Ratings and Reviews 0 Ratings
Ratings and Reviews 0 Ratings
Alternatives to Consider
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
The Receptionist for iPadThe Receptionist iPad application empowers visitors to oversee their arrivals and brings order to the front office environment. Our digital check-in solution can be tailored to fit your specific requirements, allowing for both customizable buttons and the convenience of drag-and-drop badge printing. You have the ability to efficiently monitor and document all individuals entering your workspace while securely archiving their information in the cloud, eliminating the need for traditional paper visitor logs. During check-in, you can gather essential details from your guests, whether for compliance with regulations such as ITAR, C-TPAT, FSMA, or PCI, or simply to foster a more personal interaction. Additionally, our innovative two-way communication feature enables employees to connect with their guests even before they arrive in the lobby, enhancing the overall experience. With The Receptionist, your guests are sure to leave with a lasting positive impression. This streamlined approach not only elevates visitor management but also enriches the interaction between staff and guests, setting the stage for a welcoming atmosphere.
-
ResolverMore than 1,000 organizations globally rely on Resolver’s software for security, risk management, and compliance. This includes a diverse range of sectors such as healthcare, educational institutions, and vital infrastructure entities like airports, utility companies, manufacturers, hospitality businesses, technology firms, financial services, and retail outlets. For those in leadership roles focused on security and risk management seeking innovative methods to handle incidents and mitigate risks, Resolver offers a pathway to transition from merely addressing incidents to gaining valuable insights. With its comprehensive solutions, Resolver empowers organizations to enhance their overall risk management strategies effectively.
-
Globalscape Enhanced File Transfer (EFT)Globalscape's Enhanced File Transfer platform (EFT) is designed to be an intuitive managed file transfer solution (MFT). It is relied upon by numerous Windows-focused organizations for essential file transfers. EFT combines robust security measures and compliance features along with advanced tools for collaboration, automation, and data analysis. It is offered in both cloud/SaaS via EFT Arcus and on-premises deployment options. Unlike conventional file transfer software, EFT delivers enterprise-grade data security and automates data transfers by seamlessly integrating with back-end systems. The administration of EFT is straightforward, granting extensive control over the file transfer process. By replacing outdated legacy systems and costly leased lines, EFT serves as a high-performing and scalable solution for modern data transfer needs. Furthermore, its flexibility allows organizations to adapt to changing file transfer requirements efficiently.
-
CLEARThe CLEAR™ Cryptosystem is an encryption software development kit (SDK) validated by FIPS-140-3, specifically created to safeguard files, streaming media, databases, and network communications through innovative and programmable encryption technology. It seamlessly integrates with all contemporary computing systems, offering an effective and straightforward solution for embedding advanced encryption into current security infrastructures. With its Post-Quantum Cryptography (PQC) capabilities, CLEAR™ ensures robust defense against future cybersecurity challenges, allowing you to secure your data with the most powerful encryption techniques available. This system not only enhances data protection but also allows for swift access and communication across various platforms. Key Features: • PQC Encryption Strength (512bit - 10,240bit) • Ultra Low-Latency Streaming (< 11µs / Packet) • Hyperkey™ Technology with embedded ACL • Multi-Factor / Bio-Metric Symmetric Keys • Plug-N-Play Entropy - CSRNG, QRNG, HRNG Benefits: • Pass cybersecurity audits with best-in-class tools • Share data securely via Sharepoint, Dropbox, and similar services • Protect legacy hardware and older network systems • Extend security to files stored in third-party platforms • Ensure lasting protection for long-term data archival needs, making it a comprehensive choice for organizations looking to the future.
-
Auth0Auth0 adopts a contemporary method for managing identity, allowing organizations to ensure secure access to applications for all users. It offers a high degree of customization while remaining both straightforward and adaptable. Handling billions of login transactions every month, Auth0 prioritizes convenience, privacy, and security, enabling customers to concentrate on their innovative efforts. Furthermore, Auth0 facilitates quick integration of authentication and authorization processes across web, mobile, and legacy applications, featuring advanced Fine Grained Authorization (FGA) that expands the capabilities of traditional role-based access control, thereby enhancing security measures overall.
-
GoAnywhere MFTGoAnywhere MFT provides businesses with a reliable solution for secure file transfers. This software can be utilized in various environments, including on-premise, cloud, or hybrid setups. It enables organizations to safely share data among employees, clients, trading partners, and different systems. Additionally, GoAnywhere MFT has been recognized with the Cybersecurity Excellence Award for its excellence in secure file transfer capabilities, highlighting its effectiveness in the industry. This recognition underscores the software's commitment to maintaining high security standards in data exchange.
-
Trident 1As a business proudly owned by veterans and employing over 70% veterans, we are led by former Navy SEALS and honor our commitment to service as an Official Partner of the Navy SEAL Foundation and an Executive Sponsor of the SEAL Legacy Foundation. Trident 1 stands out as a leading point of sale solution tailored for gun retailers, providing essential tools for managing retail operations, processing payments, and fostering customer relationships. Recognized as the top provider of the first comprehensive FFL software specifically designed for the firearms retail sector, Trident 1 integrates all necessary systems into one streamlined solution, ultimately saving you both time and money. By simplifying your operations, Trident 1 allows you to concentrate on meeting your customers' needs effectively. Accessible from any device and location, this cloud-based software offers flexibility that modern retailers require. Our expertise spans retail sales, range management, compliance, industry-leading integrations, secure payment processing, and exceptional customer service, all delivered from the United States. In our dedication to excellence, we continuously seek to enhance the user experience and adapt to industry changes.
-
Thinfinity WorkspaceKey Features of Thinfinity Workspace 7.0: - Utilizes Progressive Web App (PWA) technology to enhance user experience seamlessly. - Combines Thinfinity VNC, VirtualUI, and z/Scope for unparalleled flexibility. - Offers HTML5 terminal emulation compatible with DEC terminals, as well as TN 5220 and TN 3270 protocols. - Includes comprehensive enterprise-grade audit logs to ensure robust security and compliance management. - Employs a proprietary VNC protocol for effective real-time monitoring and troubleshooting. ENHANCE USER EXPERIENCE - Distribute essential applications, desktops, and files through a unified web portal. - Simplify remote browser access for users, limiting them to only the necessary resources for their tasks. STREAMLINE IT AND ELIMINATE VPNS - Move away from traditional VPN setups and their associated complexities. - Facilitate access from any device, including Chromebooks and mobile devices, with just a web browser—no setup required. PROTECT YOUR BUSINESS SECURITY - Utilize connections that are encrypted to enterprise-grade standards. - Seamlessly integrate with both internal and external identity management systems. - Implement two-factor or multi-factor authentication policies across all identity platforms, ensuring an additional layer of security for user access. - This comprehensive approach not only enhances user experience but also strengthens overall system integrity, making it a vital tool for modern businesses.
-
ThreatLockerThreatLocker® empowers organizations—from businesses and government agencies to academic institutions—with the ability to control exactly which applications are allowed to run in their environments. Built on a Zero Trust foundation, our suite of powerful cybersecurity tools puts control back in your hands. We believe in a future where every organization can operate securely and independently, free from the disruption of cyberattacks. That’s why our team of seasoned cybersecurity experts designed ThreatLocker: to give you the tools to stop threats before they start. With decades of experience developing cutting-edge security solutions, including email and content protection, ThreatLocker is our most advanced and comprehensive platform yet. It’s built to help you reduce risk, simplify your stack, and take control. Learn more at ThreatLocker.com.
What is Qumulex QxControl?
For individuals who value security, QxControl provides a unified, cloud-based solution for physical security. This cutting-edge platform transforms video management and access control software, enabling commercial users to monitor their security systems from virtually any location and on any device equipped with a web browser, all while maintaining a secure and user-friendly interface. Its contemporary design works seamlessly across desktops, mobile devices, and any internet-enabled gadget, ensuring accessibility wherever there is a connection. The open platform structure allows integrators to choose the best cameras, door controllers, and analytics available, while also supporting the use of current infrastructure during upgrades to outdated systems. Users gain extensive control over storage alternatives through secure, cloud-connected gateways and additional cloud storage options. This innovation addresses the challenges posed by legacy systems, such as the need for manual software updates, cumbersome client applications, reliance on bulky NVRs, and the security vulnerabilities associated with insecure port-forwarding. With QxControl, managing security becomes a more streamlined and effective process, allowing organizations to concentrate on their main operations without the interference of outdated technologies. Additionally, the platform’s adaptability and ease of use position it as a vital tool for modern businesses aiming to enhance their security protocols efficiently.
What is CounterMeasures?
CounterMeasures® serves as a dependable tool for risk analysis, applied in diverse fields of risk management such as physical security, operations security, critical infrastructure, information security, port security, anti-terrorism efforts, and school safety. This versatile platform, accessible via the web, is typically available as a pay-as-you-go service, with additional options for clients who prefer a hosted solution. Committed to excellence, CounterMeasures® focuses on providing superior service and support to ensure your risk management efforts yield positive results. By choosing HII’s CounterMeasures Risk Analysis Products and Services, you are not just selecting a product; you are gaining a collaborative partner that empowers your team with outstanding service and cutting-edge software tools. The dedicated team at CounterMeasures is eager to collaborate with you, offering customized support and resources to ensure the success of your projects. Together, we can confidently tackle the challenges of risk management, transforming potential uncertainties into clear strategies for success. Your journey in managing risk can be significantly enhanced through our partnership, paving the way for a safer and more secure environment.
Integrations Supported
APERIO DataWise
AXIS Camera Station
ActivID
Bosch Access Management System
Hikvision
Mercury
Sentry
Integrations Supported
APERIO DataWise
AXIS Camera Station
ActivID
Bosch Access Management System
Hikvision
Mercury
Sentry
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$289.00/month/user
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Qumulex QxControl
Company Location
United States
Company Website
www.qumulex.com/qxcontrol
Company Facts
Organization Name
Alion Science and Technology
Company Location
United States
Company Website
www.countermeasures.com
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues