Suggested Categories:

Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
View more categories (20) for "access control role"

26 Products for "access control role" with 2 filters applied:

  • 1
    Testfully

    Testfully

    Testfully

    ...Flexible and secure, set global, environment, and folder variables scoped to workspace or user. Customize auth, parameters, headers, and body to build any HTTP request easily. Work together effortlessly, add teams, assign roles, and control folder access. Supports major schemes like OAuth2 for secure and streamlined authorization. From basic to complex, Testfully enables quick, effective testing without the need for coding, making advanced API testing accessible and hassle-free. Execute all requests in a folder simultaneously, sequentially, or randomly with just one click. ...
    Starting Price: $49 per month
  • 2
    Nevatech Sentinet
    Nevatech Sentinet is a powerful, flexible, lightweight and scalable API Management and API Governance software platform designed to comprehensively address API management needs with extensive capabilities and ease of use. It provides an enterprise-level API repository with full support for API description, versioning, role-based access, life-cycle and multitenancy management, and a secure, lightweight API gateway that supports any form of APIs and services. Sentinet includes remote API management at design-time and run-time, a branded API Developer Portal for publishing and analytics, and centralized tools for creating, securing and monitoring APIs. ...
  • 3
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure...
  • 4
    Peekdata

    Peekdata

    Peekdata

    Consume data from any database, organize it into consistent metrics, and use it with every app. Build your Data and Reporting APIs faster with automated SQL generation, query optimization, access control, consistent metrics definitions, and API design. It takes only days to wrap any data source with a single reference Data API and simplify access to reporting and analytics data across your teams. Make it easy for data engineers and application developers to access the data from any source in a streamlined manner. - The single schema-less Data API endpoint - Review and configure metrics and dimensions in one place via UI - Data model visualization to make faster decisions - Data Export management scheduling AP Ready-to-use Report Builder and JavaScript components for charting libraries (Highcharts, BizCharts, Chart.js, etc.) makes it easy to embed data-rich functionality into your products. ...
    Starting Price: $349 per month
  • 5
    Apiboost

    Apiboost

    Apiboost

    Enterprise-level developer portal providing next-level access control, robust API productization, and advanced API key management. One portal for internal, external, and partner-specific APIs, robust API documentation and guides, delegated control for partners and teams, and flexible content editing with granular editorial permissions and workflows. Use Apiboost’s OpenAI integration to accelerate the development of your API guides and related documentation.
  • 6
    KrakenD

    KrakenD

    KrakenD

    ...The stateless architecture allows for straightforward, linear scalability, eliminating the need for complex coordination or database maintenance. It supports various protocols and API specifications, with features like fine-grained access controls, data transformation, and caching. Unique to KrakenD is its ability to aggregate multiple API responses into one, streamlining client-side operations. Security-wise, KrakenD aligns with OWASP standards and doesn't store data, making compliance simpler. It offers a declarative configuration and integrates with third-party logging and metrics tools. ...
    Leader badge
    View Software
    Visit Website
  • 7
    Utilihive

    Utilihive

    Greenbird Integration Technology

    ...Utilihive provides both the technical infrastructure platform (connectivity, integration, data ingestion, data lake, API management) and pre-configured integration content or accelerators (connectors, data flows, orchestrations, utility data model, energy data services, monitoring and reporting dashboards) to speed up the delivery of innovative data driven services and simplify operations. Utilities play a vital role towards achieving the Sustainable Development Goals and now have the opportunity to build universal platforms to facilitate the data economy in a new world including renewable energy. Seamless access to data is crucial to accelerate the digital transformation.
  • 8
    webMethods.io API
    ...From new mobile applications and omnichannel initiatives, to improved e-commerce and business processes, APIs and microservices power differentiation and business growth in disruptive markets. Protect APIs, data and microservices with authentication and access control. Set thresholds and limits to control API usage. Group and manage microservices just like you would with business apps. Reuse and govern them to take control and avoid chaos. Monitor who's using your APIs and microservices with increased transparency. Measure what's being consumed to directly or indirectly impact revenue. ...
  • 9
    Ambassador

    Ambassador

    Ambassador Labs

    ...Edge Stack makes securing microservices easy with a comprehensive set of security functionality, including automatic TLS, authentication, rate limiting, WAF integration, and fine-grained access control. The API Gateway contains a modern Kubernetes ingress controller that supports a broad range of protocols including gRPC and gRPC-Web, supports TLS termination, and provides traffic management controls for resource availability. Why use Ambassador Edge Stack API Gateway? - Accelerate Scalability: Manage high traffic volumes and distribute incoming requests across multiple backend services, ensuring reliable application performance...
  • 10
    SSQUARE API Management
    SSQUARE - API Management The comprehensive platform to manage APIs (your valuable assets) and keep your business secure while accessible at all time to encompass digital ecosystem. S-Square API Management allows your organization to: Organize APIs of all stakeholders Register APIs under the official directory to make your services easily accessible Protect APIs from cyberattack Provide exposed APIs the authorization to control access of your critical and sensitive data from digital threats Streamline APIs development life cycle Facilitate APIs subscribers and publishers with hassle-free GUI coupled with traffic management and analytic capabilities to enable development agility and customer experience optimization
    Starting Price: $25000 / yr
  • 11
    kgateway

    kgateway

    Cloud Native Computing Foundation

    kgateway is a Kubernetes-native gateway platform designed to manage microservices and AI agent traffic at scale. It acts as a unified control plane for API gateways, AI gateways, inference routing, and agent-to-agent communication. Built on Envoy and open standards, kgateway implements the Kubernetes Gateway API for modern cloud-native environments. The platform enables centralized authentication, authorization, rate limiting, and traffic management. Kgateway also secures LLM consumption by controlling access to models, tools, and agents. ...
  • 12
    Csmart Network API Enablement Platform

    Csmart Network API Enablement Platform

    Covalense Digital Solutions

    ...It enables seamless exposure, governance, and monetization of network services—such as messaging, location, voice/video, billing, and IoT—through TM‑Forum–aligned APIs. The platform delivers granular access control, real-time usage analytics, and flexible pricing models, transforming network assets into revenue streams. Low-code onboarding and multi-tenant architecture accelerate time-to-market and ensure scalable operations. AI-powered observability adds anomaly detection and self-healing capabilities for resilient performance. Whether enabling internal innovation or launching partner ecosystems, Csmart makes network capabilities consumable, controllable, and monetizable by design.
  • 13
    Corsha

    Corsha

    Corsha

    ...Secrets are shared. They are rarely rotated, sometimes never at all. API keys and tokens, even PKI, are getting leaked at an alarming rate. You need clear visibility into and simple control over the machines that are accessing your APIs. Organizations lack visibility into the machines that are leveraging API secrets, and as automation shifts risk from human to machine, the identities of these machines and the secrets they use is more important than ever. Corsha stops API attacks that use stolen or compromised API credentials and helps enterprises protect data and applications that leverage machine to machine (or service to service) API communication.
  • 14
    ATA

    ATA

    ATA

    ...It keeps API code, design documentation, specifications, test cases, and release notes in sync, reducing manual effort and drift while supporting OpenAPI specs, mock servers for frontend progress without backend readiness, and scheduled API monitoring to detect slow responses, timeouts, or failures early. It includes a Developer Studio for design-first OpenAPI creation and version control, E2E Test Automation with AI-generated robustness and security tests, mock servers, chained API workflows, and UI automation testing, and a Documentation Portal that centralizes API docs with multi-editor support, version management, secure access control, and auto-linked live endpoints.
  • 15
    Bijira
    ...It integrates robust security mechanisms, including OAuth2, OIDC, fine-grained access control, and firewall protections, and enforces governance-as-code with AI-assisted policy validation.
  • 16
    Devii

    Devii

    Devii

    ...This platform automatically generates schema-based APIs with CRUD functionality, enabling easy data fetching and manipulation. Devii’s built-in security features use policy-based access control (PBAC) to safeguard data without complex configurations, ensuring that only authorized users access specific resources. The platform supports integration across various SQL databases, including MySQL, PostgreSQL, Oracle, and others, allowing developers to manage all database interactions through a single GraphQL interface. ...
    Starting Price: $49 per month
  • 17
    Amazon API Gateway
    Amazon API Gateway is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. APIs act as the "front door" for applications to access data, business logic, or functionality from your backend services. Using API Gateway, you can create RESTful APIs and WebSocket APIs that enable real-time two-way communication applications. API Gateway supports containerized and serverless workloads, as well as web applications. API Gateway handles all the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, CORS support, authorization and access control, throttling, monitoring, and API version management. ...
    Starting Price: $0.90
  • 18
    Tencent Cloud API Gateway
    ...It can be quickly constructed as needed using the documentation provided by Tencent Cloud. Tencent Cloud's API Gateway features visual monitoring and a rich set of OPS capabilities such as resource management, tenant isolation, and access control, freeing you from heavy OPS workload. API Gateway can be deployed in clusters so that failover can be quickly performed for faulty gateway nodes to guarantee high service reliability. API Gateway is priced competitively and billed based on the number of API calls made and the traffic generated.
  • 19
    GraphQL

    GraphQL

    The GraphQL Foundation

    ...Send a GraphQL query to your API and get exactly what you need, nothing more and nothing less. GraphQL queries always return predictable results. Apps using GraphQL are fast and stable because they control the data they get, not the server. GraphQL queries access not just the properties of one resource but also smoothly follow references between them. While typical REST APIs require loading from multiple URLs, GraphQL APIs get all the data your app needs in a single request. Apps using GraphQL can be quick even on slow mobile network connections.
  • 20
    Aidbox FHIR Platform

    Aidbox FHIR Platform

    Health Samurai

    ...Develop telehealth apps designed for communication and remote monitoring. Implement an FHIR eco-system that complies with CMS interoperability regulations. Develop FHIR-first apps to enable your clients with great access to healthcare information. Aidbox is a metadata-driven platform where everything is represented as data/resourses that can be customized and always remain under your control.
  • 21
    3scale

    3scale

    Red Hat

    3scale is the API infrastructure to build on now, and for the future. We make it easy to manage your APIs for internal or external users. Share, secure, distribute. Control who gets access to your APIs. Implement your corporate business, usage, and governance policies from a simple console. Package APIs in the tiers of service that make sense for your business. Take advantage of a wide range of authentication patterns and credentials to create the safest interactions for your partners, customers, and users. ...
    Starting Price: $750 per month
  • 22
    CData API Server

    CData API Server

    CData Software

    ...It enables you to create and deliver self-contained API endpoints, on-premise or to the cloud - that connect to any application or database and translate REST, JSON, and OData API calls to your configured IT resources. Complete with API critical features like access-control, data security, monitoring, and management, API server is a powerful tool to help modernize your back-end infrastructure. Download a 30-day free trial of CData API Server or learn more at: https://www.cdata.com/apiserver/
  • 23
    Inigo.io

    Inigo.io

    Inigo.io

    ...Our tools eliminate development and delivery hassles, while a self-serve workflow keeps your projects moving forward. What keeps you up at night, DDoS attacks, data leaks, access control? Now you can check off everything on your GraphQL security to-do list. Defend from GraphQL parser and resolver attacks.
    Starting Price: Free
  • 24
    Hoppscotch

    Hoppscotch

    Hoppscotch LTD.

    ...From prototyping to production - develop without switching tabs. Hoppscotch got everything you need to make API development easy. Create workspaces for your teams. Control access to your workspaces. Work together with your team in real-time. Deploy Hoppscotch on your own servers. Organize your requests in collections or folders and share them with your team. Manage your environment variables and use them everywhere. View and manage your request history. Modify headers, authenticate requests, generate random data, and much more. ...
    Starting Price: $19 per user per month
  • 25
    DreamFactory

    DreamFactory

    DreamFactory Software

    ...See why companies like Disney, Bosch, Netgear, T-Mobile, Intel, and many more are embracing DreamFactory's innovative platform to get a competitive edge. Start a hosted trial or talk to our engineers to get access to an on-prem environment!
    Starting Price: $1500/month
  • 26
    Gravitee.io

    Gravitee.io

    Gravitee.io

    ...Use the power of Gravitee.io to manage identities with our OAuth2, OpenID Connect (OIDC) and Financial-grade API (FAPI) certified server. Gravitee.io APIM is a flexible, lightweight and blazing-fast open source API Management solution that helps your organization control finely who, when and how users access your APIs. With strong governance features such as API review and API quality and our market leading API designer, Gravitee.io enables you to design, manage, deploy and monitor your APIs in a secure and governed way. A branded Gravitee.io portal enables your API consumers to fully engage with your business - delivering high quality engagement for your business in the digital age.
    Starting Price: $2500 per month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB