---
description: Discover the best Network Access Control System (NAC) in New Zealand. Compare top Network Access Control System (NAC) tools with customer reviews, pricing and free demos.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Best Network Access Control System (NAC) in New Zealand - 2026 Reviews, Pricing & Demos
---

Breadcrumb: [Home](/) > [Network Access Control System (NAC)](https://www.softwareadvice.co.nz/directory/4433/network-access-control/software)

# Network Access Control System (NAC)

Canonical: https://www.softwareadvice.co.nz/directory/4433/network-access-control/software

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4433/network-access-control/software?page=2)

-----

## Products

1. [Pulseway](https://www.softwareadvice.co.nz/software/36599/pulseway) — 4.7/5 (310 reviews) — Pulseway is an integrated IT assets and network monitoring solution designed for IT administrators to remotely monito...
2. [ManageEngine Network Configuration Manager](https://www.softwareadvice.co.nz/software/435150/manageengine-network-configuration-manager) — 4.5/5 (281 reviews) — Network Configuration Manager is a robust solution designed to empower network organizations with efficient network c...
3. [OpenVPN Access Server](https://www.softwareadvice.co.nz/software/302400/openvpn-access-server) — 4.5/5 (200 reviews) — Free to try and up to 3 connected users - OpenVPN Access Server is a full-featured SSL VPN software solution that int...
4. [N-sight RMM](https://www.softwareadvice.co.nz/software/30397/solarwinds-remote) — 4.3/5 (194 reviews) — N-sight RMM is an IT management platform designed for remote monitoring and management of devices, users and endpoint...
5. [SecureLink](https://www.softwareadvice.co.nz/software/46985/securelink) — 4.2/5 (176 reviews) — SecureLink is the industry leader in critical access management, empowering organizations to secure access to their m...
6. [ThreatLocker](https://www.softwareadvice.co.nz/software/314278/threatlocker) — 4.9/5 (87 reviews) — Stop ransomware\! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint se...
7. [Perimeter 81](https://www.softwareadvice.co.nz/software/230245/perimeter-81) — 4.8/5 (80 reviews) — Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use...
8. [UTunnel VPN](https://www.softwareadvice.co.nz/software/440022/utennel) — 5.0/5 (69 reviews) — UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networkin...
9. [Device42](https://www.softwareadvice.co.nz/software/232828/device42) — 4.8/5 (59 reviews) — Device42 is an asset management solution that enables IT administrators to track hardware, software, devices and netw...
10. [Kisi](https://www.softwareadvice.co.nz/software/233266/kisi) — 4.2/5 (57 reviews) — Kisi is a cloud-based physical security application that helps businesses control user access and exchange communicat...
11. [Brivo Access](https://www.softwareadvice.co.nz/software/344721/brivo-access) — 4.3/5 (54 reviews) — Looking for access control and proptech solutions to improve security and add technology to the building? Add cloud-b...
12. [Conecta Suite](https://www.softwareadvice.co.nz/software/366554/conecta-suite) — 4.9/5 (47 reviews) — Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team pr...
13. [NordLayer](https://www.softwareadvice.co.nz/software/336763/nordvpn-teams) — 4.6/5 (33 reviews) — NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, ...
14. [Kentik](https://www.softwareadvice.co.nz/software/146053/kentik) — 4.6/5 (33 reviews) — Kentik is a cloud-based network management solution which assists network managers, network engineers and operators w...
15. [SAP Access Control](https://www.softwareadvice.co.nz/software/233830/sap-access-control) — 4.5/5 (32 reviews) — SAP Access Control is an access management software designed to help businesses across various industry verticals, in...
16. [ManageEngine Password Manager Pro](https://www.softwareadvice.co.nz/software/376425/manageengine-password-manager-pro) — 4.3/5 (23 reviews) — ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores ...
17. [Foxpass](https://www.softwareadvice.co.nz/software/232831/foxpass) — 4.8/5 (20 reviews) — Foxpass is a cloud-based and on-premise platform that helps small to large enterprises automate threat detection and ...
18. [Genea Security](https://www.softwareadvice.co.nz/software/194830/genea-access-control) — 4.8/5 (20 reviews) — Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ...
19. [Secomea](https://www.softwareadvice.co.nz/software/440313/secomea) — 4.7/5 (19 reviews) — Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It i...
20. [SolarWinds Network Configuration Manager](https://www.softwareadvice.co.nz/software/223582/solarwinds-network-configuration-manager) — 4.8/5 (18 reviews) — Network configuration manager is a cloud-based and on-premise compliance management system that assists small to larg...
21. [Access Control Manager](https://www.softwareadvice.co.nz/software/230812/access-control-manager) — 4.1/5 (11 reviews) — Access Control Manager is a network access control solution that helps businesses in retail, healthcare, oil \&amp; ga...
22. [Portnox CLEAR](https://www.softwareadvice.co.nz/software/355474/portnox-clear) — 4.1/5 (11 reviews) — Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect c...
23. [ManageEngine PAM360](https://www.softwareadvice.co.nz/software/361414/pam360) — 4.3/5 (9 reviews) — ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to...
24. [Appgate SDP](https://www.softwareadvice.co.nz/software/188797/appgate) — 5.0/5 (7 reviews) — Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce ris...
25. [Varnish Enterprise](https://www.softwareadvice.co.nz/software/296590/varnish-enterprise) — 5.0/5 (5 reviews) — Ideal for larger companies, Varnish Software's powerful caching technology helps the world's biggest content provider...

-----

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.co.nz/directory/4433/network-access-control/software?page=2)

## Related Categories

- [Network Security Software](https://www.softwareadvice.co.nz/directory/4170/network-security/software)
- [Privileged Access Management Software](https://www.softwareadvice.co.nz/directory/4241/privileged-access-management/software)
- [Customer Identity and Access Management (CIAM) Software](https://www.softwareadvice.co.nz/directory/4427/ciam/software)
- [Access Governance Software](https://www.softwareadvice.co.nz/directory/4665/access-governance/software)
- [Audit Software](https://www.softwareadvice.co.nz/directory/4188/audit/software)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.co.nz/directory/4433/network-access-control/software)
- [All Categories](https://www.softwareadvice.co.nz/directory)

## This page is available in the following languages

| Locale | URL |
| de | <https://www.softwareadvice.de/directory/4433/network-access-control/software> |
| en | <https://www.softwareadvice.com/network-access-control/> |
| en-AU | <https://www.softwareadvice.com.au/directory/4433/network-access-control/software> |
| en-GB | <https://www.softwareadvice.co.uk/directory/4433/network-access-control/software> |
| en-IE | <https://www.softwareadvice.ie/directory/4433/network-access-control/software> |
| en-NZ | <https://www.softwareadvice.co.nz/directory/4433/network-access-control/software> |
| fr | <https://www.softwareadvice.fr/directory/4433/network-access-control/software> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Software Advice helps businesses in New Zealand find the best software. Compare software options and learn more from our research and user reviews.","email":"info@softwareadvice.co.nz","url":"https://www.softwareadvice.co.nz/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.co.nz/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":null,"url":"https://www.softwareadvice.co.nz/","@id":"https://www.softwareadvice.co.nz/#website","@type":"WebSite","publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"},"potentialAction":{"query":"required","target":"https://www.softwareadvice.co.nz/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Network Access Control System (NAC)","description":"Discover the best Network Access Control System (NAC) in New Zealand. Compare top Network Access Control System (NAC) tools with customer reviews, pricing and free demos.","url":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software","about":{"@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#itemlist"},"breadcrumb":{"@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#breadcrumblist"},"@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.co.nz/#website"},"inLanguage":"en-NZ","mainEntity":{"@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#itemlist"},"publisher":{"@id":"https://www.softwareadvice.co.nz/#organization"}},{"@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Network Access Control System (NAC)","position":2,"item":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Best Network Access Control System (NAC) in New Zealand - 2026 Reviews, Pricing &amp; Demos","@context":"https://schema.org","@id":"https://www.softwareadvice.co.nz/directory/4433/network-access-control/software#itemlist","@type":"ItemList","itemListElement":[{"name":"Pulseway","position":1,"description":"Pulseway is an integrated IT assets and network monitoring solution designed for IT administrators to remotely monitor and control their business IT resources. The solution supports multi-deployment architecture, allowing the users to choose either on-premise deployment or hosting within the cloud.\n\nPulseway allows managed service providers (MSPs) to view the real-time status of their system resources, monitor overall network performance and install critical updates from a central console. The platform helps with defining scripts to automatically schedule maintenance, backup, security check and other IT activities.\n\nPulseway enables users to control devices connected to their network from a single point and monitor their performance. The solution also offers a Rest API for integration with third-party applications.\n\nKey Pulseway features: \n- Monitoring and Management\n- Discovery and Deployment\n- Server Management and Monitoring\n- Automation like Never Before\n- Out-of-the-box OS & 3rd Party Patching\n- Unlimited Remote Control for macOS and Windows\n- Custom Reporting\n\nPulseway is a cross-platform application and can run on multiple operating devices including Windows, Linux, Mac, Android and iOS-based devices. Pulseway is available on a monthly subscription basis that includes support via email, phone and product tutorials.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/24b6d480-8e57-4dff-ba99-2da2a610b851.png","url":"https://www.softwareadvice.co.nz/software/36599/pulseway","@type":"ListItem"},{"name":"ManageEngine Network Configuration Manager","position":2,"description":"Network Configuration Manager is a robust solution designed to empower network organizations with efficient network configuration and change management capabilities. It supports a wide range of network devices, including routers, switches, and firewalls, offering a comprehensive approach to streamline and enhance network operations. With features such as backup, change management, compliance management, automation, and firmware vulnerability management, Network Configuration Manager simplifies the complex task of managing network configurations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c20b96c6-0580-440b-9408-0cd2932ac907.png","url":"https://www.softwareadvice.co.nz/software/435150/manageengine-network-configuration-manager","@type":"ListItem"},{"name":"OpenVPN Access Server","position":3,"description":"Free to try and up to 3 connected users - OpenVPN Access Server is a full-featured SSL VPN software solution that integrates OpenVPN server capabilities, enterprise management capabilities, simplified OpenVPN Connect UI, and OpenVPN Client software packages that accommodate Windows, MAC, and Linux, mobile OS (Android and iOS) environments. OpenVPN Access Server supports a wide range of configurations, including secure and granular remote access to internal network and/ or private cloud network resources and applications with fine-grained access control.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/de5e48b8-4dec-4905-9a4e-ee548d072435.png","url":"https://www.softwareadvice.co.nz/software/302400/openvpn-access-server","@type":"ListItem"},{"name":"N-sight RMM","position":4,"description":"N-sight RMM is an IT management platform designed for remote monitoring and management of devices, users and endpoints across physical, hybrid and cloud environments. The platform includes remote management features with monitoring and alerting for operating systems such as Windows, macOS, Linux, and iOS. \n\nIt offers automated patch management that functions both within and outside of networks. It also provides drag-and-drop automation with a library of preconfigured scripts. Secure remote access is available with attended and unattended options, using encryption and multi-factor authentication.\n\nN-sight RMM includes a ticketing and billing system to help manage service desk workflows. Features include automated scheduling, tracking and a customizable customer portal. The platform performs continuous network device discovery with performance monitoring and automatic asset detection.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c1e40c38-00f9-4362-8afd-d3aebfb64676.webp","url":"https://www.softwareadvice.co.nz/software/30397/solarwinds-remote","@type":"ListItem"},{"name":"SecureLink","position":5,"description":"SecureLink is the industry leader in critical access management, empowering organizations to secure access to their most valuable assets, including networks, systems, and data. By leveraging Zero Trust principles, machine learning, and artificial intelligence, SecureLink provides comprehensive security solutions to govern, control, monitor, and audit the most critical and highest risk access points. Organizations across multiple industries -- including healthcare, manufacturing, government, legal, and gaming -- trust SecureLink to secure all forms of critical access, from remote access for third parties to access to critical infrastructure, regulated information, IT, and OT. \n\nOur product line includes:\n\nSecureLink Enterprise Access is a zero-trust, secure remote access platform for third parties who need enterprise network access. It gives organizations control over third-party network access using tools like fine-grained access controls, zero-trust network access, and auditing and video recording capabilities.\n\nSecureLink Customer Connect is built specifically for technology vendors, managed service providers, and other partners. It provides smooth and secure remote access into customer networks to streamline remote support operations.\n\nSecureLink Access Intelligence automates user access reviews. It inventories which employees have access to what systems and delegates the access review to managers and supervisors who can make quick approvals, rejections, or changes to access rights.\n\nSecureLink’s Privacy Monitor uses artificial intelligence and machine learning to automatically audit all access and flag any suspicious behavior, making things easier for your compliance team and saving auditors time on investigating the access. Did we mention it meets regulatory requirements, like HIPAA compliance?\n\nProtecting your company from cyber threats is no longer optional -- it’s critical. Let SecureLink’s critical access management solutions bring you security, compliance, and efficiency. No compromises.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bbcdf2fd-c5be-47c7-b8d3-0026c6c51564.png","url":"https://www.softwareadvice.co.nz/software/46985/securelink","@type":"ListItem"},{"name":"ThreatLocker","position":6,"description":"Stop ransomware! ThreatLocker helps organizations reduce their surface areas of attack with policy-driven endpoint security. Instead of only blocking known threats, block everything that is not explicitly trusted. Combine Allowlisting with Ringfencing app containment and storage policies to enable a Zero Trust posture and block attacks that live off the land.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e1c711e-8cee-47c7-9f15-9f13dcba68b8.png","url":"https://www.softwareadvice.co.nz/software/314278/threatlocker","@type":"ListItem"},{"name":"Perimeter 81","position":7,"description":"Perimeter 81 is the first Cybersecurity Experience Platform to streamline SASE through its groundbreaking ease-of-use and unified network security stack. With a global network of PoPs, Perimeter 81 offers secure network capabilities managed over our multi-tenant cloud and highly scalable for organizations worldwide. \n\nWith Perimeter 81, you can easily move your resources to the cloud, manage team member access from anywhere and gain network visibility in an all-in-one cloud management portal. With features like Firewall as a Service, Device Posture Check, Web Filtering and more, you can secure and manage your network in just a few clicks. \n\nWhy Perimeter 81? \n\n* Features you can rely on: Perimeter 81 offers all the essential cybersecurity tools you need to protect your organization. With Zero Trust Network Access, Firewall as a Service, Device Posture Check, and many more features, Perimeter 81 allows remote and on-site users to access networks safely and securely. \n\n* Lightning-fast deployment: Say goodbye to hours of configuration and manal setup. With Perimeter 81, you can have your entire network deployed in minutes - it’s that simple. \n\n* Network monitoring at your fingertips: Having visibility into your network is key. With Perimeter 81, you can fully monitor and secure your organization’s most valuable resources from a single dashboard.\n \n* World class support: Our award-winning support team is always here for you. From the moment you set up your network, we’re happy to help with anything you need along the way. \n\nNetwork security doesn’t have to be complicated – join Perimeter 81 on a mission to radically simplify the cybersecurity experience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/41d17d81-f565-443e-9e31-69b45bab1835.png","url":"https://www.softwareadvice.co.nz/software/230245/perimeter-81","@type":"ListItem"},{"name":"UTunnel VPN","position":8,"description":"UTunnel Secure Access offers a comprehensive suite of Cloud VPN, Zero-Trust Network Access (ZTNA), and Mesh Networking solutions. This enables businesses to establish secure remote access for employees while ensuring encrypted site-to-site connectivity across various network environments such as corporate networks, data centers, offices, VPCs, IoT devices, or standalone hosts. UTunnel streamlines VPN server deployments, supports agent-less resource access via web browsers, and provides intuitive policy-based user and team access management, simplifying remote access administration.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/da2ef3e7-8313-4c81-a453-ed52d0ddf40e.jpeg","url":"https://www.softwareadvice.co.nz/software/440022/utennel","@type":"ListItem"},{"name":"Device42","position":9,"description":"Device42 is an asset management solution that enables IT administrators to track hardware, software, devices and networks. The key features includes automated data center management, service management, device discovery, asset tagging and password management.\n\nThe solution enables IT administrators to manage the complete lifecycle of assets. Further, it enables managers to grant permissions and provide access rights to team members. Data center virtualization enables organizations to create a structured data repository.\n\nDevice42’s password management module enables organizations to store and manage passwords in a centralized location.\n\nThe solution integrates with third-party applications using REST APIs. Support is provided via an online portal, email and phone. The solution helps midsize businesses streamline and automate asset management operations.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5db31a81-473f-42fd-9d45-aec6effa174c.jpeg","url":"https://www.softwareadvice.co.nz/software/232828/device42","@type":"ListItem"},{"name":"Kisi","position":10,"description":"Kisi is a cloud-based physical security application that helps businesses control user access and exchange communications across organizational devices. Administrators can utilize a centralized dashboard configure door security across multiple sites, schedule temporary access and connect Kisi Controller with doors to track visitors, keycards, anomalies and more.\n\n\nFeatures of Kisi include remote access control, location monitoring, door entry validation, visual feedback, single sign-on and event logs. Security teams can use the application to generate security audit trails and export them in CSV files to monitor compliance across SOC2 or ISO regulations. Additionally, it provides single sign-on and two-factor authentication capabilities, which let end users use mobile devices to sign-in to their user accounts from remote locations.\n\n\nKisi provides an application programming interface (API), which lets businesses integrate the system with third-party applications such as Google Calendar, G Suite, Mindbody, One Login and more. Pricing is available on request and support is extended via phone, email and online knowledgebase.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6741856f-e83b-4053-82c2-74bbb7b5521f.jpeg","url":"https://www.softwareadvice.co.nz/software/233266/kisi","@type":"ListItem"},{"name":"Brivo Access","position":11,"description":"Looking for access control and proptech solutions to improve security and add technology to the building? Add cloud-based access control and make spaces smart with a platform that brings keyless entry, mobile credentials, remote security management, smart locks, visitor management, and identity management solutions from one provider. \n\nThe Brivo platform enables all these things and more to elevate employee and tenant experience and improve the safety of all people and assets in any type of physical space. \n\nThermostats, workplace management, and video surveillance are just a few examples of intelligent environments. With an open API, Brivo Access integrates with hundreds of third-party devices, applications, and platforms to help manage facilities.\n\nSmart spaces start with cloud-based access control. Brivo Access empowers teams to elevate the experience provided to employees, residents, and customers who enter or pass through properties without compromising safety. Operators get more than access control with Brivo. Teams get insight into the usage of space, possible security threats as well as savings opportunities. \n\nThe Brivo platform provides unrivaled portfolio visibility. On one screen, monitor a single facility or regional office and global assets all at once. Brivo's simplicity doesn't stop there. Administrators can connect video surveillance and visitor management to better manage facilities.\n\nIn today's world, data is vital. But more crucially, managers need to understand the facts in order to act. Brivo has changed not just security but also portfolio management. With Brivo, businesses can access, manage, and trend asset data all from one location. The technology empowers everyone with data, from security guards to SOC managers to CEOs. Insights such as access events, anomalous behaviors, foot traffic patterns and space utilization trends are all visible with the Brivo Access platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f58d3577-88e3-42da-9bac-0b128603e663.png","url":"https://www.softwareadvice.co.nz/software/344721/brivo-access","@type":"ListItem"},{"name":"Conecta Suite","position":12,"description":"Conecta Suite is the ideal solution for those looking to maximize the potential of Google Workspace and boost team productivity. With features that make management more efficient and secure, it offers advanced and customized control to meet your company's specific needs.\nBy integrating Conecta Suite, you enhance the use of the Admin Console with increased security and detailed resource management, allowing your team to collaborate and communicate more smoothly and securely.\nConecta Suite not only optimizes productivity but also strengthens security, safeguarding your data against threats and unauthorized access. Key features include:\n✅ Automatic email signature reapplication;\n✅ Access restrictions by time, system, browser, and IP;\n✅ Custom shift scheduling;\n✅ Automatic or manual device disconnection;\n✅ Deactivation of licenses for former employees;\n✅ Detailed reports on logins and file sharing;\n✅ Custom login screen with company branding;\n✅ Email and Drive file migration between users","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6430a9a4-eb31-4865-a5cb-12699bdde077.png","url":"https://www.softwareadvice.co.nz/software/366554/conecta-suite","@type":"ListItem"},{"name":"NordLayer","position":13,"description":"NordLayer is a toggle-ready network security platform designed for modern businesses. It provides secure connection, protection, detection, and response for companies adapting to hybrid work and evolving cybersecurity needs. Built on NordVPN standards, it offers trusted network security with flexible yet robust protection that integrates with any setup.\n\nSecuring remote and hybrid teams requires granular access controls and strong identity verification to prevent cyber threats. NordLayer enables IT teams to manage security through Identity & Access Management (IAM), device posture monitoring, and context-based access policies. Employees can authenticate with biometric verification, one-time passwords (OTP), or Single Sign-On (SSO) integrations with major providers.\n\nThe platform-based approach ensures comprehensive security without disrupting workflows. As a hardware-free, cloud-based solution, NordLayer deploys quickly, adapts to existing infrastructure, and scales with business growth.\n\nSome key features include:\n\n• Cutting-edge Business VPN: Provides encrypted access to company resources while maintaining privacy and compliance\n• Cloud LAN: Securely connects distributed teams, enabling file sharing, troubleshooting, and remote collaboration\n• Zero Trust Network Access (ZTNA): Ensures only authorized users can access business-critical applications and data\n• Cloud Firewall: Creates granular security rules to control and filter network traffic\n• Device Posture Monitoring: Checks device compliance with security policies, blocking risky endpoints before they access the network\n• Threat Protection: Shields employees from malware, phishing, and malicious downloads through deep packet inspection (Lite) and file scanning\n\nWith NordLayer, businesses maintain security across multiple locations. Network segmentation, traffic filtering, and private gateways ensure company data stays protected. The Business VPN, built on up to 1 Gbps servers across 40+ locations, encrypts traffic using AES-256 and ChaCha20 encryption, reducing the risk of cyber-attacks.\n\nNordLayer offers quick deployment, with onboarding in under 10 minutes and an intuitive Control Panel for managing security policies, monitoring access, and handling billing. 24/7 active support ensures quick resolution, with an average response time of 44 seconds.\n\nNordLayer is a scalable, compliance-ready solution that keeps businesses secure without complexity. Flexible pricing, no vendor lock-in, and integrations with leading identity providers allow companies to adapt security to their needs.\n\n--\n\nIf you’re looking for a partnership, check out the NordLayer Partner Program for MSPs, resellers, and agents. Partners benefit from high-profit margins, dedicated training, 24/7 support, and no upfront investment.\n\nLearn more: nordlayer.com/partner-program","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/81bce581-210b-4f70-b9dc-8023c4b3d2c5.png","url":"https://www.softwareadvice.co.nz/software/336763/nordvpn-teams","@type":"ListItem"},{"name":"Kentik","position":14,"description":"Kentik is a cloud-based network management solution which assists network managers, network engineers and operators with data encryption and access control. Its key features include bandwidth monitoring, network diagnosis, performance metrics and anomaly detection.\n\n\nThe application captures traffic, SNMPdata , BGP routing, network data and flow records across internet paths. Managers can view graph traffic for multiple metrics on a centralized portal and share reports with authorized users. With the anomaly detection module, users can detect DDos attacks and receive alert notifications. Further, the solution stores customer data on a secure SOC-2 compliant data center.\n\n\nKentik comes with a REST API and integrates with third-party applications such as A10 and Radware. It is available on a monthly subscription and support is provided via phone, email and online help desk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d10151c7-0b65-44a1-b6ae-a63bc0042d01.png","url":"https://www.softwareadvice.co.nz/software/146053/kentik","@type":"ListItem"},{"name":"SAP Access Control","position":15,"description":"SAP Access Control is an access management software designed to help businesses across various industry verticals, including banking, financial services, energy and natural resources, professional services, automotive, healthcare, retail, agribusiness and more. Key features include access request, custom user groups, access control, access risk analysis and remediation. \n\nTeams using SAP Access Control can analyze risk through predefined rule sets and streamline the performance of cross-system analysis across enterprise applications in real-time or in offline mode. Administrators can manage access using automated access requests, embedded simulations and automated provisioning to various applications. Additionally, organizations can certify assignment and role content to team members and review role and user transaction details. \n\nSAP Access Control integrates with SAP Cloud Identity Access Governance, SAP SuccessFactors, SAP Process Control, SAP HANA DB, SAP S/4HANA On-Premise and other third-party applications. Support is extended via phone, email, documentation and FAQs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f555dc8-971f-4c54-92f4-93754c4b86d2.png","url":"https://www.softwareadvice.co.nz/software/233830/sap-access-control","@type":"ListItem"},{"name":"ManageEngine Password Manager Pro","position":16,"description":"ManageEngine Password Manager Pro is an enterprise-grade privileged password management solution. It securely stores and manages sensitive information such as shared passwords, documents, and digital identities. Password Manager Pro is a complete solution to control, manage, monitor, and audit the entire life cycle of privileged access. In a single package, it offers three solutions - privileged account management, remote access management, and privileged session management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b277f6af-1b08-4a21-a0d9-861949693d0f.jpeg","url":"https://www.softwareadvice.co.nz/software/376425/manageengine-password-manager-pro","@type":"ListItem"},{"name":"Foxpass","position":17,"description":"Foxpass is a cloud-based and on-premise platform that helps small to large enterprises automate threat detection and access control process across servers and networks. It provides local cache, which enables users to keep systems running during downtime and connectivity issues.\n\n\nFoxpass allows businesses to enforce SSH keys and set password requirements for Wifi, VPN and servers. It lets users log Lightweight Directory Access Protocol (LDAP) and RADIUS requests for threat detection and debugging, providing visibility into the system's infrastructure. Additionally, enterprises can automatically connect to wireless networks without signing in with credentials by uploading root certificates for authentication.\n\n\nFoxpass comes with an application programming interface (API), which allows enterprises to control server access, modify the system and integrate it with various third-party systems. Pricing is available on monthly and annual subscriptions and support is extended via live chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0bb6628c-333c-46cb-9e8b-f2e5e4568b6e.png","url":"https://www.softwareadvice.co.nz/software/232831/foxpass","@type":"ListItem"},{"name":"Genea Security","position":18,"description":"Genea Access Control is a cloud-based access control software designed to help small businesses to large enterprises ensure the security of access across building facilities. Key features include attendance reports, credential management, key assignment and access control. \n\nBuilding teams using Genea Access Control can assign mobile keys from any device and monitor all access activity. Office administrators can assign both mobile keys and physical key fobs and cards to employees, allowing them to open gates and doors using mobile devices. The solution enables managers to assign separate access credentials to employees based on their roles. Additionally, the access control portal allows organizations to monitor all access activities in real-time by viewing all event logs including doors being held open and force attempts. \n\nGenea Access Control also lets teams lock and unlock doors remotely and integrate the platform with existing systems and other third-party applications, such as Okta, Slack, GSuite and more. Support is extended via phone, email, live chat and inquiry form.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b62fd9df-c63c-4ff1-82f5-2e3889a17a85.png","url":"https://www.softwareadvice.co.nz/software/194830/genea-access-control","@type":"ListItem"},{"name":"Secomea","position":19,"description":"Secomea is a Secure Remote Access (SRA) solution specifically designed for industrial networks and OT equipment. It is utilized by nearly ten thousand customers worldwide across numerous sites, enabling them to remotely manage their machines and prevent downtime.\n\nSecomea's solution integrates with any OT equipment, allowing organizations to secure their cyber-physical systems. This enables technicians to remotely access and intervene in production facilities, reducing travel expenses, response time, and security risks.\n\nThe implementation of Secomea's solution typically requires just one day per site. With a user-friendly and intuitive interface, Secomea aims to simplify secure remote access while maintaining global oversight and local control.\n\nSecomea's features:\n\nIdentity and access management features:\n\n- Privileged access management: Set up hierarchy-based user roles based on the principle of least privilege\n- Granular access control: Control access on an individual level with granular permissions\n- Advanced grouping: Perform mass administration of user permissions\n- Just-in-time (JIT) access: Grant temporary or scheduled access to specific assets\n- Always-on access: Set up a static, persistent tunnel connection between two separate networks\n- Request for access: Users can request access to specific assets, and admins can approve it in one click\n- Multi-Factor Authentication (MFA): Verify users’ identities via MFA with SMS authentication\n- Single Sign-On (SSO): Secure users’ authentication via Single Sign-On (SSO) with Azure AD or Okta\n\nRemote access features:\n\n- Agentless, web-based system: Use Secomea directly from your browser – no need to install a plugin or application\n- Direct access via lightweight client: Supporting OT protocols such as Modbus, Profinet, EtherCAT, Ethernet/IP, etc.\n- Indirect and clientless access: Supporting remote access from your browser via RDP, VNC, SSH, Telnet, HTTPS\n- Secure file transfer: Scan files transferred remotely for viruses or malware to assess their safety\n\nAudit and monitoring:\n\n- Real-time activities monitoring: Get an overview of ongoing remote access sessions from the Prime Dashboard\n- Audit logs: Track every activity performed on your machines to document who did what and when\n- Session recordings: Capture videos of remote access sessions for troubleshooting and audit purposes\n- Alerts and automated actions: Get SMS/email notifications for specific events and automate triggered actions\n- Access gateways information: Get a centralized overview of all gateways with detailed info (serial number, IP, firmware, last heartbeat). Register info on their physical location and contact details for streamlined operations\n- Vulnerability hub: Spot gateways that are not running the latest firmware version and those whose models are approaching End of Life or End of Support to ensure timely updates and replacements\n\nCustomization and integrations:\n- API access: Integrate Secomea with other tools you use to run your operations\n- AD integration: Changes implemented in Microsoft Azure Active Directory are synced hourly in Secomea’s access management server.\n- Security Information and Event Management (SIEM) integration: Integrate your SIEM system (Syslog, Splunk, etc.) with Secomea\n- Data Collection Module (DCM) and cloud integration\n- Collect data from your industrial equipment using its native data collection protocols (OPC UA, Modbus TCP, Siemens S7, Ethernet/IP, MQTT, etc.) and send it to your chosen cloud solution for further processing (Microsoft Azure IoT Hub, Amazon AWS IoT Core, Software AG Cumulocity IoT, Aveva Insight, MQTT data servers, etc.)\n- Support system integration: Integrate your support system with Secomea’s to centralize ticket management\n- Branding: Customize your URL and login page to align it with your corporate brand.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4ef015ad-ad45-47d0-9bc4-3367d535d5f0.jpeg","url":"https://www.softwareadvice.co.nz/software/440313/secomea","@type":"ListItem"},{"name":"SolarWinds Network Configuration Manager","position":20,"description":"Network configuration manager is a cloud-based and on-premise compliance management system that assists small to large sized organizations with network automation, device reliability enhancement and backup. Its key features include vulnerability assessment, user authentication tracking and reporting.\n\n\nThe application’s configuration tool lets supervisors manage multi-vendor networks, provide approvals and record policy violations. Administrators can use the solution to provide role-based access and identify network breaches in real-time. With its baseline module, operators can detect non-compliant configurations, perform troubleshooting and reduce downtime at multiple locations.\n\n\nNetwork configuration manager integrates with applications such as Network Performance Monitor, NetFlow Traffic Analyzer, Web Help Desk, Engineer’s Toolset and THWACK. The solution is made available with a one-time payment and support is offered via email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/37a83ee6-f178-41ca-a336-2acd2b0f1f9e.jpeg","url":"https://www.softwareadvice.co.nz/software/223582/solarwinds-network-configuration-manager","@type":"ListItem"},{"name":"Access Control Manager","position":21,"description":"Access Control Manager is a network access control solution that helps businesses in retail, healthcare, oil & gas, banking, utilities and other industries secure properties, assets and personnel. It lets supervisors monitor intrusion events, enforce policy restrictions, take alarms-based actions and back up identity data. \n\nAccess Control Manager enables physical security professionals to enforce property lockdowns, turn on access cards, create business schedules and more via the security dashboard. It allows employees to access video surveillance footage to monitor incidents across multiple locations. Additionally, the area identity reports let managers access employee locations based on door access. \n\nAccess Control Manager allows businesses to integrate the platform with several third-party card readers, biometric tools, wireless locks and visitor management applications. Pricing is available on request and support is extended via documentation, email, phone, live chat and other online measures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/f9457a10-f632-42c7-8170-c6c7047db136.png","url":"https://www.softwareadvice.co.nz/software/230812/access-control-manager","@type":"ListItem"},{"name":"Portnox CLEAR","position":22,"description":"Portnox Clear is a cloud-based network access control solution that helps businesses monitor endpoint risks, detect compromised devices, and automate mitigation to high-risk devices. It allows staff members to configure essential security policies like two-factor authentication and define access control policies for wireless, wired and VPN connections.  Portnox Clear is used across a wide variety of industries such as in banking, defense, biotech, engineering, healthcare, and legal services.\n\nPortnox Clear enables IT professionals to set up role-based access, so only those who need access have access and guest accounts stay out of confidential company resources. The group-level policies allow administrators to create risk policies for multiple users and devices from within a centralized platform. Additionally, administrators can not only monitor device risks based on several custom criteria, such as encryption, location, firewall, certificates, updates and more, but they can automate mitigation of risk such as updating the firewall or uninstalling a risky application.\n\nPortnox Clear is vendor agnostic, so it works with your existing network infrastructure.  It also seamlessly integrates with several essential technology solutions such as MDM, AD,  SIEM, and many more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45e81243-0a43-460f-b6b8-902177a09f82.png","url":"https://www.softwareadvice.co.nz/software/355474/portnox-clear","@type":"ListItem"},{"name":"ManageEngine PAM360","position":23,"description":"ManageEngine PAM360 is a privileged access management solution designed to help IT teams control and secure access to critical enterprise systems. It offers a unified approach to managing privileged accounts, sessions, and access workflows within an organization's IT infrastructure. This platform is suitable for digital-first enterprises, government agencies, and various industries aiming to enhance security and meet compliance requirements.\n\nThe solution includes features such as privileged account and session management, privilege elevation and delegation management, and cloud infrastructure entitlements management. PAM360 allows organizations to discover and manage privileged accounts automatically, implement just-in-time privilege elevation, monitor cloud entitlements, and apply detailed controls for endpoint privilege management. It also provides privileged user behavior analytics with AI and ML-driven anomaly detection to identify suspicious activities and potential security threats.\n\nManageEngine PAM360 includes secrets management to secure credentials for non-human entities such as applications, services, and DevOps pipelines. It offers encryption key and certificate lifecycle management to prevent service downtime and impersonation attacks. PAM360 is designed to meet compliance standards including NIST, PCI-DSS, FISMA, HIPAA, SOX, and ISO-IEC 27001, with flexible deployment options and an intuitive user interface for streamlined implementation and operation.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/221979f6-48e9-4b78-ac1d-9d414890f83c.png","url":"https://www.softwareadvice.co.nz/software/361414/pam360","@type":"ListItem"},{"name":"Appgate SDP","position":24,"description":"Powered by Zero Trust Architecture, Appgate secure access and cybersecurity solutions enable businesses to reduce risk and ensure network security within a digital environment. Serving more than 1,000 organizations across 40 countries, Appgate provides enterprises with cloud/hybrid access security products and services that can remedy network security issues. These solutions include Appgate SDP (software-defined perimeter), Appgate RBA (risk-based authentication), Appgate DTP (digital threat protection), and adversary simulation services. \n\nAppgate SDP simplifies access controls and strengthens network security for all in-office or remote users. By unifying access in one solution, IT administrators can streamline access management and configuration for all users, devices, networks, and infrastructure.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1fa2bf14-befc-42fe-969e-d95499f99853.png","url":"https://www.softwareadvice.co.nz/software/188797/appgate","@type":"ListItem"},{"name":"Varnish Enterprise","position":25,"description":"Ideal for larger companies, Varnish Software's powerful caching technology helps the world's biggest content providers deliver lightning-fast web and streaming experiences for huge audiences, without downtime or loss of performance.\n\nOur solutions combine open-source flexibility with enterprise robustness to speed up media streaming services, accelerate websites and APIs, and enable global businesses to build custom CDNs, unlocking unbeatable content delivery performance and resilience.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b52d9072-c299-44b6-a777-91323df7c2b8.jpeg","url":"https://www.softwareadvice.co.nz/software/296590/varnish-enterprise","@type":"ListItem"}],"numberOfItems":25}
</script>
