Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
The Receptionist for iPadThe Receptionist iPad application empowers visitors to oversee their arrivals and brings order to the front office environment. Our digital check-in solution can be tailored to fit your specific requirements, allowing for both customizable buttons and the convenience of drag-and-drop badge printing. You have the ability to efficiently monitor and document all individuals entering your workspace while securely archiving their information in the cloud, eliminating the need for traditional paper visitor logs. During check-in, you can gather essential details from your guests, whether for compliance with regulations such as ITAR, C-TPAT, FSMA, or PCI, or simply to foster a more personal interaction. Additionally, our innovative two-way communication feature enables employees to connect with their guests even before they arrive in the lobby, enhancing the overall experience. With The Receptionist, your guests are sure to leave with a lasting positive impression. This streamlined approach not only elevates visitor management but also enriches the interaction between staff and guests, setting the stage for a welcoming atmosphere.
-
Securden Unified PAMAccess privileges and their corresponding credentials play a crucial role in safeguarding an organization's sensitive information. The nature of this sensitive data can differ widely depending on the sector; for instance, healthcare entities manage extensive patient records, while banks oversee financial and customer information. It is vital to secure access to these privileged accounts, as they are frequently unmanaged and scattered throughout the organization. A comprehensive Privileged Access Management solution, such as Securden Unified PAM, is essential for gathering all privileged identities and accounts into a centralized vault, simplifying management. By limiting access to these accounts and applying the Just-in-time access principle, organizations can enhance security. Users can initiate remote connections to authorized IT resources with a single click, while monitoring and managing these sessions for users, third-party vendors, and IT administrators through shadowing capabilities. Additionally, organizations should eliminate local admin rights on endpoints and implement application control policies to effectively uphold a Zero-Trust approach without hindering productivity. Furthermore, it is important to record and monitor all activities with thorough audit trails and actionable reports to maintain compliance with industry regulations, ultimately ensuring the protection of sensitive information.
-
Thinfinity WorkspaceKey Features of Thinfinity Workspace 7.0: - Utilizes Progressive Web App (PWA) technology to enhance user experience seamlessly. - Combines Thinfinity VNC, VirtualUI, and z/Scope for unparalleled flexibility. - Offers HTML5 terminal emulation compatible with DEC terminals, as well as TN 5220 and TN 3270 protocols. - Includes comprehensive enterprise-grade audit logs to ensure robust security and compliance management. - Employs a proprietary VNC protocol for effective real-time monitoring and troubleshooting. ENHANCE USER EXPERIENCE - Distribute essential applications, desktops, and files through a unified web portal. - Simplify remote browser access for users, limiting them to only the necessary resources for their tasks. STREAMLINE IT AND ELIMINATE VPNS - Move away from traditional VPN setups and their associated complexities. - Facilitate access from any device, including Chromebooks and mobile devices, with just a web browser—no setup required. PROTECT YOUR BUSINESS SECURITY - Utilize connections that are encrypted to enterprise-grade standards. - Seamlessly integrate with both internal and external identity management systems. - Implement two-factor or multi-factor authentication policies across all identity platforms, ensuring an additional layer of security for user access. - This comprehensive approach not only enhances user experience but also strengthens overall system integrity, making it a vital tool for modern businesses.
-
TruGridTruGrid SecureRDP provides secure access to Windows desktops and applications from virtually any location by utilizing a Desktop as a Service (DaaS) model that incorporates a Zero Trust approach without the need for firewall exposure. The key advantages of TruGrid SecureRDP include: - Elimination of Firewall Exposure & VPN Requirements: Facilitates remote access by preventing the need to open inbound firewall ports. - Zero Trust Access Control: Limits connections to users who have been pre-authenticated, significantly lowering the risk of ransomware attacks. - Cloud-Based Authentication: Reduces dependency on RDS gateways, SSL certificates, or external multi-factor authentication (MFA) tools. - Improved Performance: Leverages a fiber-optic network to reduce latency in connections. - Rapid Deployment & Multi-Tenant Functionality: Becomes fully functional in less than an hour with a user-friendly multi-tenant management console. - Built-In MFA & Azure Compatibility: Offers integrated MFA options in conjunction with Azure MFA and Active Directory support. - Wide Device Compatibility: Functions effortlessly across various platforms, including Windows, Mac, iOS, Android, and ChromeOS. - Continuous Support & Complimentary Setup: Provides 24/7 assistance along with free onboarding services, ensuring a smooth transition for users. Moreover, organizations can trust that this solution will adapt to their growing security needs seamlessly.
-
AxeroNeed a digital hub that actually connects, engages, and reaches employees, users, and departments with the right information they need to be successful? Axero is an award winning intranet solution where out-of-the-box meets customizable. Power efficiency by streamlining knowledge, communication, and collaboration the way you, specifically, need it to. With Axero, you're able to increase productivity by reaching employees with relevant, role-based information, all in a unified suite that feels, looks, and works like your workplace. With AI tools, flexible features, 500+ REST APIs, integrations, and granular permissions, send targeted communications while cutting back on email, distribute knowledge and resources to teams and offices near and far, and build a connected culture that employees love. Not one single Axero intranet is the same—and that's because our platform is built for building. Every Axero customer, backed by our highly rated client success team, has their own unique platform centered around their workflows, company structure, and organizational goals. Your organization isn't out-of-the-box and your intranet shouldn't be, either.
-
HaystackHaystack bridges the gap between every employee in your organization and the essential people, resources, and information necessary for their growth and success. By offering a fun, intuitive, and informative way to kick off the day, Haystack transforms the employee experience. Its customizable branding and modular design allow organizations to easily showcase key resources, foster a strong cultural identity, and share valuable knowledge. With automated multi-channel delivery and insightful analytics, reaching employees at optimal moments becomes effortless. This approach enables staff to spend less time searching for information and more time focusing on their objectives. Haystack simplifies knowledge sharing, ensuring that employees can access vital materials from anywhere in the world. As teams expand and evolve, maintaining connections can become challenging, but Haystack’s comprehensive employee profiles and company directory create a sense of proximity among colleagues, making them feel as if they are just a room away. Ultimately, this platform not only enhances productivity but also cultivates a cohesive company culture.
-
HERE Enterprise BrowserAt HERE, we’ve been solely focused on building the world’s first and only enterprise browser purpose-built to solve both security and productivity. HERE technology is trusted by 90% of the world’s largest financial institutions and backed by In-Q-Tel, the strategic investment firm that works with the U.S. intelligence community and other government agencies. HERE is redefining how global enterprises secure their work and empower their workforce. Built on Chromium, HERE seamlessly integrates into enterprise environments while delivering controls, context, and confidence where consumer browsers fall short.
-
VennVenn is transforming the way organizations manage BYOD workforces by alleviating the challenges associated with purchasing and safeguarding laptops or managing virtual desktops. Their innovative technology offers a fresh perspective on securing remote staff and contractors who utilize unmanaged devices. By utilizing Venn’s Blue Border™ software, businesses can create a company-managed Secure Enclave on the user’s personal computer, which allows IT departments to protect corporate data while respecting the privacy of end users. With over 700 clients, such as Fidelity, Guardian, and Voya, Venn has established itself as a trusted partner in compliance with FINRA, SEC, NAIC, and SOC 2 regulations. Discover more about their solutions at venn.com, where a commitment to enhancing workplace security meets user convenience.
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
PlanfixThe Planfix platform empowers organizations to oversee their complete business operations online. No matter the size or sector of the company, Planfix serves as an exceptional tool for project and work management. This platform provides your organization with a highly customizable management system, allowing for tailored process designs and visual elements to suit your needs. Combining features such as task and project management, CRM, sales, marketing, production, logistics, support services, accounting, and human resources, Planfix offers a comprehensive solution that integrates various aspects of business operations. Data flows smoothly between teams, ensuring that a transaction at the implementation phase can seamlessly evolve into a project and then be handed over to support. Planfix is ideal for a diverse range of entities, including businesses, non-profit organizations, public associations, and any collective striving towards a mutual goal. With the trust of 7,724 companies, it streamlines business workflows for over 68,000 users, enhancing efficiency and collaboration across the board. The versatility and robustness of the Planfix platform make it a valuable asset for any organization aiming to improve its operational effectiveness.
What is Kisi?
Kisi serves as a versatile platform that can function independently for your business or seamlessly blend with an existing access control system. Its automated access provisioning simplifies the processes of onboarding and managing users. Additionally, Kisi’s capability to connect with your user management systems enables automatic enrollment and the allocation of necessary permissions to users. You have the flexibility to grant or revoke access for individuals or teams as needed. For streamlined automatic provisioning, integrating your SSO and directory solutions is also possible. Whenever a door is accessed, personalized alerts are sent straight to your email or phone, ensuring you stay informed. Every event is meticulously recorded and organized within the Kisi dashboard, facilitating straightforward report generation and audits. Moreover, you can leverage the API to develop tailored solutions or integrate with other software, enhancing your overall operational efficiency. This comprehensive functionality makes Kisi an ideal choice for businesses aiming to optimize their access control systems.
What is Bosch Access Management System?
Robust access control is essential for maintaining security in any organization. To efficiently oversee the access profiles of numerous users, it is imperative to implement highly reliable software solutions. Our Access Management System is an innovative choice specifically designed for medium to large-scale applications. It combines user-friendliness with scalability, ensuring superior data security while offering features commonly found in high-end security products. Moreover, this software allows for seamless integration with third-party systems, which greatly enhances its adaptability for various access control requirements. As your organization progresses, our solution is crafted to grow and evolve in tandem with your needs. We offer three tailored software packages—Lite, Plus, and Professional—each designed for different enterprise sizes, allowing for the management of a large number of cardholders and doors. With capabilities to handle up to 400,000 cardholders and 10,000 doors, transitioning to a more advanced option as your business expands is a simple and efficient process, ensuring that your access control mechanisms remain strong and effective. This flexibility not only supports current demands but also anticipates future challenges in security management.
Integrations Supported
5X
Archie
Cobot
ConnectPointz
Coworks
Eden Workplace
Envoy
Google Calendar
GymFlow
Gymdesk
Integrations Supported
5X
Archie
Cobot
ConnectPointz
Coworks
Eden Workplace
Envoy
Google Calendar
GymFlow
Gymdesk
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
KISI
Date Founded
2013
Company Location
United States
Company Website
www.getkisi.com
Company Facts
Organization Name
Bosch
Company Location
United States
Company Website
www.boschsecurity.com/xc/en/solutions/access-control-systems/access-control-software/
Categories and Features
Digital Workplace
Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management
IoT
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues