Results for: ms access

Suggested Categories:

Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Identity and Access Management (IAM) Software
Identity and Access Management (IAM) software is a security solution that manages and controls user access to digital resources within an organization. It ensures that the right individuals have access to the appropriate resources at the right times and for the right reasons. IAM systems provide tools for user authentication, authorization, and lifecycle management, helping to enforce security policies and compliance requirements. They often integrate features like single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC) to streamline access and reduce the risk of unauthorized entry. By centralizing access controls, IAM software enhances operational efficiency, minimizes security risks, and provides audit trails for regulatory purposes.
Extended Access Management (XAM) Software
Extended Access Management (XAM) software is a modern cybersecurity solution designed to bridge the "Access Trust Gap" in today's hybrid and remote work environments. Traditional Identity and Access Management (IAM) and Mobile Device Management (MDM) tools often fall short in securing unmanaged applications and personal devices. XAM addresses this by providing comprehensive visibility and control over all user identities, applications—both managed and unmanaged—and devices. It enforces contextual access policies based on real-time device health, user behavior, and application usage, ensuring that only trusted entities can access sensitive resources. By integrating with existing IAM and MDM systems, XAM enhances security without disrupting user productivity, making it an essential component for organizations aiming to secure their digital ecosystems.
OT Secure Remote Access Software
OT secure remote access software enables authorized engineers, technicians, and third-party vendors to securely connect to Operational Technology (OT) networks — like industrial control systems (ICS), SCADA, PLCs, and other critical infrastructure — from remote locations. It replaces traditional VPNs and jump-servers with modern security practices such as Zero Trust Network Access (ZTNA), least-privilege access, multi-factor authentication (MFA), and session isolation to reduce attack surfaces. These solutions often include network segmentation, protocol isolation, access logging, and session recording to ensure compliance, auditability, and protection against credential theft or lateral movement. For legacy or vulnerable OT devices that cannot be patched easily, “network-cloaking” or “invisible network” techniques help hide devices from unauthorized scans. Overall, OT secure remote access software allows remote management, maintenance, and troubleshooting of critical infrastructure while preserving security, reliability, and compliance.
Customer Identity and Access Management (CIAM) Software
Customer identity access management (CIAM) software enables organizations to store, manage, and handle customer identities and user data.
Secure Access Service Edge (SASE) Software
Secure Access Service Edge (SASE) software combines wide-area networking (WAN) and network security functions into a unified cloud-native service to securely connect users, devices, and applications regardless of location. It integrates capabilities such as secure web gateways, firewall-as-a-service, zero trust network access (ZTNA), and cloud access security broker (CASB) to provide comprehensive, scalable, and flexible security. SASE software enables organizations to enforce consistent security policies, reduce complexity, and improve performance for remote workforces and distributed environments. By delivering security and networking as a single service, it supports digital transformation and cloud adoption while minimizing risks. SASE solutions are critical for modern enterprises aiming to protect data and users in a highly connected, cloud-driven world.
Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Data Subject Access Request (DSAR) Software
Data subject access request (DSAR) software enables organizations to stay compliant with data privacy regulations such as GDPR and CCPA by giving them the ability to identify, access, and delete users personal data from their systems upon request.
Just-in-Time (JIT) Access Software
Just-in-Time (JIT) access software is a security solution that grants users temporary, limited access to critical systems or data only when needed. It minimizes exposure to sensitive resources, reducing the attack surface for potential cyber threats. Access is granted dynamically, often based on user roles, tasks, or pre-defined approval workflows. JIT access ensures compliance with the principle of least privilege, enhancing overall security and accountability.
Zero Trust Network Access (ZTNA) Software
Zero Trust Network Access (ZTNA) solutions are a type of security technology that verifies and enforces strict access controls for all users, devices, and applications attempting to connect to a network.
Identity Management Software
Identity management software is a system designed to manage and secure digital identities across an organization. It ensures that users have appropriate access to resources by handling identity creation, maintenance, and deactivation throughout the identity lifecycle. The software includes features such as role-based access control, single sign-on (SSO), and directory services to streamline identity administration. By automating processes like user provisioning and deprovisioning, it enhances efficiency while reducing human errors and security risks. Identity management software is essential for maintaining compliance with regulatory standards and protecting sensitive information from unauthorized access.
Physical Security Software
Physical security software is a suite of tools designed to manage and monitor the security of physical spaces, assets, and individuals within an organization. These platforms often integrate with hardware systems such as access control systems, surveillance cameras, alarms, and sensors to provide a comprehensive security solution. Features of physical security software can include real-time monitoring, incident reporting, visitor management, access control, and remote security management. The software can also provide detailed analytics on security incidents, track access logs, and manage emergency response protocols. By helping organizations secure their physical premises, physical security software enhances safety, prevents unauthorized access, and ensures regulatory compliance.

67 Products for "ms access" with 2 filters applied:

  • 1
    PYPROXY

    PYPROXY

    PYPROXY

    Market-leading proxy solution provides tens of millions of IP resources. Commercial residential and ISP proxy network includes 90M+ IPs around the world. Exclusive high-performance server requests access to real residential addresses. Abundant bandwidth support business demands. Real-time speed can reach 1M-5M/s.99% success rate guarantee data collection activities. There is no limit to the number of uses or invocation frequencies of the proxies. You can generate huge amounts of proxies at one time. Provide various API parameter configurations. ...
    Starting Price: $0.77/GB
    View Software
    Visit Website
  • 2
    Monas MS

    Monas MS

    TRIKDIS

    Alarm monitoring software Monas MS is designed to display, process, store and react to messages received in the centralized monitoring stations. Additional modules provide advanced features for alarm monitoring and response. All in one – alarm monitoring, management and control of rapid response teams, remote access for technical personnel. We can convert the current monitoring software database to Monas MS software database, keeping all existing records.
  • 3
    Stellar Repair for Access

    Stellar Repair for Access

    Stellar Data Recovery Inc.

    Powerful tool recommended by Microsoft MVPs and widely trusted by users & admins worldwide, to repair MS Access database & recover its objects in a new database. Previews all the recoverable objects, including tables, queries, forms, reports, etc., before saving them. The software supports Office 365, Access 2019, 2016, 2013, and lower versions. Also, it can work with the latest Windows 11 and earlier versions. Compact and Repair database command is used for reducing the database file size to fix the issues arising due to large database and occasional corruption. ...
    Starting Price: $99 per year
  • 4
    eCatholic ChMS
    ...Plus data is refreshed in real-time, giving your entire team access to the most up-to-date information and keeping everyone on the same page. When you combine simple online giving technology with your eCatholic tools, you can automatically import weekly donations and other fundraising campaigns directly into your ChMS database. eCatholic's intuitive software maintains precise records for parishes with multiple churches, so your information is always accurate and easy to find.
    Starting Price: $20 per month
  • 5
    A-Plan

    A-Plan

    Braintool Software

    ...Although A-Plan's basic functions are deliberately kept simple, you can also manage information about project portfolio management (PPM), risk management and skill management due to its flexible structure. The Project Management Office (PMO) or project office will also benefit from A-Plan. A-Plan enables data exchange with MS Project, MS Excel, MS Outlook and MindManager for easy exchange of your scheduling. The optional WebViewer allows access to current appointments and planning data via web-based views at any time, anywhere and on any device.
    Starting Price: $452/one-time/user
  • 6
    Cloudbrink

    Cloudbrink

    Cloudbrink

    If you’ve ever dealt with slow VPNs, or clunky ZTNA agents that degrade app performance, you’re not alone. Many IT teams are stuck balancing security with usability—and often end up sacrificing both. Here is a different approach. The high-performance ZTNA service that is part of a personal SASE solution from Cloudbrink can upgrade or replace traditional VPNs while fixing the performance and complexity that come from other vendors in the ZTNA and SASE space. Built as a software-only...
    Leader badge
    Partner badge
    View Software
    Visit Website
  • 7
    Sysgem Logfile Concentrator
    ...Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent alarms and real-time alerts. The platform offers a user-customizable display for real-time record monitoring and provides a full web browser interface for remote access. Additionally, it supports common ODBC databases such as MS SQL, Oracle, and MS Access. As part of the Sysgem product family, Logfile Concentrator can function as a standalone solution or complement the Sysgem Enterprise Manager (SEM).
  • 8
    Zavanta

    Zavanta

    COMPROSE

    Need a better way to capture policies, SOPs, and work instructions and make them accessible to your workforce? Zavanta is web-based system for building clear, easy-to-update policies and procedures, online portals, and manuals people WANT to use! Clear communication is essential for improved workforce performance and compliance. Other tools simply manage documents or pair MS-Word with workflow, so you are on your own as far as the content itself goes.
  • 9
    Empirica

    Empirica

    BEC Systems

    ...A unique identification barcode/file is used for each test set request, from the scanning of the original pathology test form through to final verification and issue of results. RFID/EID option is also available in this pathology software. Built on advanced SQL Client/Server database architecture allowing you to access information and create reports from any other SQL capable application (MS-Excel, MS-Access etc). Test Set Database allows you to combine any number of individual pathology tests into a single named Test Set. Full privilege control of users allows individual security setting for each user. Privileges include: Viewing or Editing Databases, Editing Tests and Ranges, etc.
    Starting Price: $295.00/one-time
  • 10
    DocLogix

    DocLogix

    DocLogix

    ...You can choose to use DocLogix on-premise or in the Cloud. DocLogix integrates with MS Office, SAP, NAV, etc. and allows users to gain control over unstructured content as well as reap tangible benefits while still using their favorite work environment (mobile, e-mail, web browser, MS Office). Solution can help to create order and efficiency in the office while reducing costs and frustration.
  • 11
    Qxchange

    Qxchange

    Cellarstone

    QXchange is a flexible, easy to use, data integration software. It can quickly and easily transfer data between many standard data formats and applications, including MS Access, Excel, Comma delimited flat file, MS SQL Server, QuickBooks, Salesforce.com and others. It allows simple and clear setup of extraction, transformation and loading instructions to exchange data between different formats. The instructions are stored and managed as profiles. QXchange is a very easy to use, data integration software. ...
  • 12
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ...Create trial, subscription, and perpetual licenses keys. Licenses can be node locked or floating/concurrent. Protect applications developed in .NET, ASP.NET, C++, VB6, VBA, Delphi, Excel, MS-Access, Word, Outlook add-ins, Android, Mac OS X, Linux, etc. Manage license keys with a state-of-the-art graphical user interface. Protect your application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. ...
    Leader badge
    Starting Price: $200 one-time payment
  • 13
    TrustID

    TrustID

    TrustID

    ...Its intuitive card designer wizard guides users through seven simple steps to create unique and professional ID cards, making it practical for small SMEs and scalable for large projects such as critical infrastructure and airports. The software offers a range of database connectivity options, from simple CSV and text files to MS Access and MS Excel, with enterprise-level databases like MySQL, Oracle, and ODBC integration available in Pro editions. TrustID supports various devices for photo capture, including webcams, scanners, and Canon digital cameras, and offers signature capture on most editions, with face recognition available on Pro licenses. All editions support writing electronic data to magnetic stripe cards.
    Starting Price: $100 one-time payment
  • 14
    cardPresso

    cardPresso

    cardPresso

    ...The software is available in five scalable editions, XXS, XS, XM, XL, and XXL, each tailored to different levels of complexity and functionality. Key features include support for various database connections (such as MS Access, MS SQL, MySQL, and Oracle), native support for file formats like XLS, XLSX, CSV, and TXT, and capabilities for magnetic stripe, contact, and contactless chip encoding. The intuitive interface simplifies card production, and continuous development ensures the software remains up-to-date with the latest card technologies. Additionally, cardPresso provides free technical support, including technotes, video tutorials, and assistance via phone, Skype, and email.
  • 15
    MeetMinutes

    MeetMinutes

    MeetMinutes

    ...The platform enables efficient task management by converting action items into to-dos in the task management tool of your choice. MeetMinutes effortlessly integrates with your existing Google or Microsoft calendar and works with Google Meet, MS Teams, and Zoom. It supports multiple languages in the same meeting, providing automated transcriptions, task tracking, and key insights, eliminating the need for manual note-taking. MeetMinutes is trusted by over 50 top brands across the globe. Access conversation intelligence, sentiment analysis, engagement metrics, and usage analytics to optimize team performance.
    Starting Price: $14 per month
  • 16
    Excel Password Recovery

    Excel Password Recovery

    eSoftTools Software

    ...Smart Key Features of Excel Password Unlocker Recover lost Excel spreadsheet password Unlock Excel, Word, & Access file formats Support all MS Excel versions 97 up to 2019 and Windows versions up to 10 (32-bit, & 64-bit) Gives recovery attack options such as Dictionary attack, Brute Force attack, & Mask attack
    Starting Price: $19
  • 17
    Engage

    Engage

    Markido

    Create amazing presentations with the Engage PowerPoint add-in. Drag-n-drop design, infographics, automation and accessibility. It's easy and free. Design like a designer even if you're not one. Drag and drop hundreds of built-in design elements onto any slide. Using these design assets helps communicate information in a more understandable and memorable way. Link shapes, tables, charts, images and infographics to MS Excel. When the source data changes you can update your whole presentation from multiple sources with just one click. ...
    Starting Price: $228 per user per year
  • 18
    PEDYN P2000
    The PEDYN P2000 is a powerful Engineering and Manufacturing Software Program that uses Microsoft Access as a platform. The graphical design and drill down navigation make the P2000 very easy to learn and use. Since the program is contained in a MS Access Database, it interfaces well with other software. This MRP manufacturing software program can be easily customized to fit your specific business requirements. The P2000 is expandable, flexible and provides the perfect low cost solutions for small to mid size engineering and manufacturing companies. ...
    Starting Price: $1,895
  • 19
    SP IT Helpdesk

    SP IT Helpdesk

    SP Marketplace

    ...Unlike traditional standalone help desk applications, SP IT Helpdesk combines business process automation with a collaborative team experience. Self-service for users is driven through a MyIT portal available through MS Teams or SharePoint, makes it easy to submit tickets, and access a knowledge base, documents and training links. IT Staff can access the secure Staff Portal through Microsoft Teams or SharePoint. The portal provides a place to organize IT activities, communications and documents. An integrated Power BI Dashboard provides visibility to management.
    Starting Price: $15 per user per year
  • 20
    PeopleTrack

    PeopleTrack

    OpenTech Services

    ...Have your regulars check themselves in at the point of entry and let the software handle all the details using our automated features. There are three options to choose from for your PeopleTrack database: MS Access, a locally hosted SQL server, or our hosted Cloud database. All three are freely accessible for third-party integrations. Locally hosted systems include a 1-year service maintenance agreement (SMA) which entitles you to all program updates, as well as phone, email, and remote support.
  • 21
    Qbox

    Qbox

    CoralTree

    Qbox is an all-in-one collaboration platform designed to streamline accounting workflows by combining file sharing, client portals, task management, chat, invoicing, eSignatures, and QuickBooks Desktop remote access into a single dashboard. It lets multiple users share and collaborate on QuickBooks, MS Access, Word, Excel, and PowerPoint files, automatically syncing changes and locking files to prevent conflicts, and supports QuickBooks attachments (PDF, DOC, XLS, JPG, PNG) in lock-step with company files. With no complex installation, you simply grant access to your QuickBooks Desktop files, and Qbox manages versioning and syncing, providing secure, cloud-based collaboration even for occasional monthly reviews. ...
    Starting Price: $5 per month
  • 22
    IAM Cloud

    IAM Cloud

    IAM Cloud

    IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. ...
    Starting Price: $2.40 per month
  • 23
    eDocs

    eDocs

    Wolf Technology Group

    If your employees are using consumer-grade sync services like Google Drive or MS OneDrive, your business might be at risk of data theft, data loss, corrupted data, or even compliance violations. eDocs syncs corporate data, allowing users to access and share files and folders from virtually anywhere. Migrating to a document management system is a large undertaking that can be overwhelming. Wolf Technology Group is here to help!
  • 24
    Contour BI

    Contour BI

    Contour Components

    With an easy-to-use platform for interactive reporting, data analysis, and report distribution, the Contour BI platform provides access to all corporate data sources, builds interactive reports with zero programming, and publishes interactive reports to your local network and the web. Virtually all popular data sources are supported: Oracle, MS SQL, PostgreSQL, Excel, Access, CSV, IBM SPSS, etc. Editions for Windows, Linux, Mac OS, Android, and iOS are supported. ...
    Starting Price: $1000.00/one-time/user
  • 25
    WebCruiter

    WebCruiter

    Talentech

    ...If you have previously registered with one or more of these, you will be able to access your details from this page, or from the companies’ own websites. Log in to your CV, whether or not it is linked to a specific employer.
  • 26
    Async

    Async

    Async

    Async is a developer-first AI voice platform, rooted in technology that powers Podcastle, offering premium text-to-speech and voice cloning via a simple, high-performance API. Developers gain access to broadcast-quality, natural-sounding voices with under-200 ms latency, and can create personalized voice clones using just a three-second audio sample. It supports streaming output so audio plays as it’s generated, and offers transparent usage-based billing with real-time daily stats and per-second cost control. Built to scale from prototypes to full production, Async makes advanced voice capabilities accessible to indie developers and enterprises alike, backed by the same trusted infrastructure that fueled Podcastle.
    Starting Price: $1 per hour
  • 27
    Inworld TTS
    Inworld TTS is a state-of-the-art text-to-speech platform designed to deliver ultra-realistic, context-aware speech synthesis and precise voice-cloning capabilities at a radically accessible price. The flagship model, TTS-1, is optimized for real-time applications and supports low-latency streaming (first audio chunk in ≈200 ms) as well as multiple languages (including English, Spanish, French, Korean, Chinese, and more). Developers can use instant zero-shot voice cloning (5-15 seconds of audio) or professional fine-tuned cloning, add voice-tags for emotion, style, and non-verbal sounds, and switch languages while preserving voice identity. ...
    Starting Price: $0.005 per minute
  • 28
    Aestiva Purchase Order

    Aestiva Purchase Order

    Aestiva Software

    Aestiva Purchase Order is a procurement and purchasing software by Aestiva Software. Aestiva Purchase Order enables organizations to manage, create, and approve purchase requisitions and purchase orders. Aestiva Purchase Order is accessible via different platforms such as MS Windows, Mac OS X, Linux, and Unix. With Aestiva Purchase Order, users can time-stamp purchase orders (PO) and generate auditor reports for specific details. Aestiva Purchase Order also supports different languages and multiple currencies.
    Starting Price: $3000.00/one-time
  • 29
    People-Trak HRIS Suite

    People-Trak HRIS Suite

    Technical Difference

    ...Private, Government, & Nonprofit organizations of all sizes use People-Trak because of its comprehensive HR Software features and low price. People-Trak can use a variety of database platforms including MS Access, SQL Server, MSDE and Oracle. Human Resources software offers all the advantages of centralized data: easy lookup, easy reporting, easy maintenance. You won't wonder where your data is, because People-Trak makes it easy to find what you're looking for the moment you need it.
  • 30
    Magentrix PRM

    Magentrix PRM

    Magentrix

    Increase productivity of your channel sales partners with a Magentrix partner portal for partner relationship management (PRM). Customize the look and feel with your own brand. Control access to standard and custom objects, files and document sharing and eLearning. FEATURES: Partner onboarding, Playbooks, Training & certification, Pop-up alerts, Deal Registration, Deal Management, Document Management, Content Management, Market Development Funds (MDF) and much...
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next