Results for: access control role

Suggested Categories:

Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
View more categories (20) for "access control role"

479 Products for "access control role" with 1 filter applied:

  • 1
    JS7 JobScheduler
    ... - True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc. - Hybrid use for cloud and on premises User Interface - Modern, no-code GUI for inventory management, monitoring and control with web browsers - Near real-time information brings immediate visibility of status changes and log output of jobs and workflows - Multi-client capability, role based access management High Availability - Redundancy and Resilience based on asynchronous design and autonomous Agents - Clustering for all JS7 products, automatic fail-over and manual switch-over
    Starting Price: $1440/year
    Partner badge
    View Software
    Visit Website
  • 2
    ZITADEL

    ZITADEL

    ZITADEL

    ...Developers can integrate authentication directly into their applications using ZITADEL's APIs or build dedicated login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 3
    Passwork

    Passwork

    Passwork

    ...Key features: - Set custom permissions for vaults and folders - Store passwords in a structured way - Use the search bar, tags and color labels for quick and easy access - Eliminate unsecured, old, weak or compromised passwords - Track all activities and review previously used passwords - Invite teammates to vaults and shared folders - Role-based access control - Integration with AD, Azure AD and LDAP - Custom settings for individual users and roles - Import and export effortlessly
    Starting Price: $480 one-time
  • 4
    FusionAuth

    FusionAuth

    FusionAuth

    ...Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
    View Software
    Visit Website
  • 5
    Delinea Server Suite
    ...Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. ...
  • 6
    Devolutions Workspace
    ...Devolutions Workspace brings them together in one interface that works across Windows, macOS, Linux, iOS, Android, and browsers. Users can autofill credentials, manage entries based on role-based access control (RBAC), and respond to time-sensitive access requests—without ever seeing the raw passwords. Workspace includes multi-factor authentication (MFA) through Devolutions Authenticator, secure in-app messaging, and offline mode. Admins can enforce strong policies, while end-users enjoy a frictionless login experience. ...
    Starting Price: $3/month/user
  • 7
    Premier Construction Software

    Premier Construction Software

    Premier Construction Software

    ... • Project and field management with RFIs, subcontracts, drawings, and change orders tied directly to the budget and schedule. • Automated billing, approvals, and payroll to reduce manual entry and speed up collections. • Unlimited entities, consolidated reporting, and role-based dashboards.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 8
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 9
    ISGUS Time Management

    ISGUS Time Management

    ISGUS America LLC

    ...They enable reliable recording of time and operating data as well as secure Access Control. The terminals are robust, user-friendly and can be flexibly integrated into different corporate environments.
    View Software
    Visit Website
  • 10
    tenfold

    tenfold

    tenfold

    tenfold is a no-code solution for Identity Governance & Administration (IGA), ensuring that the right people have access to the right resources at the right time. Thanks to its off-the-shelf plugins and streamlined setup, tenfold is fully operational in weeks - helping you avoid long & costly setup phases. Go from access risks to full control over IT privileges with tenfold's comprehensive IGA toolset: - User Lifecycle Management - Role-based Access - End User Self-Service - Approval Workflows - Data Access Governance - User Access Reviews - Separation of Duties
    Starting Price: $.09/managed identity/month
  • 11
    On Control EA

    On Control EA

    On Control EA

    ...Take a look at real-time data on how currencies perform from around the world. With On Control EA, you have access to unlimited amounts of all the data you need to make a decision regarding your next best trading move.
  • 12
    WeLIMS

    WeLIMS

    WeLIMS

    ...With WeLIMS you can set the right level of authorization in your organization. Predefined roles for Product specifications management, Recipes management or Quality Control are already set up. Workflows make everyone collaborate efficiently and seamlessly.
    Starting Price: $30/month/user
  • 13
    Devolutions PAM

    Devolutions PAM

    Devolutions

    ...One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
    Starting Price: $50/month/user
  • 14
    Qvu Data Service
    ...Qvu Data Service provides REST API endpoints for users and applications to execute saved query documents and return results in tabular or JSON formatted result sets. Qvu Data Service provides role-based data source, table column and document group access control and supports both Basic and OIDC authentication.
    Starting Price: $0
  • 15
    DynamicsPrint

    DynamicsPrint

    DynamicsPrint®

    DynamicsPrint® is a Microsoft preferred solution. It is a complete ERP solution for the printing and packaging industry compatible with Microsoft Dynamics 365. DynamicsPrint® can handle every aspect of your company’s operations. From quoting and production to resource planning and finance. Microsoft is promoting the solution on AppSource. The product is a cloud-native SaaS solution that enables you to access your applications and data any time from any location. With DynamicsPrint®, there...
    Starting Price: $7 per user/month
  • 16
    Securden Unified PAM
    Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. ...
    Starting Price: Per User Pricing
    View Software
    Visit Website
  • 17
    StrongDM

    StrongDM

    StrongDM

    ... - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Starting Price: $70/user/month
    View Software
    Visit Website
  • 18
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods.
    Starting Price: $8/month/user
  • 19
    S3M Security Network Access Control
    S3M Security is a cybersecurity company that focuses on software development and provides value added services in network and information security. Founded by people with more than 20 years of experience in the industry, S3M Security operates in the USA, Europe and EMEA regions. Our team continues to develop new approaches and solutions every day to provide secure environments for organizations against increasing cyber threats and attacks.
  • 20
    Devolutions Gateway
    ...Gateway supports RDP (Remote Desktop Protocol), SSH (Secure Shell), VNC (Virtual Network Computing), PowerShell, and more—all brokered through just-in-time (JIT) access using pre-authorized tokens. The Remote Access Management package adds everything needed: Devolutions Launcher for one-click access, Hub or Server for storing and controlling credentials, and role-based access control (RBAC) to ensure each user sees only what they’re authorized. Every action is logged. Together, they replace VPNs with an auditable, fast, and flexible access model - ideal for organizations that prioritize security and ease of use.
    Starting Price: $20/month/user
  • 21
    ManageEngine ADManager Plus
    ...With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. ...
    Starting Price: $595 per year
    View Software
    Visit Website
  • 22
    Anypoint MQ

    Anypoint MQ

    MuleSoft

    With Anypoint MQ, perform advanced asynchronous messaging — such as queueing and pub/sub — with fully hosted and managed cloud message queues and exchanges. As a service of Anypoint Platform™, Anypoint MQ supports environments, business groups, and role-based access control (RBAC) with enterprise-grade functionality.
  • 23
    ScreenHub
    ...With features like Display Health Monitoring, ScreenHub allows you to track and monitor your display's overall health without the hassle and expense of additional hardware like cameras. Role-based access control (RBAC) and Workspaces come together to offer you more security and oversight of who is accessing your displays by setting permission levels for different users.
    Starting Price: $6.99 per display per month
  • 24
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 25
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. ...
  • 26
    Devolutions Remote Desktop Manager
    ...It’s a streamlined, policy-driven solution for IT teams that want full control over remote access without bouncing between tools.
    Leader badge
    Starting Price: $30/month/user
  • 27
    Hestia Control Panel

    Hestia Control Panel

    Hestia Control Panel

    Hestia Control Panel is an open source, lightweight, and powerful server management solution offering a web and CLI interface to deploy and manage web domains, mail, DNS, databases, and backups from a single dashboard. It supports SFTP/SSH user access with chroot jails, two‑factor authentication, SSH key management, and per‑domain TLS certificates.
    Starting Price: Free
  • 28
    PureDome

    PureDome

    PureDome

    PureDome, an advanced secure connectivity solution, is purpose-built to elevate network security for businesses. Streamlining access management enables authorized team members to exclusively access company assets. With its unified cloud platform, PureDome integrates crucial elements of user roles, including secure remote access, data access control, and team management. This integration simplifies network infrastructure management and centralizes operations, facilitating seamless business workflows. ...
    Starting Price: $8.45 per user per month
  • 29
    Tailscale

    Tailscale

    Tailscale

    ...Devices only connect after signing in through your existing identity provider. Easily enforce multi-factor authentication, deauthorize employees who’ve moved on, and more. Define role-based access controls to restrict sensitive servers or authorize contractors to only see what they need. And every connection is centrally logged from both ends, viewable from a dashboard and logging API.
    Starting Price: $5 per user per month
  • 30
    Securden Password Vault for Enterprises
    ...It centralizes the storage of passwords, SSH keys, DevOps secrets, files, and other sensitive data in an AES-256 encrypted vault, helping organizations enforce strong security controls and defend against insider and external threats. The solution enables secure credential storage, granular access controls, automated password rotation, and just-in-time access while providing full visibility through audit logs, session recordings, and real-time alerts. IT teams can launch secure remote connections such as RDP, SSH, and SQL directly from the vault without exposing credentials. ...
    View Software
    Visit Website
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB