Software > IT Security > Authentication

Authentication Software and Access Control Software

Access control software allows you to restrict access to certain rooms or cabinets via authentication. In practice, a chip and a reader with an installed access control software (RFID access control) is usually used to check the authorization of access. Biometric data, such as fingerprint, iris scan or voice recognition, are often used for access control. Authentication software is also often used for personnel time recording. As a rule, however, various core processes of identity management or identity and access management (IAM) are mapped via the software solutions.

The access control and authentication products listed here range from biometric access control solutions, RFID access control software, time and attendance access control systems to specialized image authentication or voice authentication software.

Are you looking for a suitable authentication solutions?
show 1 to 8 (of 8 entries)
HelloID
Secure cloud access management through single sign-on also for mobile users
Secure cloud access management through single sign-on also for mobile users Your users need access to applications and data regardless of device or location? You need secure access for your cloud applications? HelloID provides a web-based dashboard for your SaaS and intranet applications including single sign-on functionality. Legacy applications may be accessible via Citrix or RDP. Multi-factor authentication (MFA) and access policies additionally guarantee a secure login process. HelloID Access Management is the solution for organizations with a hybrid network environment. Of course, it is also ideal for employees in the home office, pupils/students, field staff or mobile caregivers. But also in the office secure and...
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
Self Service Password Reset Manager (SSRPM)
Increased security through identity verification during password reset
Increased security through identity verification during password reset With the Self Service Reset Password Manager (SSRPM), end users can reset their passwords themselves at any time via a web module. Pre-defined security questions and two-factor authentication enable unique user identification for the highest possible security against password misuse and identity theft. Learn now how SSRPM can support your password management.
FLINTEC IT - Mobile Project Time Recording
Recording of staff time and project time via Flintec App
Recording of staff time and project time via Flintec App The software solution FLINTEC IT - Mobile Project Time Recording is a modular extension of the Flintec App for time recording and access control. The mobile project time recording is used to record personnel/project time for payroll accounting and project time for post-calculation.
prime WebTime and prime WebAccess
Time recording and access control for 5-5000 employees
Time recording and access control for 5-5000 employees The working time recording with the prime WebTime software convinces with the simple time bookings and high functionality. The time recording system offers comprehensive evaluation options for efficient personnel resource planning. Thanks to the web browser standard, the solution can be quickly and comprehensively integrated, expanded and networked with other access, time recording or security solutions.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
DEXICON for access control and time recording
Access control, building security
Access control, building security Based on its core competence in data acquisition, PCS today implements comprehensive corporate security projects with high-security biometrics, video management, access control, visitor management and perimeter protection, from consulting and project planning to installation and maintenance.
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
show 1 to 8 (of 8 entries)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 347 Software categories