Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
The Receptionist for iPadThe Receptionist iPad application empowers visitors to oversee their arrivals and brings order to the front office environment. Our digital check-in solution can be tailored to fit your specific requirements, allowing for both customizable buttons and the convenience of drag-and-drop badge printing. You have the ability to efficiently monitor and document all individuals entering your workspace while securely archiving their information in the cloud, eliminating the need for traditional paper visitor logs. During check-in, you can gather essential details from your guests, whether for compliance with regulations such as ITAR, C-TPAT, FSMA, or PCI, or simply to foster a more personal interaction. Additionally, our innovative two-way communication feature enables employees to connect with their guests even before they arrive in the lobby, enhancing the overall experience. With The Receptionist, your guests are sure to leave with a lasting positive impression. This streamlined approach not only elevates visitor management but also enriches the interaction between staff and guests, setting the stage for a welcoming atmosphere.
-
ResolverMore than 1,000 organizations globally rely on Resolver’s software for security, risk management, and compliance. This includes a diverse range of sectors such as healthcare, educational institutions, and vital infrastructure entities like airports, utility companies, manufacturers, hospitality businesses, technology firms, financial services, and retail outlets. For those in leadership roles focused on security and risk management seeking innovative methods to handle incidents and mitigate risks, Resolver offers a pathway to transition from merely addressing incidents to gaining valuable insights. With its comprehensive solutions, Resolver empowers organizations to enhance their overall risk management strategies effectively.
-
OpenVPNMore than 15,000 companies around the globe rely on OpenVPN's Access Server for a self-hosted VPN solution that securely connects their remote workforce to the company's private network via the internet. This ensures that employees working remotely or in hybrid setups can easily and securely access essential business resources without overwhelming you with extensive setup and maintenance tasks. OpenVPN Access Server provides a comprehensive SSL self-hosted VPN software solution, combining robust OpenVPN server functionalities with enterprise management features, a user-friendly OpenVPN Connect interface, and client software packages that are compatible with Windows, macOS, Linux, and mobile operating systems like Android and iOS. Furthermore, OpenVPN Access Server allows for a variety of configurations, enabling secure and precise remote access to internal networks and private cloud resources, all while offering meticulous access control measures for enhanced security. Additionally, its flexibility and scalability make it an ideal choice for businesses of all sizes looking to maintain high security while managing remote access effectively.
-
KrakenDDesigned for optimal performance and effective resource management, KrakenD is capable of handling an impressive 70,000 requests per second with just a single instance. Its stateless architecture promotes effortless scalability, eliminating the challenges associated with database maintenance or node synchronization. When it comes to features, KrakenD excels as a versatile solution. It supports a variety of protocols and API specifications, providing detailed access control, data transformation, and caching options. An exceptional aspect of its functionality is the Backend For Frontend pattern, which harmonizes multiple API requests into a unified response, thereby enhancing the client experience. On the security side, KrakenD adheres to OWASP standards and is agnostic to data types, facilitating compliance with various regulations. Its user-friendly nature is bolstered by a declarative configuration and seamless integration with third-party tools. Furthermore, with its community-driven open-source edition and clear pricing structure, KrakenD stands out as the preferred API Gateway for enterprises that prioritize both performance and scalability without compromise, making it a vital asset in today's digital landscape.
-
Stack AIStackAI is an enterprise AI automation platform built to help organizations create end-to-end internal tools and processes with AI agents. Unlike point solutions or one-off chatbots, StackAI provides a single platform where enterprises can design, deploy, and govern AI workflows in a secure, compliant, and fully controlled environment. Using its visual workflow builder, teams can map entire processes — from data intake and enrichment to decision-making, reporting, and audit trails. Enterprise knowledge bases such as SharePoint, Confluence, Notion, Google Drive, and internal databases can be connected directly, with features for version control, citations, and permissioning to keep information reliable and protected. AI agents can be deployed in multiple ways: as a chat assistant embedded in daily workflows, an advanced form for structured document-heavy tasks, or an API endpoint connected into existing tools. StackAI integrates natively with Slack, Teams, Salesforce, HubSpot, ServiceNow, Airtable, and more. Security and compliance are embedded at every layer. The platform supports SSO (Okta, Azure AD, Google), role-based access control, audit logs, data residency, and PII masking. Enterprises can monitor usage, apply cost controls, and test workflows with guardrails and evaluations before production. StackAI also offers flexible model routing, enabling teams to choose between OpenAI, Anthropic, Google, or local LLMs, with advanced settings to fine-tune parameters and ensure consistent, accurate outputs. A growing template library speeds deployment with pre-built solutions for Contract Analysis, Support Desk Automation, RFP Response, Investment Memo Generation, and InfoSec Questionnaires. By replacing fragmented processes with secure, AI-driven workflows, StackAI helps enterprises cut manual work, accelerate decision-making, and empower non-technical teams to build automation that scales across the organization.
-
MetaLocatorMetaLocator simplifies the process of building a store locator, product finder, dealer or partner locator, and various search tools such as where-to-buy features or healthcare provider searches. With MetaLocator, users can easily develop customizable locator software that supports searches by zip code, address, or through automatic location detection, all while providing fully integrated mapping and geolocation functionalities. The platform is designed to be mobile-friendly and accommodates multiple languages, while its analytics and business intelligence features enhance user-path visibility and optimization. The robust web-based control panel offers comprehensive management capabilities for settings, locations, data integrity, and analytics, granting access to over 300 features that empower users to tailor their location content and search functionalities. Additionally, MetaLocator ensures complete security for sensitive sectors, including banking and healthcare. Our dedicated support, design, and development teams are on hand to collaborate with you, whether to help you get started quickly or to develop customized solutions that meet your specific needs. Setting up with MetaLocator is a breeze and can be accomplished in three straightforward steps: first, create your account; next, upload your data; and finally, install it on your website. By visiting our website, you can easily embark on your journey to improved location services!
-
SAP S/4HANA Cloud Public EditionSAP S/4HANA Public Cloud serves as an advanced ERP solution that facilitates rapid digital transformation through AI-driven insights, adherence to industry standards, and an intuitive user experience. By enhancing operational efficiency, empowering decision-making, and revealing new avenues for growth, it stands out as a comprehensive tool for modern businesses. Key features include compliance with SOX and GAAP, robust financial controls, detailed forecasting and reporting, and effective treasury and tax management. Additionally, it offers automation through AI, machine learning, and robotic process automation, alongside efficient supply chain and inventory management solutions. With templated integrations and strong manufacturing capabilities, it supports scalability for businesses of all sizes. Embracing industry innovation is essential to propel growth in revenue, efficiency, and profitability. Continuous improvement is the cornerstone of optimizing business operations and processes, ensuring that organizations stay competitive in their respective markets. Therefore, selecting a dedicated partner who is committed to your success is crucial in navigating this journey.
-
UniqkeyUniqkey stands out as Europe's foremost password and access management solution, streamlining security for employees while granting organizations superior oversight of their cloud systems, access protocols, and workforce administration. By addressing major threats to corporate infrastructure, Uniqkey protects essential systems and organizational credentials through cutting-edge encryption techniques. Additionally, it provides exclusive insights and a holistic overview of IT frameworks, employee access, and security metrics, proving invaluable for IT departments to effectively monitor security strategies and evaluate the success of educational initiatives with assurance. Thanks to robust integrations with existing platforms like Microsoft, IT administrators can efficiently manage user provisioning and de-provisioning, facilitating smooth onboarding and offboarding while ensuring comprehensive protection of their IT ecosystems through sophisticated encryption measures. Developed by top-tier security professionals in Europe, we utilize the latest encryption technologies, including the offline encryption of all data. Our advanced technology stack and servers, located in Denmark, guarantee optimal security, data reliability, and adherence to European standards, ultimately providing our clients with a sense of security and trust in our services. Furthermore, Uniqkey’s commitment to continual improvement ensures that we stay ahead in the evolving landscape of cybersecurity threats.
-
PsonoPsono, an open-source password manager designed for self-hosting, places a strong emphasis on the security of your sensitive information. It utilizes encryption techniques to store your credentials in a way that ensures only you can access them, while also allowing for secure, encrypted sharing with your team members. With a variety of features, Psono makes managing data and accessing passwords simpler than ever. Its encryption process begins with client-side encryption, providing true end-to-end security for shared passwords, and is enhanced by both SSL and storage encryption methods. Moreover, the entire codebase is available for public scrutiny, highlighting the belief that true security relies on effective encryption rather than hiding flaws in the system. Choosing a self-hosted solution like Psono grants you greater control over access and reduces reliance on third-party data storage services, reinforcing its position as one of the most secure password management options available. Additionally, this self-hosting capability empowers users to tailor security measures to their specific needs and preferences, further enhancing their overall data protection strategy.
What is CredoID?
CredoID: A versatile software solution for access control management.
Midpoint Security provides comprehensive integrated solutions tailored for security and access control initiatives, all centered around the CredoID access control software. Serving as the foundational element of these solutions, CredoID can be seamlessly enhanced with additional features such as time and attendance tracking, video surveillance, burglar alarm systems, vehicle management, elevator control, ID card design and printing, mapping capabilities, and various custom scripts.
With CredoID, installing security systems of any size becomes a straightforward task. This open platform solution is compatible with a wide array of controllers, including HID EVO Edge and VertX Evo & Aero, as well as extension modules and wireless Aperio locks. Furthermore, CredoID facilitates integration with DigiFort VMS and alarm panels by ASB security, in addition to DigiFort LPR capabilities. In essence, the CredoID software unifies alarm monitoring, access control, and time & attendance functions within a single, cohesive package that meets diverse organizational needs.
What is Cloudvue?
Johnson Controls is transforming the experience and comprehension of spaces like never before. By utilizing data from both the inside and outside of buildings, our clients can achieve a more comprehensive approach to operations and security management. OpenBlue stands out as a pioneering innovation from Johnson Controls, reshaping the relationship between buildings and their occupants. Cloudvue is a widely recognized solution that aims to elevate surveillance capabilities, streamline access control, and provide valuable analytics that strengthen security measures while enhancing productivity within organizations. Through a unified interface, users are empowered to monitor an entire security framework visually, allowing them to interact with any camera or door from virtually anywhere in the world. This system facilitates seamless management of camera feeds, access permissions, and intelligent alerts via a centralized software solution integrated with cloud technology. Users have the flexibility to incorporate an unlimited number of cameras and access points as their requirements change. Customizable floor plans, map views, and dynamic dashboards ensure that information remains organized even as operations scale up, ultimately fostering a cohesive blend of technology with security oversight. Furthermore, the system's versatility guarantees that it can evolve in tandem with the changing demands of its users, making it a future-proof choice for modern security management.
Integrations Supported
Digifort
Door Tablet
Perspective VMS
Splan
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Midpoint Security
Company Website
www.midpoint-security.com
Company Facts
Organization Name
Johnson Controls
Company Location
United States
Company Website
www.johnsoncontrols.com/security/cloud-products
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues