Results for: access control role

Suggested Categories:

Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
View more categories (20) for "access control role"

722 Products for "access control role" with 2 filters applied:

  • 1
    JS7 JobScheduler
    ... - True multi-platform scheduling on premises for Windows®, Linux®, AIX®, Solaris®, macOS® etc. - Hybrid use for cloud and on premises User Interface - Modern, no-code GUI for inventory management, monitoring and control with web browsers - Near real-time information brings immediate visibility of status changes and log output of jobs and workflows - Multi-client capability, role based access management High Availability - Redundancy and Resilience based on asynchronous design and autonomous Agents - Clustering for all JS7 products, automatic fail-over and manual switch-over
    Starting Price: $1440/year
    Partner badge
    View Software
    Visit Website
  • 2
    ZITADEL

    ZITADEL

    ZITADEL

    ...Developers can integrate authentication directly into their applications using ZITADEL's APIs or build dedicated login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 3
    Passwork

    Passwork

    Passwork

    ...Key features: - Set custom permissions for vaults and folders - Store passwords in a structured way - Use the search bar, tags and color labels for quick and easy access - Eliminate unsecured, old, weak or compromised passwords - Track all activities and review previously used passwords - Invite teammates to vaults and shared folders - Role-based access control - Integration with AD, Azure AD and LDAP - Custom settings for individual users and roles - Import and export effortlessly
    Starting Price: $480 one-time
  • 4
    FusionAuth

    FusionAuth

    FusionAuth

    ...Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
    View Software
    Visit Website
  • 5
    Devolutions Workspace
    ...Devolutions Workspace brings them together in one interface that works across Windows, macOS, Linux, iOS, Android, and browsers. Users can autofill credentials, manage entries based on role-based access control (RBAC), and respond to time-sensitive access requests—without ever seeing the raw passwords. Workspace includes multi-factor authentication (MFA) through Devolutions Authenticator, secure in-app messaging, and offline mode. Admins can enforce strong policies, while end-users enjoy a frictionless login experience. ...
    Starting Price: $3/month/user
  • 6
    Mammoth Enterprise Browser
    ​Mammoth Cyber's Enterprise Browser is a Chromium-based solution designed to enhance secure remote access by integrating a policy engine directly within the browser. It offers organizations visibility and control over user interactions with internal applications, public cloud services, and SaaS platforms. By enforcing conditional access and implementing least privilege principles, the browser ensures that users access only the resources necessary for their roles, thereby reducing the risk of data breaches. ...
  • 7
    Premier Construction Software

    Premier Construction Software

    Premier Construction Software

    ... • Project and field management with RFIs, subcontracts, drawings, and change orders tied directly to the budget and schedule. • Automated billing, approvals, and payroll to reduce manual entry and speed up collections. • Unlimited entities, consolidated reporting, and role-based dashboards.
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 8
    Moon HRM

    Moon HRM

    Moon Apps

    Moon HRM allows the super admin to create user admins or managers with assigned roles. Super admins can monitor the managers and employees; HR managers can also be assigned user roles, Our free employee management software helps organizations assign different user roles per the designation and requirement to manage their team. Other Features * Project Hours * Time Logs * Daily Worksheet * Attendance Reports * Leave Requests * Employee Ticket Management * Holiday Calendar * Team Access Control * Company Banner Display * Managed Drive Boost your company's ROI by focusing on qualitative workforce management. ...
    Starting Price: Free to Start
  • 9
    ThreatLocker

    ThreatLocker

    ThreatLocker

    The ThreatLocker suite of security tools are powerful and designed so that everyone from businesses to government agencies to academic institutions can directly control exactly what applications run on their networks. We envision a future in which all organizations can chart their own course free from the influence of cybercriminals and the damage their incursions cause, and our team of veteran cybersecurity professionals created ThreatLocker to make this vision a reality. The team at...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 10
    ISGUS Time Management

    ISGUS Time Management

    ISGUS America LLC

    ...They enable reliable recording of time and operating data as well as secure Access Control. The terminals are robust, user-friendly and can be flexibly integrated into different corporate environments.
    View Software
    Visit Website
  • 11
    WeLIMS

    WeLIMS

    WeLIMS

    ...With WeLIMS you can set the right level of authorization in your organization. Predefined roles for Product specifications management, Recipes management or Quality Control are already set up. Workflows make everyone collaborate efficiently and seamlessly.
    Starting Price: $30/month/user
  • 12
    Devolutions PAM

    Devolutions PAM

    Devolutions

    ...One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
    Starting Price: $50/month/user
  • 13
    Access MicrOpay

    Access MicrOpay

    The Access Group

    Access MicrOpay (formerly Sage MicrOpay) has been helping Australian businesses deliver accurate and compliant payroll for over 35 years. Today’s regulatory and business environment in Australia makes it imperative to remain compliant, competitive and in control. Designed, delivered, and supported by Australians, MicrOpay is the number one choice for Australian Payroll professionals.
  • 14
    Proton Drive

    Proton Drive

    Proton AG

    Proton Drive is the all-in-one workspace for storing sensitive data and collaborating with your teams, clients, and partners. Collaborate securely without compromising control: Share client files, contracts, and sensitive business documents with full end-to-end encryption. You control who can access what. Set passwords, add expiry dates, 
 or revoke access anytime. Protect all your business data:
Plans come with 1 TB of storage allowance per user, giving your team enough space for all their files and docs. ...
    Starting Price: $1.00/user/month
    View Software
    Visit Website
  • 15
    Wrike

    Wrike

    Wrike

    ...Worried about keeping your data secure in the cloud? No problem! Our enterprise-grade security boasts 99.9% uptime, as well as continuous data backup, user authentication, role-based access control, and data encryption. Start your free trial today.
    Leader badge
    Starting Price: $10 per user per month
  • 16
    DynamicsPrint

    DynamicsPrint

    DynamicsPrint®

    DynamicsPrint® is a Microsoft preferred solution. It is a complete ERP solution for the printing and packaging industry compatible with Microsoft Dynamics 365. DynamicsPrint® can handle every aspect of your company’s operations. From quoting and production to resource planning and finance. Microsoft is promoting the solution on AppSource. The product is a cloud-native SaaS solution that enables you to access your applications and data any time from any location. With DynamicsPrint®, there...
    Starting Price: $7 per user/month
  • 17
    Securden Unified PAM
    Securden Unified PAM is a privileged access security solution that lets you discover, centrally store, organize, share, manage, and keep track of all privileged identities, passwords, keys, documents, and other identities. It helps you establish a centralized password management system, automate management with approval workflows, control ‘who’ can access ‘what’, monitor, and record all access to critical IT assets, and enforce password security best practices. ...
    Starting Price: Per User Pricing
    View Software
    Visit Website
  • 18
    StrongDM

    StrongDM

    StrongDM

    ... - Total visibility into everything that’s ever happened in your stack. Security and Compliance teams can easily answer who did what, where, and when. - Admins have precise control over what each user has access to—without these controls ever getting in the way of productivity - IT, InfoSec, and Administrators have precise controls. Unauthorized access is eliminated because users never see resources they don’t have permission to use. -All past, present, and future infrastructure is supported - Responsive 24/7/365 customer support.
    Starting Price: $70/user/month
    View Software
    Visit Website
  • 19
    BOBO by Bourgeois Bohème

    BOBO by Bourgeois Bohème

    Bourgeois Bohème

    BOBO by Bourgeois Bohème is an elite, invitation‑only digital platform that integrates bespoke financial management with luxury lifestyle services in a single, intuitive ecosystem. It offers secure family and staff wallets, wearable and virtual payment devices without names or account numbers, highly customizable spending controls by category, time, and location, and very high transaction limits (up to €1 M per card) backed by robust top‑up and ATM features. The Control Hub provides smart reporting, invoice matching, and role-based access for teams and advisors. Global lifestyle assistance is available 24/7 for administrative, travel, and entertainment arrangements, alongside curated access to premium events and experiences. ...
    Starting Price: Free
  • 20
    Prisma Access Browser

    Prisma Access Browser

    Palo Alto Networks

    ...This browser extends Secure Access Service Edge (SASE) protection seamlessly to every device, offering agility, security, and control to businesses. Key features include creating a secure workspace on any device, protecting against advanced phishing attacks, identifying and blocking advanced malware, supporting forensics and threat hunting, and reducing the risk of tampering.
  • 21
    Venn

    Venn

    Venn

    ...Venn’s Blue Border™ is patented technology that protects company data and applications on BYOD computers used by contractors and remote employees - without VDI. With Venn, work lives in a company-controlled Secure Enclave (installed on the user’s PC or Mac) where all data is encrypted and access is managed. Work applications run locally within the Enclave (no hosting or virtualization) and are protected and isolated from any personal use on the same computer. With Venn, customers are empowered to achieve the cost savings and workforce agility of BYOD, while ensuring robust data protection and compliance with HIPAA, FINRA, PCI, SOC 2, and many more. ...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 22
    ManageEngine Password Manager Pro
    Control access to IT resources and applications based on roles and job responsibilities. Launch direct connection to remote IT resources, websites and applications.
    Starting Price: $495 per year
  • 23
    Visitor Management Singapore
    Visitor Management System in Singapore is a critical component within the suite of security access control solutions implementation in your company. It gives you the ability to know exactly who entered your building premises, when, and why. More importantly, it plays the critical role of allowing you to manage and differentiate between authorized visitors, who should be granted card access, and illegitimate visitors who should be denied entry.
    Starting Price: $2400 one-time payment
  • 24
    S3M Security Network Access Control
    S3M Security is a cybersecurity company that focuses on software development and provides value added services in network and information security. Founded by people with more than 20 years of experience in the industry, S3M Security operates in the USA, Europe and EMEA regions. Our team continues to develop new approaches and solutions every day to provide secure environments for organizations against increasing cyber threats and attacks.
  • 25
    BigHand Business Intelligence
    BigHand Business Intelligence, powered by Iridium is an advanced financial BI solution for law firms with role-based reporting that delivers the right financial data to the right person via intuitive dashboards. The flexible data warehouse replaces manual reporting with data visibility from the firm level to individual clients and matters. Self-service analytics provide controlled access to relevant metrics in any visualization tool of choice.
  • 26
    ManageEngine ADManager Plus
    ...With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. ...
    Starting Price: $595 per year
    View Software
    Visit Website
  • 27
    Anypoint MQ

    Anypoint MQ

    MuleSoft

    With Anypoint MQ, perform advanced asynchronous messaging — such as queueing and pub/sub — with fully hosted and managed cloud message queues and exchanges. As a service of Anypoint Platform™, Anypoint MQ supports environments, business groups, and role-based access control (RBAC) with enterprise-grade functionality.
  • 28
    UTunnel VPN and ZTNA
    UTunnel provides Cloud VPN, ZTNA, and Mesh Networking solutions for secure remote access and seamless network connectivity. ACCESS GATEWAY: Our Cloud VPN as a Service offers swift deployment of Cloud or On-Premise VPN servers. It utilizes OpenVPN and IPSec protocols, enables policy-based access control, and lets you deploy a Business VPN network effortlessly. ONE-CLICK ACCESS: A Zero Trust Application Access (ZTAA) solution that simplifies secure access to internal business applications. ...
    Leader badge
    Starting Price: $6/user/month
    Partner badge
    View Software
    Visit Website
  • 29
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. ...
  • 30
    Devolutions Hub

    Devolutions Hub

    Devolutions

    Devolutions Hub is a powerful, cloud-based solution designed to securely manage and store credentials and sensitive information for teams and organizations. Whether you're a small business or a large enterprise, Devolutions Hub enables seamless password management with robust security features, including role-based access control, audit trails, and encryption. Accessible through any web browser, it simplifies credential sharing and management, while also integrating with other IT and security tools. Devolutions Hub is the ideal solution for businesses looking to enhance security without compromising usability.
    Starting Price: $3 USD/month/user
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB