Suggested Categories:

Guided Selling Software
Guided selling software are tools that help sales reps and customers move through the sales process. Guided selling tools guide sales reps through the entire sales cycle and selling process, so that they can close more deals and become more efficient at selling.
PDF Editors
PDF editors allow users to create, modify, and manage PDF documents by adding, removing, or editing text, images, and other elements within the file. These platforms typically offer tools for annotating, highlighting, and commenting on PDFs, as well as the ability to rearrange pages, merge multiple PDFs, or split a single document into several files. PDF editors also often include features like form filling, digital signing, and password protection, enhancing document security and interactivity. By using PDF editors, businesses and individuals can customize documents, improve collaboration, and streamline workflows for handling digital paperwork.
User Research Software
User research software, also referred to as UX research or user testing software, enables organizations to research and understand all aspects of the user experience and customer journey. These tools typically include features for conducting surveys, user interviews, usability testing, and feedback collection through various channels such as websites, mobile apps, and social media. They may also provide analytics capabilities to analyze patterns in user data, identify pain points, and uncover actionable insights. User research software is essential for improving user experience (UX), optimizing interfaces, and ensuring that products meet the needs and expectations of their target audience.
PDF Converters
PDF converters are software tools that enable users to convert PDF documents into different formats, such as Word, Excel, PowerPoint, HTML, or image files, and vice versa. These platforms allow users to extract text, images, and tables from PDF files, making the content editable and easier to manipulate. PDF converters can handle both scanned and native PDFs, offering features like OCR (Optical Character Recognition) for extracting text from images. With the ability to convert files to and from PDF, users can easily share, edit, or archive documents in the most appropriate format for their needs. By using PDF converters, businesses and individuals can improve document workflow and increase productivity.
PDF Readers
PDF readers are software applications that enable users to access, open, and read PDFs. PDF readers are essential tools for being able to open and read PDF files. Advanced PDF readers may also support form filling, digital signatures, and interactive features embedded in PDF documents. PDF readers are widely used in both personal and professional settings to view reports, manuals, eBooks, contracts, and other documents that need to preserve formatting across different devices and platforms.
PDF SDK
PDF SDKs (Software Development Kits) provide developers with the tools and libraries needed to integrate PDF functionality into their applications or websites. These SDKs offer features like viewing, editing, creating, converting, and annotating PDFs, allowing developers to build custom PDF solutions tailored to their needs. PDF SDKs often include APIs for manipulating text, images, and form data, as well as for handling document security, such as encryption and password protection. By using PDF SDKs, developers can add robust PDF capabilities to their software without having to build these features from scratch, saving time and resources.
PDF Software
PDF software refers to a range of tools designed for working with PDF (Portable Document Format) files, which are widely used for document sharing and storage. These tools offer a variety of functions, such as creating, viewing, editing, converting, securing, and managing PDF files. PDF software can be used for tasks like merging or splitting documents, adding annotations, filling out forms, applying digital signatures, and securing documents with passwords or encryption. It is commonly utilized across industries for document collaboration, official documentation, and data exchange due to its universal compatibility and ability to maintain formatting across different platforms.
Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
B2B Payment Platforms
B2B payment platforms are digital solutions designed to facilitate and streamline financial transactions between businesses. These platforms provide secure, efficient, and scalable methods for companies to send and receive payments, manage invoices, and handle cross-border transactions. Features often include support for various payment methods (such as ACH, wire transfers, credit cards, and e-wallets), invoice management, payment reconciliation, and fraud prevention tools. B2B payment platforms help businesses reduce administrative costs, improve cash flow management, and ensure compliance with regulatory requirements. By automating payment workflows and improving the speed and accuracy of transactions, these platforms enhance the overall efficiency of business operations.
B2B Data Providers
B2B data providers offer companies access to large sets of business-related data, which can include information on companies, contacts, industries, financials, and market trends. This data is valuable for businesses looking to expand their customer base, enhance lead generation, conduct market research, or refine their sales strategies. B2B data providers often deliver enriched contact information, company profiles, and detailed insights on decision-makers, helping businesses identify potential leads and make informed decisions. These services may include databases with direct access to contacts, industry reports, and analytics to improve targeted outreach and account-based marketing strategies.
PDF APIs
PDF APIs are software interfaces that enable developers to integrate PDF-related functionality into their applications or websites. These APIs allow for the creation, manipulation, conversion, and extraction of content from PDF files without requiring users to manually open or edit the files. Common features of PDF APIs include merging, splitting, editing text, adding annotations, and extracting text and images. They can also handle PDF conversions, such as converting PDFs to other formats like Word, Excel, or HTML, and vice versa. By using PDF APIs, businesses can automate document workflows, enhance document management systems, and integrate PDF capabilities into custom applications seamlessly.
PDF Compressors
PDF compressors reduce the file size of PDF documents while preserving the content and formatting. These tools optimize the PDF by removing unnecessary data, compressing images, and adjusting file structures to decrease storage requirements and improve file transfer speeds. PDF compressors are useful for businesses and individuals who need to share large PDF files via email or upload them to websites, ensuring they remain accessible and easy to handle without sacrificing quality. Many PDF compression tools offer batch processing, allowing users to compress multiple files at once, saving time and effort.
PDF Merge Software
PDF merge software tools enable users to combine PDFs into a single PDF file. PDF merge tools simplify the process of combining multiple separate PDF files or other documents, like Word documents, into one single PDF document.
PDF Splitters
PDF splitters are tools that allow users to divide large PDF files into smaller, more manageable parts. These platforms provide the ability to separate a single PDF document into individual pages, specific page ranges, or custom-selected sections. PDF splitters can be useful for organizing, sharing, or extracting specific content from a larger file without altering the rest of the document. Many PDF splitters also support batch processing, enabling users to split multiple files at once. By using a PDF splitter, businesses and individuals can easily break down documents for more convenient handling, sharing, and storage.
PDF Generators
PDF generators are tools that allow users to quickly and easily create PDF documents from any type of file, HTML, or code. These tools provide a simple way to convert text, images and other digital formats into the standard PDF format. They also often provide additional features such as password protection and interactive elements like links and forms.
PDF Printers
PDF printers are software tools that allow users to convert digital files into PDF format. They are often used by individuals and businesses for creating and sharing documents with a consistent layout across different devices. These printers can be installed on desktop computers, laptops, and mobile devices. They offer a range of features such as the ability to merge multiple files into one PDF document and password protection for added security. Overall, PDF printers are convenient tools for managing electronic documents in a standardized format.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
PDF Translators
PDF translators are software tools or web-based services used to convert text and imagery in a PDF from one language into another. The translation process is quick and easy, allowing users to obtain translations of PDF documents in a matter of minutes. These translators provide high quality results, making them invaluable for business, educational and personal use. electronic signature, and publishing.
PDF Annotators
PDF annotation tools are pieces of software designed to allow users to add notes and highlight text on PDF documents. They can be used by students or professionals to mark up documents, make comments, and organize information in an intuitive way. Annotations may also include drawing shapes or adding images. The annotations can then be saved with the document for easy sharing and future reference.
PDF Redaction Software
PDF redaction software allows users to securely remove or hide sensitive information from PDF documents, ensuring that confidential data is not accessible. It provides tools to permanently redact text, images, or entire sections by blacking out or erasing content while preserving the rest of the document’s structure. The software ensures that redacted information is irretrievable, even through advanced recovery techniques, enhancing security and compliance with privacy regulations. It often includes features for batch processing, making it easier to redact multiple documents quickly and efficiently. Ultimately, PDF redaction software helps organizations protect sensitive information and maintain compliance with data protection laws.
View more categories (20) for "myfp2esp32-user-guide-306_02.pdf"

27 Products for "myfp2esp32-user-guide-306_02.pdf" with 2 filters applied:

  • 1
    Auth0

    Auth0

    Okta

    ...Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows.
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 2
    Uniqkey

    Uniqkey

    Uniqkey

    ...Uniqkey is Europe’s trusted password and access management platform - purpose-built for companies that demand security, simplicity, and control. Engineered by European cybersecurity experts, our platform combines military-grade encryption with an effortless user experience. We remove complexity from everyday workflows, helping employees stay secure without slowing them down. From auto-filling 2FA codes to streamlining access across your cloud environment, Uniqkey keeps security frictionless and productivity high. With real-time visibility across your entire infrastructure, IT teams gain complete control over access rights, employee activity, and security scores - empowering them to defend against threats and drive compliance with confidence proactively. ...
    Starting Price: €4.5 per employee, per month
    View Software
    Visit Website
  • 3
    GateKeeper Enterprise

    GateKeeper Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key.
    Starting Price: $3/user/month
  • 4
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores.
  • 5
    GateKeeper Client

    GateKeeper Client

    Untethered Labs, Inc.

    ...Synchronization of users, passwords, keys, and access rules. Works with the GateKeeper Vault and on-demand OTPs. Secure cybersecurity blind spots with auto-locking. Advanced proximity-based authentication for computers and websites. Using real-time presence detection, the application determines when a user has walked away and automatically locks the computer.
    Starting Price: $3 per user per month
  • 6
    LiveEnsure

    LiveEnsure

    LiveEnsure

    LiveEnsure® security authenticates users in real time via their smart device. It goes beyond tokens, certs, PINs, OTPs, push or passwords. LiveEnsure® is strong, seamless multi-factor verification of devices, location, knowledge, time, biometrics and behavior in context with an elegant user experience and individual privacy. Instead of crafting home-grown solutions or relying on vendors who infiltrate your identity stack, LiveEnsure® is simple trust API that gives you the power to verify your users across multiple factors with a single call. ...
  • 7
    OneLogin

    OneLogin

    OneLogin

    ...Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 8
    The OptimalCloud

    The OptimalCloud

    Optimal IdM

    The OptimalCloud platform is a full featured, award winning, SSO Federation & IAM solution that provides a single point of authentication, policy management and auditing for a seamless end user experience. The OptimalCloud is deployed in workforce and consumer scenarios, used by some of the most recognizable companies on the globe, and used in some of the most secure environments in the world. Each feature-rich pricing tier comes with multi-factor authentication (MFA), because proper security shouldn't cost extra. The OptimalCloud is integrated with more than eleven thousand applications, simplifying set up and configuration and also has 24 x 7 x 365 support with a guaranteed uptime of 99.99%.
    Starting Price: $2/user/month
  • 9
    cidaas

    cidaas

    WidasConcepts

    ...We take care of it so you can focus on your core business. No more worrying about maintenance or operation. Countless passwords and pins make life difficult for users and are an unsightly barrier to access on digital channels. With passwordless authentication you secure your digital applications and offer your users a unique customer experience – because the login is the first thing your users see.
  • 10
    Symantec VIP
    ...Your favorite websites offer secured authentication compatible with VIP. To begin, scan a QR code and security codes will be generated for that website every thirty seconds. With Symantec VIP both enterprise and end users can securely authenticate wherever and however they are accessing the services. With hundreds of supported websites and integrations that you can easily set up yourself, multi-factor authentication is a snap.
  • 11
    Cisco Duo
    ...To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Starting Price: $3 per user per month
  • 12
    LogMeOnce

    LogMeOnce

    LogMeOnce

    A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. ...
    Starting Price: $3 per user per month
  • 13
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. ...
    Starting Price: $5 per user per month
  • 14
    Entrust Identity Enterprise
    ...Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 15
    UnifyID

    UnifyID

    UnifyID

    Use UnifyID's authentication platform to remove passwords and one-time passcodes (OTP) from your user experience while improving security and consumer convenience. UnifyID offers Multi-Factor Authentication services that combine deterministic, behavioral biometric and environmental attributes using machine learning to uniquely identify users. Applies advanced machine learning to behavioral biometrics and environmental factors to create a secure digital fingerprint of the user.
  • 16
    NuDetect

    NuDetect

    NuData Security

    Our solution combines the power of our four integrated layers of security to verify users based on their inherent behavior. Used by major global brands, this solution protects online environments from login to logout. Don’t miss anything during a session. NuDetect is placed at different points across the environment to monitor users from the moment they enter your website until they leave. Find anomalous activity before it results in fraud.
  • 17
    HYPR

    HYPR

    HYPR | The Passwordless Company

    ...The solution is trusted by more than 60M users worldwide. With deployments taking hours rather than weeks or months, organizations decrease the risk of attack, increase positive user experience, and lower operational costs.
    Starting Price: $4.00 per user/month
  • 18
    PortalGuard

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS is a single, flexible cloud-based IAM platform that offers the widest range of options for multi-factor authentication, biometrics, single sign-on, and self-service password reset to support a customer’s security initiatives and deliver an optimized user experience – all at an affordable price point. For over 20 years, industries such as education, including over 200 institutions, healthcare, finance, and government have chosen PortalGuard as their preferred solution.Whether you’re looking for passwordless workflows, support for your Zero Trust architecture, or just implementing MFA for the first time, PortalGuard can easily secure access for both the workforce and customers whether they are remote or on-premises. ...
  • 19
    SecureAuth

    SecureAuth

    SecureAuth

    With SecureAuth, every digital journey is simple, seamless, and secure to support your Zero Trust initiatives. Protect employees, partners, and contractors with frictionless user experience while reducing business risk and increasing productivity. Enable your evolving digital business initiatives with simple, secure, unified customer experience. SecureAuth leverages adaptive risk analytics, using hundreds of variables like human patterns, device and browser fingerprinting, and geolocation to create each user’s unique digital DNA. ...
    Starting Price: $1 per month
  • 20
    Privakey

    Privakey

    Privakey

    ...The answer is Privakey. Transaction intent verification (TIV) is the combination of strong identity assurance and contextual response into one intuitive user experience. Common examples of TIV include payment confirmations, wire transfer approvals and account update acknowledgements. Our solution utilizes asymmetric cryptography, mobile biometrics and secure notifications to ensure the integrity of every exchange.
  • 21
    Procyon

    Procyon

    Procyon

    ...Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices.
  • 22
    SecurePass

    SecurePass

    eMudhra

    SecurePass IAM provides robust security measures like credential vaulting, session monitoring, and least privilege enforcement. This reduces the risk of unauthorized access, ensuring your organization's data remains secure By automating processes like user provisioning, access certifications, and password management, SecurePass IAM simplifies access management. This leads to increased operational efficiency and productivity within your organization With its built-in analytics, reporting capabilities, and access governance features, SecurePass IAM aids in maintaining compliance with various regulatory standards. ...
  • 23
    SolidPass

    SolidPass

    SolidPass

    SolidPass is a leader in next-generation strong authentication, and protects enterprises and their customers from fraud, digital attacks, and information theft through advanced security software. Solidpass converts mobile phones, internet browsers, and desktop applications into robust security tokens. By eliminating the need for hardware tokens, SolidPass brings the highest levels of security at a fraction of the cost, and without the hassle of traditional, physical two-factor authentication...
  • 24
    Trusona

    Trusona

    Trusona

    Trusona, the pioneering leader of passwordless authentication for digital businesses, provides a phishing-resistant alternative to passwords and SMS OTPs. Trusona Authentication Cloud is a passkey-as-a-service platform, offering the simplest, quickest and least expensive way to add passkeys to your website. It improves business growth and profitability with sign-ins that delight your customers, mitigating top threats like phishing and account takeovers (ATOs) while providing a UX...
  • 25
    It'sMe

    It'sMe

    Acceptto

    ...It’s time to get rid of them for good. 89% of security professionals claim that a more advanced multi-factor authentication tool that provides continuous, behavioral authentication would improve their company’s security posture. Acceptto provides users with Intelligent MFA that intuitively authorizes access to applications and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). ...
  • 26
    LastPass

    LastPass

    LastPass

    LastPass is a cloud-based password manager available on any system or device, ensuring credentials are protected, private, and always within reach. Simple to set up and effortless to use, LastPass delivers the world's most convenient password management experience for consumers and businesses of all sizes and technical requirements. Say goodbye to password fatigue by generating, sharing, accessing, and managing credentials at the click of a button, while preventing bad actors from accessing...
    Leader badge
    Starting Price: $4 per user per month
  • 27
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure...
  • Previous
  • You're on page 1
  • Next