Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
UTunnel VPN and ZTNAUTunnel Secure Access offers solutions including Cloud VPN, ZTNA, and Mesh Networking to facilitate secure remote connections and reliable network performance. ACCESS GATEWAY: Our Cloud VPN as a Service allows for the rapid deployment of VPN servers on either Cloud or On-Premise setups. By employing OpenVPN and IPSec protocols, it ensures secure remote connections complemented by policy-driven access controls, enabling businesses to establish a robust VPN network effortlessly. ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) feature revolutionizes secure interaction with internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can conveniently access these services via their web browsers without the necessity of any client-side applications. MESHCONNECT: This solution, combining Zero Trust Network Access (ZTNA) and mesh networking, offers detailed access controls tailored to specific business network resources and fosters the formation of secure, interconnected business networks for enhanced collaboration. SITE-TO-SITE VPN: Additionally, the Access Gateway allows for the establishment of secure IPSec Site-to-Site tunnels, which facilitate connections between UTunnel's VPN servers and other network infrastructure components like gateways, firewalls, routers, and unified threat management (UTM) systems, thereby enhancing overall network security. By integrating these features, UTunnel Secure Access is committed to providing comprehensive solutions that meet the evolving needs of modern businesses.
-
The Receptionist for iPadThe Receptionist iPad application empowers visitors to oversee their arrivals and brings order to the front office environment. Our digital check-in solution can be tailored to fit your specific requirements, allowing for both customizable buttons and the convenience of drag-and-drop badge printing. You have the ability to efficiently monitor and document all individuals entering your workspace while securely archiving their information in the cloud, eliminating the need for traditional paper visitor logs. During check-in, you can gather essential details from your guests, whether for compliance with regulations such as ITAR, C-TPAT, FSMA, or PCI, or simply to foster a more personal interaction. Additionally, our innovative two-way communication feature enables employees to connect with their guests even before they arrive in the lobby, enhancing the overall experience. With The Receptionist, your guests are sure to leave with a lasting positive impression. This streamlined approach not only elevates visitor management but also enriches the interaction between staff and guests, setting the stage for a welcoming atmosphere.
-
6Storage6Storage is an all-in-one software platform designed to simplify and optimize self-storage operations for businesses of every size. Built with scalability in mind, 6Storage allows owners and operators to manage single or multi-site facilities with ease, whether working onsite or remotely. The platform automates critical workflows, including unit rentals, tenant onboarding, billing, invoicing, and payment processing. It also centralizes communication, integrates access control through 6Security, and provides real-time analytics to support smarter business decisions. Customizable dashboards and automation tools help reduce manual tasks, minimize errors, and maximize operational efficiency. With built-in tenant protection options, flexible integrations, and intuitive user design, 6Storage helps operators boost revenue while delivering a seamless and modern tenant experience. From small independent facilities to large portfolios, 6Storage gives businesses the tools they need to save time, grow faster, and stay ahead in a competitive self-storage market.
-
FuelCloudFuelCloud is revolutionizing the fuel technology sector by developing advanced Fuel Management Systems designed for the oversight and administration of bulk fuel inventories. By leveraging four generations of expertise in the fuel industry alongside cutting-edge advancements in cloud computing and mobile technology, FuelCloud’s systems provide a level of control akin to cardlock systems but at more accessible prices. This combination results in a robust yet cost-effective solution that safeguards fuel against loss and theft, enhances reporting and management processes, and empowers users with comprehensive control over their fuel resources. Central to FuelCloud's offering is its cloud-based web portal, which enables managers to monitor transactions and tank levels, regulate fuel access permissions, and streamline the generation and distribution of reports. Additionally, this web portal seamlessly integrates bulk fuel data with existing fleet and business management platforms, facilitating a holistic view of fleet operations from the storage tank to the vehicle exhaust. This integration not only improves efficiency but also supports informed decision-making, ensuring that businesses can optimize their fuel usage effectively.
-
Securden Password Vault for EnterprisesSecurden Password Vault is a comprehensive solution for password management designed for enterprises, enabling secure storage, organization, sharing, and tracking of both human and machine identities. Its intuitive access management system empowers IT teams to share administrator credentials while automating the oversight of privileged accounts efficiently within the organization. Furthermore, Securden integrates effortlessly with various industry-standard solutions such as SIEM, SAML-based SSO, Active Directory, and Azure AD, facilitating a smooth implementation process across different organizations. Organizations can be confident in the protection of their sensitive information, as Securden employs robust encryption techniques supported by a reliable high availability infrastructure. The platform also features detailed granular access controls, allowing users to provide account access without disclosing the actual credentials in a just-in-time manner. Importantly, Securden Password Vault supports both on-premise self-hosting and cloud-based (SaaS) deployment options, making it flexible to meet diverse organizational needs. This versatility ensures that companies can choose the deployment method that best aligns with their security requirements and operational preferences.
-
ActiveBatch Workload AutomationActiveBatch, developed by Redwood, serves as a comprehensive workload automation platform that effectively integrates and automates operations across essential systems such as Informatica, SAP, Oracle, and Microsoft. With features like a low-code Super REST API adapter, an intuitive drag-and-drop workflow designer, and over 100 pre-built job steps and connectors, it is suitable for on-premises, cloud, or hybrid environments. Users can easily oversee their processes and gain insights through real-time monitoring and tailored alerts sent via email or SMS, ensuring that service level agreements (SLAs) are consistently met. The platform offers exceptional scalability through Managed Smart Queues, which optimize resource allocation for high-volume workloads while minimizing overall process completion times. ActiveBatch is certified with ISO 27001 and SOC 2, Type II, employs encrypted connections, and is subject to regular evaluations by third-party testers. Additionally, users enjoy the advantages of continuous updates alongside dedicated support from our Customer Success team, who provide 24/7 assistance and on-demand training, thereby facilitating their journey to success and operational excellence. With such robust features and support, ActiveBatch significantly empowers organizations to enhance their automation capabilities.
-
DriveLockDriveLock’s HYPERSECURE Platform aims to strengthen IT infrastructures against cyber threats effectively. Just as one would naturally secure their home, it is equally vital to ensure that business-critical data and endpoints are protected effortlessly. By leveraging cutting-edge technology alongside extensive industry knowledge, DriveLock’s security solutions provide comprehensive data protection throughout its entire lifecycle. In contrast to conventional security approaches that depend on fixing vulnerabilities after the fact, the DriveLock Zero Trust Platform takes a proactive stance by blocking unauthorized access. Through centralized policy enforcement, it guarantees that only verified users and endpoints can access crucial data and applications, consistently following the principle of never trusting and always verifying while ensuring a robust layer of security. This not only enhances the overall security posture but also fosters a culture of vigilance within organizations.
-
Auth0Auth0 adopts a contemporary method for managing identity, allowing organizations to ensure secure access to applications for all users. It offers a high degree of customization while remaining both straightforward and adaptable. Handling billions of login transactions every month, Auth0 prioritizes convenience, privacy, and security, enabling customers to concentrate on their innovative efforts. Furthermore, Auth0 facilitates quick integration of authentication and authorization processes across web, mobile, and legacy applications, featuring advanced Fine Grained Authorization (FGA) that expands the capabilities of traditional role-based access control, thereby enhancing security measures overall.
-
ReflectizReflectiz is a web exposure management platform that helps organizations identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. It provides full visibility and control over first, third, and fourth-party components like scripts, trackers, and open-source libraries that traditional security tools often miss. What sets Reflectiz apart is its ability to operate remotely, without the need to embed code on customer websites. This ensures there’s no impact on site performance, no access to sensitive user data, and no additional attack surface. The platform continuously monitors all external components, providing real-time insights into the behaviors of third-party applications, trackers, and scripts that could introduce risks. By mapping your entire digital supply chain, Reflectiz uncovers hidden vulnerabilities that traditional security tools may overlook. Reflectiz offers a centralized dashboard that enables businesses to gain a comprehensive, real-time view of their web assets. It allows teams to define baselines for approved and unapproved behaviors, swiftly identifying deviations and potential threats. With Reflectiz, businesses can mitigate risks before they escalate, ensuring proactive security management. The platform is especially valuable for industries like eCommerce, finance, and healthcare, where managing third-party risks is a top priority. Reflectiz provides continuous monitoring and detailed insights into external components without requiring any modifications to website code, helping businesses ensure security, maintain compliance, and reduce attack surfaces. By offering deep visibility and control over external components, Reflectiz empowers organizations to safeguard their digital presence against evolving cyber threats, keeping security, privacy, and compliance top of mind.
-
VerkadaVerkada adeptly merges the intuitive characteristics of consumer security systems with the extensive scale and protection required by businesses and organizations. Through the integration of high-quality hardware and a user-centric, cloud-based software platform, modern enterprises can efficiently oversee and secure their facilities across multiple sites. The inclusion of Power over Ethernet (PoE) cameras allows for rapid installation, taking only minutes and negating the need for traditional network video recorders or digital video recorders. Users have the capability to store footage locally for up to a year, which helps them stay ahead of emerging security threats via ongoing feature upgrades and security patches. The cameras send encrypted thumbnails to the cloud and only transmit video when being actively viewed, facilitating indefinite cloud storage of clips and easy sharing of recorded events with key stakeholders. All footage from various sites can be unified into a single dashboard, granting secure access to the entire team. Additionally, these cameras serve as smart sensors, leveraging advanced AI and edge computing to deliver real-time actionable insights. This cutting-edge methodology effectively tackles the prevalent challenges in physical security management, while simultaneously boosting overall safety and operational productivity. This comprehensive solution not only enhances security measures but also fosters a proactive approach to risk management in the workplace.
What is Feenics Access Control?
Feenics Access Control is a cutting-edge cloud-based solution designed to significantly improve security operations. This platform provides a powerful and flexible system that consolidates multiple access points into a single, intuitive dashboard for easier management of security protocols. Users benefit from real-time monitoring and control features, allowing them to oversee credentials, unlock or secure entrances, and log security incidents from any device, no matter where they are located. The adaptability of Feenics Access Control enables businesses to tailor their security measures to meet particular needs effectively. Moreover, the system supports a wide range of hardware integrations, making it suitable for various settings, including corporate offices and extensive industrial sites. By harnessing the advantages of cloud technology, this solution reduces the need for elaborate on-site infrastructure, offering a streamlined and cost-effective method for managing physical security. In addition, its user-friendly interface ensures that organizations can easily adjust to changing security requirements, thus enhancing overall operational resilience. Ultimately, Feenics Access Control represents a comprehensive approach to modern security management that empowers users to maintain their safety standards efficiently.
What is DOOR?
DOOR is a comprehensive smart building ecosystem that transforms traditional properties into connected, intelligent environments. Building on its foundation as Latch, DOOR integrates advanced access control hardware with powerful management software to deliver seamless building operations. Its hardware lineup includes smart locks, intercom systems, cameras, motion sensors, and connectivity hubs, all designed to function cohesively within a unified platform. Through DOOR OS, property managers gain centralized control over access permissions, automation workflows, and building data analytics. The system not only enhances security at every entry point but also reduces operational friction for onsite teams. By automating repetitive tasks such as credential management and turnover rekeying, properties can realize measurable cost savings and improved efficiency. DOOR integrates directly with leading property management platforms including Yardi, RealPage, Entrata, and AppFolio, ensuring streamlined data flow and simplified administration. Its solutions are suitable for both new construction projects and retrofit installations, offering flexibility for diverse portfolios. The platform contributes to increased net operating income by lowering overhead, enabling smart amenities, and differentiating properties in competitive rental markets. Residents benefit from a modern, frictionless living experience with secure, convenient access controls. Owners and operators gain actionable insights that help protect asset value and future-proof their investments. By combining hardware innovation, automation, and integrated software intelligence, DOOR delivers a scalable foundation for the next generation of multifamily smart buildings.
Integrations Supported
ASSA ABLOY Academy
Active Directory
Amazon Web Services (AWS)
Arcules
Ava
Avigilon
B-Line
Envoy
HID Fargo Connect
HID Origo
Integrations Supported
ASSA ABLOY Academy
Active Directory
Amazon Web Services (AWS)
Arcules
Ava
Avigilon
B-Line
Envoy
HID Fargo Connect
HID Origo
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Free
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
acre security
Date Founded
2012
Company Location
United States
Company Website
acresecurity.com/access-control-solutions/feenics-rocket-fuel-for-your-security-operations
Company Facts
Organization Name
DOOR
Company Location
United States
Company Website
door.com