Alternatives to Nebula

Compare Nebula alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Nebula in 2026. Compare features, ratings, user reviews, pricing, and more from Nebula competitors and alternatives in order to make an informed decision for your business.

  • 1
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. It allows users to securely access them via web browsers without the need for a client application. MESHCONNECT: This Zero Trust Network Access (ZTNA) and mesh networking solution based on WireGuard enables granular access controls to business network resources and easy creation of secure mesh networks. SITE-TO-SITE VPN: The Access Gateway solution lets you easily set up secure Site-to-Site tunnels (IPSec) between UTunnel's VPN servers and hardware network gateways, firewalls & UTM systems.
    Leader badge
    Partner badge
    Compare vs. Nebula View Software
    Visit Website
  • 2
    Pangolin

    Pangolin

    Pangolin

    Pangolin is an open source, identity-aware tunneled reverse-proxy platform that lets you securely expose applications from any location without opening inbound ports or requiring a traditional VPN. It uses a distributed architecture of globally available nodes to route traffic through encrypted WireGuard tunnels, enabling devices behind NATs or firewalls to serve applications publicly via a central dashboard. Through the unified dashboard, you can manage sites and resources across your infrastructure, define granular access-control rules (such as SSO, OIDC, PINs, geolocation, and IP restrictions), and monitor real-time health and usage metrics. The system supports self-hosting (Community or Enterprise editions) or a managed cloud option, and works by installing a lightweight agent on each site while using the central control server to handle ingress, routing, authentication, and failover.
    Starting Price: $15 per month
  • 3
    NetBird

    NetBird

    NetBird

    NetBird is an open-source Zero Trust Networking platform built by engineers for engineers. It radically simplifies deploying secure private networks using the high-performance WireGuard® protocol. Unlike traditional VPNs, NetBird creates decentralized, low-latency, high-throughput private networks with a single management console for identity-based access control. Integrating seamlessly with your IdP for SSO and MFA, it forms direct, encrypted peer-to-peer tunnels between devices, servers, and clouds - no central bottlenecks or single points of failure. Lightweight clients ensure scalability and privacy, with traffic never passing through management services. NetBird supports integrations with CrowdStrike, Intune, SentinelOne, pfSense, and more. Ideal for Zero Trust remote access, multi-cloud connectivity, dynamic posture checks, detailed auditing, and MSP multi-tenant management - all through one intuitive platform.
    Starting Price: $5/user/month
  • 4
    Headscale

    Headscale

    Juan Font

    Headscale is an open-source, self-hosted implementation of the control server used by the Tailscale network, enabling users to keep full ownership of their private tailnets while using Tailscale clients. It supports registering users and nodes, issuing pre-authentication keys, advertising subnet-routes and exit-node capabilities, enforcing access-control lists, and integrating with OIDC/SAML identity providers for user authentication. The server is deployable via Debian/Ubuntu packages or standalone binaries, configurable through a YAML file, and managed via its CLI or REST API. Headscale tracks each node, route, and user in its database, supports route approval workflows, and enables features such as subnet routing, exit node designation, and node-to-node mesh within the tailnet. Being self-hosted, it gives organizations and hobbyists full control over their private network endpoints, encryption keys, and traffic flows, rather than depending on a commercial control plane.
    Starting Price: Free
  • 5
    Neysa Nebula
    Nebula allows you to deploy and scale your AI projects quickly, easily and cost-efficiently2 on highly robust, on-demand GPU infrastructure. Train and infer your models securely and easily on the Nebula cloud powered by the latest on-demand Nvidia GPUs and create and manage your containerized workloads through Nebula’s user-friendly orchestration layer. Access Nebula’s MLOps and low-code/no-code engines to build and deploy AI use cases for business teams and to deploy AI-powered applications swiftly and seamlessly with little to no coding. Choose between the Nebula containerized AI cloud, your on-prem environment, or any cloud of your choice. Build and scale AI-enabled business use-cases within a matter of weeks, not months, with the Nebula Unify platform.
    Starting Price: $0.12 per hour
  • 6
    Nebula

    Nebula

    Nebula

    Nebula is the home of smart, thoughtful videos, podcasts, and classes from your favorite creators. A place for experimentation and exploration, with exclusive originals, bonus content, and no ads in sight. Original productions and bonus material. Nebula is creator-owned and operated. Watch offline in our mobile apps. Subscribe to get access to all of our premium content, including Nebula Originals, Nebula Plus bonus content, Nebula First early releases, and Nebula Classes.
    Starting Price: $5 per month
  • 7
    Nebula

    Nebula

    KLDiscovery

    A powerful combination of capability and simplicity, Nebula® brings a fresh perspective to established technology with improved flexibility and control. Offering a more modern and user-friendly approach than other review tools that can be overwhelming to administer and navigate, Nebula minimizes the learning curve while ensuring critical information is easily accessible and readily available. This translates into time and cost savings across the board. Nebula can be hosted within the Microsoft Azure cloud or behind an organization’s firewall with Nebula Portable™, allowing it to be offered virtually anywhere in the world to accommodate increasingly demanding data privacy and sovereignty regulations. Total control over all document batching with dynamic Workflow system available only in Nebula. Workflow also fully automates document routing and distribution to streamline document review and maximize efficiency, accuracy and defensibility.
  • 8
    Nebula Graph
    The graph database built for super large-scale graphs with milliseconds of latency. We are continuing to collaborate with the community to prepare, popularize and promote the graph database. Nebula Graph only allows authenticated access via role-based access control. Nebula Graph supports multiple storage engine types and the query language can be extended to support new algorithms. Nebula Graph provides low latency read and write , while still maintaining high throughput to simplify the most complex data sets. With a shared-nothing distributed architecture , Nebula Graph offers linear scalability. Nebula Graph's SQL-like query language is easy to understand and powerful enough to meet complex business needs. With horizontal scalability and a snapshot feature, Nebula Graph guarantees high availability even in case of failures. Large Internet companies like JD, Meituan, and Xiaohongshu have deployed Nebula Graph in production environments.
  • 9
    OpenNebula

    OpenNebula

    OpenNebula

    Welcome to OpenNebula, the Cloud & Edge Computing Platform that brings flexibility, scalability, simplicity, and vendor independence to support the growing needs of your developers and DevOps practices. OpenNebula is a powerful, but easy-to-use, open source platform to build and manage Enterprise Clouds. OpenNebula provides unified management of IT infrastructure and applications, avoiding vendor lock-in and reducing complexity, resource consumption and operational costs. OpenNebula combines virtualization and container technologies with multi-tenancy, automatic provision and elasticity to offer on-demand applications and services.A standard OpenNebula Cloud Architecture consists of the Cloud Management Cluster, with the Front-end node(s), and the Cloud Infrastructure, made of one or several workload Clusters.
  • 10
    NebulaPOS
    NebulaPOS is a cloud point-of-sale software app for your phone or tablet! And includes an iOS and Android ‘native’ POS app using the latest technology frameworks, with food and beverage and hospitality in mind! Try the next generation in cloud point of sale for Android and iOS. Contact us now for more information and how to register via the web app and add your device via the native app via the respective stores! NebulaPOS is ideally suited for any size hotel, lodge, or resort offering a food and beverage or retail operation. NebulaPOS cloud point of sale offers a native iOS and Android point of sale app for ease of use. As well as powerful inventory management, including complex recipes and stock processing. Now with Uber Eats integration! NebulaPOS is your ideal food and beverage management application, suitable for all types of hospitality establishments, hotel F&B operations, restaurants, bars and curios. Try it now, and import your existing stock setup and opening balance.
  • 11
    NebulaPMS
    NebulaPMS is a cloud application to be added to the stable of products developed and hosted by HTI. NebulaPMS offers powerful Hotel Booking and PMS functionality, in a secure and efficient cloud-based PMS environment. The application is hosted and provides resilience, security and daily backups. Save on IT costs and infrastructure and move to the cloud with HTI today! Less hassle with IT infrastructure, and leave application and environmental support to us! We also ensure all features and functionality are available in a single supported version of the software. This means quicker access by our application and technical support structures and improved maintenance of the application.
    Starting Price: $20 per month
  • 12
    NebulaCRS
    HTI is committed to building World Class cloud-based hotel management software applications for the global hospitality industry. Central Reservations (CRS) is HTI’s flagship product. Nebula will succeed eRes in the Global CRS space and we aim to deliver a complete cloud suite in the reservations, channel management and food and beverage and stock control sector of the industry. NebulaCRS (powered by eRes CRS) an industry-leading cloud Central Reservations and distribution solution. Manage real-time rates and availability for any size property. World-renowned Call Centre feature, with distribution for Guests and Agents to look and book accommodation. Create as many base rates as you require to create a truly dynamic derived rates strategy for revenue optimization. With over 50 directly connected channels and more on-boarding all the time, eRes and Nebula are a natural choice.
  • 13
    Nebula Container Orchestrator

    Nebula Container Orchestrator

    Nebula Container Orchestrator

    Nebula container orchestrator aims to help devs and ops treat IoT devices just like distributed Dockerized apps. It aim is to act as Docker orchestrator for IoT devices as well as for distributed services such as CDN or edge computing that can span thousands (possibly even millions) of devices worldwide and it does it all while being open-source and completely free. Nebula is a open source project created for Docker orchestration and designed to manage massive clusters at scale, it achieves this by scaling each project component out as far as required. The project’s aim is to act as Docker orchestrator for IoT devices as well as for distributed services such as CDN or edge computing. Nebula is capable of simultaneously updating tens of thousands of IoT devices worldwide with a single API call in an effort to help devs and ops treat IoT devices just like distributed Dockerized apps.
  • 14
    ResoluteAI

    ResoluteAI

    ResoluteAI

    ResoluteAI's secure platform lets you search aggregated scientific, regulatory, and business databases simultaneously. Combined with our interactive analytics and downloadable visualizations, you can make connections that lead to breakthrough discoveries. Nebula is ResoluteAI's enterprise search product for science. We apply structured metadata and a range of AI capabilities to your institutional knowledge. This includes NLP, OCR, image recognition, and transcription, making your proprietary information easily findable and accessible. With Nebula, you have the power to unlock the hidden value in your research, experiments, market intelligence, and acquired assets. Structured metadata created from unstructured text, semantic expansion, conceptual search, and document similarity search.
  • 15
    Nebula

    Nebula

    Nebula

    Nebula is a client management and appointment scheduling platform built specifically for dietitians and nutritionists. It brings together everything a nutrition professional needs to run their practice in one place. Key features include: Online appointment booking with a public booking page where clients can schedule directly Client management with session notes, templates, and history tracking PDF nutrition plans and reports Client portal for secure communication and document sharing Built-in business website builder Multi-language support (English, Spanish, Turkish, Dutch, German, Ukrainian) Nebula eliminates the need to juggle multiple tools like Google Calendar, WhatsApp, and Excel spreadsheets. Dietitians can manage their entire practice from a single dashboard. Free 30-day trial available with no credit card required.
    Starting Price: $15/month/user
  • 16
    nebulaONE

    nebulaONE

    Cloudforce

    nebulaONE is a secure, private generative AI gateway built on Microsoft Azure that lets organizations harness leading AI models and build custom AI agents without code, all within their own cloud environment. It aggregates top AI models from providers like OpenAI, Anthropic, Meta, and others into a unified interface so users can safely ingest sensitive data, generate organization-aligned content, and automate routine tasks while keeping data fully under institutional control. Designed to replace insecure public AI tools, nebulaONE emphasizes enterprise-grade security, compliance with regulatory standards such as HIPAA, FERPA, and GDPR, and seamless integration with existing systems. It supports custom AI chatbot creation, no-code development of personalized assistants, and rapid prototyping of new generative use cases, helping educational, healthcare, and enterprise teams accelerate innovation, streamline operations, and enhance productivity.
  • 17
    Shieldoo

    Shieldoo

    Cloudfield

    Shieldoo is a next-gen private network for remote connection from anywhere built with a well-known open-source tool called Nebula. The Shieldoo secure network is a collection of nodes, a lighthouse, and an admin center. The user device is a node, the server is a node, the cloud stack is a node, and the LAN access box is a node. Two nodes discover each other through a lighthouse and then connect peer-to-peer. With Shieldoo, you can build a complex security infrastructure which is easy to use. A tailored wizard will guide you through the initial setup, and the usual administration is handled in the admin center. You pay only for users and servers seen in the network that month, and you always get the complete feature set: unlimited admin accounts, SSO, MFA, domain by your choice etc.
    Starting Price: $0,49 per hour/server/user
  • 18
    iCrypto

    iCrypto

    iCrypto

    Designed to be used with our entire suite of iCrypto cloud-based services, the iCrypto SDK can integrate into existing Enterprise Apps or when deployed as iCrypto App be used as a standalone one-step password-less verification solution. By employing the latest cryptography technologies in combination with device-level security and management, the iCrypto SDK is the ultimate software token that can be used as a biometric ID on the go in a wide variety of industries. iCrypto SDK provides authenticator PKI signatures, a range of cryptographic protocols such as TOTP/HOTP/OCRA/MTP, push-based authentication, on-device as well as network-based biometrics such as fingerprint, iris scan, face/voice/eyeball recognition, third-party authorization, secure storage, context collection and host of security features.
    Starting Price: Free
  • 19
    SonicWall Mobile Connect
    SonicWall Mobile Connect is a secure remote access solution that enables employees to safely connect to corporate resources from various devices, including those running iOS, macOS, Android, Chrome OS, and Kindle Fire. By establishing an encrypted SSL VPN tunnel, Mobile Connect ensures that all data transmitted between the device and the corporate network remains protected from interception. This application integrates seamlessly with SonicWall's Secure Mobile Access (SMA) and next-generation firewall appliances, allowing IT administrators to enforce granular access policies based on user identity, device type, and application. Additionally, Mobile Connect supports features such as per-application VPN, context-aware authentication, and centralized policy management, providing a comprehensive solution for secure mobile access.
    Starting Price: Free
  • 20
    Nexsign

    Nexsign

    SAMSUNG SDS

    Get stronger mobile security that’s uniquely yours. The next step in mobile security is Nexsign. Unlike a password, which can be easily forgotten or duplicated, Nexsign™ verifies your identity with biometric information using your fingerprint, face, and voice. The result? An authentication experience that’s simpler, faster, and even more secure. The days of remembering long, complicated passwords are officially over. Accessing data is as simple as recognizing your fingerprint, face or voice. Enjoy some peace of mind. Nexsign™ will not store your biometric information on the server. And with a strong authentication system using Public-Key Infrastructure (PKI), there is no risk of biometric information leaking. Biometric authentication is just the beginning. Nexsign™ can also work on a range of platforms and environments, such as Mobile OTP or PIN authentication. Now it’s simple and easy to deploy solutions, with standardized development toolkits, APIs, and a web-based admin portal.
  • 21
    everID

    everID

    Datarella

    Decentralized public key infrastructure is a fundamental technology that allows users to authenticate themselves, without relying on a trusted centralized authority. Private keys grant the users access and control over their accounts, their assets, and even to their digital identity (SSI). Within everID, everKEY is our decentralized key recovery solution for wallets and other products that require highly secure key management.
  • 22
    X-VPN

    X-VPN

    Free Connected

    Protect your sensitive and private information. Secure your internet data with 256-bit encryption. Bank-grade multi-layered encryption technology. Choices of 9 types of security tunnels. 9 Protocols to help you bypass filters and firewalls. Access streaming & social networking apps/sites at your office, abroad. Access YouTube, Netflix, Spotify and other streaming contents. Gain access to Facebook, Twitter, Snapchat and many other apps. Mask your actual internet visit request as regular internet data. VPN split tunneling is a useful function that lets you totally control internet traffic transfer with or without the VPN tunnel. For instance, you can use X-VPN to watch Netflix while your local applications (such as bank app) connect to local internet bypassing the VPN tunnel. X-VPN deployed 8000+ VPN servers around the world, which can router your data packets to game servers directly, to stabilize the internet connection and reduce your ping.
  • 23
    StrongKey

    StrongKey

    StrongKey

    StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI management solution integrates with TLS/SSL, identity access management (IAM), digital signature, secrets management, and device management systems. StrongKey Tellaro is a comprehensive software suite that provides strong authentication, encryption, tokenization, PKI management, and digital signature management. Our open-source software includes a FIDO® Certified FIDO2 server, and we support flexible data center and cloud deployment models.
  • 24
    Unbound CORE Identity Security
    Authenticate users and machines and protect PKI – seamlessly across all locations and devices. Create virtual enclaves for mobile and for desktop with maximum security and without sacrificing the user experience. Authenticate user access and identify simply and securely with CORE virtual secure enclave SDK. Mobile, desktop, or server-side enabled – CORE keeps credentials safe even if the user’s personal device is compromised. Build virtual smartcards, protect mobile apps, and more with pure software agility. Integrate strong two-factor and multi-factor authentication into a mobile app – no hardware, no one-time password, no software token required. Replace traditional smartcards with virtual ones to authenticate employees and reduce operational strain and total cost of ownership. Protect machine and human electronic identities and the root certificate authority which oversees them. Protecting PII with maximum security, best user experience.
  • 25
    Certificate Authority Service
    Certificate Authority Service is a highly available, scalable Google Cloud service that enables you to simplify, automate, and customize the deployment, management, and security of private certificate authorities (CA). Simplify the deployment, management, and security of your enterprise PKI with a cloud service that helps to automate time-consuming, risky, and error-prone infrastructure tasks, freeing you to focus on higher-value projects. Customize Certificate Authority Service to your needs by configuring custom CAs and certificates, enforcing granular access controls, automating common tasks with APIs, and integrating with your existing systems. Have peace of mind knowing that your CA service is highly available, scalable, backed by an SLA, auditable, and ready to help you achieve compliance with advanced hardware and software security controls. Create a private CA in minutes versus the days and weeks that it takes to deploy and operate your own CA.
    Starting Price: $20 per CA per month
  • 26
    GlobalSign

    GlobalSign

    GlobalSign

    GlobalSign is the leading provider of trusted identity and security solutions. Enabling businesses, large enterprises, cloud service providers and IoT innovators around the world to secure online communications, manage millions of verified digital identities and automate authentication and encryption. Its high-scale Public Key Infrastructure (#PKI) and identity solutions support the billions of services, devices, people and things comprising the Internet of Everything (#IoE). GlobalSign is an identity services company providing cloud-based, highly scalable PKI solutions for enterprises needing to conduct safe commerce, communications, content delivery and community interactions. Our identity and security solutions enable businesses, large enterprises, cloud-based service providers and IoT innovators around the world to conduct secure online communications, manage millions of verified digital identities and automate authentication and encryption.
  • 27
    AWS VPN

    AWS VPN

    Amazon

    AWS VPN enables secure connections between on-premises networks and AWS Virtual Private Clouds (VPCs) using IPsec VPN tunnels. Each connection includes two tunnels for high availability, terminating in different availability zones to ensure resilience. It supports both static and dynamic routing with BGP, and offers customizable tunnel options, including inside tunnel IP addresses, pre-shared keys, and BGP Autonomous System Numbers (ASNs). Accelerated Site-to-Site VPN leverages AWS Global Accelerator to route traffic through the nearest AWS edge location, improving performance by reducing latency and jitter. AWS Client VPN is a fully managed, elastic VPN service that allows users to securely access AWS and on-premises resources from any location using an OpenVPN-based client. It supports authentication through Active Directory, mutual certificate authentication, and SAML-based federated authentication.
  • 28
    Huawei Cloud VPN
    Virtual Private Network (VPN) establishes a secure, encrypted communication tunnel between your local data center and your VPC on HUAWEI CLOUD. With VPN, you can build a flexible and scalable hybrid cloud environment. Huawei-proprietary hardware encrypts data based on IKE and IPsec with carrier-class reliability and ensures VPN connection stability. You can use the VPN service to connect your VPC on the cloud to your local data center and add more computing capacity to your network by leveraging the scalability and elasticity of the cloud. Uses Huawei-proprietary hardware devices to establish secure, reliable, and encrypted IPsec tunnels over the Internet. Enables you to extend your local data center into HUAWEI CLOUD, meeting application and service scaling requirements. Allows you to purchase VPN connections on demand. The connections are immediately accessible upon creation.
    Starting Price: $0.0082 per hour
  • 29
    Cloudflare Tunnel
    From the moment an application is deployed, developers and IT spend time locking it down — configuring ACLs, rotating IP addresses, and using clunky solutions like GRE tunnels. There’s a simpler and more secure way to protect your applications and web servers from direct attacks: Cloudflare Tunnel. Ensure your server is safe, no matter where it’s running: public cloud, private cloud, Kubernetes cluster, or even a Mac mini under your TV. Cloudflare Tunnel is tunneling software that lets you quickly secure and encrypt application traffic to any type of infrastructure, so you can hide your web server IP addresses, block direct attacks, and get back to delivering great applications. The Tunnel daemon creates an encrypted tunnel between your origin web server and Cloudflare’s nearest data center, all without opening any public inbound ports.
  • 30
    Radmin VPN

    Radmin VPN

    Famatech

    Radmin VPN is a free and easy-to-use software product to create virtual local networks. The program allows users to securely connect computers, located behind firewalls. Provides you a secure tunnel for traffic to flow. Reliable end-to-end encryption (256-bit AES) keeps your connection safe. Easy to set-up, easy to manage for both - IT Pros and home techs. Easily connect distributed teams together, create one cohesive network no matter how far you are located from each other. Radmin VPN allows you to connect to remote PCs even behind firewalls you don’t control. Thanks to the integration with Radmin remote control software, Radmin VPN allows you to securely access and work at your remote computer from anywhere, whether from home, hotel or airport. Your network resources – files, apps, and emails are just a click away wherever you go.
    Starting Price: Free
  • 31
    signer.digital

    signer.digital

    Chartered Information Systems

    signer.digital is the range of solutions which offer its users innovative ways to sign the documents and files and eInvoices, through it rage of procuts like, Bridge Application, REST APIs, Web Server and Web Libraries, DLLs and Free signer.digital Browser Extension. The signer.digital Bridge application can be setup in minutes for Digitally Signing with any of the existing ERP or application without writing a line of code, while the web server and libraries can be configured with any application, signer.ditial supports cross-platform applications through REST APIs. With signer.digital Browser Extension we offer seamless PKI operations through all the modern Browsers like Chrome, Edge and Firefox on all 3 OS platforms. Users can perform PKI Operations like Signing, Encryption, Verification, Authentication, Download of Digital Certificate Etc.
  • 32
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 33
    Carbon Browser

    Carbon Browser

    Carbon Browser

    We solve the privacy issue with our in-built dVPN, firewall & ToR e2ee which will come at no extra cost. A fully immersive web 3.0 experience with crypto features as standard including a multi-chain wallet and bridge. An optimized engine along with automatic blocking of intrusive ads and trackers gives you blazing-fast page load speeds. We block trackers and ads on every page you browse without compromising UX or browsing speed. Carbon Browser’s AdBlock feature blocks all intrusive and annoying ads by default, enhancing the browsing experience by removing disruptions. It automatically prevents video ads on YouTube, sponsored posts sidebar ads on Facebook, and distracting banner ads. Additionally, it eliminates pop-ups and pop-under windows, making web pages load faster and reducing clutter for a cleaner, more focused browsing experience. Carbon’s open source code is hosted on decentralized servers, offering a secure and distributed alternative to conventional file hosting services.
    Starting Price: Free
  • 34
    Dogtag

    Dogtag

    Dogtag

    The Dogtag Certificate System is an enterprise-class open source Certificate Authority (CA). It is a full-featured system, and has been hardened by real-world deployments. It supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management, and much more. The Dogtag Certificate System can be downloaded for free and set up in less than an hour. Dogtag is a collection of technologies that allow enterprises to deploy PKI on a large scale. Certificate issuance, revocation, and retrieval. Certificate Revocation List (CRL) generation and publishing. Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA) for organizational authentication and policies. Encryption key archival and recovery. Smartcard lifecycle management. Token profiles, token enrollment, on-hold, key recovery, and format. Face-to-face enrollment with the security officer workstation interface.
  • 35
    CyLock

    CyLock

    Cybernexa

    Cybernexa, a global leader in information security, pioneers cutting-edge solutions such as CyLock MFA, SSO, ADPass, and PKI. Committed to innovation, our robust products address the dynamic security needs of today's mobile-centric environment. Offering seamless integration, CyLock MFA ensures multi-factor authentication, while CyLock SSO simplifies access to multiple systems. Manage Active Directory securely with CyLock ADPass, and fortify data integrity with CyLock PKI's encryption. Beyond products, our dedicated team delivers comprehensive cybersecurity compliance services, ensuring your organization stays ahead of threats. Choose Cybernexa for unparalleled security innovation, global reach, and comprehensive services tailored to diverse sectors.
  • 36
    Active Directory Certificate Services (AD CS)
    This document provides an overview of Active Directory Certificate Services (AD CS) in Windows Server® 2012. AD CS is the Server Role that allows you to build a public key infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for your organization. AD CS provides customizable services for issuing and managing digital certificates used in software security systems that employ public key technologies. The digital certificates that AD CS provides can be used to encrypt and digitally sign electronic documents and messages. These digital certificates can be used for authentication of computer, user, or device accounts on a network. You can use AD CS to enhance security by binding the identity of a person, device, or service to a corresponding private key. AD CS gives you a cost-effective, efficient, and secure way to manage the distribution and use of certificates.
  • 37
    Axiad Cloud

    Axiad Cloud

    Axiad Cloud

    Systematically authenticate across all users, machines, and interactions with a cloud-based, complete, and flexible authentication platform. Axiad helps organizations move to a passwordless future without the friction and risk of fragmented solutions and ultimately improve their cybersecurity posture and empower their end users. Establish best practices for user security, eliminate silos, and meet compliance requirements with enterprise-grade passwordless MFA. Establish best practices for user security, eliminate silos, and meet compliance requirements with government-grade phishing-resistant authentication. Go beyond an in-place IAM product, establish best practices for user security, and meet compliance requirements with passwordless and phishing-resistant MFA. Enhance machine identity authentication and improve overall security with a unified, highly customizable PKI solution.
  • 38
    ZevaCrypt

    ZevaCrypt

    ZevaCrypt

    Increase return on investment of existing PIV infrastructure for cross-agency encryption through ZevaCrypt™ intuitive and true end-to-end encryption solution. Email communication over secure channels has always been one of the most difficult-to-solve security challenges, especially those struggling to enforce the use of high assurance credentials such as PIV and CAC. Meanwhile, email is our primary form of communication for both sensitive and non-sensitive information. While encrypting within the same organization is simple, email encryption across organizational boundaries is challenging and often manual. Existing PKI encryption systems don’t ensure the required level of protection, and currently none of the encryption systems validate certificate policies the way they were designed to be used. In general, strong encryption must combine strong identity with strong cryptography. PKI encryption is the only means of achieving this intersection of goals.
    Starting Price: $9.90 per month
  • 39
    Secardeo TOPKI
    Digital certificates offer a high degree of security for encryption, strong authentication and digital signatures. In an enterprise PKI you need appropriate services for certificate management and key management. Secardeo TOPKI (Trusted Open PKI) is a PKI system platform for automated key distribution of X.509 certificates and private keys to all users and devices where they are required. For this, TOPKI provides components that serve for specific certificate lifecycle management tasks. The PKI software components of the TOPKI platform can be integrated with other PKI systems, Active Directory or Mobile Device Management systems. TOPKI enables a seamless adoption of managed PKI services. By this you can automatically request certificates from trusted public CAs in the cloud. Or you can use open source CAs, for example to auto-enroll internal computer certificates. The TOPKI PKI products can also enhance your existing Microsoft PKI.
  • 40
    Certicom Managed PKI Service
    Digital certificates are a common basis for establishing trust between communicating entities - on the Internet as well as within private networks. They are increasingly important for securing IoT applications employing wireless sensor networks and smart connected devices, with each endpoint representing a new attack surface. That growing attack surface is critical to consider when designing your security architecture. Managing an organization’s certificates with an in-house Public Key Infrastructure (PKI) is usually a time consuming and expensive endeavor. Certicom makes it easy, offering a secure and reliable hosted PKI platform which can manage certificates on behalf of an organization or an entire ecosystem. The service minimizes the up-front expense and lowers the ongoing cost of managing certificates while helping customers secure their devices and get their products to market quickly.
  • 41
    DocRAID

    DocRAID

    AvailabilityPlus

    Multi-award-winning, CloudRAID driven security. Resilient, yet easy to use file sharing. On-premise on your metal or off-premise in our data centers. Zero-knowledge-Storage. Email protection. No software installation is required at the receiver. CloudRAID based, highly resilient, yet easy-to-use email encryption gateway. No software to maintain, no PKI required. No software installation. No hassles. All email clients supported. All devices. Ready to protect in minutes. Software to identify vulnerabilities and to harden critical infrastructures. Built-in cooperation with the German Federal Office for Information Security (BSI). Fragmentation, encryption and redundant distribution reduce your attack surface. DocRAID® is leading in CloudRAID technology. Fragmentation, encryption and redundant distribution protect your files during transport and at rest. Redundant distribution of encrypted data fragments to multiple jurisdictions adds an extra layer of protection.
    Starting Price: $24 per month
  • 42
    NoPorts

    NoPorts

    Atsign

    NoPorts is a VPN alternative that allows people to establish an encrypted IP tunnel directly between devices, eliminating the need for exposed ports and creating a zero-trust environment. It provides true end-to-end encryption while empowering organizations to leverage the benefits of existing protocols like RDP, Citrix, and VPN while mitigating the inherent security risks associated with them.
    Starting Price: $4/month/user
  • 43
    Nexus Smart ID Corporate PKI
    Issue, manage and automate PKI certificates for people, services and devices to enable strong authentication, data confidentiality, integrity and digital signatures, with Smart ID Corporate PKI. A corporate public-key infrastructure can issue and manage trusted identities for people, devices and services, forming the basis of information security in an organization. Smart ID provides a reliable foundation, including roles, policies and procedures, for issuing and managing trusted, certificate-based identities. Smart ID corporate PKI is a flexible and scalable solution that can be used by any organization to issue, manage and validate certificate-based digital identities for mixed endpoint environments that include people, infrastructure and things. Based on standard products that are proven in business-critical environments and made in Sweden.
  • 44
    GlobalSign IoT Edge Enroll
    Proper PKI device enrollment is key to provisioning unique, strong and secure devices identities. IoT Edge Enroll is a full-featured, registration authority service that ensures simple, secure and optimized device enrollment. It’s a key component of our PKI-based IoT Identity Platform that enables Device Identity Lifecycle Management. It’s the most comprehensive, flexible, commercial PKI device enrollment feature set available. Certificate Templating Engine for Exacting Enrollment - Leverage custom certificate fields and data to deliver maximum flexibility for unique IoT authentication requirements. Device Identity Manager for Admin Control - Manage unique device identities throughout their lifecycles including certificate auditing and reporting, device whitelist management, device enablement/disablement and enrollment eligibility.
  • 45
    KeyScaler

    KeyScaler

    Device Authority

    KeyScaler® is a purpose-built device identity centric IAM platform for IoT and Blockchain. It allows customers to securely register, provision and connect devices to IoT platforms, applications and services. The platform simplifies the process of establishing a robust, end-to-end security architecture within the IoT and deliver efficiencies at scale through security automation, without human intervention. With the enormous and dynamic scale of the IoT where new devices are continually being provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 46
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 47
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 48
    Systweak VPN

    Systweak VPN

    Systweak VPN

    Systweak VPN hides your IP address, lets you access favorite websites & entertainment content without any restrictions. To avoid ISP throttling, bypass censorship, and provide online anonymity, this VPN uses cutting edge security technology. By default, Systweak VPN uses AES-256-bit encryption, used by security agencies to conceal and guard classified information. This means it provides a reliably encrypted tunnel between your device and the VPN server. Enjoy your favorite shows, listen to music, and stream any content without any restrictions at your home and while traveling out of the country. To establish a secure tunnel, offer good speed and secure data Systweak VPN uses Internet Key Exchange Version 2.Systweak VPN is committed to offering complete privacy and security to users. To keep it that way it uses AES 256-bit military-grade encryption and ensures online obscurity.
    Starting Price: $5.95 per year
  • 49
    Oracle VPN Connect
    Connect your enterprise campus, branch networks, and data centers to Oracle Cloud. Data is encrypted in virtual private network (VPN) tunnels. No provider negotiations or new circuits required. Use your existing internet connection. Securely connect your existing infrastructure to the cloud by using industry-standard encryption algorithms. Connect your headquarters, branch locations, and private data centers to Oracle Cloud so all of your offices can access applications. No contracts or commitment. Build as many IPSec tunnels to Oracle Cloud Infrastructure as you want and keep them active as long as you want.
    Starting Price: $0.0085 per month
  • 50
    SonicWall Connect Tunnel
    SonicWall Connect Tunnel provides an “in-office” experience for a remote working world with full access away from the office. For IT-managed Mac, Windows, and Linux users, this thin client delivers fast and secure remote access to sensitive corporate data and assets. For Windows 10 users, Connect Tunnel supports Device Guard, a Windows server component that enables secure authorized access. With Connect Tunnel, you always maintain centralized control because it integrates directly with SMA 1000 Unified Policy and End Point Control (EPC) to ensure a safe environment and a compliant device before allowing network access. Unleash the benefits of a remote workforce without sacrificing the security of your corporate network. We provide a variety of VPN clients to fit the needs of every SonicWall appliance or virtual appliance.