses on replacing outdated security hardware with AI based software and hardware solutions designed for high-traffic environments like hospitals, schools, and casinos. Key Product Ecosystem: Weapons Detection System (Apollo 500): A high-throughput walk-through detector that uses AI to distinguish between metal weapons (firearms, knives) and everyday metal objects like keys or phones, allowing people to pass through without emptying their pockets. AI-Assisted X-Ray: Software and or hardware that integrates with baggage scanners to automatically highlight threats and stop the conveyor belt if a weapon or prohibited item is detected. Hospital Visitor Management System (VMS) for healthcare facilities that automates visitor check-in with EPIC
  • 39
    HelloID

    HelloID

    Tools4ever

    HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs. HelloID Modules: Provisioning - Automate the entire user lifecycle process by connecting your HR or SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. Service Automation - Transform your legacy help desk into a fully automated “Self-Service” platform Access Management - Zero-Trust security with 1-click Single Sign-On (SSO) and Multifactor Authentication (MFA)
    Starting Price: $2.36/month/user
  • 40
    Ontic

    Ontic

    Ontic

    Ontic’s Protective Intelligence Platform makes businesses safer by serving intelligence to physical security teams so they can take informed action to protect people, property and reputation. By aggregating data sources and tools, your team can get more relevant intelligence—faster—for early threat detection. Ontic is the first protective intelligence software company to digitally transform how Fortune 500 and emerging enterprises proactively address physical threat management to protect employees, customers and assets. Ontic’s SaaS-based platform collects and connects threat indicators to provide a comprehensive view of potential threats while surfacing critical knowledge so companies can assess and action more to maintain business continuity and reduce financial impact. Ontic also provides strategic consulting, multidimensional services, education and thought leadership for safety and security professionals at major corporations via its Center for Protective Intelligence.
  • 41
    Qumulex QxControl

    Qumulex QxControl

    Qumulex QxControl

    A unified, cloud-based, physical security solution for those serious about security. QxControl is a modern take on video management and access control software. With QxControl, commercial customers can manage their physical security from anywhere, on any device that runs a browser, using a cybersecure, intuitive UI. Modern, intuitive user interface that can be operated on desktop, mobile, or any device with a browser, from anywhere you have an internet connection. Open platform architecture allows Integrators to choose the best cameras, door controllers, and analytics on the market and enables the use of existing infrastructure when upgrading legacy systems. Total control of storage via cloud-connected cybersecure gateways as well as external cloud storage. No more legacy system headaches of manual software updates, thick client applications to download, cumbersome NVRs, and insecure port-forwarding.
  • 42
    Leosac

    Leosac

    Leosac

    Leosac is a software company specialized into physical access control industry. We provide a scalable, modular and affordable open-source access control and credential provisioning solution. For individuals and from small to large companies, for trusted identities and physical access management that you are in control.
  • 43
    Genetec Synergis
    Genetec is a global leader in unified physical security solutions, helping organizations protect people, assets, and data through innovative technology. Its integrated platform combines video management, access control, license plate recognition, and decision management in one intelligent ecosystem. By connecting multiple security and operational systems, Genetec gives organizations a real-time, holistic view of their environments. The company’s commitment to cybersecurity, privacy, and trust ensures that all solutions are built with a “security by design” philosophy. Through products like Security Center and Omnicast, Genetec empowers enterprises to respond to incidents faster and make smarter, data-driven decisions. With a presence in over 150 countries, Genetec continues to shape the future of safe, connected, and resilient operations worldwide.
  • 44
    YourSixOS

    YourSixOS

    YourSix

    Say goodbye to outdated, on-premise security systems. YourSixOS offers a modern approach to security with our serverless, direct-to-cloud solution. No more cumbersome hardware, no more outdated software – just secure, simple, and flexible security at your fingertips. For operational intelligence and physical security you can trust, the answer is YourSixOS. Our cloud native platform provides unparalleled scalability, uncompromising data security, and unprecedented visibility into your business. Eliminate the blind spots in your business and leverage your visual intelligence to ensure there’s nothing about your business you can’t see. Visual intelligence is more than just protecting against liabilities like threats to physical property or loss of goods. It’s the power to improve customer experiences, increase productivity, and drive operational improvements. It’s a live feed of every risk attacking your profitability.
  • 45
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. PortalGuard’s MFA stands out above others as it is the only solution to offer Identity-Bound Biometrics that offer the highest levels of integrity, security, accuracy, availability and are easier to use than traditional authentication methods.
  • 46
    EyeOTmonitor

    EyeOTmonitor

    EyeOTmonitor

    EyeOTmonitor is a unified monitoring and observability platform for physical security, video surveillance, and WISP environments. It provides real-time visibility into camera health, video quality, and the wired and wireless infrastructure that supports these systems. The ImageAssure module continuously monitors camera image health, automatically detecting issues such as blurred, blocked, moved, or degraded images. EyeOTmonitor integrates with leading Video Management Systems (VMSs), allowing operators to correlate camera status, video quality, and system events in a single platform. EyeOTmonitor also includes full Network Management System (NMS) capabilities for monitoring switches, routers, radios, access points, and wireless links commonly used in physical security and WISP deployments. Topology-aware and geospatial maps provide intuitive visualization of devices, links, and sites, enabling faster troubleshooting and end-to-end visibility from camera to network.
    Starting Price: Per Device Annual Price
  • 47
    Qognify

    Qognify

    Qognify

    Qognify helps organizations minimize the impact of incidents with its innovative portfolio of video management software and enterprise incident management solutions. With thousands of deployments in banks, utility companies, airports, seaports, city centers, and transportation agencies, Qognify helps agencies all over the world keep people and assets safe. Qognify places a premium on operational and physical security strategies because safety is priceless. Qognify solutions help organizations capture, analyze, and leverage big data to anticipate, manage, and mitigate security and safety risks, maintain business continuity, and streamline operations. The Qognify offerings provide valuable insights that enable enterprises and security-conscious organizations to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends.
  • 48
    Omnigo

    Omnigo

    Omnigo

    Omnigo is a leading public safety, incident and security management solution. Ideal for law enforcement, education, healthcare and other enterprise markets, Omnigo software ensures safer environments by offering robust tools to manage the entire incident lifecycle. Omnigo's key modules include detection, response, reporting, remediation, and prevention. Our solutions streamline your evidence management process so you can maintain chain of custody and manage property from intake through disposal, on virtually any device. With a team that includes former law enforcement, first responders, and other public safety professionals, we’re uniquely qualified to understand exactly what you need to protect your community.
  • 49
    Pronect

    Pronect

    Pronect

    Pronect helps security managers digitalize and optimize their operations. Our AI-enabled SaaS platform provides a comprehensive dashboard and methodology for making faster, smarter, and cost-effective decisions. Purpose-built for physical security, it enables security teams to save time through automated mapping, tracking, and reporting of security risks and performance. Our approach aligns security strategies with business objectives to ensure effectiveness, compliance, and stakeholder trust.
  • 50
    Super Display Touchscreen Security

    Super Display Touchscreen Security

    Black Creek Integrated Systems

    Black Creek's touchscreen-based Super Display® Security System is the flagship of Black Creek's security technologies. The system provides agencies with a modern solution that incorporates all aspects of correctional facility physical security into a single, fully integrated package. The Super Display® System is ideal for either new construction or retrofits and is the most cost-effective, long-term solution available. The Super Display® System leverages brilliant, large-format LCD touchscreen monitors, speedy Intel® processors and Black Creek's easy-to-use user interface software to produce fast and intuitive security management for corrections. The Black Creek Super Display® Touchscreen Security System is an open architecture construct - utilizing only high-quality, non-proprietary system components. This assures a high level of system availability and makes maintenance a breeze by using only in-house personnel.