Business Software for OpenVPN

  • 1
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    872 Ratings
    See Software
    Learn More
    Auth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control.
  • 2
    Kamatera Reviews

    Kamatera

    Kamatera

    $4 per month
    151 Ratings
    See Software
    Learn More
    Our comprehensive suite of cloud services allows you to build your cloud server your way. Kamatera’s infrastructure is specialized in VPS hosting. With 24 data centers around the world, including 8 in the US, as well as in Europe, Asia and the Middle East, you can choose from. Our enterprise-grade cloud server can meet your requirements at any stage. We use cutting edge hardware, including Ice Lake Processors, NVMe SSDs, and other components, to deliver consistent performance and 99.95% uptime. With a robust service such as ours, you'll get a lot of great features like fantastic hardware, flexible cloud setup, Windows server hosting, fully managed hosting and data security. We also offer consultation, server migration and disaster recovery. We have a 24/7 live support team to assist you in all time zones. With our flexible and predictable pricing plans, you only pay for the services you use.
  • 3
    Domotz Reviews
    Top Pick
    See Software
    Learn More
    Discover why MSPs, IT Professionals, and System Integrators trust our Network Monitoring and Management Solution to monitor thousands of networks worldwide. Try for free now!
  • 4
    Netdata Reviews
    Top Pick
    Monitor your servers, containers, and applications, in high-resolution and in real-time. Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: Collects metrics from 800+ integrations Real-Time, Low-Latency, High-Resolution Unsupervised Anomaly Detection Powerful Visualization Out of box Alerts systemd Journal Logs Explorer Low Maintenance Open and Extensible Troubleshoot slowdowns and anomalies in your infrastructure with thousands of per-second metrics, meaningful visualisations, and insightful health alarms with zero configuration. Netdata is different. Real-Time data collection and visualization. Infinite scalability baked into its design. Flexible and extremely modular. Immediately available for troubleshooting, requiring zero prior knowledge and preparation.
  • 5
    Google Authenticator Reviews
    Top Pick
    Google Authenticator produces 2-Step Verification codes directly on your mobile device. This additional layer of security enhances the protection of your Google Account by necessitating a second verification step during the login process. Alongside your password, you will need a code that the Google Authenticator app generates on your phone. By using your Google Account, you can conveniently and securely access a multitude of websites and services, while also maintaining clear control over your privacy preferences. To further safeguard your account, utilize the Security Checkup tool, which offers tailored advice and actionable steps to bolster your account's security. It's crucial to understand that compromised passwords are far more prevalent than one might assume. Two-step verification serves as a formidable defense against unauthorized access, requiring that you complete an additional verification step after entering your password, thus significantly enhancing your account's safety. With this method, you can have greater peace of mind knowing that your information is better protected.
  • 6
    Microsoft Authenticator Reviews
    Top Pick
    Embrace a password-free experience by simply entering your username and verifying your sign-in through your mobile device—it's as straightforward as that! Traditional passwords can easily be forgotten, intercepted, or hacked, but with the Authenticator app, your phone adds an additional security measure alongside your PIN or fingerprint. This tool enables you to log into services like Outlook, OneDrive, Office, and many others seamlessly. Safeguard all of your accounts with the added protection of two-step verification. Furthermore, the app enhances your online security by employing industry-standard time-based one-time password (OTP) codes for comprehensive account protection. By utilizing these features, you can enjoy a more secure digital experience without the hassle of remembering complex passwords.
  • 7
    Google Workspace Reviews
    Top Pick

    Google Workspace

    Google

    $6 per user per month
    13 Ratings
    Google Workspace, the enhanced version of G Suite, brings together all the essential tools you need to boost productivity in a single, user-friendly platform. This integrated workspace simplifies your workflow, allowing you to focus more on your tasks rather than on managing them. With advanced AI and search capabilities, Google Workspace enables you to prioritize what truly matters while it takes care of the rest. You can work seamlessly from any location and on any device, even without an internet connection, thanks to customizable tools designed to cater to your team's specific requirements. Just like G Suite, Google Workspace offers bespoke email solutions for businesses along with a suite of collaborative tools, including Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides, and Forms. Explore our assortment of plans tailored to address your distinct business needs, and find the one that aligns best with your goals on our pricing page. Experience how Google Workspace can transform the way your team collaborates and achieves success.
  • 8
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 9
    Foxpass Reviews
    Top Pick

    Foxpass

    Foxpass

    $3/User/Month
    7 Ratings
    Foxpass provides access control and infrastructure identity for companies of all sizes. Our cloud-hosted and on-premise LDAP and RADIUS and SSH key management solutions ensure employees have only the networks, servers, and VPNs that they need, and only for the period requested. Foxpass can be integrated with existing products such as Office365, Okta and Bitium to provide seamless access.
  • 10
    Microsoft Entra ID Reviews
    Microsoft Entra ID, previously known as Azure Active Directory, serves as a robust cloud-based identity and access management solution that integrates essential directory services, application access control, and sophisticated identity protection measures. Enhance your organization's security with this cloud identity solution, which effectively links employees, clients, and partners to their applications, devices, and valuable data. Utilize robust authentication methods and risk-adjusted access policies to secure resource access without sacrificing user experience. Ensure a quick and straightforward sign-in process throughout your multicloud infrastructure to boost user productivity, minimize password management time, and enhance overall efficiency. Centralize the management of all identities and access to applications, whether they reside in the cloud or on-premises, to gain better visibility and control over your organization’s resources. This comprehensive approach not only protects sensitive information but also fosters a seamless and efficient working environment for all users.
  • 11
    IPFire Reviews
    IPFire is an advanced, robust, and secure Open Source firewall built on the Linux platform. Its user-friendly interface, exceptional performance across various environments, and adaptability make it suitable for a wide range of users. Prioritizing security above all, IPFire is fortified to defend against online threats while simultaneously safeguarding your network from potential intrusions. The firewall's robust engine and its integrated intrusion prevention system work in tandem to shield your network from cyber attacks and denial-of-service threats. Developed as free software by a collaborative community, IPFire is trusted by hundreds of thousands of users globally. The core aim of IPFire is to ensure maximum security, and it is designed for easy configuration to establish a firewall engine that effectively blocks unauthorized access. By default, IPFire organizes the network into distinct zones with tailored security policies, such as LAN and DMZ, allowing for effective risk management and customized configurations to cater to specific requirements. This thoughtful design enhances the overall security posture of any network it protects.
  • 12
    Rublon Reviews

    Rublon

    Rublon

    $1/month/user
    2 Ratings
    Rublon allows your workforce to securely connect to your organization's servers, networks, and applications. Multi-factor authentication makes it easy to protect your data and comply with data protection regulations such as GDPR. Rublon can be deployed across your organization, enabling multi-factor authentication (MFA) for all cloud apps, VPNs servers, workstations, on-premise and internal apps.
  • 13
    BitLaunch Reviews
    Make payments with cryptocurrency for exceptional cloud servers that are efficient, rapid, and secure. With BitLaunch, DigitalOcean, Vultr, and Linode, you can quickly deploy servers and pay hourly using Bitcoin and various other cryptocurrencies. Experience top-tier cloud servers from renowned hosting providers, featuring instant automatic setup and one-click applications for enhanced privacy, including OpenVPN, WireGuard, and Shadowsocks R, alongside LAMP/LEMP, WordPress, and a plethora of other options. Our extensive selection of Operating Systems encompasses everything from Linux variants to Windows Desktop and Server editions. You can easily launch anything from the most recent Ubuntu version to a Bitcoin Windows RDP. Our knowledgeable and dedicated support team is available to assist you whether you need guidance on server configurations or help in selecting the right specifications for your needs. Additionally, leverage our Developer API to programmatically create and manage servers for your projects, along with the ability to handle crypto transactions seamlessly. We also offer a straightforward Command-line Tool to help you kickstart your journey into our services. Furthermore, our user-friendly interface ensures a smooth experience for both novices and seasoned professionals alike.
  • 14
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 15
    Skycloak Reviews
    Many developers are unaware that the most powerful tool for managing users, handling authentication and authorization, and even designing custom login and signup pages is completely free and open source: Keycloak 🤯. However, being free means you’re responsible for setting it up and maintaining it as your application scales. This creates several challenges that we aim to solve: Awareness: Developers and businesses are often unaware that Keycloak can address all their IAM needs. Cost: Many businesses are paying significant costs with current IDaaS providers. Maintenance: Businesses already using Keycloak face challenges in managing maintenance overhead and meeting compliance requirements for sensitive data. Skycloak is a managed Keycloak service that provides enterprise-grade identity and access management capabilities without the complexity of managing your own infrastructure. It combines the robust features of Keycloak with additional tools and services to enhance your security and development experience.
  • 16
    OneLogin Reviews
    Protect essential organizational data and enhance employee efficiency with OneLogin, a reliable identity and access management (IAM) platform tailored for contemporary businesses. This solution is crafted to bolster security within enterprises while streamlining login processes, making it an ideal choice for organizations aiming to implement security measures effortlessly. OneLogin boasts a variety of highly-rated functionalities, including single sign-on (SSO), a centralized directory, user provisioning, adaptive authentication, mobile identity management, compliance reporting, and additional features. By leveraging these tools, companies can ensure both security and ease of access for their users. As organizations continue to navigate the complexities of digital security, OneLogin stands out as a comprehensive solution to meet these evolving needs.
  • 17
    LoginTC Reviews

    LoginTC

    Cyphercor

    $3/month/user
    Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
  • 18
    EZ VPN Reviews

    EZ VPN

    EZ VPN

    $149 per year
    EZ VPNTM provides rapid and secure access to all of your remote network locations, enabling you to connect to your office for remote work, manage home automation systems, upgrade industrial control panels, and monitor webcams effortlessly. With EZ VPNTM, any resource behind a firewall is accessible without the need to modify your existing network settings. It establishes a secure VPN connection that allows you to control home automation, access remote desktops, and more, all while eliminating the hassle of complex router or firewall setups. This solution is compatible with any network environment, as EZ VPNTM comes preconfigured to ensure the highest level of VPN security. Enhanced safety features include a password-protected certificate, two-factor authentication, and notifications. You can manage all your connections through a user-friendly web interface, where traffic data, user status, and connection history are conveniently displayed on the dashboard, making it easy to monitor and maintain your network activity. This comprehensive approach to remote access and security simplifies the experience for users at all levels.
  • 19
    AWS Directory Service Reviews
    AWS Directory Service for Microsoft Active Directory, commonly referred to as AWS Managed Microsoft Active Directory (AD), allows your directory-capable applications and AWS services to seamlessly utilize a managed version of Active Directory within AWS. This service is based on genuine Microsoft AD technology and eliminates the need for data synchronization or replication from your on-premises Active Directory to the cloud. Users can leverage standard Active Directory administrative tools and utilize inherent features like Group Policy and single sign-on. With AWS Managed Microsoft AD, integrating Amazon EC2 and Amazon RDS for SQL Server instances into your domain becomes straightforward, along with the ability to utilize AWS End User Computing (EUC) offerings such as Amazon WorkSpaces for AD users and groups. This service facilitates the migration of applications dependent on Active Directory and Windows-based workloads to the AWS environment. Additionally, AWS Managed Microsoft AD enables the application of Group Policies for managing EC2 instances while effectively supporting AD-dependent applications hosted in the AWS Cloud. Ultimately, this solution simplifies enterprise operations by providing a robust and scalable directory service in the cloud.
  • 20
    SolusIO Reviews

    SolusIO

    SolusIO

    $2.50 per month
    Our aim is to equip our partners and clients with tailored solutions that cater to their specific digital transformation paths. In various sectors, organizations are compelled to utilize technology to enhance customer engagement and unlock new market potential. Central to this endeavor is the necessity for a dynamic IT infrastructure that adapts to evolving demands and accelerates innovation. We simplify the intricacies of managing virtual infrastructure by providing ultra-fast, on-demand virtual machines, a straightforward API, and a user-friendly self-service control panel for clients, complemented by a robust administration panel for service providers. SolusIO offers a comprehensive suite of virtualization technologies that support both hypervisor and container-based virtualization, enabling centralized management of KVM virtual machines. Additionally, upcoming releases will introduce support for OpenVZ, Virtuozzo, and other technologies, further enhancing our platform's capabilities. This continuous evolution ensures that our clients remain equipped to navigate the complexities of the digital landscape effectively.
  • 21
    ADrive Enterprise Reviews

    ADrive Enterprise

    ADrive

    $1.67 per month
    ADrive Enterprise harnesses cloud storage to free your data center and system administrators from the expenses and responsibilities tied to managing in-house production storage systems. Our skilled teams, dedicated solely to storage, craft top-tier solutions utilizing reliable technology from prominent manufacturers in today's data center, storage, and networking sectors. We ensure 99.9% uptime by utilizing enterprise-class storage systems from NetApp®, securely hosted in Tier IV data centers with various service providers. These advanced storage solutions are meticulously designed to eliminate any potential points of failure. Consequently, we assure that your business applications will remain operational, even in the event of multiple failures involving storage controllers, disk drives, network systems, power supplies, and cooling apparatuses. To enhance performance, we optionally connect to your offices or data centers through VPN connections. Additionally, you can set up backup schedules, select the frequency of backups, and immediately begin mirroring your data to the ADrive Enterprise Cloud, offering you peace of mind and reliability in data management. This commitment to excellence ensures that your data is safe and accessible whenever you need it, empowering your business to thrive in a digital landscape.
  • 22
    V-Key Smart Authenticator Reviews
    Enroll in the V-Key Smart Authenticator now to enjoy a complimentary one-month trial. Trust is the foundation of both businesses and relationships. Are your team members working from home? Do you manage numerous users who require access to your applications or systems? As organizations increasingly adopt multi-factor authentication (MFA), relying solely on a password has become inadequate. Moreover, SMS one-time passwords (OTPs) have shown to be insecure, making them susceptible to interception and phishing schemes. While hardware tokens may offer a level of security, they are costly to implement, prone to loss or theft, often inconvenient for users, and necessitate frequent replacements. The V-Key authenticator offers a robust and adaptable solution for multi-factor authentication that is more affordable and ideally suited for small to medium enterprises. It seamlessly integrates with a variety of enterprise applications, systems, and VPNs, ensuring enhanced security. Achieve enterprise-grade multi-factor authentication in just three straightforward steps, making it an ideal choice for businesses aiming to bolster their security measures.
  • 23
    360 Monitoring Reviews

    360 Monitoring

    360 Monitoring

    $3.99 per month
    With customizable dashboards, straightforward setup, and tailored tools, you have a comprehensive solution for ensuring server uptime. Monitor your online business assets confidently, backed by exceptional internal and external system oversight. Keep an eye on server performance indicators such as CPU, network, memory, and disk usage to diagnose problems directly at their origin. Safeguard your websites against harmful IPs to enhance both your sender reputation and email deliverability. Conduct thorough scans of your application log files to gather insights into their performance metrics. Explore a rich library of top plugins and even create your own using the open-source 360 agent. Regularly assess your site’s uptime, performance, and overall health through scheduled scans. With a single click, evaluate your website from 26 different global locations, ensuring an optimal customer experience everywhere. Stay informed via your preferred application so you can be alerted immediately if your site experiences downtime or performance issues. Additionally, utilize this unique crawler to examine entire websites and portals for quality, allowing you to detect errors effectively and improve overall functionality. By implementing these features, you can maintain a proactive approach to website management and performance optimization.
  • 24
    SpendHound Reviews
    Maximize your vendor renewals while streamlining your tech expenses and conserving both time and money. Experience all features without any hidden upsells, and take advantage of complimentary communication via calls, Slack, and email with our renewal specialists who are dedicated to helping you reduce costs on software renewals. Gain insight into competitive pricing to ensure you're not overspending on vendor services, and let our team analyze your contracts to offer strategic advice and negotiation strategies for securing better deals. Enjoy seamless direct integrations that can be set up in under half an hour, with all vendor information automatically populated for your convenience. Receive timely renewal reminders through both email and Slack, along with valuable cost-saving insights that highlight application redundancies and underutilization. Alternatively, connect directly with our renewal experts for free benchmarking insights and negotiation techniques. By combining innovative software solutions with expert human analysis and seamless integrations, SpendHound delivers the most precise renewal tracking service available in the market today. Empower your business with these comprehensive tools and expertise to navigate vendor renewals effortlessly and effectively.
  • 25
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory serves as a centralized repository for information regarding various objects within a network, facilitating easy access and management for both administrators and users. It employs a structured data storage approach, which underpins a logical and hierarchical arrangement of directory information. This repository, referred to as the directory, holds details about various Active Directory entities, which commonly include shared resources like servers, volumes, printers, as well as user and computer accounts on the network. For a deeper understanding of the Active Directory data repository, one can refer to the section on Directory data store. Security measures are seamlessly integrated with Active Directory, encompassing logon authentication and the control of access to directory objects. Through a single network logon, administrators are empowered to oversee directory information and organizational structures across the entire network, while authorized users can readily access resources from any location within the network. Additionally, policy-based administration simplifies the management process, making it more efficient even for the most intricate network configurations. This framework not only enhances security but also streamlines resource management, making network operations more effective.
  • Previous
  • You're on page 1
  • 2
  • Next