Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
UTunnel VPN and ZTNAUTunnel Secure Access offers solutions including Cloud VPN, ZTNA, and Mesh Networking to facilitate secure remote connections and reliable network performance. ACCESS GATEWAY: Our Cloud VPN as a Service allows for the rapid deployment of VPN servers on either Cloud or On-Premise setups. By employing OpenVPN and IPSec protocols, it ensures secure remote connections complemented by policy-driven access controls, enabling businesses to establish a robust VPN network effortlessly. ONE-CLICK ACCESS: The Zero Trust Application Access (ZTAA) feature revolutionizes secure interaction with internal business applications such as HTTP, HTTPS, SSH, and RDP. Users can conveniently access these services via their web browsers without the necessity of any client-side applications. MESHCONNECT: This solution, combining Zero Trust Network Access (ZTNA) and mesh networking, offers detailed access controls tailored to specific business network resources and fosters the formation of secure, interconnected business networks for enhanced collaboration. SITE-TO-SITE VPN: Additionally, the Access Gateway allows for the establishment of secure IPSec Site-to-Site tunnels, which facilitate connections between UTunnel's VPN servers and other network infrastructure components like gateways, firewalls, routers, and unified threat management (UTM) systems, thereby enhancing overall network security. By integrating these features, UTunnel Secure Access is committed to providing comprehensive solutions that meet the evolving needs of modern businesses.
-
Thinfinity WorkspaceKey Features of Thinfinity Workspace 7.0: - Utilizes Progressive Web App (PWA) technology to enhance user experience seamlessly. - Combines Thinfinity VNC, VirtualUI, and z/Scope for unparalleled flexibility. - Offers HTML5 terminal emulation compatible with DEC terminals, as well as TN 5220 and TN 3270 protocols. - Includes comprehensive enterprise-grade audit logs to ensure robust security and compliance management. - Employs a proprietary VNC protocol for effective real-time monitoring and troubleshooting. ENHANCE USER EXPERIENCE - Distribute essential applications, desktops, and files through a unified web portal. - Simplify remote browser access for users, limiting them to only the necessary resources for their tasks. STREAMLINE IT AND ELIMINATE VPNS - Move away from traditional VPN setups and their associated complexities. - Facilitate access from any device, including Chromebooks and mobile devices, with just a web browser—no setup required. PROTECT YOUR BUSINESS SECURITY - Utilize connections that are encrypted to enterprise-grade standards. - Seamlessly integrate with both internal and external identity management systems. - Implement two-factor or multi-factor authentication policies across all identity platforms, ensuring an additional layer of security for user access. - This comprehensive approach not only enhances user experience but also strengthens overall system integrity, making it a vital tool for modern businesses.
-
FusionAuthFusionAuth is a comprehensive authentication and authorization platform purpose-built for modern development teams and IT departments. Designed for seamless integration, it supports virtually any application stack or programming language. Every capability is fully exposed via APIs, giving your team the flexibility to address complex identity and access management (IAM) requirements without compromise. From core features like user registration and login, to advanced protocols such as passwordless authentication, MFA, SAML, and OIDC — FusionAuth delivers enterprise-level functionality out of the box. Built-in compliance tools make it easy to align with regulatory standards including GDPR, HIPAA, and COPPA, reducing risk and accelerating deployment. FusionAuth offers total deployment freedom: run it on any OS, in containers, in your private cloud, or choose FusionAuth Cloud — our fully managed, scalable SaaS hosting option. Whether you’re a startup or an enterprise, FusionAuth empowers your organization to customize and scale your identity infrastructure with confidence and control.
-
Control DControl D is a versatile DNS filtering and traffic redirection service that utilizes advanced Secure DNS protocols such as DNS-over-HTTPS, DNS-over-TLS, and DNS-over-QUIC, while also accommodating traditional DNS. With Control D, users can effectively eliminate harmful threats, restrict various types of undesirable content across the network—including advertisements, trackers, IoT data, adult material, social media, and more—while also redirecting traffic through transparent proxies and monitoring network activities and usage patterns at a client-specific level. Consider it your own personalized Authoritative DNS resolver for the entire Internet, providing you with detailed control over which domains are allowed to be resolved, redirected, or blocked. This capability not only enhances security but also empowers users to tailor their online experience according to their preferences.
-
ReflectizReflectiz is a web exposure management platform that helps organizations identify, monitor, and mitigate security, privacy, and compliance risks across their online environments. It provides full visibility and control over first, third, and fourth-party components like scripts, trackers, and open-source libraries that traditional security tools often miss. What sets Reflectiz apart is its ability to operate remotely, without the need to embed code on customer websites. This ensures there’s no impact on site performance, no access to sensitive user data, and no additional attack surface. The platform continuously monitors all external components, providing real-time insights into the behaviors of third-party applications, trackers, and scripts that could introduce risks. By mapping your entire digital supply chain, Reflectiz uncovers hidden vulnerabilities that traditional security tools may overlook. Reflectiz offers a centralized dashboard that enables businesses to gain a comprehensive, real-time view of their web assets. It allows teams to define baselines for approved and unapproved behaviors, swiftly identifying deviations and potential threats. With Reflectiz, businesses can mitigate risks before they escalate, ensuring proactive security management. The platform is especially valuable for industries like eCommerce, finance, and healthcare, where managing third-party risks is a top priority. Reflectiz provides continuous monitoring and detailed insights into external components without requiring any modifications to website code, helping businesses ensure security, maintain compliance, and reduce attack surfaces. By offering deep visibility and control over external components, Reflectiz empowers organizations to safeguard their digital presence against evolving cyber threats, keeping security, privacy, and compliance top of mind.
-
PBRS Power BI Reports DistributionPBRS is a powerful third-party application that significantly boosts the capabilities of Power BI reports by offering sophisticated options for scheduling, automation, and distribution. With PBRS, users can set Power BI reports to run at designated times or establish repeating schedules tailored to their needs, such as executing a report hourly, bi-daily, or on specific days like the third Monday of each month. Furthermore, it allows for the automation of report generation in response to particular triggers or conditions, such as changes in a database, incoming data through a port, the existence of unread emails in designated folders, or the presence of specific files. In addition, PBRS facilitates the distribution of Power BI reports in a variety of formats—including Excel, PDF, or CSV—to multiple destinations, enabling users to apply unique filters and select recipients for each scheduled report. This extensive flexibility in report distribution ensures that the specific requirements of organizations are effectively met. Moreover, PBRS integrates smoothly with different Power BI environments, encompassing Power BI Service (Pro and PPU), Power BI Report Server (On-Premises), Power BI Premium, and all versions of SQL Server Reporting Services, making it a versatile tool for any reporting needs.
-
Securden Password Vault for EnterprisesSecurden Password Vault is a comprehensive solution for password management designed for enterprises, enabling secure storage, organization, sharing, and tracking of both human and machine identities. Its intuitive access management system empowers IT teams to share administrator credentials while automating the oversight of privileged accounts efficiently within the organization. Furthermore, Securden integrates effortlessly with various industry-standard solutions such as SIEM, SAML-based SSO, Active Directory, and Azure AD, facilitating a smooth implementation process across different organizations. Organizations can be confident in the protection of their sensitive information, as Securden employs robust encryption techniques supported by a reliable high availability infrastructure. The platform also features detailed granular access controls, allowing users to provide account access without disclosing the actual credentials in a just-in-time manner. Importantly, Securden Password Vault supports both on-premise self-hosting and cloud-based (SaaS) deployment options, making it flexible to meet diverse organizational needs. This versatility ensures that companies can choose the deployment method that best aligns with their security requirements and operational preferences.
-
NetNutNetNut stands out as a premier provider of proxy services, offering an extensive range of solutions that encompass residential, static residential, mobile, and datacenter proxies, all aimed at optimizing online activities and delivering exceptional performance. With a vast network of over 85 million residential IPs available in 195 countries, NetNut empowers users to perform efficient web scraping, data collection, and maintain online privacy through rapid and dependable connections. Their innovative infrastructure ensures one-hop connectivity, which significantly reduces latency and guarantees a stable, uninterrupted user experience. Additionally, NetNut's intuitive dashboard facilitates real-time management of proxies and provides valuable usage analytics, making integration and oversight straightforward for users. Dedicated to ensuring client satisfaction, NetNut not only offers prompt and effective support but also customizes solutions to accommodate a wide range of business requirements. This commitment to quality and adaptability positions NetNut as a trusted ally for organizations looking to enhance their online capabilities.
-
FlowlensSimple, smart software for SME manufacturers. Flowlens delivers end-to-end business management software designed specifically to meet the needs of SME manufacturers. Use Flowlens to support your growth as you add customers, suppliers, stock and scale to your manufacturing business. With Flowlens, you can: • Centralize your business information in one secure, cloud-based system • Manage customers, suppliers, and inventory with complete visibility • Streamline production and capacity planning • Automatically identify stock shortages and create purchase orders • Handle multi-level BOMs and production routings with ease • Manage unlimited SKUs across your product lines • Maintain traceability and quality compliance • Control multi-site and multi-level stock operations • Deliver exceptional after-sales service with full product history • Integrate seamlessly with Xero, QuickBooks Online, and Sage 50  Optimise productivity. Whether you’re looking to replace paper and Excel based processes or older legacy systems, implementing Flowlens provides you with a proven pathway to boosting profitability and establishing data integration across your business functions.  Deliver financial visibility across your supply chain. Connect Flowlens with your accounting applications, and you’ll remove data double entry between functions and establish full online reporting visibility across all your operations.  Enhance stock control. Pinpoint your near and long term materials requirements through Flowlens capacity planning and multi-level BOM management.  Drive supplier management. Move your supplier management processes online with Flowlens. Simplify and streamline supplier negotiations and maximise your cost and quality position through Flowlens RFQ management functionality. Speak to our implementation staff today to agree an action plan that meets your goals for enhanced productivity, increased data integration and improved profitability.
-
JOpt.TourOptimizerJOpt.TourOptimizer is an enterprise software component for organizations that want to improve how tours, appointments, deliveries, and mobile resources are planned. It helps businesses move from manual dispatching and static rules to automated decision support for logistics, transportation, and field service operations. Instead of focusing only on route calculation, the platform supports end-to-end planning scenarios where cost, service quality, feasibility, and operational consistency all matter. The solution is designed to handle real operational complexity. Planning logic can include time windows, working hours, visit durations, capacities, skills and expertise levels, territories, zone governance, overnight stays, alternate destinations, and custom business rules. This enables teams to create schedules and routes that better reflect how operations actually run in production environments. JOpt.TourOptimizer supports a broad range of planning use cases, including vehicle routing, pickup and delivery, multi-depot operations, heterogeneous fleets, and workforce scheduling. It is available as an embedded Java SDK and as a Docker-based REST API with OpenAPI and Swagger support, making it suitable for integration into ERP, CRM, TMS, WMS, dispatch software, customer portals, and field service platforms. For business software teams, this means optimization can become a scalable part of a larger digital workflow rather than a disconnected specialty tool. JOpt.TourOptimizer helps improve planning efficiency, transparency, SLA compliance, and service reliability while giving software vendors and enterprise IT teams flexible deployment and integration options. It is especially relevant for companies that need optimization technology they can embed, govern, and expand over time as operational requirements grow.
What is Pangolin?
Pangolin is an innovative open-source platform tailored for identity-aware tunneled reverse-proxying, enabling users to safely expose applications from virtually any location without the requirement of opening inbound ports or configuring a traditional VPN. It utilizes a decentralized network of globally distributed nodes that aid in routing traffic through encrypted WireGuard tunnels, allowing devices located behind NATs or firewalls to publicly host applications via a centralized management dashboard. This comprehensive dashboard permits users to oversee multiple sites and resources across their infrastructure while defining intricate access-control policies that include features like SSO, OIDC, PINs, geolocation, and IP restrictions, all while facilitating real-time monitoring of health and usage metrics. The platform supports both self-hosted options—available in Community or Enterprise editions—and a managed cloud service, which operates by deploying a lightweight agent on each site, with the central control server responsible for managing ingress, traffic routing, authentication, and failover processes. Moreover, the design of Pangolin promotes a secure and efficient framework for developers and IT teams focused on simplifying application exposure while upholding stringent security measures. This added layer of security not only enhances the integrity of the applications but also streamlines the overall management process.
What is AWS VPN?
AWS VPN provides secure connections between on-premises networks and AWS Virtual Private Clouds (VPCs) through the use of IPsec VPN tunnels, which guarantees a strong and reliable link. To bolster availability, each VPN connection features dual tunnels that terminate in separate availability zones, enhancing overall resilience. This service supports both static and dynamic routing via BGP, while allowing for customizable tunnel configurations, including settings for inside tunnel IP addresses, pre-shared keys, and BGP Autonomous System Numbers (ASNs). The Accelerated Site-to-Site VPN option takes advantage of AWS Global Accelerator, improving traffic routing by directing it through the nearest AWS edge location, thereby reducing latency and jitter to enhance user experience. Furthermore, AWS Client VPN acts as a fully managed and elastic VPN service, allowing users to securely access AWS and on-premises resources from any location using an OpenVPN-based client. It accommodates a range of authentication methods, such as Active Directory, mutual certificate authentication, and SAML-based federated authentication, which ensures both flexibility and security for users. Ultimately, these various VPN solutions offered by AWS address a wide array of connectivity needs, all while placing a strong emphasis on security and performance for optimal operational efficiency. Additionally, the comprehensive nature of these services allows organizations to tailor their VPN setups to meet specific requirements, further enhancing their cloud infrastructure.
Integrations Supported
AWS Client VPN
AWS Global Accelerator
AWS Site-to-Site VPN
Active Directory
Amazon Virtual Private Cloud
Amazon Web Services (AWS)
Bitwarden
Collate
Google Cloud Platform
Grafana Cloud
Integrations Supported
AWS Client VPN
AWS Global Accelerator
AWS Site-to-Site VPN
Active Directory
Amazon Virtual Private Cloud
Amazon Web Services (AWS)
Bitwarden
Collate
Google Cloud Platform
Grafana Cloud
API Availability
Has API
API Availability
Has API
Pricing Information
$15 per month
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Pangolin
Date Founded
2025
Company Location
United States
Company Website
pangolin.net
Company Facts
Organization Name
Amazon
Date Founded
1994
Company Location
United States
Company Website
aws.amazon.com/vpn/
Categories and Features
Categories and Features
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label