Ratings and Reviews 2 Ratings
Ratings and Reviews 2 Ratings
Alternatives to Consider
-
FusionAuthFusionAuth is a comprehensive authentication and authorization platform purpose-built for modern development teams and IT departments. Designed for seamless integration, it supports virtually any application stack or programming language. Every capability is fully exposed via APIs, giving your team the flexibility to address complex identity and access management (IAM) requirements without compromise. From core features like user registration and login, to advanced protocols such as passwordless authentication, MFA, SAML, and OIDC — FusionAuth delivers enterprise-level functionality out of the box. Built-in compliance tools make it easy to align with regulatory standards including GDPR, HIPAA, and COPPA, reducing risk and accelerating deployment. FusionAuth offers total deployment freedom: run it on any OS, in containers, in your private cloud, or choose FusionAuth Cloud — our fully managed, scalable SaaS hosting option. Whether you’re a startup or an enterprise, FusionAuth empowers your organization to customize and scale your identity infrastructure with confidence and control.
-
UniqkeyUniqkey stands out as Europe's foremost password and access management solution, streamlining security for employees while granting organizations superior oversight of their cloud systems, access protocols, and workforce administration. By addressing major threats to corporate infrastructure, Uniqkey protects essential systems and organizational credentials through cutting-edge encryption techniques. Additionally, it provides exclusive insights and a holistic overview of IT frameworks, employee access, and security metrics, proving invaluable for IT departments to effectively monitor security strategies and evaluate the success of educational initiatives with assurance. Thanks to robust integrations with existing platforms like Microsoft, IT administrators can efficiently manage user provisioning and de-provisioning, facilitating smooth onboarding and offboarding while ensuring comprehensive protection of their IT ecosystems through sophisticated encryption measures. Developed by top-tier security professionals in Europe, we utilize the latest encryption technologies, including the offline encryption of all data. Our advanced technology stack and servers, located in Denmark, guarantee optimal security, data reliability, and adherence to European standards, ultimately providing our clients with a sense of security and trust in our services. Furthermore, Uniqkey’s commitment to continual improvement ensures that we stay ahead in the evolving landscape of cybersecurity threats.
-
The Receptionist for iPadThe Receptionist iPad application empowers visitors to oversee their arrivals and brings order to the front office environment. Our digital check-in solution can be tailored to fit your specific requirements, allowing for both customizable buttons and the convenience of drag-and-drop badge printing. You have the ability to efficiently monitor and document all individuals entering your workspace while securely archiving their information in the cloud, eliminating the need for traditional paper visitor logs. During check-in, you can gather essential details from your guests, whether for compliance with regulations such as ITAR, C-TPAT, FSMA, or PCI, or simply to foster a more personal interaction. Additionally, our innovative two-way communication feature enables employees to connect with their guests even before they arrive in the lobby, enhancing the overall experience. With The Receptionist, your guests are sure to leave with a lasting positive impression. This streamlined approach not only elevates visitor management but also enriches the interaction between staff and guests, setting the stage for a welcoming atmosphere.
-
HSI DonesafeHSI Donesafe revolutionizes environmental, health, and safety (EHS) management through a no-code, cloud-based solution that simplifies intricate processes into efficient and intuitive workflows. Widely embraced by various sectors, Donesafe integrates tracking, management, and reporting in a single, user-friendly platform, enhancing compliance efforts and improving safety outcomes. The platform's flexible structure enables teams to tailor workflows, forms, and dashboards according to their changing compliance requirements. By providing essential tools for incident reporting, audits, training, and risk assessments, it ensures organizations can swiftly adapt to regulatory shifts. Highlighted Features: - Tailor-made workflows that comply with regulations - Instant insights for real-time safety monitoring - Scalable framework that evolves alongside your organization - Efficient compliance tools for hassle-free audits and reporting Empower your EHS team to reach new heights of safety excellence with HSI Donesafe, and experience a transformation in how safety management is approached. With Donesafe, achieving compliance and safety goals becomes not only feasible but also straightforward.
-
KognitionKognition delivers cutting-edge security technology powered by AI that ensures consistent and proactive threat detection, all while being significantly more cost-effective than traditional security measures. By integrating effortlessly with current systems, we enable organizations to identify potential risks—such as the display of weapons or the formation of crowds—and alert security teams regarding unauthorized individuals and VIPs. This innovative solution not only minimizes IT costs but also decreases the reliance on additional security staff, thereby improving the efficiency of incident responses. Additionally, Kognition provides comprehensive security reporting and enhanced visibility across various sectors, including K-12 education, commercial real estate, and heavily regulated industries. Ultimately, our technology empowers organizations to create safer environments, making security more accessible and manageable than ever before.
-
VisitUs ReceptionProminent organizations such as Yamaha and Nespresso, along with various government bodies, have successfully adopted our visit management software into their workflows. This innovative system allows them to promptly alert staff regarding guest arrivals and deliveries, while providing real-time visitor tracking that enhances the overall guest experience. By eliminating the need for paperwork, automating visitor logs, and boosting employee efficiency, this transformative visitor management solution is truly a game changer. Are you seeking effective ways to enhance your guest reception and front desk operations? Additionally, would you like to monitor visitor hours, streamline the check-in process, and refine your site evacuation plans? With VisitUs Reception, it's time to embrace a premier Visitor Management System that is rapidly revolutionizing the business landscape, ensuring you stay ahead of the competition. Don't miss out on the opportunity to elevate your reception experience and improve operational efficiency.
-
ClearoomsClearooms offers a comprehensive solution for managing your hybrid work environment. With Clearooms, you can effortlessly handle bookings for hot desks and meeting spaces, enabling a flexible and secure workplace for companies of any size. Our pricing structure is determined by the specific desks or rooms you wish to manage, rather than the total employee count, making it cost-effective and adaptable. Whether you need to oversee a single set of desks or just a couple of meeting rooms, Clearooms provides ample options for maximizing savings through our tiered pricing model. The intuitive traffic light system delivers real-time updates on the availability of desks and meeting spaces, while our detailed reports offer valuable insights into usage patterns and efficiencies. Our dedicated support team is always ready to assist you promptly, ensuring a seamless experience for all users.
-
StrongDMThe landscape of access and access management has evolved into a more intricate and often frustrating challenge. strongDM reimagines access by focusing on the individuals who require it, resulting in a solution that is not only user-friendly but also maintains rigorous security and compliance standards. This innovative approach is referred to as People-First Access. Users benefit from quick, straightforward, and traceable access to essential resources, while administrators enjoy enhanced control that reduces the risk of unauthorized and excessive permissions. Additionally, teams in IT, Security, DevOps, and Compliance can effortlessly track activities with detailed audit logs answering critical questions about actions taken, locations, and timings. The system integrates seamlessly and securely across various environments and protocols, complemented by reliable 24/7 customer support to ensure optimal functionality. This comprehensive approach guarantees both efficiency and security in managing access.
-
ThreatLockerThreatLocker® empowers organizations—from businesses and government agencies to academic institutions—with the ability to control exactly which applications are allowed to run in their environments. Built on a Zero Trust foundation, our suite of powerful cybersecurity tools puts control back in your hands. We believe in a future where every organization can operate securely and independently, free from the disruption of cyberattacks. That’s why our team of seasoned cybersecurity experts designed ThreatLocker: to give you the tools to stop threats before they start. With decades of experience developing cutting-edge security solutions, including email and content protection, ThreatLocker is our most advanced and comprehensive platform yet. It’s built to help you reduce risk, simplify your stack, and take control. Learn more at ThreatLocker.com.
-
ManageEngine ADManager PlusADManager Plus is a user-friendly management and reporting solution for Windows Active Directory (AD) that assists both AD administrators and help desk staff in their everyday operations. Featuring a centralized and intuitive web-based interface, this software simplifies complex operations like bulk user account management and the delegation of role-based access to help desk agents. Additionally, it produces an extensive array of AD reports that are crucial for meeting compliance audit requirements. The tool also offers mobile applications, allowing AD professionals to manage user tasks conveniently from their mobile devices while on the move. This flexibility ensures that administrators can maintain productivity and oversight, regardless of their location.
What is Spintly?
For an effortless, convenient, and contactless user experience, a wireless door access control system powered by the cloud is now at your disposal. This innovative access management solution harnesses the capabilities of cloud technology and mobile devices. Spintly's fully wireless access management system is transforming the security landscape. By removing the intricate processes associated with traditional access control systems, it allows for a simplified installation in buildings. Installers stand to gain significantly, saving more than 60% in both time and expenses by avoiding the need for wiring. This efficiency boosts productivity and helps lower costs. Our goal is to enhance buildings by providing users with a seamless access experience. Moreover, we strive to make environments smarter through our comprehensive wireless mesh platform designed for intelligent building devices. Spintly offers tailored solutions across various sectors with its cutting-edge wireless access control hardware and cloud-based software, ensuring a future where security and convenience go hand in hand. Our commitment to innovation in building management continues to drive us forward as we explore new horizons in technological advancements.
What is Nold Cloud?
The Nold Open is a sleek and secure device that utilizes Bluetooth technology to connect with various electronic locks, encompassing garage doors, gates, standard locks, alarm systems, and pool covers. By implementing the Nold Open into your system, you can dispense with the need for numerous remotes, opting instead for virtual keys that you can access right from your smartphone. The free app, which is compatible with both Android and iOS devices, empowers you to manage your keys effectively and easily provide access to friends and family. With the innovative Auto Open feature, your doors will automatically unlock as you draw near, eliminating any need to search for your phone. This device leverages advanced wireless technology that seamlessly integrates with both iOS and Android platforms. You can incorporate multiple keys and devices all within one application, allowing for a centralized hub to manage all your entry points. The process of sharing access with visitors is simplified, removing the inconvenience of creating duplicate physical keys or buying extra remotes. In addition, all connected devices and guest access can be effortlessly overseen through Nold Cloud, a straightforward, web-based platform that elevates your security experience. Nold Open not only enhances your home’s security and convenience but also represents a modern solution for smart living, ultimately transforming how you interact with your environment. With its user-friendly design and powerful features, the Nold Open is quickly becoming a vital addition for those seeking a smarter, more efficient lifestyle.
Integrations Supported
Google Workspace
Microsoft Entra ID
Nexudus
SAP SuccessFactors
greytHR
Integrations Supported
Google Workspace
Microsoft Entra ID
Nexudus
SAP SuccessFactors
greytHR
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
$12 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Spintly
Date Founded
2017
Company Location
United States
Company Website
spintly.com
Company Facts
Organization Name
Nold Technologies
Date Founded
2016
Company Location
Hungary
Company Website
www.nold.io
Categories and Features
Attendance Tracking
Absence Management
Calendar Management
Employee Scheduling
Employee Time Clock
FMLA Tracking
Overtime Tracking
Reporting/Analytics
Self Service Portal
Time Tracking
Timesheets
Vacation / Leave Tracking
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Visitor Management
Alerts/Notifications
Badge Management
Document Management
ID Scan
Pre-Registration
Registration Management
Self Check-in
Visitor Tracking
Watch List
Categories and Features
Physical Security
Checkpoint Tracking
Customer Management
Data Collection
Event Management
Incident Management
Investigation Management
Multiple Alarm Queues