Alternatives to Userify
Compare Userify alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Userify in 2026. Compare features, ratings, user reviews, pricing, and more from Userify competitors and alternatives in order to make an informed decision for your business.
-
1
Diplomat Managed File Transfer
Coviant Software
Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more. With over two decades of proven, breach-free performance, Diplomat MFT supports compliance with HIPAA, HITECH, GLBA, PCI/DSS, GDPR, and DORA. It features robust capabilities such as PGP encryption, multi-factor authentication, IP-based access rules, and built-in threat intelligence. If you're still relying on manual scripts or outdated FTP tools and you're concerned about audit failures, security gaps, or compliance risks, Diplomat MFT offers a scalable, secure solution you can trust. Start your free trial today. -
2
QEval
Etech Global Services
QEval is contact center quality assurance software that automates quality monitoring across 100% of voice, chat, and email interactions. Most call center QA teams manually sample 1 to 5% of calls. QEval replaces that with AI-powered speech analytics, automated quality scoring, and real-time compliance monitoring. Core functionality: call monitoring and evaluation, agent performance management, sentiment analysis, keyword detection, customer experience analytics, coaching workflows, gamification, and 110+ dashboards with predictive analytics. Compliance monitoring covers PCI, HIPAA, and GDPR with 98% accuracy and real-time alerts. QEval's speech analytics engine is trained on 138M+ interactions with 94% classification accuracy. The platform deploys in 30 days, not the 90 to 120 days typical of call center quality monitoring software. ISO 27001, SOC 2, PCI-DSS certified. Built by Etech Global Services for Fortune 500 contact centers in healthcare, telecom, retail, banking, and BPO. -
3
Securden Endpoint Privilege Manager
Securden
Securden Endpoint Privilege Manager (EPM) helps enterprises remove admin rights without impacting productivity on Windows, Mac, and Linux endpoints. Securden EPM helps elevate applications for standard users and grant admin rights on a Just-in-Time basis, eliminating standing privileges while maintaining seamless operations. Enforce application control using allowlisting and blocklisting, enable on-demand and policy-based granular application elevation, and manage privileges even on offline endpoints. Capabilities include JIT local admin rights, application usage tracking, and local administrator group monitoring. Secure remote access supports IT helpdesk operations, while built-in controls help meet compliance requirements such as HIPAA, PCI-DSS, GDPR, and NERC-CIP. A highly scalable architecture and wide array of integrations make Securden EPM ideal for securing enterprise endpoints at scale. -
4
Securden Unified PAM
Securden
Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. The major modules of Securden Unified PAM are password management, privileged account management, secure remote access, application control, endpoint privilege management, privileged session management, and SSH key management. The platform supports compliance with NIS2, DORA, NIST, PCI-DSS, HIPAA, and ISO-IEC 27001. Installation typically takes only a few minutes, and a complete production-ready PAM can be achieved in less than a month with Securden Unified PAM. -
5
StandardFusion
StandardFusion
A GRC solution for technology-focused SMB and Enterprise Information Security teams. StandardFusion eliminates spreadsheet pain by using a single system of record. Identify, assess, treat, track and report on risks with confidence. Turn audit-based activities into a standardized process. Conduct audits with certainty and direct access to evidence. Manage compliance to multiple standards; ISO, SOC, NIST, HIPAA, GDPR, PCI-DSS, FedRAMP and more. Manage vendor and 3rd party risk, and security questionnaires easily in one place. StandardFusion is a Cloud-Based SaaS or on-premise GRC platform designed to make InfoSec compliance simple, approachable and scalable. Connect what your organization does, with what your organization needs to do.Starting Price: $1800 per month -
6
6clicks
6clicks
6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRamp and many other standards. Hundreds of businesses trust 6clicks to set up and automate their risk and compliance programs and streamline audit, vendor risk assessment, incident and risk management and policy implementation. Easily import standards, laws, regulations or templates from our massive content library, use AI-powered features to automate manual tasks, and integrate 6clicks with over 3,000 apps you know and love. 6clicks has been built for businesses of all shapes and sizes and is also used by advisors with a world-class partner program and white label capability available. 6clicks was founded in 2019 and has offices in the United States, United Kingdom, India and Australia. -
7
WestFax
WestFax
#1 rated HIPAA Compliant Fax Service. 100% cloud based. No hardware required. We can port your existing fax number or give you a new number (toll free available as well). HIPAA COMPLIANT FAX Secure, HIPAA compliant, cloud based fax server solution that enables users to send and receive high volume fax. FAX API We've done hundreds of HIPAA compliant API integrations for some of the largest healthcare companies in the world. When you choose WestFax we will provide a dedicated API programmer to help you every step of the way. If you're looking for Fax API integration, High Volume Broadcast Fax, Fax to e-mail or any other fax solution, WestFax is here to help.Starting Price: $0.01 -
8
SaltStack
SaltStack
SaltStack is an intelligent IT automation platform that can manage, secure, and optimize any infrastructure—on-prem, in the cloud, or at the edge. It’s built on a unique and powerful event-driven automation engine that detects events in any system and reacts intelligently to them, making it an extremely effective solution for managing large, complex environments. With the newly launched SecOps offering, SaltStack can detect security vulnerabilities and non-compliant, mis-configured systems. As soon as an issue is detected, this powerful automation helps you and your team remediate it, keeping your infrastructure securely configured, compliant, and up-to-date. The SecOps suite includes both Comply and Protect. Comply scans and remediates against CIS, DISA-STIG, NIST, PCI, HIPAA compliance standards. And Protect scans for vulnerabilities and patches and updates your operating systems. -
9
Upland InterFAX
Upland Software
InterFAX provides HIPAA & PCI-DSS compliant, cloud-based, scalable fax solutions for businesses of all sizes. The service is ideal for multi-office and remote workers as users may securely access the Control Panel from any internet-enabled device. Features include comprehensive audit trails, automatic fax deletion upon delivery, enterprise user management, as well as an integrated faxing platform/API with automatic fax removal. A Business Associate Agreement (BAA) is available upon request.Starting Price: $9.95 per month -
10
Plum Voice Cloud IVR
The Plum Group
Plum Voice is the leading independent interactive voice response (IVR) provider in the market. The company powers telcos across the world with its fully comprehensive Cloud IVR solution. Reliable, flexible, and secure, the Plum Voice Cloud IVR gives users the freedom to automate and control their most critical business processes or customer touch point over the phone without the hassle of managing complex telephony infrastructure. The solution is also HIPAA and PCI-DSS level 1 compliant, so users can assure that Plum Voice Cloud IVR can help securely handle critical medical and financial information. -
11
Rocket Passport
Rocket Software
Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows. -
12
Rocket Secure Host Access
Rocket Software
Rocket® Secure Host Access is a security-first terminal emulation solution designed to protect access to critical host and mainframe applications. It extends modern identity and access management (IAM) controls directly to green screen environments. The platform enables phishing-resistant, passwordless authentication to reduce credential-based threats. Rocket Secure Host Access supports compliance with regulations such as HIPAA, PCI-DSS, and DORA. It works across desktop, web, and hybrid environments for flexible deployment and consolidated ongoing administration. Strong encryption standards like TLS 1.3 and SSH help safeguard sensitive data. The solution strengthens enterprise security without disrupting existing workflows. -
13
Nutanix Security Central
Nutanix
NCM Security Central unifies cloud security operations for your workloads and data on any cloud type while automating incident response with intelligent analysis and regulatory compliance. Build an automated, multi-cloud response dashboard and platform for critical initiatives like defense-in-depth and Zero Trust (ZTA). Quickly assess your risk of a security incident by understanding the vulnerabilities in your apps and data before you’re compromised. Instantly comply with industry standards using custom audits across clouds from public to on-premises without a heavy management lift. Correlate potential security vulnerabilities using Qualys’ scanning integration, then leverage the power of Nutanix X-Play to automate incident response or create micro-segmentation workflows. Gain asset visibility across workloads anywhere, then audit these findings against standards like CIS, NIST CSF v1.1, PCI-DSS v3.2.1, HIPAA for public clouds, or PCI-DSS v3.2.1 and DISA STIG for Nutanix on-prem. -
14
Paytia
Paytia
Take secure & compliant payments over the phone and get real-time authorisation. With Paytia your customers use their keypad to communicate card data securely. They're protected, trust in your business is increased — plus it's no longer exposed to fines and charges for breaking payment-security rules. Paytia’s PCI-DSS certified phone-payment solutions give your customers the same protection they expect which shopping in-store or online, which means you no longer need to hear or store their card data.Starting Price: From $11.10 -
15
Cloudnosys
Cloudnosys
Cloudnosys is an AI-powered cloud security, compliance, and automation platform for AWS, Azure, and GCP. It enables organizations to secure their multi-cloud environments through continuous monitoring, intelligent threat detection, and automated remediation of security and compliance risks. The platform scans cloud infrastructure across services such as IAM, VPC, S3, CloudTrail, and GCP-native components to detect misconfigurations, vulnerabilities, and policy violations in real time. Cloudnosys supports key regulatory and industry frameworks including PCI-DSS, HIPAA, FISMA, and AWS CIS Benchmarks, helping organizations meet compliance requirements quickly and efficiently. Cloudnosys is regionally compliant and supports regulatory mandates across the United States, European Union, MENA region, Brazil, and other jurisdictions, making it suitable for organizations operating in multiple geographies with varying data governance and compliance needs. -
16
MAAS
Canonical
Self-service, remote installation of Windows, CentOS, ESXi and Ubuntu on real servers turns your data centre into a bare metal cloud. Metal-As-A-Service (MAAS) provisioning with Windows, ESXi, Linux. Bare metal cloud with on-demand servers. Remote edge cluster operations. Infrastructure monitoring and discovery. Ansible, Chef, Puppet, SALT, Juju integration. Super fast install from scratch. VMWare ESXi, Windows, CentOS, RHEL, Ubuntu. Custom images with pre-installed apps. Disk and network configuration. API-driven DHCP, DNS, PXE, IPAM. REST API for provisioning. LDAP user authentication. Role-based access control (RBAC). Hardware testing and commissioning. MAAS delivers the fastest OS installation times in the industry thanks to its optimised image-based installer. Works on all certified servers from any major vendor. Discovers servers in racks, chassis and data centre networks. Supports major system BMCs and chassis controllers.Starting Price: $30 -
17
Ignyte Assurance Platform
Ignyte Assurance Platform
Ignyte Assurance Platform is an AI-enabled integrated risk management platform that helps organizations from different industries implement simplified, measurable, and repeatable GRC processes. One of the main objectives of this platform is to ensure that users are able to easily keep up and comply with changing regulations, standards, and guidelines related to cybersecurity. Ignyte Assurance Platform provides users with automated ways of continuously monitoring and assessing how their organization is adhering to the requirements specified under GDPR, HIPAA, PCI-DSS, FedRAMP, FFIEC, FISMA, and PCI-DSS. Security frameworks and regulations are automatically mapped to the internal controls and policies they are implementing. The compliance management platform also offers audit management capabilities that make it easy for users to gather and organize the pieces of information and evidence needed by external auditors. -
18
Scrigno
GP Dati Hotel Service
Scrigno PMS is the web-based cloud suite designed to provide a single hotel management system for managing strategic areas of the hotel. The value of Scrigno PMS consists of the use of a centralized Oracle database, to which all the specific application modules of each department are connected. Furthermore the PCI-DSS certification and GDPR compliant procedures guarantee complete information and data security for both the Hotel and Customers. Centralized business intelligence, reports, accounting and invoicing. CRS, Revenue Management Systems, POS e F&B, Wellness, Marketing Automation, Concierge App, ERP. for every hotel the right solution at the right price. on the most secure PCI-DSS compliant catacenter in Europe. Scrigno PMS was designed to allow hotel companies to implement customer relationship marketing strategies, where customer information is the foundation on which the entire hotel chain information system is built. -
19
opConfig
FirstWave
opConfig can automate everything from config push to alerting on changes and enforcing compliance. Introduce operational delegation to your organization and allow the troubleshooting of your network devices without giving 'root' access. Implement your compliance policy with PCI-DSS, HIPAA, COBIT and more using prebuilt industry standard rule sets (eg Cisco-NSA) or customize your own. Collects and backs-up configuration information in all environments, all vendors hardware and software, cloud-based, on-premise and hybrid. opConfig gives you the ability to create robust command sets that can aid in root cause analysis of faults. Our software solutions scale horizontally and vertically. We have provided monitoring and management solutions for over 200k nodes. Compare configuration data with older versions or against other devices. Use compliance policies as a task sheet to ensure all devices are compliant. -
20
Cloud Raxak
Cloud Raxak
Businesses want to take advantage of the flexibility, scalability, and speed of the cloud. However, lack of proactive and automated processes for cloud management can lead to challenges such as increased costs, higher residual risk, and the impediment of DevOps. By delivering consistent security and compliance across cloud environments, Cloud Raxak enables businesses to undergo successful cloud transformations while reducing the risk, time, and costs involved. Raxak Protect is a SaaS-based security offering that empowers IT and application development teams, by simplifying and automating security and compliance across private and public clouds. eading edge security profiles based on government and industry standards (CIS, DISA & NIST STIGs, PCI-DSS, HIPAA, FFIEC, FISMA, etc.). Automatic integration and application of security profiles, so that cloud apps can be deployed quickly, cost-effectively, and without human error. -
21
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance. -
22
Neontra
TXIO
Neontra is a made-in-Canada online solution for managing your money. It is similar to YNAB and Mint, but our goal is to become a trusted, next-generation Personal Finance Assistant (PFA) that can guide you toward a brighter, more secure financial future. How we are different: Neontra is forward looking — we predict your behaviour based on historical data, resulting in better goal-based planning and accurate forecasts of your financial future Gain Personalized Insights into your financial life, including our Health Check: a report card on your finances Expense Explorer — a deep-dive into your spending that helps you identify new ways to save Use Neontra How You Want — connect your accounts for automatic updates, or if you prefer a more anonymous experience, import your data from files or by hand. Security and Privacy — we are SOC2 certified, the AICPA’s most stringent criteria for security, confidentiality and privacy. Your data is safe with us. -
23
Radware Client-Side Protection
Radware
Cybercriminals are targeting an unmonitored source for personal and financial data, the application supply chain. This includes the dozens of automatically trusted third-party services embedded in your application environments that can expose user-entered addresses, credit card numbers, and more. Protect the data path between end users’ browsers and third-party services by extending Radware’s blanket of security to your application supply chain. Our advanced client-side protection complies with new PCI-DSS 4.0 requirements, so you can keep your customer data safe, and your reputation intact. Discover third-party scripts and services running on the browser side of your application. Receive real-time activity tracking alerts and threat-level assessments according to multiple indicators (compliant with PCI-DSS 4 regulations). Prevent data leakage by blocking destinations that are unknown or have illegitimate parameters. -
24
MetaSource MetStor
MetaSource
MetaStor is a secure, cloud-based enterprise content management and document management platform that enables organizations to digitize, store, search, retrieve, route, and manage business documents and content from any device with a clean, intuitive interface that requires minimal training. Built on OpenText AppEnhancer technology, MetaStor breaks down information silos by unifying systems that create, store, and deliver content to process participants, connecting capture, management, and workflow automation to streamline business processes such as loan boarding, invoice processing, human resources, accounts payable, and other paper-intensive tasks. It supports unlimited users with multiple security layers, including PCI-DSS Level 1, SOC 2 Type 2, and HIPAA compliance, configurable password rules, robust audit trails, and document-level security, while providing disaster recovery with server and location redundancy and real-time replication to protect against data loss. -
25
BitRaser File Eraser
Stellar Information Technology
BitRaser File Eraser is a privacy-safeguarding software that permanently erases files, folders, volumes, Internet history, etc. stored on laptops, desktops, and servers beyond the scope of data recovery. The software meets the daily data sanitization requirements of organizations and governments by erasing data securely. The software allows you to schedule the erasure process & maintain detailed log reports of all files deleted for meeting statutory & regulatory compliance needs for data security & privacy – SOX, GLB, HIPAA, ISO27001, EU-GDPR, PCI-DSS. Cloud connectivity helps you maintain the reports on the secure BitRaser cloud console from where you can extract these reports at a later date.Starting Price: $29.99 one-time payment -
26
Cetbix GRC & ISMS
Cetbix
In three steps, you can achieve information security self-assessment, ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA, and more. Cetbix® ISMS strengthens your certification. Information security management system that is comprehensive, integrated, documents ready and paperless. Cetbix® online SaaS ISMS. ISMS software from Cetbix®. Other features include IT/OT Asset Management, Document Management, Risk Assessment and Management, Scada Inventory, Financial Risk, Software Implementation Automation, Cyber Threat Intelligence Maturity Assessment, and others. More than 190 enterprises worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations. -
27
Kitecyber
Kitecyber
Kitecyber provides a hyper-converged endpoint security solution that provides comprehensive security and meets compliance requirements of organizations for SOC2, ISO27001, HIPAA, PCI-DSS, GDPR etc. Our unique endpoint-based approach eliminates the need for cloud gateways or local appliances. The hyper-converged offering includes the following protections: 1) Secure Web Gateway to safeguard internet access 2) Eliminate Shadow SaaS and Shadow AI) 3) Anti-Phishing measures to protect user credentials 4) Zero Trust Private Access (Next gen VPN) 5) Data Loss Prevention across all devices—Mac, Windows, and mobile 6) Device Management for Mac, Windows, and mobile for all employees, BYOD devices and 3rd party contractors 7) Continuous Compliance Monitoring 8) User Behavior Analysis to identify potential risks -
28
SecOps
SecOps
Scan for vulnerable and unpatched operating systems, 3rd party software, and libraries in your virtual machines, network devices, appliances and endpoint workloads prioritized by risk. Efficiently manage and deploy critical security updates with our automated patching solution. Pre-validated and revertible patches with one-click deployment. Assess configurations of your servers, network devices and endpoints. Use our proprietary compliance patching technology to fix the gaps for CIS Level 1&2, PCI-DSS, HIPAA, ISO 27001 & more. From static image to dynamic running instances , Discover, track and continuously secure docker containers, Kubernetes pods and microservices. -
29
CoreStack
CoreStack
CoreStack, an AI-powered multi-cloud governance solution, empowers enterprises to rapidly achieve Continuous and Autonomous Cloud Governance at Scale. CoreStack enables enterprises to realize outcomes such as 40% decrease in cloud costs and 50% increase in operational efficiencies by governing operations, security, cost, access, and resources. CoreStack also assures 100% compliance with standards such as ISO, FedRAMP, NIST, HIPAA, PCI-DSS, AWS CIS & Well Architected Framework (WAF). CoreStack works with many large global customers across multiple industries including Financial Services, Healthcare, Retail, Education, Telecommunications, Technology and Government. CoreStack was recognized as IDC Innovator in Cloud Management Solutions and in the Gartner Magic quadrant for Cloud Management Platforms in 2020. CoreStack is a Microsoft Azure Gold & Co-Sell Partner and Amazon AWS Advanced Technology Partner.Starting Price: $49.00 per month -
30
Cloudaware
Cloudaware
Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. Cloudaware is designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware integrates out-of-the-box with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and over 50 other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.Starting Price: $0.008/CI/month -
31
DuploCloud
DuploCloud
No-code/low-code infrastructure automation for cloud security and compliance done right the first time. Use DuploCloud. Automated provisioning and orchestration across the network, compute, storage, containers, cloud-native services, continuous compliance and developer guardrails, with 24/7 support. DuploCloud accelerates time to compliance by natively integrating security controls into SecOps workflows the first time, including, monitoring and alerting for PCI-DSS, HIPAA, SOC 2 and GDPR. Easily migrate on-premises to cloud or cloud to cloud with seamless automation and unique data migration techniques to minimize downtime. DuploCloud’s no-code/low-code software platform is your DevSecOps expert, speeding time-to-market by translating high-level application specifications into detailed and fully managed cloud configurations. With pre-programmed knowledge of over 500 cloud services, the platform automatically creates and provisions all the necessary infrastructure-as-code for you app.Starting Price: $2,000 per month -
32
Zirozen
Zirozen
Zirozen is a unified autonomous endpoint management platform that delivers real‑time visibility and control across your entire IT environment to network equipment and cloud infrastructure, via an intuitive drag‑and‑drop dashboard. Its AI‑powered engine continuously scans for vulnerabilities, misconfigurations, missing patches, and unauthorized software, automatically prioritizing and remediating risks based on severity scores. Zirozen automates cross‑platform patch and configuration management with policy‑driven scheduling, continuous compliance auditing for standards like GDPR, HIPAA, and PCI‑DSS, software metering and license optimization, file integrity monitoring, application control, and malicious activity detection. Deep integrations eliminate tool sprawl by correlating security, asset, and inventory data in one console, while customizable alerts and centralized reporting enable proactive SecOps with reduced mean time to resolution. -
33
Spacelift
Spacelift
Spacelift, via the Spacelift Infrastructure Orchestration Platform, manages the entire infrastructure lifecycle – provisioning, configuration and governance. Spacelift integrates with existing infrastructure tooling (e.g., Terraform, OpenTofu, CloudFormation, Pulumi, Ansible) to provide a single integrated workflow to deliver secure, cost-effective and resilient infrastructure, fast. Spacelift is redefining how infrastructure is provisioned and governed with Spacelift Intent, the first open source, agentic, natural language model for cloud infrastructure. Intent allows developers to provision resources instantly without writing HCL, while DevOps and Platform teams maintain full visibility, policy control, and auditability. Built on Terraform providers, Intent creates a new path for agility, complementing IaC and GitOps by making fast, low-ceremony provisioning safe and governed.Starting Price: $399 per month -
34
Corner Bowl Event Log Manager
Corner Bowl Software Corporation
An enterprise class Centralized Windows Event Log Management Software Tool. A Centralized Log Consolidator. A Real-Time Windows Event Log, Syslog and Application Log Monitor Software Tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.Starting Price: $84 -
35
Probely
Probely
Probely is a web vulnerability scanner for agile teams. It provides continuous scanning of web applications and lets you efficiently manage the lifecycle of the vulnerabilities found, in a sleek and intuitive web interface. It also provides simple instructions on how to fix the vulnerabilities (including snippets of code), and by using its full-featured API, it can be integrated into development processes (SDLC) and continuous integration pipelines (CI/CD), to automate security testing. Probely empowers developers to be more independent, solving the security teams' scaling problem, that is usually undersized when compared to development teams, by providing developers with a tool that makes them more independent when it comes to security testing, allowing security teams to focus on more important and critical activities. Probely covers OWASP TOP10 and thousands more and can be used to check specific PCI-DSS, ISO27001, HIPAA, and GDPR requirements.Starting Price: $49.00/month -
36
StrongKey
StrongKey
StrongKey has been in the PKI business for almost 20 years, with implementations across the globe in a diverse range of applications. StrongKey Tellaro provides a full public key infrastructure (PKI) platform for managing keys and digital certificates. With a built-in hardware security module (HSM) and EJBCA server, customers are able to issue digital certificates with our Tellaro E-Series based on securely generated public keys. Private keys are generated and stored within the HSM. Our PKI management solution integrates with TLS/SSL, identity access management (IAM), digital signature, secrets management, and device management systems. StrongKey Tellaro is a comprehensive software suite that provides strong authentication, encryption, tokenization, PKI management, and digital signature management. Our open-source software includes a FIDO® Certified FIDO2 server, and we support flexible data center and cloud deployment models. -
37
InsightAppSec
Rapid7
Highest rated DAST solution by an independent research firm three years in a row. Automatically assess modern web apps and APIs with fewer false positives and missed vulnerabilities. Fast-track fixes with rich reporting and integrations, and inform compliance and development stakeholders. Effectively manage the security assessment of your application portfolio, regardless of its size. Automatically crawl and assess web applications to identify vulnerabilities like SQL Injection, XSS, and CSRF. The modern UI and intuitive workflows built on the Insight platform make InsightAppSec easy to deploy, manage, and run. Scan applications hosted on closed networks with the optional on-premise engine. InsightAppSec assesses and reports on your web app's compliance to PCI-DSS, HIPAA, OWASP Top Ten, and other regulatory requirements.Starting Price: $2000 per app per year -
38
SharkStriker
SharkStriker
SharkStriker is an ISO27001-certified cybersecurity company offering human-led holistic security services. We were founded with the sole purpose of solving industry challenges like skill shortage, non-compliance and managing multiple vendors for cybersecurity. The name SharkStriker was inspired by the orca whales that even sharks are afraid of. They intend to be the orca whales of the digital ocean, protecting businesses from the sharks of cyberspace. We offer a gamut of industry-specific tailored cybersecurity solutions and services such as: 360-degree cybersecurity posture assessment Managed Detection and Response SIEM as service SOC-as-service IoT and Cloud Security assessment and augmentation VAPT services Compliance management for regulatory and global regulations like:- GDPR PCI-DSS ARAMCO SAMA ISO 270001 NEST and more. By having a team of threat experts working at the ground level with enterprises across industries.Starting Price: $9.99/month -
39
JustGoCloud
GoAutoDial
Welcome to JustGoCloud! GOautodial's on-demand cloud contact center soution. Get your call center up and running in as little time as possible. Guaranteed 99.99% uptime. Running on high availability servers located in the US East and West coasts. SSAE-16 SOC 1 & 2 Type 1 certified, HIPAA and PCI DSS compliant datacenters. With web application and SIP firewall to prevent and protect against HTTP DOS brute-force and SIP attacks. Once your trial ends, we will be sending you an invoice for the upcoming month to continue your paid subscription. If you wish to continue, just settle the invoice and you’re good to go.Starting Price: $15 per user per month -
40
Azure Key Vault
Microsoft
Enhance data protection and compliance with Key Vault. Secure key management is essential to protect data in the cloud. Use Azure Key Vault to encrypt keys and small secrets like passwords that use keys stored in hardware security modules (HSMs). For more assurance, import or generate keys in HSMs, and Microsoft processes your keys in FIPS validated HSMs (hardware and firmware) - FIPS 140-2 Level 2 for vaults and FIPS 140-2 Level 3 for HSM pools. With Key Vault, Microsoft doesn’t see or extract your keys. Monitor and audit your key use with Azure logging—pipe logs into Azure HDInsight or your security information and event management (SIEM) solution for more analysis and threat detection. -
41
SentinelTrails
LogSentinel
Our blockchain-based technology does not allow any audit trail changes or deletion even by privileged users. Meet the audit trail requirements of many standards and regulations: GDPR, PSD2, PCI-DSS, ISO 27001, HIPAA, SOX, etc. Real-time detailed analysis of everything that happens, as well as AI-driven anomaly detection will prevent any fraud attempts. Straightforward agent or agentless integration of all existing systems, as well as a simple RESTful API. Have a unified command centre for real-time control and insight across all systems and users. Demonstrate compliance at reduced operational cost and minimise effort on audit, forensics and fraud detection. Never again worry about the integrity of your critical data – we use blockchain so no one can ever tamper with it. -
42
Promodag Reports
Promodag
Promodag, a recognized leader in Exchange reporting, offers you a versatile reporting tool on Microsoft Exchange that is compatible with your on-premises or hybrid organizations as well as with your Office 365 tenant. Overlaying governance protocols (SOX, PCI-DSS, HIPAA, GLBA, FISMA) requires the implementation of often complex compliance measures and detailed reporting on messaging use. Promodag Reports for Exchange enables you to respond to requests from IT security and Human Resources managers and to implement a dynamic and proactive security policy. Promodag Reports is particularly suitable for monitoring observance of the "Right to Disconnect" charter within your company, which enshrines employees’ right to disconnect from digital communications outside of regular hours. It reports on the indicators you need to respond quickly and accurately to the demands of Human Resources and business management in the context of the development of telecommuting. -
43
Dogtag
Dogtag
The Dogtag Certificate System is an enterprise-class open source Certificate Authority (CA). It is a full-featured system, and has been hardened by real-world deployments. It supports all aspects of certificate lifecycle management, including key archival, OCSP and smartcard management, and much more. The Dogtag Certificate System can be downloaded for free and set up in less than an hour. Dogtag is a collection of technologies that allow enterprises to deploy PKI on a large scale. Certificate issuance, revocation, and retrieval. Certificate Revocation List (CRL) generation and publishing. Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA) for organizational authentication and policies. Encryption key archival and recovery. Smartcard lifecycle management. Token profiles, token enrollment, on-hold, key recovery, and format. Face-to-face enrollment with the security officer workstation interface. -
44
Akeyless Identity Security Platform
Akeyless
Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight. -
45
HIPAA Vault
HIPAA Vault
Our HIPAA Compliant Hosting & Cloud Solutions are the perfect solution for healthcare professionals and businesses in need of HIPAA Compliant secure cloud and website hosting services. HIPAA Vault’s Managed Services include less-than-15 minute response times for critical alerts, and 90% first call resolution. Our dedicated IT professionals handle everything from general support questions and maintenance, to more complex issues such as advanced firewall configurations and system monitoring. This can result in reduced operating costs, while giving you the latest in security updates and compliance. If you need a Windows environment and want peace of mind, you should go with our HIPAA Compliant Windows Hosting plan. Find the right HIPAA email messaging solution to match your business needs. Secure, convenient, and flexible. -
46
P2P Telehealth
Omnicrom
Easy, Compliant & Secure Telehealth Video consultations that are: Easy. Works on your phone or computer browser. No software to install. Compliant. Enables you to comply with HIPAA. Secure. Connects peer-to-peer with end-to-end encryption. Easy to stay compliant. Custom-built for compliance with HIPAA unlike some others. HIPAA stands for the "Health Insurance Portability and Accountability Act of 1996". It's a US federal mandate that requires the protection and confidential handling of "protected health information". P2P Telehealth can help you comply with its HIPAA obligations. Please review HIPAA to ensure your practices comply. HIPAA Compliant. There are no official certifications for HIPAA compliance. Nonetheless, P2P Telehealth has been built using technology, structures and processes that will make it easier for you to comply. This means all video and audio travel directly from you to your patient. No video or audio data travel through a central server -
47
CyberArk Machine Identity Security
CyberArk
CyberArk Machine Identity Security provides comprehensive protection for all machine identities, including secrets, certificates, workload identities, and SSH keys. The platform offers centralized visibility and scalable automation to secure these non-human identities throughout their lifecycle. Designed to help organizations reduce risk and maintain resilience, CyberArk ensures secure machine identity management across on-premises, cloud, and hybrid environments. -
48
Delve
Delve
Delve is an AI-native compliance platform designed to automate and streamline the process of obtaining and maintaining certifications such as SOC 2, HIPAA, ISO 27001, GDPR, and PCI-DSS. By integrating with a company's existing tech ecosystem, including tools like AWS, GitHub, and internal systems, Delve deploys AI agents that continuously scan for compliance gaps and automatically gather necessary evidence, reducing the manual workload typically associated with compliance tasks. Features include AI-driven code scanning to detect business logic errors, daily infrastructure monitoring, autofill for security questionnaires, and alerts for unauthorized access. Delve's platform offers a white-glove onboarding experience and provides dedicated support via Slack, ensuring that teams have the assistance they need throughout the compliance process. It is designed to support both startups and enterprises, aiming to save significant time and resources by automating manual compliance activities. -
49
Keyfactor Command
Keyfactor
Join the world’s leading enterprises running on the most complete and scalable managed PKI as-a-Service. Get all the advantages of PKI without the complexity. Whether it is securing your network, sensitive data, or connected devices, you turn to PKI as the proven technology to establish trust. But building and running your PKI is a complex and expensive undertaking. Getting it right is critical, but it’s not an easy feat. Finding and retaining the right people with the right skillsets, adherence to industry standards, and the expense of hardware and software required to run a robust PKI are all serious challenges — not to mention all that is at stake when something goes wrong. Easily organize and manage your inventory and set proactive alerts to notify users of expired or non-compliant certificates before they become a headache. -
50
Givecloud
Givecloud
When donors are delighted, they are more likely to give more frequently and quickly. Our technology stack has been used by over 2000 nonprofits over 8 years. Take your fundraising further when you connect Givecloud to your favorite nonprofit tools and services. Givecloud provides comprehensive support plans to fit your needs. Givecloud is trusted by national brands. We are proudly SOC 2 Type II compliant and PCI-DSS compliant. Givecloud is your all-in-one digital fundraising platform. Accomplish more with fundraising apps and features, all in one place. Join the thousands of nonprofits benefitting from highly engaged donors eager to support your mission. Our customers boast an impressive 68% donor conversion rate, surpassing the 25-35% rates seen with other fundraising options. Unleash the power of donor engagement with us. Givecloud can seamlessly connect with your existing nonprofit tools and services, eliminating cumbersome organizational changes and making integrations easy.Starting Price: $69 per month