Alternatives to WiKID Authentication System
Compare WiKID Authentication System alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to WiKID Authentication System in 2026. Compare features, ratings, user reviews, pricing, and more from WiKID Authentication System competitors and alternatives in order to make an informed decision for your business.
-
1
ManageEngine Endpoint Central
ManageEngine
ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security. -
2
1Password
1Password
1Password is a secure, scalable, and easy-to-use password manager that's trusted by the world's leading companies. Using 1Password makes it easy for your employees to stay safe online. Once 1Password is part of their workflow, good security habits will become second nature. 1Password Advanced Protection is now available with 1Password Business. Set Master Password policies, enforce two-factor authentication team-wide, restrict access with firewall rules, review sign-in attempts and require your team to use the latest version of 1Password. Our award-winning apps are available for Mac, iOS, Linux, Windows, and Android. 1Password syncs seamlessly across devices, so your employees always have access to their passwords. When everyone uses 1Password, your risk goes down — and your productivity goes up. -
3
Cerberus FTP Server
Redwood Software
Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations. - FTP/S, SCP, SFTP, HTTPS - SAML SSO - Active Directory & LDAP - Secure SSL Encryption - Two-Factor Authentication - IP Auto-Banning and Geoblocking - HIPAA Compliant - FIPS 140-2 Validated - Advanced Reporting - Comprehensive Auditing - Web File Transfer Client - Email Notifications - Event Support & Automation - File Retention Policies -Unlimited Connections -Virtual Directories -Users & Groups -Detailed Logs -Full IPv6 Support -FTP with TLS/SSL -SOAP control API -Web Administration -SSH2 SFTP and SCP -Public Key Authentication -
4
Inuvika OVD Enterprise
Inuvika
Our virtual desktop solution, OVD Enterprise, delivers Windows and Linux apps and desktops (VDI) to any device. Built on Linux, it reduces Windows licensing requirements, needs less infrastructure and reduces total costs by up to 60% compared to Citrix or VMware Horizon (Omnissa). Microsoft SQL Server licenses are not required. It can be deployed on-premises or through any cloud provider. OVD is also available as a service through our network of Managed Services Providers. Migration from Citrix or Horizon is easy. OVD Enterprise integrates with today's leading enterprise standards, including any directory service, storage or hypervisor. Key Features: -Deliver Windows and Linux apps and desktops -Use any device - macOS, Windows, Linux, iOS/Android, Chromebook, Raspberry Pi, or any HTML5 Web browser. -Full multi-tenancy support -Full USB redirection -Integrated Two-Factor Authentication -Integrated secure gateway allows for secure remote access. No need for NetScalerStarting Price: $8.55/concurrent user/month -
5
CPTRAX for Windows
Visual Click Software
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. -
6
ActivTrak
Birch Grove Software
ActivTrak helps enterprises drive operational efficiency through AI-powered workforce intelligence. Its award-winning platform transforms work activity data into actionable insights for workforce management, workforce productivity and workforce planning — enabling measurable ROI and stronger business outcomes. More than 9,500 organizations trust ActivTrak's technology, recognized by Deloitte's Technology Fast 500, Inc. 5000, TrustRadius, and G2. Backed by Sapphire Ventures and Elsewhere Partners, ActivTrak leads the way in privacy-first workforce data that fuels the future of intelligent work.Starting Price: $10/user/month billed annually -
7
Symantec VIP
Broadcom
Your key to one swipe two-step authentication. Two-factor authentication is easy to enable and prevents attacks. With just a swipe of a finger, or use of a security code, your information is secure. Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap. -
8
AuthLite
AuthLite
AuthLite secures your Windows enterprise network authentication and stays within your budget. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication. With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it. AuthLite eliminates the "Pass the Hash" (PtH) attack vector against your administrative accounts by limiting the privileges assigned to a user. Require two-factor logon before granting the domain admins group SID. AuthLite works with your existing RDP servers and software. No changes are needed to RDP client machine software or drivers. Even when you are offline, your account logon is still protected with two-factor authentication. AuthLite uses the strong cryptographic HMAC/SHA1 Challenge/response feature of the YubiKey token to support cached/offline logon.Starting Price: $500 per year -
9
Protectimus
Protectimus Limited
Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.Starting Price: $33 per month -
10
Delinea Cloud Suite
Delinea
Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions. -
11
PowerTerm WebConnect HostView
Ericom Software
In today's economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm® WebConnect HostView web-to-host emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Centrally manage configuration and software updates - save on time and administrative resources. Increase productivity; enable anytime, anywhere access to business-critical applications using a standard web browser, regardless of the user's physical location. Reduce costs associated with individual licensing, maintenance, support and updates. SSL, SSH, SFTP, Active Directory and LDAP integration, Single Sign-On, authentication (including Kerberos), RADIUS, RSA® SecurID® and SecurEnvoy® SecureAccess and SecurICE two-factor authentication support, and more. -
12
Primo VPN
IAInnocationLab
VPN solution for your connectivity needs supports OSX versions including Catalina. PPTP MAC Over OSX versions including Catalina (10.15). PPTP VPN Protocol over Catalina. L2TP over IPSec Protocol, L2TP/IPSec VPN Protocol fast and reliable. Multiple connections, supports multiple VPN connections simultaneously. Genuine MAC OS protocol. Based on the original MAC OS VPN protocols. Secured credentials storage and all credentials stored in keychain mac secured infrastructure.Starting Price: $3 per month -
13
Only Netwrix Privilege Secure for Discovery removes your biggest undiscovered security risk by providing Just-Enough access, Just-in-Time, eliminating standing privilege with continuous scanning and agentless, faultless simplicity, unlike legacy privileged access management (PAM) solutions that leave unprotected attack surfaces and are difficult to deploy. Netwrix Privilege Secure for Discovery ensures privileged access is precisely allocated and continuously inventoried by granting privileged access on a Just-in-Time, Just-Enough basis using two-factor authentication. Netwrix Privilege Secure for Discovery was purpose-built to address this problem, using an identity-enabled response, and be a force multiplier to security programs worldwide. The founding team especially had in mind those looking to secure and enable access to global, distributed and always scaling infrastructure. Netwrix Privilege Secure for Discovery was purpose-built to address this problem and be a force multiplier.
-
14
Rohos Logon Key
Tesline-Service
Two-factor authentication solution that converts any USB drive into a security token for your computer and allows you to access Windows securely. Works also with RFID, OTP, U2F tokens by replacing the Windows login password. Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F or industrial RFID access cards. The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes. Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.Starting Price: $32 one-time payment -
15
LayerX
LayerX
LayerX Enterprise Browser Extension analyzes web sessions at the utmost granular elements to prevent attacker-controlled webpages from performing malicious activities and users from putting enterprise resources at risk, without disrupting their legitimate interactions with websites, data and applications Prevent risk to your data, apps, and devices with access and activity policies. Enhance identity protection by using the browser extension as an additional authentication factor. Dynamically scan every web page to disclose malicious code, content and files. Monitor user activities to detect potential compromise or data loss. Create adaptive or rule-based policies that respond to detected risk with a wide range of protective actions, from restricting ֵactivities and web page behavior to full blocking. -
16
Intermedia SecuriSync
Intermedia Cloud Communications
Three functions in one product: file sync & share, real-time backup, and antivirus (including ransomware). Easily save, synchronize, and access the most current versions of files from any device, with unlimited versioning. Restore in real time files stored in the cloud, on desktops, mobile devices, and more. Reduce downtime from ransomware with built-in anti-malware and antivirus protection from Bitdefender. Guard against compromised passwords with two-factor authentication, administered from the HostPilot control panel. Your files will be protected with Bitdefender’s anti-malware and antivirus software—available for new and existing SecuriSync customers at no extra cost. Two-factor authentication lets administrators add a second layer of protection. Real-time backup of all PC files and mobile photos and videos. Restore files to any point in time with one click. Protects files & enables quick recovery from ransomware attacks.Starting Price: $14.99 per user per month -
17
Netwrix Privilege Secure
Netwrix
Netwrix Privilege Secure is a comprehensive Privileged Access Management (PAM) solution designed to enhance security by eliminating standing privileged accounts and implementing just-in-time access. Creating ephemeral identities that grant the necessary access only when required, reduces the attack surface and prevents lateral movement within the network. The platform offers features such as session monitoring, recording of privileged activities for audit and forensic purposes, and integration with existing vaults through its Bring Your Own Vault (BYOV) connectors. Additionally, it supports multi-factor authentication to validate user identities in line with zero trust principles. Netwrix Privilege Secure is designed for quick deployment, with initial setup achievable in less than 20 minutes and full deployment within a day. It also provides session management tools for monitoring and recording privileged activities, enhancing audit and forensic capabilities. -
18
LDAP
LDAP
LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol. Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments. Offers links to various standards documents and reference guides for in-depth exploration of the protocol. Features posts related to directory services, including software release news, new standards documents, specifications, and how-to articles. -
19
eScan
MicroWorld Technologies
eScan's next-gen antivirus solution that protects the home network from viruses, malware, ransomware, bots, and more, using a layered approach. With the unique combination of basic and modern techniques, eScan blocks a broad range of attacks. It comprises right from web filtering, signature-based malware detection and behavior analysis to innovative techniques like deep learning malware detection, exploit prevention, heuristic scan, and many more. eScan offers business endpoint protection and endpoint detection and response (EDR) solutions as well as anti-spam solutions for email and multi-factor authentication.Starting Price: $58.95/one-time/user -
20
MemberProtect
InetSolution
MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP. -
21
SolidPass
SolidPass
SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication tokens. SolidPass has bridged the traditional trade-off between usability and stronger security, and makes Challenge-Response (CR) and Transaction Data Signing (TDS) simple to use by incorporating advancements such as barcode scanning. Barcode scanning-based authentication can be used for Challenge-Response (CR) and Transaction Data Signing (TDS). Barcode scanning adds usability and convenience. -
22
IMCWire
IMCWire
IMCWire is a cloud-native press-release management and distribution platform for PR professionals, marketers, and organizations. Draft releases with our WYSIWYG editor offering real-time SEO guidance, version control, and role-based approvals. Leverage targeted distribution to syndicate to global wire services (AP News, Business Insider, Bloomberg, Yahoo Finance) and niche outlets by industry, region, or audience. Automate scheduling across time zones and follow-up campaigns based on engagement triggers. Monitor performance with a live dashboard tracking opens, clicks, pickups, and sentiment, and export white-label PDF/CSV reports. Boost SEO with embedded structured data (NewsArticle, FAQPage) and backlink syndication. Integrate seamlessly with WordPress, Drupal, Salesforce, HubSpot, or any CMS/CRM via REST API, plus no-code workflows through Zapier/Integromat. Ensure enterprise-grade security with OAuth/SAML SSO, two-factor authentication, and granular access controls.Starting Price: $100 -
23
Vault One
VaultOne Software
Have total control and visibility over who accesses your data, systems, applications, infrastructure and any other assets, preventing cyber attacks and data breaches. With VaultOne, protect your company’s resources and achieve compliance. VaultOne is redesigning the concept of privileged access management (PAM). Manage user access, credentials and sessions in a fast, secure and automated way. In a single and powerful solution, we offer multiple features, such as digital vault, password generator, sessions recording, auditing and reporting, customizable policies, disaster recovery and multi-factor authentication. If you’re looking for a solution to protect shared accounts, certificates and user access to applications, websites, servers, databases, cloud services and infrastructure, you’ve just found it. By creating customized access policies and managing users and privileges, you fight cyber attacks and avoid data breaches.4Starting Price: $99 per month -
24
Falcon Identity Threat Detection
CrowdStrike
Falcon Identity Threat Detection lets you see all Service and Privileged accounts on your network and cloud with full credential profiles and weak authentication discovery across every domain. Analyze every domain in your organization for potential vulnerability from stale credentials, and weak or stale passwords, see all service connections and weak authentication protocols in use. Falcon Identity Threat Detection monitors the domain controllers on-premises or in the cloud (via API) to see all authentication traffic. It creates a baseline for all entities and compares behavior against unusual lateral movement, Golden Ticket attacks, Mimikatz traffic patterns and other related threats. It can help you see Escalation of Privilege and anomalous Service Account activity. Falcon Identity Threat Detection reduces the time to detect by viewing live authentication traffic, which expedites finding and resolving incidents. -
25
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
26
Cisco Identity Intelligence is an AI-powered solution that bridges the gap between authentication and access, providing top-tier security insights without interruptions. By closing the gaps between authentication and access, Cisco Identity Intelligence solution protects your attack surface before attackers can make their move. Get a full picture of identity activity and clean up vulnerable accounts, eliminate risky privileges, and block high-risk access attempts. With seamless deployment, Cisco Identity Intelligence solution powers other Cisco security suites, resulting in deeper functionality that informs the right response to any threat. Attackers' methods are becoming increasingly more complex, which is why Cisco Identity Intelligence solution is built to protect your organization against identity threats, no matter how sophisticated they are.
-
27
BeyondTrust Password Safe
BeyondTrust
Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review. -
28
AuthN by IDEE
IDEE
Award winning, Enterprise-wide, Zero Trust Authentication as a Service. AuthN™ by IDEE eliminates all password based risks and reduces the cost of administrative overhead. Your fastest time to market for your transition to passwordless across the enterprise. AuthN™ is interoperable and can be deployed in addition to your existing SSO, hardware-token and password-management investments. Whether stand-alone or integrated, realize a tangible reduction of your risk exposure by completely removing the password. Insider threats and human errors are also reduced with no central credential databases of any kind. Our completely passwordless multi-factor authentication can keep your attackers at bay and keep you out of the headlines of tomorrow. Your favorite applications, SSO and password managers receive a plug & play security upgrade. AuthN™ supports open standards (e.g. RADIUS, SAML, OIDC) and offers custom plugins to help you leverage the additional benefits of AuthN™.Starting Price: €3 per user per month -
29
Altered Security
Altered Security
Altered Security offers a hands-on cybersecurity education platform featuring Red Team labs, cyber ranges, bootcamps, and certifications designed for Active Directory, Azure, and enterprise security. Through self-paced on-demand labs and in-person sessions, participants gain access to realistic, fully patched environments along with preconfigured VMs, detailed video courses (11–14+ hours), lab manuals, walk-through videos, and instructor support. Courses such as Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE), and AD CS Attacks cover topics including enumeration, privilege escalation, Kerberos, certificate-based attacks, lateral movement, hybrid Azure-PHF, and cloud persistence. Labs simulate enterprise networks with multiple domains and forests, guiding learners from non‑admin starts to enterprise admin compromise, and include exam attempts for industry-recognized certifications. -
30
AdRestore
Microsoft
Windows Server 2003 introduces the ability to restore deleted ("tombstoned") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code is based on sample code in the Microsoft Platform SDK. ADInsight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. Use its detailed tracing of Active Directory client-server communications to solve Windows authentication, Exchange, DNS, and other problems. ADInsight uses DLL injection techniques to intercept calls that applications make in the Wldap32.dll library, which is the standard library underlying Active Directory APIs such ldap and ADSI. Unlike network monitoring tools, ADInsight intercepts and interprets all client-side APIs, including those that do not result in transmission to a server. -
31
Visual Guard
Novalys
Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management costStarting Price: 1.55/month/user -
32
OpenOTP Security Suite
RCDevs
OpenOTP Security Suite is a European Enterprise-grade Security all-in-one Solution for Identity & Access Management (IAM), including : - Multi-Factor Authentication (MFA/2FA) with U2F / OTP, applicable even for Legacy Applications - Federation Services (SSO with OpenID & SAML / ADFS) - Network Access Control (protecting Wifi & Ethernet Swiches) - VPN security (via an included Radius Bridge), designed specifically for remote work - Windows logins & Remote Desktop Services (RDS) OpenOTP Security Suite combines mobile technology with proven security standards to offer professionals and non-professionals the best alternative, bringing modularity and flexibility to suit any infrastructure's needs. OpenOTP Security Suite is an enterprise-class European security solution designed for installation on-premises or in a private cloud. ++ Free Token App (and compatible with most existing hardware and software tokens) ++ Free 30-day Trial ++ Freeware (<25 users)Starting Price: €1.85/User/M -
33
BeyondTrust Pathfinder
BeyondTrust
BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring. -
34
CloudPanel
CloudPanel
CloudPanel is a free server control panel for PHP, built for the cloud for maximum performance and security. CloudPanel is a modern server control panel that makes it easier and more enjoyable to run your PHP Apps in the cloud. No contract, hidden costs, limitations, or restrictions. Ultra-fast lightweight components like NGINX, PHP-FPM and MySQL for maximum performance. Free SSL certificates for all of your domains, with one click, are automatically renewed. Shipped with multiple PHP versions. Running or changing the PHP version for an app is just a click. A clean and easy-to-use server control panel to get things done in no time. Commandline-application that provides commands for backing up and restoring databases, disabling two-factor authentification and many more. Supports more than ten languages, like English, German, Spanish, Chinese, Italian and many more. An additional layer of security is provided with two-factor authentication for secure CloudPanel login. -
35
Delinea Server Suite
Delinea
Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting. -
36
NoPass
NoPass
NoPass™ is a multi-factor authentication add on for remote users. In addition to the username and password, NoPass™ performs two additional factors of authentication – something you have and something you are. This utilizes smartphones and does not require the purchase of additional hardware authentication devices for each user. It also does not use SMS, which can also be costly and is vulnerable to being intercepted. With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (like RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this, Identité™ has introduced its NoPass™ Employee MFA solution, a lightweight feature that enhances the overall security and is adaptable with the leading authentication protocols that are in the market.Starting Price: $2 -
37
VisualSVN
VisualSVN Software Ltd.
VisualSVN Server is an enterprise-ready Subversion (SVN) server solution designed to make it easy to install, configure, and manage a full-featured version control server on Microsoft Windows systems, providing universal versioned storage with out-of-the-box operation and support for standard Subversion clients. It installs as a single package that offers a powerful management console implemented as a standard MMC snap-in for repository, user, and permission administration, and includes command-line tools and PowerShell scripting for automation. VisualSVN Server features a modern HTML5 web interface for browsing repositories, supports Active Directory single sign-on with secure authentication protocols, and protects against password guessing attacks. It enables advanced capabilities such as backup and restore with scheduled verification, access and operational logging, remote server administration across a network, and repository management delegation.Starting Price: $59 per license -
38
LDAP Administrator
Softerra
Work with several servers at once, organize them in groups, and easily copy data between them. LDAP Administrator supports LDAPv2 and LDAPv3 protocols and allows working with OpenLDAP, Netscape/iPlanet, Novell eDirectory, Oracle Internet Directory, Lotus Domino, Microsoft Active Directory, CA Directory, Siemens DirX, and any other LDAP server. Set various LDAP filters to display only the entries that match your criteria. Quickly access frequently viewed branches by setting a custom base DN to start browsing from. Jump to previously viewed objects using navigation history. And much more. Prevent directory data from being accidentally modified or deleted by making your LDAP server profiles read-only in LDAP Administrator.Starting Price: $250 one-time payment -
39
Atlassian Crowd
Atlassian
Single sign-on and user identity that's easy to use. Manage users from multiple directories - Active Directory, LDAP, OpenLDAP or Microsoft Azure AD - and control application authentication permissions in one single location. Make life easy for your users by giving them one username and password to log in to all the applications they need access to. Seamlessly integrate all your Atlassian products - like Jira, Confluence, and Bitbucket- to give your users one simple single sign-on (SSO) experience. Map any combination of directories to a single application – perfect for managing users not in your main directory - and manage authentication permissions in the same place. Get started with connectors for AD, LDAP, Microsoft Azure AD, Novell eDirectory, and more. You can even create your own custom connector. Can't make group changes in your directory? Keep your users in LDAP and define their authentication permissions in Crowd.Starting Price: $10 one-time fee -
40
Zentry
Zentry Security
Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies. -
41
S-Filer Portal
OKIOK Data
S-Filer Portal™ is a complete, on premise solution that allows large and small organizations to meet a wide range of secure file transfer, storage and sharing business requirements. It includes the functionality typically found in much more expensive Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) solutions. Unlike file sharing solutions designed for personal use, S-Filer Portal has been designed right from the start for enterprise use, resulting in better manageability and security. All files are stored encrypted in secure virtual vaults using AES 256 encryption and transferred securely using SSL/TLS and optional end to end encryption. Tight integration with Active Directory and LDAP provides internal users with Single Sign-On capability while external users are managed and authenticated in separate authentication domains. -
42
SoftNAS
Buurst
SoftNAS is a cloud-native, software-defined, full-featured enterprise cloud NAS filer product line for primary data storage, secondary storage and hybrid cloud data integration. It enables existing applications to securely migrate to and connect with the cloud without re-engineering. With enterprise-class NAS features like: high-availability, deduplication, compression, thin-provisioning, snapshots, replication, cloning, encryption (at rest and in transit), LDAP and Active Directory integration, and support for NFS, CIFS, iSCSI or AFP storage protocols, SoftNAS protects mission-critical and primary, active/hot data, backup/archive data and makes cloud data migration faster and more reliable. SoftNAS offers the broadest range of storage options in terms of price vs. performance and backend storage selection, on-demand at petabyte scale across the AWS and Azure Marketplaces or on-premises on VMware. -
43
FortiTrust Identity
Fortinet
FortiTrust Identity is a cloud-based subscription that simplifies identity and access management across enterprise hybrid environments. FortiTrust Identity (FTI) is cloud-based and natively integrated with the Fortinet Security Fabric to deliver a rich set of security controls and centralized management of user authentications, including multi-factor authentication. FTI enables you to begin your zero-trust journey with reliable user verification and strong authentication, plus ease of use for the end user. Adaptive, multi-factor, or passwordless authentication and identity federation for SSO across the enterprise hybrid environment are all included via user-based licensing. Ensure the right people get appropriate access to your data, resources, and applications across the enterprise. Increase certainty of user identity with the verification of another factor and adaptive authentication technique. -
44
Resfinex
Resfinex
Trade a variety of cryptocurrency on a secure platform. In order to encourage robust liquidity and tighter spreads in our markets, Resfinex employs a volume-tiered, maker-taker fee schedule. Fees are charged and deduced on a per-trade basis and will be taken in the currency you receive (ETH if you buy ETH/USDT or USDT if you sell ETH/USDT for example). We use the latest technologies, alongiside our expert security team to keep your funds safe, and to stay ahead of vulnerabilities and exploitation attempts. Two-Factor Authentication is highly recommended for every every user and each account has the option to enable it for actions such as withdrawals. Our DDoS mitigation techniques immediately resist any malicious attacks on our website that may threaten service performance. Multiple signatories are required to transfer funds out of cold storage, which is secured by ledger vault technology.Starting Price: 0.15% trading fee -
45
AD Admin Tool
LDAPSoft
AD Admin Tool is a simple and easy to use tool which allows you to browse, edit, query and export from active directory. With this tool you can view and edit active directory data including binary and images, export and import data to/from most popular file formats, edit attributes using many built-in editors, manage active directory users and their privileges, mass update entries using SQL-like syntax and use a multitude of other admin functions designed for making your work with active directory comfortable and efficient. With AD Admin Tool you can quickly and easily create and edit entries. LDAP connection profiles give you the opportunity to connect to the active directory server in one touch and only work with the selected active directory connection. With this tool you can connect to the active directory locally, remotely or using SSL.Starting Price: $395 one-time payment -
46
QOMPLX
QOMPLX
QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment. -
47
AWS VPN
Amazon
AWS VPN enables secure connections between on-premises networks and AWS Virtual Private Clouds (VPCs) using IPsec VPN tunnels. Each connection includes two tunnels for high availability, terminating in different availability zones to ensure resilience. It supports both static and dynamic routing with BGP, and offers customizable tunnel options, including inside tunnel IP addresses, pre-shared keys, and BGP Autonomous System Numbers (ASNs). Accelerated Site-to-Site VPN leverages AWS Global Accelerator to route traffic through the nearest AWS edge location, improving performance by reducing latency and jitter. AWS Client VPN is a fully managed, elastic VPN service that allows users to securely access AWS and on-premises resources from any location using an OpenVPN-based client. It supports authentication through Active Directory, mutual certificate authentication, and SAML-based federated authentication. -
48
SecureKi
SecureKi
Secure access for your business, customers, or employees with our unparalleled identity security backed by a zero–trust philosophy. When it comes to protecting your data, passwords are the weakest link. That is why multifactor authentication has become the identity and access management standard for preventing unauthorized access. Verify the identity of all users with SecureKi. Compromised access and credentials most often are the leading attack vectors of a security breach. Our comprehensive privileged access management is designed to manage and monitor privileged access to accounts and applications, alert system administrators on high-risk events, reduce operations complexity, and meet regulatory compliance with ease. Privilege escalation is at the core of most cyber-attacks and system vulnerabilities. -
49
Skillmine Auth
Skillmine Technology Consulting
Skillmine Auth is a comprehensive Identity and Access Management (IAM) platform that enables organizations to securely manage user identities, access control, and authentication across all business applications. It supports modern standards like SAML, OAuth 2.0, and OpenID Connect, along with custom authentication for legacy systems. Skillmine Auth offers flexible deployment options (Cloud or On-Premises) and integrates seamlessly with Active Directory, HRMS, and other enterprise systems to deliver unified and secure user experiences. -
50
Yubico YubiKey
Yubico
Protect your digital world with YubiKey. Stop account takeovers, go passwordless and modernize your multifactor authentication. Get the world’s leading security key for superior security, user experience and return on investment. Designed for personal and business use, the YubiKey comes in a variety of shapes and with different features to fit your needs. Take our quick Product Finder Quiz to find the right key for you. The YubiKey works with hundreds of services and software applications. We’re here to guide you getting started whether for personal or business use. The industry's #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. With a simple touch, the multi-protocol YubiKey protects access to computers, networks, and online services. No more reaching for your smartphone, or re-typing passcodes. Just plug in your YubiKey, tap, and it does the rest for you.