41 Integrations with Datacard Secura

View a list of Datacard Secura integrations and software that integrates with Datacard Secura below. Compare the best Datacard Secura integrations as well as features, ratings, user reviews, and pricing of software that integrates with Datacard Secura. Here are the current Datacard Secura integrations in 2026:

  • 1
    Microsoft 365

    Microsoft 365

    Microsoft

    Microsoft 365 for Individuals is a complete productivity suite that combines powerful applications, secure cloud storage, and AI-driven tools to help users achieve more in their daily lives. It integrates popular apps like Word, Excel, PowerPoint, Outlook, OneNote, and OneDrive, all enhanced with Copilot—Microsoft’s intelligent AI companion. The platform enables seamless collaboration, creativity, and organization across devices, including PC, Mac, iPhone, iPad, and Android. With Microsoft Designer, users can create stunning visuals, while Clipchamp adds professional-grade video editing capabilities. Built-in Microsoft Defender provides advanced security for personal data and devices. Microsoft 365 empowers individuals to imagine, create, and accomplish with greater efficiency and confidence.
    Leader badge
    Starting Price: $9.99/month
  • 2
    IBM Cloud
    IBM Cloud® capabilities enable business agility and resiliency. Explore the platform that gives you 2.5x value. Designed for industry, security and the freedom to build and run anywhere. Business workflow transformation with automation and AI. Strong technology partner ecosystem that delivers value for industry needs. Industry and business domain expertise and solutions. Automated and auditable processes. Unique capabilities for the highest levels of cloud security and monitoring. Consistent security and controls posture across all applications. Containerized capabilities for DevOps, automation, data and security. Ease of integration and a consistent application development lifecycle. Advanced technologies including IBM Watson®, analytics, IoT, and edge.
  • 3
    BULL Forms

    BULL Forms

    BULL Forms

    The easiest way to generate all of your Colorado Real Estate Commission DORA Forms online with no hassle. Get Started now to see why everyone is talking about BULL Forms. Generate all of your Colorado Real Estate DORA Forms from one simplified location without struggling with pdf programs or manually filling them out. Setup your account and start generating your Real Estate contracts in minutes. Try the demo below now and see how easy it is. Regardless where you are, you will have access to all your forms and the ability to send them to a client from the road. Use your iPad, laptop or public computer as everything is stored online. Send your forms directly from the program or save them to your local computer for printing or filing. Its fast and simple. If Colorado upgrades their DORA forms, its included. New features and functionality all included. Stop having to upgrade every year when new features are released. Its all included at one affordable subscription price.
    Starting Price: $14.99 per month
  • 4
    F5 BIG-IP Advanced WAF
    Advanced Web Application Firewall (WAF) protect your apps with behavioral analytics, proactive bot defense, and application-layer encryption of sensitive data. Use the ROI Estimator from F5 and Forrester to find out how Advanced WAF can improve your security posture and save you money. The F5 F5 BIG-IP Advanced WAF provides a powerful set of security features that will keep your Web Applications safe from attack. Many WAFs offer a basic level of protection from attack at the higher layers of the OSI stack, but the F5 Advanced WAF takes things even further and offers some serious security features like Anti Bot Mobile SDK, Credential Stuffing threat feeds, Proactive Bot Defense, and Datasafe to name a few. Protect your apps, APIs, and data against the most prevalent attacks such as zero-day vulnerabilities, app-layer DoS attacks, threat campaigns, application takeover, and bots.
  • 5
    Cloud Foundry

    Cloud Foundry

    Cloud Foundry

    Cloud Foundry makes it faster and easier to build, test, deploy and scale applications, providing a choice of clouds, developer frameworks, and application services. It is an open source project and is available through a variety of private cloud distributions and public cloud instances. Cloud Foundry has a container-based architecture that runs apps in any programming language. Deploy apps to CF using your existing tools and with zero modification to the code. Instantiate, deploy, and manage high-availability Kubernetes clusters with CF BOSH on any cloud. By decoupling applications from infrastructure, you can make individual decisions about where to host workloads – on premise, in public clouds, or in managed infrastructures – and move those workloads as necessary in minutes, with no changes to the app.
  • 6
    Ivanti Neurons for MDM
    Effectively manage and secure all endpoints, so you can protect data everywhere work happens. Dealing with increasing demand for devices, applications and platforms? Ivanti Neurons for MDM is your single solution to manage iOS, iPadOS, Android, macOS, ChromeOS and Windows. Quickly and easily onboard devices and provision them over the air with all the apps, settings and security configurations they need. Deliver a delightful, native user experience across any device and OS while improving productivity. Manage and protect any iOS, iPadOS, Android, macOS, ChromeOS, Windows and VR/XR device, from a single cloud-based solution. Know the devices your supply chain workers rely on are updated and in good operating condition, ready for the day’s business.
  • 7
    Jamf Now
    Jamf Now, formerly Bushel, is an on-demand mobile device management software solution specifically created for the iPhones, iPads, and Macs in the workplace. Fast, accessible, and affordable, this device management platform enables Apple users to set up, manage, and protect their workplace with ease. With Jamf Now, you can easily configure company email account and protect crucial information by keeping personal and company data separate, and automatically install work apps to devices.
    Starting Price: $2.00/month/user
  • 8
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 9
    VaultCore

    VaultCore

    Fornetix

    Fornetix® delivers VaultCore™, a highly scalable, next-generation, patented enterprise key management solution built to fully enable encryption to protect your data by seamlessly integrating with existing platforms, automating policy, and empowering administrators with an organized, centralized control that is easily exercised across all environments. Request a demo and experience VaultCore's: - Rapid, seamless integration with existing technology - Separation of Duties (a best practice) - Centralized Control of policy through powerful automation - Strengthened security of data at rest, in motion and in use - Drastic reduction in costs associated with data breaches — lost business, recovery time, reputation damage - Simplified compliance and regulatory enforcement - Scalable to over 100 million keys (more than enough to meet any industry's or government's needs) - Reporting abilities to meet compliance needs - Ease of use
    Starting Price: $1,118 per year
  • 10
    Autodesk Alias
    Seamlessly collaborate across different workflows and personas. Increase productivity and eliminate the need to toggle between siloed systems. Use a single source for design from sketch through production surfacing. Create and reuse templates across design and surfacing teams—sharing surfacing language. Curve and Surface replace workflows with the History Visualizer tool, enabling automatic rebuild of geometry. Collaborate across teams and manage projects with a single suite of tools for faster decision-making. Allow Alias and non-Alias modelers to collaborate with Alias Assemblies and Master Alias Assembly Concept. Review design projects with Shotgun to keep creative teams focused.
    Starting Price: $585 per month
  • 11
    SigningHub

    SigningHub

    Ascertia

    Significant cost savings can be made when paper-based processes are moved on-line. For some documents it is vital to ensure traceability, accountability and audit with clear legal weight, data integrity and individual signed approval together with easy to access workflow process evidence. SigningHub enables quick, efficient on-line approval of any business document, agreement, report, request or package. SigningHub supports basic e-Signatures, Advanced e-Signatures and EU Qualified Signatures. The best way to prove a document is unchanged from the time of signing is to use cryptographic digital signatures. Organisations need to show that their internal controls are effective and compliant with local legislation and regulations. Ascertia has offered world-class PKI products for years. SigningHub brings together all of this capability and knowledge to provide the most secure way to sign documents.
    Starting Price: $12.10/month/user
  • 12
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. Bit4id has extensive knowledge and experience in the development of software and tools for security and digital identity management based on Public Key Infrastructure (PKI). Providing solutions for managing more than 10 million digital identities, and processing more than 50 million digital signatures a year, Bit4id is a company leading in innovation for the PKI and digital identity market in Europe and Latin America.
  • 13
    A10 Thunder ADC

    A10 Thunder ADC

    A10 Networks

    High-performance advanced load balancing solution that enables your applications to be highly available, accelerated, and secure. Ensure efficient and reliable application delivery across multiple datacenters and cloud. Minimize latency and downtime, and enhance end-user experience. Increase application security with advanced SSL/TLS offload, single sign-on (SSO), DDoS protection and Web Application Firewall (WAF) capabilities. Complete full-proxy Layer 4 load balancer and Layer 7 load balancer with flexible aFleX® scripting and customizable server health checks.
  • 14
    AVX ONE

    AVX ONE

    AppViewX

    AVX ONE is the most advanced SaaS certificate lifecycle management (CLM) platform for enterprise PKI, IAM, security, DevOps, cloud, platform and application teams. With visibility, automation and control of certificates and keys, AVX ONE enables crypto-agility to rapidly respond to cryptographic changes, mitigate threats, prevent outages and prepare for Post-Quantum Cryptography. In one unified platform, AppViewX provides instant value via enterprise-wide CLM, Kubernetes and container TLS automation, scalable PKI-as-a-Service, easy Microsoft PKI modernization, secure code signing, IoT identity security, SSH management, and Post-Quantum Cryptography (PQC) readiness with AI and ML risk reduction capabilities in complex hybrid, multi-cloud and edge environments.
  • 15
    Keyfactor EJBCA
    EJBCA is an Enterprise grade PKI platform capable of issuing and managing digital certificates in the billions. One of the most used PKI platforms globally, it is used by governments and large enterprises across all sectors. PKI shouldn't be complex. Simplify it, with EJBCA® Enterprise, the only PKI platform that deploys fast, runs anywhere, and scales on-demand — so you can issue and manage thousands, even billions of certificates, no problem. Powered by the most trusted and widely used open-source PKI, EJBCA Enterprise empowers teams to establish trust with identity-first security for every human and machine, anywhere. Replace legacy CA solutions with a flexible and scalable PKI platform to issue and manage certificates for devices, workloads, and users. Embed certificate-based identity into thousands or millions of connected products with a fast and scalable PKI solution.
  • 16
    Akana API Platform

    Akana API Platform

    Akana by Perforce

    Manage the full API lifecycle, deploy across multiple clouds, support digital transformation and ensure compliance, all from one API platform. As businesses look to further connect with their partners and customers, strength in API management is increasingly part of the digital transformation. Akana provides an end-to-end, full lifecycle API management tool for designing, implementing, securing, managing, monitoring, and publishing APIs. Well-suited for large diverse enterprises and federated API partner ecosystems, Akana can be deployed natively across clouds and on-premises, enables customers to deploy securely via an integrated no-code portal, and provides detailed business analytics. Generate deep business insights from your API traffic through configurable analytic reports. Socialize and manage your communities through targeted developer portals.
  • 17
    BeyondTrust Password Safe
    Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review.
  • 18
    BlackBerry Access
    Enable access to your corporate network from personal or non-corporate managed devices, protecting enterprise data with full containerization to reduce the risk of data leakage. BlackBerry® Access provides a secure, intuitive user experience for intranet browsing. Employees get access to corporate intranets and apps on their personal or non-corporate managed devices. Simplify your bring your own computer program with desktop offerings from BlackBerry, giving you modern alternatives to traditional VPN and VDI solutions. BlackBerry® Desktop enables users to securely access corporate on-premises or cloud content and resources on their personally owned or non-corporate managed Windows 10 and macOS devices. It includes BlackBerry Access as well as BlackBerry® Work. BlackBerry Access is a secure browser that allows your organization to confidently enable mobile access to your corporate network. It supports iOS, Android, Windows, and macOS.
  • 19
    PaloPro

    PaloPro

    PaloServices

    PaloPro , is a tool to observe, analyze and analyze all reports made on the Internet and Social Media, which provides valuable analysis and information to improve the marketing and communication strategy of companies. Using state-of-the-art technology for immediate and accurate results, PaloPro analyzes all online reports that shape the public opinion and reputation of companies, products, individuals, organizations, and their competition. Using quantitative and qualitative methods of research and analysis we identify and present the important topics of discussion about your company, products, people and organizations of interest. We come up with useful suggestions for the strategic improvement of your image and/or brand. We give you the possibility of Web & Social Listening , in a friendly and easy-to-use environment, to create dashboards with a wide range of available components, collecting the information you are interested in through your own queries.
  • 20
    HID SAFE

    HID SAFE

    HID Global

    Through a single, centralized platform, HID SAFE Enterprise advances the security functions of identity management, breaks down the siloed systems and processes within organizations, and enables collaboration across departments and teams. HID SAFE Visitor Manager automates the entire lifecycle of visitors of any organization. This completely web-based solution includes capabilities for visitor pre-registration, security and background checks, access authorization, check-in/check-out, badge printing and centralized reporting, and audit trail functions. HID SAFE Visitor Manager is an extremely flexible solution that can be easily configured for each customer’s unique visitor management requirements. This highly scalable solution allows for easy management of busy sites with high volumes of visitors. HID SAFE Risk Analytics enables organizations to take the power of their physical security data beyond traditional reporting and use it to predict physical security operations.
  • 21
    Axway Amplify
    To become the hero, not the roadblock, many IT departments are investing in integration platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. Whether it’s cutting the budget, struggling to get to the cloud, or tackling a growing project backlog, IT is challenged like never before. To become the hero, not the roadblock, many IT organizations are investing in platforms that let users accomplish projects themselves, instead of waiting for an IT specialist. Axway Amplify Platform is the enterprise integration platform that that can hide integration complexity, enforce IT policy, and scale at will, enabling your teams to: Stop repetitive one-off integrations, and focus on reusable integrations that can be leveraged by wider internal and external teams. Gain cloud cost savings and increase scale by moving on-premises integration silos to the cloud, or by leveraging them in place with hybrid deployment, and much more.
  • 22
    Cisco Secure Cloud Analytics
    Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​
  • 23
    Asseco SPIN

    Asseco SPIN

    Asseco Solutions

    Asseco SPIN is a modern ERP solution with advanced features. It supports the proper operation of all processes in medium-sized and large businesses. Thanks to the web interface, the system enables you to work from any place using a web browser. Stable system for medium-sized business and large corporations. Access also via the web or mobile devices. Advanced executive Business Intelligence tools. Coverage of advanced processes also in production companies. Integrated tools for controlling and economic evaluation. Asseco SPIN takes the management of your company to a new level. It offers a number of quality management tools for processing complex data and simple, intuitive operation. The system is fully scalable in its complexity and the modules are perfectly interconnected. It is also available online using the iSPIN web application. With Asseco SPIN you get top software developed especially for the needs of the Slovak market.
  • 24
    Gigamon

    Gigamon

    Gigamon

    Fuel Your Digital Transformation Journey. Manage complex digital apps on your network with unparalleled depth and breadth of intelligence. Managing your network daily to ensure constant availability is daunting. Networks are getting faster, data volumes are growing and users and apps are everywhere, which makes monitoring and managing difficult. How are you supposed to drive Digital Transformation? What if you could ensure network uptime while gaining visibility into your data-in-motion across physical, virtual and cloud environments? Gain visibility across all networks, tiers and applications — while getting intelligence across your complex structures of applications. Gigamon solutions can radically improve the effectiveness of your entire network ecosystem. Ready to learn how?
  • 25
    Trellix Data Encryption
    Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
  • 26
    Kona Site Defender

    Kona Site Defender

    Akamai Technologies

    Protect your apps and APIs against the largest and most sophisticated attacks with a web application firewall and DDoS protection at the edge. Kona Site Defender provides application security at the edge — closer to attackers and further from your applications. With 178 billion WAF rule triggers a day, Akamai harnesses unmatched visibility into attacks to deliver curated and highly accurate WAF protections that keep up with the latest threats. Flexible protections help secure your entire application footprint and respond to changing business requirements, including APIs and cloud migration, with dramatically lower management overhead. Kona Site Defender employs a proprietary anomaly detection engine designed to deliver the highest accuracy out of the box. You need application security that can be customized for your unique requirements and the organizations you support.
  • 27
    3M Connected Safety
    Connected Safety is an Internet of Things (IoT) platform designed to connect workers, places and equipment, helping organizations to drive improvements in worker safety, compliance workflow, and safety process automation. 3M Connected PPE and software products help organizations advance the digital transformation of worker safety through innovative combinations of data science and PPE technologies. Help improve the efficiency of your safety organization by upgrading to IoT-enabled connected PPE and digitizing legacy processes using our health, safety & compliance software. Identify areas of risk and opportunities for improvement through analysis of data and insights generated through 3M Connected Safety products and software to take your compliance programs to the next level. Workers can better anticipate and recognize workplace hazards, allowing them to be confident in their safety decisions and focus on the task at hand.
  • 28
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 29
    HashiCorp Boundary
    Access any system from anywhere based on user identity. Traditional approaches like SSH bastion hosts or VPNs require distributing and managing credentials, configuring network controls like firewalls, and exposing the private network. Boundary provides a secure way to access hosts and critical systems without having to manage credentials or expose your network, and is entirely open source. Authenticate with any trusted identity provider you are already using. No need to distribute new credentials and manage them. Authorize access based on logical roles and services, instead of physical IP addresses. Manage dynamic infrastructure and integrate service registries so hosts and service catalogs are kept up-to-date. Automate credential injection to securely access services and hosts with HashiCorp Vault. Reduce risk of leaking credentials with dynamic secrets and just-in-time credentials.
  • 30
    OpenText Data Privacy & Protection Foundation
    OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
  • 31
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 32
    ACI Case Manager

    ACI Case Manager

    ACI Worldwide

    Whether a genuine fraud event or a false positive, how banks manage the customer experience is critical. Give your fraud investigators a complete set of tools to resolve any issue and keep customers satisfied. Ensure that analysts can serve customers efficiently and comprehensively to confirm fraud events. Simplify case creation by utilizing account and contact details from ACI Fraud Management. Create efficient customer correspondence through configurable templates with dynamic data selection. Leverage centralized case details with multiple parameters for searching and appending data. Configure fraud analysts' workflow for simplified case management and increase the speed at which they work cases enterprise-wide. Use dynamic data enrichment, data displays and workflows to create guided workflows, built-in prompts and help-aids to assist investigator’s conduct research and decision-making.
  • 33
    Xceedia HCMS
    Let us put life into your next authoring and media project. Film & video production. Documentaries, animated films, short videos, feature films, film editing. Technical authoring. Courseware, textbooks, documentation, white papers, hands-on training, online help system. Multimedia content projects. Web development, podcasts, audio production, web media projects, eCommerce systems, web content management systems.
  • 34
    ForgeRock

    ForgeRock

    ForgeRock

    Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs.
  • 35
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 36
    BlueCat Edge
    BlueCat Edge is an advanced DNS solution that enhances traditional DDI infrastructure with powerful IP forwarding, discovery, resolution, and security capabilities designed for modern multicloud environments. It deploys lightweight service points across on-prem, virtual, and cloud environments to apply intelligent forwarding rules and enforce security policies at the edge of the network. Edge improves visibility by capturing internal and external DNS queries from any user or branch, creating a unified view of DNS behavior across global environments. For networking teams, the platform simplifies complex resolution pathways and uses Intelligent Forwarding to automatically route queries to the optimal destination. For cloud environments, Edge integrates with BlueCat Integrity and cloud-native DNS providers to resolve services reliably across multicloud footprints.
  • 37
    Contrail Networking

    Contrail Networking

    Juniper Networks

    Contrail Networking provides dynamic end-to-end networking policy and control for any cloud, any workload, and any deployment, from a single user interface. It translates abstract workflows into specific policies, simplifying the orchestration of virtual overlay connectivity across all environments. You can apply and control end-to-end policies across physical and virtual environments. Contrail Networking’s software-defined networking (SDN) capability, based on the open-source network virtualization project Tungsten Fabric, enables you to securely deploy your workloads in any environment. It offers continuous overlay connectivity to any workload, running on any compute technologies from traditional bare-metal servers, virtual machines, to containers. The unified operations and management tool, Contrail Command, is a simple-to-use interface.
  • 38
    Keyfactor Command
    Join the world’s leading enterprises running on the most complete and scalable managed PKI as-a-Service. Get all the advantages of PKI without the complexity. Whether it is securing your network, sensitive data, or connected devices, you turn to PKI as the proven technology to establish trust. But building and running your PKI is a complex and expensive undertaking. Getting it right is critical, but it’s not an easy feat. Finding and retaining the right people with the right skillsets, adherence to industry standards, and the expense of hardware and software required to run a robust PKI are all serious challenges — not to mention all that is at stake when something goes wrong. Easily organize and manage your inventory and set proactive alerts to notify users of expired or non-compliant certificates before they become a headache.
  • 39
    OneSpan Authentication Servers
    Secure access and transactions by deploying multi factor authentication and transaction signing capabilities at mass scale​. Leverage proven authentication server and API technologies to secure access and transactions and streamline identity management​. Use strong authentication to secure access to corporate resources and banking applications. Enable highly secure transaction signing with user friendly Cronto® technology. Simplify authentication lifecycle management via a single integrated system. Easily support new standards in application and network access security for most major operating systems and platforms. Ensure business continuity – eliminate server downtime and service disruptions. Deploy server solutions regardless of operating system or architecture. OneSpan server solutions validate authentication requests to offer secure and seamless access to a variety of corporate resources and applications.
  • 40
    CyberArk Conjur
    A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.
  • 41
    CBORD

    CBORD

    The CBORD Group

    Going forward, retail dining operations will need to be lean and adaptable. It’s crucial to have a technology solution that will help you reduce costs and meet changing requirements quickly across all locations. Create a dynamic retail dining experience with CBORD solutions. Adjust your retail operations at a moment’s notice to accommodate things like supply shortages, price changes, and physical distancing just to name a few. CBORD solutions fit any food service or convenience store environment, powering full countertop POS terminals, tablets, self-order kiosks, and online and mobile ordering. Use the latest in hardware and software to streamline and modernize your POS processes. Offer online ordering and payment options that support social distancing in all your dining and retail locations.
  • Previous
  • You're on page 1
  • Next