Software > IT Security > Authentication

Authentication Software and Access Control Software

Access control software allows you to restrict access to certain rooms or cabinets via authentication. In practice, a chip and a reader with an installed access control software (RFID access control) is usually used to check the authorization of access. Biometric data, such as fingerprint, iris scan or voice recognition, are often used for access control. Authentication software is also often used for personnel time recording. As a rule, however, various core processes of identity management or identity and access management (IAM) are mapped via the software solutions.

The access control and authentication products listed here range from biometric access control solutions, RFID access control software, time and attendance access control systems to specialized image authentication or voice authentication software.

Are you looking for a suitable authentication solutions?
show 1 to 12 (of 12 software programs)
HelloID
Secure cloud access management through single sign-on also for mobile users
Secure cloud access management through single sign-on also for mobile users Your users need access to applications and data regardless of device or location? You need secure access for your cloud applications? HelloID provides a web-based dashboard for your SaaS and intranet applications including single sign-on functionality. Legacy applications may be accessible via Citrix or RDP. Multi-factor authentication (MFA) and access policies additionally guarantee a secure login process. HelloID Access Management is the solution for organizations with a hybrid network environment. Of course, it is also ideal for employees in the home office, pupils/students, field staff or mobile caregivers. But also in the office secure and...
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
Self Service Password Reset Manager (SSRPM)
Increased security through identity verification during password reset
Increased security through identity verification during password reset With the Self Service Reset Password Manager (SSRPM), end users can reset their passwords themselves at any time via a web module. Pre-defined security questions and two-factor authentication enable unique user identification for the highest possible security against password misuse and identity theft. Learn now how SSRPM can support your password management.
FLINTEC IT - Mobile Project Time Recording
Recording of staff time and project time via Flintec App
Recording of staff time and project time via Flintec App The software solution FLINTEC IT - Mobile Project Time Recording is a modular extension of the Flintec App for time recording and access control. The mobile project time recording is used to record personnel/project time for payroll accounting and project time for post-calculation.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
DEXICON for access control and time recording
Access control, building security
Access control, building security Based on its core competence in data acquisition, PCS today implements comprehensive corporate security projects with high-security biometrics, video management, access control, visitor management and perimeter protection, from consulting and project planning to installation and maintenance.
FLINTEC IT - Mobile access and door status monitoring
App for mobile access control and wireless door status monitoring
App for mobile access control and wireless door status monitoring FLINTEC IT - Mobile access and door status monitoring enables secure and reliable control of access to a building or room. Authentication is carried out using an NFC-enabled device, such as a smartphone. Door status monitoring enables the status of the door to be monitored, e.g. whether the door is open or closed.
FLINTEC IT - Alert in the event of a breach of working time regulations
Software for time recording with alarm in case of violation of working time regulations
Software for time recording with alarm in case of violation of working time regulations Time recording with control mechanisms focuses on compliance with regulations and real-time information. Are work assignments carried out, statutory breaks taken and driving licenses checked regularly? Flintec records the data and reports rule violations or reminders promptly.
amxSIGN for Office 365
Sign directly and digitally in SharePoint
For all business processes that require signatures (e.g. contracts, invoices, etc.), amxSIGN for Office 365 offers the option of signing documents directly from the SharePoint application. The solution is user-friendly and implements the digital signature in compliance with the legal requirements of the EU and the integration of the federal printing office as a signature provider.
FLINTEC IT - Time recording via app with workflow
Flintec digitizes and automates recurring processes in time recording
Flintec digitizes and automates recurring processes in time recording FLINTEC IT Workflow digitizes approval procedures for time recording. Flintec has integrated the module into the Flintec app for mobile time recording. With the Workflow module, approval procedures for time recording are conveniently requested, approved and forwarded to time management via the app.
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management
tenfold - Next Generation Access Management tenfold is a powerful and user-friendly identity and access management software. Managing access rights has never been easier! Organize your file servers: tenfold is perfectly tailored to meet the demands of Microsoft environments. The software creates all Active Directory accounts automatically and builds the necessary access structures in accordance with best practices right from the start. Data owners are included into specified workflows. tenfold helps you maintain control over who has access to which folders at any time.
prime WebTime and prime WebAccess
Time recording and access control for 5-5000 employees
Time recording and access control for 5-5000 employees The working time recording with the prime WebTime software convinces with the simple time bookings and high functionality. The time recording system offers comprehensive evaluation options for efficient personnel resource planning. Thanks to the web browser standard, the solution can be quickly and comprehensively integrated, expanded and networked with other access, time recording or security solutions.
show 1 to 12 (of 12 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories