Results for: ms access

Suggested Categories:

Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Identity and Access Management (IAM) Software
Identity and Access Management (IAM) software is a security solution that manages and controls user access to digital resources within an organization. It ensures that the right individuals have access to the appropriate resources at the right times and for the right reasons. IAM systems provide tools for user authentication, authorization, and lifecycle management, helping to enforce security policies and compliance requirements. They often integrate features like single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC) to streamline access and reduce the risk of unauthorized entry. By centralizing access controls, IAM software enhances operational efficiency, minimizes security risks, and provides audit trails for regulatory purposes.
Extended Access Management (XAM) Software
Extended Access Management (XAM) software is a modern cybersecurity solution designed to bridge the "Access Trust Gap" in today's hybrid and remote work environments. Traditional Identity and Access Management (IAM) and Mobile Device Management (MDM) tools often fall short in securing unmanaged applications and personal devices. XAM addresses this by providing comprehensive visibility and control over all user identities, applications—both managed and unmanaged—and devices. It enforces contextual access policies based on real-time device health, user behavior, and application usage, ensuring that only trusted entities can access sensitive resources. By integrating with existing IAM and MDM systems, XAM enhances security without disrupting user productivity, making it an essential component for organizations aiming to secure their digital ecosystems.
OT Secure Remote Access Software
OT secure remote access software enables authorized engineers, technicians, and third-party vendors to securely connect to Operational Technology (OT) networks — like industrial control systems (ICS), SCADA, PLCs, and other critical infrastructure — from remote locations. It replaces traditional VPNs and jump-servers with modern security practices such as Zero Trust Network Access (ZTNA), least-privilege access, multi-factor authentication (MFA), and session isolation to reduce attack surfaces. These solutions often include network segmentation, protocol isolation, access logging, and session recording to ensure compliance, auditability, and protection against credential theft or lateral movement. For legacy or vulnerable OT devices that cannot be patched easily, “network-cloaking” or “invisible network” techniques help hide devices from unauthorized scans. Overall, OT secure remote access software allows remote management, maintenance, and troubleshooting of critical infrastructure while preserving security, reliability, and compliance.
Customer Identity and Access Management (CIAM) Software
Customer identity access management (CIAM) software enables organizations to store, manage, and handle customer identities and user data.
Secure Access Service Edge (SASE) Software
Secure Access Service Edge (SASE) software combines wide-area networking (WAN) and network security functions into a unified cloud-native service to securely connect users, devices, and applications regardless of location. It integrates capabilities such as secure web gateways, firewall-as-a-service, zero trust network access (ZTNA), and cloud access security broker (CASB) to provide comprehensive, scalable, and flexible security. SASE software enables organizations to enforce consistent security policies, reduce complexity, and improve performance for remote workforces and distributed environments. By delivering security and networking as a single service, it supports digital transformation and cloud adoption while minimizing risks. SASE solutions are critical for modern enterprises aiming to protect data and users in a highly connected, cloud-driven world.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Data Subject Access Request (DSAR) Software
Data subject access request (DSAR) software enables organizations to stay compliant with data privacy regulations such as GDPR and CCPA by giving them the ability to identify, access, and delete users personal data from their systems upon request.
Just-in-Time (JIT) Access Software
Just-in-Time (JIT) access software is a security solution that grants users temporary, limited access to critical systems or data only when needed. It minimizes exposure to sensitive resources, reducing the attack surface for potential cyber threats. Access is granted dynamically, often based on user roles, tasks, or pre-defined approval workflows. JIT access ensures compliance with the principle of least privilege, enhancing overall security and accountability.
Zero Trust Network Access (ZTNA) Software
Zero Trust Network Access (ZTNA) solutions are a type of security technology that verifies and enforces strict access controls for all users, devices, and applications attempting to connect to a network.
Identity Management Software
Identity management software is a system designed to manage and secure digital identities across an organization. It ensures that users have appropriate access to resources by handling identity creation, maintenance, and deactivation throughout the identity lifecycle. The software includes features such as role-based access control, single sign-on (SSO), and directory services to streamline identity administration. By automating processes like user provisioning and deprovisioning, it enhances efficiency while reducing human errors and security risks. Identity management software is essential for maintaining compliance with regulatory standards and protecting sensitive information from unauthorized access.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.

147 Products for "ms access"

  • 1
    PYPROXY

    PYPROXY

    PYPROXY

    Market-leading proxy solution provides tens of millions of IP resources. Commercial residential and ISP proxy network includes 90M+ IPs around the world. Exclusive high-performance server requests access to real residential addresses. Abundant bandwidth support business demands. Real-time speed can reach 1M-5M/s.99% success rate guarantee data collection activities. There is no limit to the number of uses or invocation frequencies of the proxies. You can generate huge amounts of proxies at one time. Provide various API parameter configurations. ...
    Starting Price: $0.77/GB
    View Software
    Visit Website
  • 2
    Monas MS

    Monas MS

    TRIKDIS

    Alarm monitoring software Monas MS is designed to display, process, store and react to messages received in the centralized monitoring stations. Additional modules provide advanced features for alarm monitoring and response. All in one – alarm monitoring, management and control of rapid response teams, remote access for technical personnel. We can convert the current monitoring software database to Monas MS software database, keeping all existing records.
  • 3
    Project Reader
    Project Reader is a cost-effective desktop application which lets you open, print and export Microsoft Project files. Project Reader opens every Microsoft Project plan version, from the older MS Project 98 to the newer MS Project 2019. Open, print and export any MS Project file without requiring MS Project. Multilingual user interface with run-time language change. Instantly access all MS project plans in any format at a very reasonable price. Track the progress of any task with Gantt chart, label them and export/print any view. ...
    Starting Price: $29.00/one-time/user
  • 4
    Stellar Repair for Access

    Stellar Repair for Access

    Stellar Data Recovery Inc.

    Powerful tool recommended by Microsoft MVPs and widely trusted by users & admins worldwide, to repair MS Access database & recover its objects in a new database. Previews all the recoverable objects, including tables, queries, forms, reports, etc., before saving them. The software supports Office 365, Access 2019, 2016, 2013, and lower versions. Also, it can work with the latest Windows 11 and earlier versions. Compact and Repair database command is used for reducing the database file size to fix the issues arising due to large database and occasional corruption. ...
    Starting Price: $99 per year
  • 5
    Data Loader

    Data Loader

    Interface Computers

    Data Loader is a simple, yet powerful tool capable of Synchronizing, exporting and importing data between many common database formats. If you wish to convert MS SQL Server, CSV or MS Access to MySQL, this is the best tool to satisfy your specific needs effectively. The latest Data Loader Version supports MySQL, Oracle, MS Access, Excel, FoxPro, DBF, MS SQL Server, CSV and Delimited or Flat Files. You can now easily convert Oracle to MySQL or MS SQL Server using this tool equipped with several unique and advanced features. ...
    Starting Price: $99 one-time payment
  • 6
    SQL Manager

    SQL Manager

    EMS Software

    ...Manipulate data with filters, grouping, sorting and sub-levels, view it as JSON, Image or XML and export it into any of popular formats, including XLSX, CSV, TXT, XML, SQL and more. Advanced import from MS Excel, MS Access, DBF, XML, ODF, TXT, CSV, etc. with selecting the method of adding data to the already existing tables, as well as processing or replacing of inserted data. Data export into a variety of popular formats: MS Excel, MS Word, MS Access, HTML, PDF, TXT, CSV, DBF, XML, ODF and more with flexible setting for the result data view.
  • 7
    Chainnodes

    Chainnodes

    Chainnodes

    Chainnodes is a next-gen Web3 Infrastructure provider to power your dApps! Deploy your archival node in one click and benefit from the following features: low latency (<100ms), high speed block execution (~50ms), high rate limits (up to 500 RPS), > 99.99% uptime and fair and transparent pricing.
    Starting Price: $50 per month
  • 8
    eCatholic ChMS
    ...Plus data is refreshed in real-time, giving your entire team access to the most up-to-date information and keeping everyone on the same page. When you combine simple online giving technology with your eCatholic tools, you can automatically import weekly donations and other fundraising campaigns directly into your ChMS database. eCatholic's intuitive software maintains precise records for parishes with multiple churches, so your information is always accurate and easy to find.
    Starting Price: $20 per month
  • 9
    iPMP

    iPMP

    Integra Software Services

    Transforming goals to successes through a streamlined workflow. Hold complete control over your projects. All of the familiar functions from MS Excel, MS Project, MS Access, and MS SharePoint are bundled into a single streamlined platform. iPMP is a simple yet powerful project management platform that amps up and streamlines project management through automated planning with customizable templates, workload monitoring, advanced project scheduling through Gantt charts, and micro-scheduling of projects. ...
  • 10
    JS Paint

    JS Paint

    JS Paint

    JS Paint is a free online paint tool based on MS Paint. This free online paint and pixel editor is easy to use and simple. It was created as a browser-based alternative to Microsoft Paint.
  • 11
    eBiziiMS

    eBiziiMS

    BridgeSol

    Enable a better intelligence to record documents and support business decisions while reducing the cost of document storage and retrieval. With features such as Record management, Workflow management, Correspondence Management empower your organization to work as single unit with unified objectives. Error-free identification for over 400 million physical access cards worldwide. With features like no required software, embedded flash memory and plug-play functionality the card reader is ready...
  • 12
    PAVE

    PAVE

    PAVE

    ...Despite all care, content or visual changes to the document cannot be completely ruled out by processing with PAVE. It is up to the user to check the generated PDF documents. The ZHAW assumes no liability. The ICT accessibility lab has previously developed plugins for creating accessible PDF documents from MS Word and MS PowerPoint, but with which you cannot make existing PDF documents barrier-free. This gap is now closed with PAVE.
  • 13
    METFIN

    METFIN

    Compex Integrated Systems

    Metfin-MS is flexible ERP software designed specifically for Metal and Surface Finishers. Built on our Integrated Business Management System, Metfin-MS provides your metal finishing shop with everything you need to gather, organize and quickly access vital production and financial information. Integrated in nature, yet modular by design, our software allows all team members within your organization to contribute and participate and share information without bottleneck or repetitive data entry. ...
  • 14
    A-Plan

    A-Plan

    Braintool Software

    ...Although A-Plan's basic functions are deliberately kept simple, you can also manage information about project portfolio management (PPM), risk management and skill management due to its flexible structure. The Project Management Office (PMO) or project office will also benefit from A-Plan. A-Plan enables data exchange with MS Project, MS Excel, MS Outlook and MindManager for easy exchange of your scheduling. The optional WebViewer allows access to current appointments and planning data via web-based views at any time, anywhere and on any device.
    Starting Price: $452/one-time/user
  • 15
    Vertical ERP

    Vertical ERP

    Vertical ERP

    ...Vertical ERP runs on the latest Microsoft technologies, this includes Microsoft SQL Server. All of our modules are fully integrated, so no need to import or export data. Vertical ERP is also integrated with MS Word, MS Access, MS Excel, and other office products. Vertical ERP has several industry specific solutions. These include solutions for the Automotive, Injection Molding/Plastics, and Food and Beverage industries.
    Starting Price: $99 per user per month
  • 16
    Cloudbrink

    Cloudbrink

    Cloudbrink

    If you’ve ever dealt with slow VPNs, or clunky ZTNA agents that degrade app performance, you’re not alone. Many IT teams are stuck balancing security with usability—and often end up sacrificing both. Here is a different approach. The high-performance ZTNA service that is part of a personal SASE solution from Cloudbrink can upgrade or replace traditional VPNs while fixing the performance and complexity that come from other vendors in the ZTNA and SASE space. Built as a software-only...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 17
    Quik-Biz Bill System

    Quik-Biz Bill System

    TPS of Illinois

    Copy the MS Access database file to a location you and other users have access to. Double click on the MS Access file to open the database. When you get the following screen, hold the Shift key and click on “Open”. Once the database opens, click on the “Tools” menu and open the “Options” submenu. Then click on the “Hidden objects” check box and click “OK”.
    Starting Price: $45 one-time payment
  • 18
    PD-Trak

    PD-Trak

    PD-Trak Solutions

    PD-Trak is an idea, project and portfolio management system that is optimized to manage product development projects using a stage/phase-gate process. It is a highly scalable, cost effective solution for small start-ups and large multi-national corporations. PD-Trak combines the accessibility of a web application with the power and familiarity of Excel, PowerPoint and MS Project (use of MS Office tools optional). PD-Trak Solutions offers consulting and training services related to PPM and stage/phase-gate.
  • 19
    Softaken OST to PST Converter
    ...We will discuss the key feature of the program, but before that, it is essential to learn the reason for conversion. Why Convert OST to PST? OST and PST support MS Outlook for Windows. Even both of them support MS Outlook, users cannot access OST files directly to PST or vice versa. MS Outlook restricts users to open data directly from one email file format to the other.
  • 20
    Sysgem Logfile Concentrator
    ...Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent alarms and real-time alerts. The platform offers a user-customizable display for real-time record monitoring and provides a full web browser interface for remote access. Additionally, it supports common ODBC databases such as MS SQL, Oracle, and MS Access. As part of the Sysgem product family, Logfile Concentrator can function as a standalone solution or complement the Sysgem Enterprise Manager (SEM).
  • 21
    QuickMigrations Thunderbird to Outlook
    ...Some of the advanced features are listed below. 1. Auto Load option fetch the Thunderbird file from its default location automatically. 2. Load Profile option provides the full access to the user to search the Thunderbird file (s) from the local storage. 3. Supports bulk migration for Thunderbird to Outlook PST format. 4. Export all the data from Thunderbird to MS Outlook at once. 5. Compatible with Windows 10, 8.1, 8, 7 and all the previous versions. 6. Supports MS Outlook 2019, 2016, 2013, 2010
    Starting Price: $39
  • 22
    Spectrus JS

    Spectrus JS

    ACD/Labs

    Process and analyze NMR and xC/UV/MS data from any web browser on Mac and Windows. Access a complete set of intuitive processing tools when and where it's convenient for you.
  • 23
    Zavanta

    Zavanta

    COMPROSE

    Need a better way to capture policies, SOPs, and work instructions and make them accessible to your workforce? Zavanta is web-based system for building clear, easy-to-update policies and procedures, online portals, and manuals people WANT to use! Clear communication is essential for improved workforce performance and compliance. Other tools simply manage documents or pair MS-Word with workflow, so you are on your own as far as the content itself goes.
  • 24
    WinSQL

    WinSQL

    Synametrics Technologies

    ...WinSQL is a generic querying tool that connects to any relational database (RDBMS) for which an Open Database Connectivity (ODBC) driver is available, virtually all RDBMS on the market today. Connect to a variety of databases, including: heavy duty vendors Oracle, MS SQL Server, DB2, Sybase, Informix to lightweight backends like MS Access, DBase, and Text File. Generate royalty-free executables that can be used by your business users to run queries. These can be either static or dynamic queries that pull fresh data from the back-end. Export or simply open any query results into MS Excel with just a click of your mouse. ...
    Starting Price: $99.00/year/user
  • 25
    IMSXpress ISO 9001
    ...The IMSXpress client application can be installed directly on user computers, or on a Windows server and then be distributed to users by remote desktop services as a remote application. The database is an MS SQL database. It can be installed on any MS SQL Server 2014 or higher and be accessed by the IMSXpress application over any type of network. You can set up your own remote access, use our cloud-based data hosting service, or get the online subscription package. Fully automated training system with self-training, integrated document training, job descriptions, and more. ...
    Starting Price: $160 per month
  • 26
    GitBit

    GitBit

    GitBit

    Training for MS-500: Microsoft Office 365 Security Admin. What you'll learn: * Everything you need to know to pass the MS-500: Microsoft 365 Security Administration. * Creating and managing admin roles including time-limited admin roles. * Creating and managing conditional access policies. * How to implement multi-factor authentication (MFA)
  • 27
    Empirica

    Empirica

    BEC Systems

    ...A unique identification barcode/file is used for each test set request, from the scanning of the original pathology test form through to final verification and issue of results. RFID/EID option is also available in this pathology software. Built on advanced SQL Client/Server database architecture allowing you to access information and create reports from any other SQL capable application (MS-Excel, MS-Access etc). Test Set Database allows you to combine any number of individual pathology tests into a single named Test Set. Full privilege control of users allows individual security setting for each user. Privileges include: Viewing or Editing Databases, Editing Tests and Ranges, etc.
    Starting Price: $295.00/one-time
  • 28
    DocLogix

    DocLogix

    DocLogix

    ...You can choose to use DocLogix on-premise or in the Cloud. DocLogix integrates with MS Office, SAP, NAV, etc. and allows users to gain control over unstructured content as well as reap tangible benefits while still using their favorite work environment (mobile, e-mail, web browser, MS Office). Solution can help to create order and efficiency in the office while reducing costs and frustration.
  • 29
    CMSContractor

    CMSContractor

    Construction Management Software

    Construction Management Software Limited are one of the leading suppliers and developers of construction estimating and financial software systems for the construction and allied contracting industries. This version of the software is the long-established VB6/MS Access version. It is aimed at the 1 to 10 user marketplace but not limited by the number of users. This version of the software is the newly released C# .NET/MS SQL Server version. It is a modern web services solution, architectured using the latest Microsoft technologies for building secure, reliable web applications. It is aimed at the 5+ user marketplace, a solution that can also be used on a single user standalone basis. ...
  • 30
    Qxchange

    Qxchange

    Cellarstone

    QXchange is a flexible, easy to use, data integration software. It can quickly and easily transfer data between many standard data formats and applications, including MS Access, Excel, Comma delimited flat file, MS SQL Server, QuickBooks, Salesforce.com and others. It allows simple and clear setup of extraction, transformation and loading instructions to exchange data between different formats. The instructions are stored and managed as profiles. QXchange is a very easy to use, data integration software. ...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next