Top 15 SubInACL Alternative and Similar Softwares | Dec 2024

SubInACL is a command-line tool that enables administrators to obtain security information about files, registry keys, and services, and transfer this information from user to user, from local or global group to group, and from domain to domain.

1. TransAuth

TransAuth 75% of network intrusions in 2013 involved a weak, lost or stolen credential. TransAuth wants to make it easier to prevent the damage and cost associated with data breaches due to compromised passwords . Automatic Multifactor Authentication is faster, easier and more comprehensive than competing solutions.......

2. SetACL

SetACL Free, powerful and fast management of Windows permissions (ACLs) and object ownership. From the command line and via COM. For administrators and developers. Works with files, folders, registry keys, printers, file shares, services and WMI objects.......

3. Redhand

Redhand RedHand locks your computer. Manually via global hot key, menu bar or dock. Automatically after a period of inactivity (much like a screensaver), depending on the presence of a Bluetooth device, or whenever your computer goes to sleep.When RedHand locks your computer, it makes sure that you are informed about......

4. 10Duke Entitlement Management Solution

10Duke Entitlement Management Solution Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news......

5. Adragon Firewall

Adragon Firewall Adragon Firewall 7 is a PC security logging tool, it can log all the access to the file/registry for all running process. moreover, it can deny any of the access.How     whenever a program is about to read/wirte a file/registry, Adragon Firewall is involved in. Adragon Firewall will search the......

6. LemonLDAP::NG

LemonLDAP::NG LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......

7. CONREGO

CONREGO CONREGO is the most flexible self-hosted software dedicated to organisers of events.It will help you managing event participants efficiently, thanks to the functionality and flexibility that you can afford:- Build registration form for your event participants- Create a beautiful and user-friendly event website- Send mass invitations and mailings- Create print-ready......

8. Proxyclick

Proxyclick Visitor management that everyone will loveLasting connections with visitors and contractors start with a friendly invitation and a fast check-in.......

9. System Frontier

System Frontier Role based access control for remote Windows server, workstation and network device management. A flexible and granular permission model allows organizations to grant only the rights needed to manage their IT systems. Filter access and available actions for specific Windows services, processes, scheduled tasks, custom scripts and more, using a......

10. 10Duke Identity Bridge

10Duke Identity Bridge Simple and efficient cloud-based Single Sign-On (SSO) for employees by ‘bridging’ between the Identity Provider used by your company (for example, Active Directory) and the various 3rd party SaaS providers like Salesforce, Office 365 or Zendesk that your employees are using.If your company is increasingly using cloud-based applications to help......

11. CoovaChilli

CoovaChilli CoovaChilli is an open-source software access controller, based on the popular (but now defunct) ChilliSpot project, and is actively maintained by an original ChilliSpot contributor.CoovaChilli is a feature rich software access controller that provides a captive portal / walled-garden environment and uses RADIUS for access provisioning and accounting.......

12. fugit

fugit fugit - _Really_ lightweight git access controlMinimal bash script to be used with key-based authentication.Controls push/pull access on a per-repo base.......

13. WinGate

WinGate WinGate Proxy Server is a highly capable integrated Proxy server, firewall and email server designed for access control, security and communications needs. What you do get is all the features of Standard license for 3 concurrent users.......

14. Openam

Openam OpenAM provides open source Authentication, Authorization, Entitlement and Federation software. Through OpenAM, the community actively continues development of OpenSSO.OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. OpenAM provides the foundation for integrating diverse web applications that......

15. Proofpoint

Proofpoint Proofpoint, Inc. (NASDAQ: PFPT) helps the largest and most successful companies in the world protect and govern their most sensitive data. Proofpoint is an innovative security-as-a-service vendor that delivers data protection solutions that help medium- and large-sized organizations protect their data from attack and enable them to effectively meet......