Filter Results (29)
Countries available
Countries where the product is available. Note: Customer support may not be accessible in that country.
South Africa
Pricing Options
29 results
With Pulseway Network Access Control - Monitor, manage & implement policies for controlling devices and user access to their networks.
Learn more about Pulseway
With Pulseway all-in-one Network Access Control software you can monitor, manage and implement policies for controlling devices and user access to their networks. Identify different network devices,... Read more
turn an existing Pulseway agent into a probe that detects and, where possible, identify all agents on the network. You can then enroll any discovered device that you want to monitor. Start your free trial today!
Learn more about Pulseway
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Cloud-based physical security solution that helps businesses manage and monitor access across facilities from a centralized platform.
Learn more about Brivo Access
Leading cloud-based access control and smart spaces technology that bring keyless entry, mobile credentials, remote security management, smart locks, visitor management and identity management... Read more
solutions to market. The Brivo platform enables security automation, remote management, elevates employee and tenant experience, and improves the safety of all people and assets in any type of physical space.
Learn more about Brivo Access
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Designed to adapt — secure network access solutions tailored to evolving business needs.
Learn more about NordLayer
Network Access Control (NAC) is a policy of securely accessing the network and restricting unauthorized users or devices outside of it. Any unverified attempts to connect are supervised and detected... Read more
by IT administrators responsible for enforcing NAC security policy. However, it’s a labor-intensive task that requires resources and attention to detail — to minimize the workload and increase performance quality, NordLayer offers a centralized Control Panel that supports access activity monitoring.
Learn more about NordLayer
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Jamf Private Access is a zero-trust network access solution that allows administrators to secure access to their network.
Learn more about Jamf Private Access
With Jamf Private Access, organizations can balance maintaining network security with providing end-users quick and easy access to resources they need to do their jobs. Unlike with a VPN, with this... Read more
Zero-Trust Network Access solution, users never have to think about when or how to access secured sites. The user is authenticated, authorized and the device is trusted to access data directly - all from behind the scenes.
Learn more about Jamf Private Access
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
SecureLink, an Imprivata company, is the industry leader in critical access management
SecureLink, an Imprivata company, is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data.... Read more
By leveraging zero trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points.
Learn more about SecureLink
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
The N-able RMM platform is built for both managed service providers and in-house IT professionals who manage complex IT environments.
The N-able RMM remote monitoring and management platform is designed to make managing, maintaining, and protecting IT assets easy for IT service providers, MSPs, and in-house IT professionals. From a... Read more
single web-based dashboard, you get access to antivirus, endpoint detection and response, patch management, email protection, and integrated backup, in addition to drag-and-drop automation. In short, RMM is built to provide efficiency and grow as you grow.
Learn more about RMM
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
ITAM Software: Track complete hardware & software asset life-cycles, licenses, contracts, certificates, renewal reminders, and more!
Device42 is the most comprehensive discovery system for Hybrid IT available today. Continuously discover, map, and optimize infrastructure and applications across data center and cloud environments.... Read more
Device42 intelligently groups discovered workloads by application affinities, dramatically reducing the effort required to create move groups, capturing all communications. Customers across 60 countries use these capabilities to manage and modernize their IT infrastructure and application landscapes.
Learn more about Device42
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone.
Provides cloud-managed keyless access for your office or building. It allows you to unlock the door with your smartphone.
Learn more about Kisi
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement.
Enables all corporate compliance stakeholders to collaboratively define and oversee proper SoD enforcement.
Learn more about SAP Access Control
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
We provide a way to grant access to your wireless and LAN networks, as well as your Linux servers, and only for the duration needed
Free Trial
Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need.
Also, we provide SSH Key Management and enforcement.
Learn more about Foxpass
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Genea Access Control is a cloud-based access control platform that provides physical security to buildings and enterprises.
Genea access control is a cloud-based access control platform that provides physical security for buildings and enterprises. The solution includes mobile-based access control, visitor management,... Read more
access logs, out-of-the-box integrations, non-proprietary access control hardware, 24/7 support & more.
Our software allows building tenants to self-manage access for their employees to the building through the main entrance, parking garage, and any other access points.
Learn more about Genea Access Control
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Kentik is the network observability company. Our platform is a must-have to plan, run, and fix any network.
Kentik is the network observability company. Our platform is a must-have for the network front line, whether digital business, corporate IT, or service provider. Network and cloud professionals turn... Read more
to the Kentik Network Observability Cloud to plan, run, and fix any network, relying on our infinite granularity, AI-driven insights, and insanely fast search. Kentik makes sense of network, cloud, host, and container flow, internet routing, performance tests, and network metrics.
Learn more about Kentik
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering.
Features include graphic mapping, role-based identity management, email notifications, peer-to-peer replication, and area mustering.
Learn more about Access Control Manager
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Portnox offers cloud-native network & endpoint security essentials that enable IT teams to address today's pressing security challenges
Portnox CLEAR is the only cloud-native network access control (NAC) solution that unifies essential network and endpoint security capabilities: device discovery, network authentication, access... Read more
control, network hardware administration, risk mitigation and compliance enforcement. As a cloud service, Portnox CLEAR eliminates the need for on-going maintenance such as upgrades and patches and requires no on-site appliances.
Learn more about Portnox CLEAR
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
NACVIEW is a modern, easy to implement and integrate network access control solution.
NACVIEW is a modern, easy to implement and integrate network access control solution. NACVIEW provides visibility of all connected devices across the whole network. A variety of profiling methods... Read more
allows you to define what is connected to your network (type of device, operating system, etc. NACVIEW accurate and granular policies enable you to define what devices can connect to your network. Politics can build based on many different factors like a group of users, group of devices, type, etc.
Learn more about NACVIEW
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Relevance platform to deliver contextually relevant information for personalized interactions with clients, partners, customers & more.
Relevance platform to deliver contextually relevant information for personalized interactions with clients, partners, customers & more.
Learn more about Coveo Relevance Cloud
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Re-imagined Network Access Control for the World of IoT
Genian NAC helps maintain full visibility & control of all IT assets and ensures them to be the highest level of security and compliance through flexible deployment options (Cloud or on-prem).
Genian... Read more
NAC also provides a consistent and reliable access experience to all authorized users and keeps non-compliant devices to the highest level of security compliance automatically through comprehensive IT management solution.
Learn more about Genian NAC
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Cyber and end point security software providing user control, internal network traffic management, and financial transaction tracking.
Learn more about Adept Secure
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems.
On a mission to improve safety and security for the built world, Openpath creates smart, flexible access control systems. Sleek, secure hardware and convenient, touchless mobile entry enhances the... Read more
user experience, while cloud-based enterprise software and built-in video capabilities effortlessly scale to make remote system management easier than ever.
Openpath is a complete access control system designed to secure anywhere from a single door up to hundreds of entries across multiple locations.
Learn more about Openpath
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
strongDM makes it unbelievably easy to manage and audit access across all infrastructure: databases, servers, clusters, web apps.
strongDM is obsessed with getting your staff access to the systems that run your business.
We combine authentication, authorization, networking, and observability to deliver frictionless access to... Read more
everything in your stack. That means secure, that means convenient, that means as flexible and automatable as you need it to be.
Learn more about strongDM
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. OSS & Enterprise editions.
Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that... Read more
need to secure their infrastructure and comply with security best-practices and regulatory requirements. It helps in having complete visibility into activity happening across org infrastructure while reducing the operational overhead of privileged access management.
Learn more about Teleport
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor.
VMware AppDefense is an endpoint protection platform that improves the security of your applications from within the hypervisor. The solution allows users to accelerate security operations, assure... Read more
workloads, protect workloads and enhance micro-segmentation effectiveness.
Learn more about VMware AppDefense
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for all users, devices, and workloads. We deliver secure access for complex and hybrid... Read more
enterprises by thwarting complex threats, reducing costs, and boosting operational efficiency.
The full suite of Appgate solutions and services protects more than 650 organizations across the government, fortune 50, and global enterprises.
Learn more about Appgate SDP
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, 24/7.
Klevio is the only key management solution where you can lock / unlock your existing doors, from anywhere, at any time.
With the Klevio suite you have everything to easily manage access to your... Read more
property or business:
- Klevio hardware is installed at the property to deliver secure keyless access
- The Klevio Dashboard is your access management tool with advanced key sharing & monitoring features
- The Klevio Phone App is the digital key - the more secure and convenient way to unlock doors
Learn more about Klevio
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications.
Cloud-based network monitoring platform that helps businesses assess the performance & bandwidth of applications.
The software allows users to simplify operations, monitor application performance,... Read more
enable firewalls and more.
Learn more about VMware SD-WAN
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems.
Carbon Black App Control is an application access control solution that allows security operations teams to protect critical systems.
Learn more about Carbon Black App Control
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Mainframe security suite of products for real-time threat detection, user authorization, and cybersecurity compliance.
Mainframe security suite for real-time threat detection, user authorization, and cybersecurity compliance. The suite includes the following products: IBM Z Multi-Factor Authentication, zSecure... Read more
Command Verifier, zSecure Audit, zSecure Alert, zSecure Admin, zSecure Visual, zSecure CICS Toolkit, and zSecure Manager for RACF z/VM.
Learn more about IBM Security zSecure
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Hybrid cloud integration platform that helps businesses with network automation, IP address management, and routing capabilities.
Hybrid cloud integration platform that helps businesses with network automation, IP address management, and routing capabilities.
Learn more about mmesh
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System
Cloud-based network access control (NAC) platform that helps manage regulatory compliance, access control, and security threats.
Cloud-based network access control (NAC) platform that helps manage regulatory compliance, access control, and security threats.
Learn more about Zentry Trusted Access
Features
- Policy Creation
- Access Controls/Permissions
- Multiple Authentication Methods
- Intrusion Prevention System