Alternatives to PolicyPak

Compare PolicyPak alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to PolicyPak in 2026. Compare features, ratings, user reviews, pricing, and more from PolicyPak competitors and alternatives in order to make an informed decision for your business.

  • 1
    ManageEngine Endpoint Central
    ManageEngine Endpoint Central is built to secure the digital workplace while also giving IT teams complete control over their enterprise endpoints. It delivers a security-first approach by combining advanced endpoint protection with comprehensive management, allowing IT teams to manage the entire endpoint lifecycle, all from a single console. With automated patching across Windows, Mac, Linux and 1,000+ third-party applications, it ensures vulnerabilities are mitigated before attackers can exploit them. Its next-gen antivirus (NGAV) feature, powered by AI-driven behavioural detection, provides 24/7 protection against ransomware, malware, and zero-day threats. Endpoint Central further strengthens enterprise defenses with a broad set of security capabilities, including vulnerability assessment and mitigation, peripheral device control, data loss prevention, application control, endpoint privilege management, encryption with FileVault and BitLocker, and browser security.
    Compare vs. PolicyPak View Software
    Visit Website
  • 2
    Airlock Digital

    Airlock Digital

    Airlock Digital

    Airlock Digital is an application control solution that enforces a Deny by Default security posture. It enables organizations to define trusted applications, scripts, libraries, and processes at a granular level using file hash, path, publisher, or parent process. Only those explicitly defined as trusted are allowed to execute. The platform supports Windows, macOS, and Linux systems, including legacy operating systems and operational technology (OT) environments. Airlock Digital includes allowlisting and blocklisting capabilities, integrated file reputation checks via VirusTotal, and detailed logging for audit and compliance. Exception management is supported through features such as rule-based overrides and time-bound One-Time Passwords (OTPs). Centralized policy management allows consistent enforcement across large and distributed environments. The platform is available as an on-premises deployment, in the cloud, or as a managed hosted service.
    Compare vs. PolicyPak View Software
    Visit Website
  • 3
    DriveLock

    DriveLock

    DriveLock

    Cyber threats are everywhere, but protecting your IT systems should be as natural as locking your front door. With DriveLock’s HYPERSECURE Platform, safeguarding your endpoints and business data is easier than ever. We integrate the latest security technologies and share our expertise, so you can focus on what matters—without worrying about data protection. Zero Trust Platform takes a proactive approach, eliminating security gaps before they become a risk. By enforcing centralized policies, DriveLock ensures employees and endpoints access only what they need—following the golden rule of cybersecurity: ''never trust, always verify''.
    Compare vs. PolicyPak View Software
    Visit Website
  • 4
    Jamf Pro
    Formerly known as Casper Suite, Jamf Pro is an enterprise mobility management (EMM) tool for Apple macOS and iOS devices. Jamf Pro includes a host of features that helps to simplify device deployment, analyze inventory data, and respond to security threats easily: - Choose a zero-touch, hands-free experience or go hands-on through imaging. Either way, enroll devices and deploy them with ease. - Go beyond configuration profiles and use policies and scripts to customize devices for the optimal user experience. - Purchase apps in bulk and make them available automatically or through a Self Service catalog. - Manage device settings and configurations, restrict malicious software, and patch all of your Apple devices without user interaction. Jamf Pro works seamlessly with your existing IT services and technologies, including: Apple Business Manager, Active Directory, SSO/SAML, SCCM, APIs, Cisco ISE, Security Connector and Fast Lane, Conditional Access for Mac.
  • 5
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
  • 6
    Securden Endpoint Privilege Manager
    Eliminate local administrator rights on Windows servers and endpoints. Seamlessly elevate applications for standard users. Enforce the principle of least privilege and zero trust with Endpoint Privilege Management. Automate PEDM using policy-based application control. •Eliminate local admin rights on Windows endpoints •Manage applications that require administrative privileges •Define who can access what applications & automate application control through whitelisting & blacklisting •Policy-based access, even for offline endpoints & remote employees •On-demand privilege elevation on online & offline endpoints •Grant temporary full administrator privileged for standard users when required •Track application usage & privilege elevation trends •Continuously monitor local admin accounts & detect if new local admin accounts are created •Ensure compliance with regulations with comprehensive audit trails •Highly scalable and enterprise ready
  • 7
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 8
    Zscaler

    Zscaler

    Zscaler

    Zscaler, creator of the Zero Trust Exchange platform, uses the largest security cloud on the planet to make doing business and navigating change a simpler, faster, and more productive experience. The Zscaler Zero Trust Exchange enables fast, secure connections and allows your employees to work from anywhere using the internet as the corporate network. Based on the zero trust principle of least-privileged access, it provides comprehensive security using context-based identity and policy enforcement. The Zero Trust Exchange operates across 150 data centers worldwide, ensuring that the service is close to your users, co-located with the cloud providers and applications they are accessing, such as Microsoft 365 and AWS. It guarantees the shortest path between your users and their destinations, providing comprehensive security and an amazing user experience. Use our free service, Internet Threat Exposure Analysis. It’s fast, safe, and confidential.
  • 9
    Check Point Application Control
    Application Control provides the industry’s strongest application security and identity control to organizations of all sizes. Integrated into the Check Point Next Generation Firewalls (NGFW), Application Control enables businesses to easily create granular policies based on users or groups, to identify, block or limit the usage of applications and widgets. Applications are classified into categories, based on diverse criteria such as application type, security risk level, resource usage, productivity implications, and more. Granular control of social networks, applications, and application features, identify, allow, block, or limit the usage. Leverages the world’s largest application library, grouping apps into categories to simplify policy creation and protect against threats and malware. Integrated into Next Generation Firewalls enables consolidation of security controls decreasing costs. Only the right users and devices can access your protected assets.
  • 10
    Heimdal Application Control
    Heimdal Application Control is a novel approach to integrative application management and user rights curation. Modular and easy to set up, App Control empowers the system administrator to create all-encompassing rule-based frameworks, streamline auto-dismissal or auto-approval flows, and enforce individual rights per Active Directory group. The tool’s uniqueness comes from its ability to perfectly pair with a (PAM) Privileged Access Management solution, imparting the user with granular oversight of software inventories and hardware assets.
  • 11
    SP Policy Management

    SP Policy Management

    SP Marketplace

    SP Policy Management streamlines the entire policy and procedure life cycle from development through electronic acknowledgment by employees or contractors. Built on SharePoint, Microsoft Teams, and the Power Platform, SP Policy Management is an easy-to-use out-of-the-box solution that provides a consistent way to drive compliance with policies from HR, IT, Security, Safety, and more. Upon Approval, publish policies to the Policies Portal for access by employees with applied governance by the group. Provide a central point for employees to search, browse and see the latest policies. Also, view their acknowledgments. Manage and track policy expiration, renewal, and retention. Reminder notifications to policy owners. Policy calendar for upcoming renewals. Request via email employee groups to acknowledge that they have read and understood policies. Schedule and Track Policy Acknowledgement by Group.
    Starting Price: $15 per user per year
  • 12
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 13
    AWS Organizations
    AWS Organizations offers policy-based management for multiple AWS accounts. Learn how Organizations help you more easily manage policies for groups of accounts and automate account creation. Quickly scale your environment by programmatically creating new AWS accounts for your resources and teams at no additional charge. Simplify user-based permission management to give teams the freedom to build while staying within targeted governance boundaries. Manage and optimize costs across your AWS accounts and resources. Centrally secure and audit your environment across all of your AWS accounts. Create AWS accounts and add them to user-defined groups for instant security policy application, touchless infrastructure deployments, and auditing. Create a security group and provide users with read-only access to your resources to actively monitor, identify, and mitigate security concerns.
  • 14
    BlackBerry Enterprise BRIDGE
    BlackBerry® Enterprise BRIDGE provides a highly secure option for seamlessly using native Microsoft mobile apps on iOS and Android. Using Microsoft Office mobile apps just got a lot simpler and more secure. Regulated and security-conscious organizations can now enable their users with the full native app experience for Microsoft PowerPoint, Word, and Excel from BlackBerry Dynamics apps such as BlackBerry Work. With the rapid adoption of Office 365 by business and consumer users, some employees may use personal Office 365 accounts to work with corporate files. With the collaboration between BlackBerry and Microsoft, users no longer need to use this workaround. The secure bridge ensures that data encryption and document fidelity are preserved in the document-sharing process and that common data leakage policies are applied. BlackBerry Enterprise BRIDGE allows users to view, create, edit, and annotate Office files on their mobile device of choice inside a secure managed app environment.
  • 15
    ManageEngine Application Control Plus
    Application Control Plus is an enterprise solution that leverages application control and privilege management features to fortify endpoint security. With application discovery, rule-based whitelisting/blacklisting, management of application-specific privileges, and just-in-time access enabled for temporary requirements, this software ensures that it caters to the end-to-end application needs of businesses. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all untrusted applications out of your network. Protect your risky legacy OS machines by deploying application control policies that prevent vulnerable applications without a patch from running. Augment the security of customer-facing systems such as point-of-sale or fixed-function machines by simulating an environment under lockdown using policies run in Strict Mode.
  • 16
    OpenText ZENworks Suite
    OpenText ZENworks Suite is a unified endpoint management platform designed to simplify the way organizations manage devices, applications, security policies, and software updates. It centralizes control of thousands of endpoints, ensuring consistent deployment, compliance, and visibility across the organization. With automated patching, encryption, and policy-driven security, ZENworks strengthens protection while reducing IT workload. The suite helps IT teams eliminate tool sprawl by consolidating asset management, endpoint security, software delivery, and device configuration into one solution. Hybrid work support makes it easy to manage devices remotely and securely without complicated infrastructure. Ultimately, ZENworks improves operational efficiency, lowers IT costs, and enhances organizational productivity.
  • 17
    Ivanti Application Control
    Application Control combines dynamic allowed and denied lists with privilege management to prevent unauthorized code execution without making IT manage extensive lists manually and without constraining users. Automated requests and approvals via helpdesk systems lighten the load for IT staff while providing users a streamlined experience. With Application Control you can manage user privileges and policy automatically, at a granular level, and allow for optional self-elevation when exceptions occur. Give your users access to what they need quickly, with seamless app access that relies on granular, context-aware policies. Create flexible, preventive policies to help ensure only known and trusted applications can execute on a system. Enable automated requests for emergency privilege elevation or application access via integrated IT helpdesk system​.
  • 18
    Carbon Black App Control
    Carbon Black App Control is a robust application control solution designed to prevent malware, ransomware, and other unauthorized applications from running on endpoints. It enables organizations to enforce security policies by only allowing trusted applications to execute, reducing the risk of cyber threats and improving endpoint security. With its centralized management console, Carbon Black App Control provides visibility and control over the applications running in an organization, ensuring that all software complies with security policies. This solution offers real-time protection and detailed reporting capabilities, allowing IT teams to easily detect and respond to security incidents.
  • 19
    PolicyStat

    PolicyStat

    PolicyStat

    Healthcare staffing and operational environments are becoming more and more complex and the challenge of these along with low policy adoption rates by staff and poor communication are making it more difficult to adhere to regulatory compliance, yet the need to set policies and effectively communicate them to all employees across the entire environment is critical for patient safety. Remaining compliant (with safe patient care, a priority) is becoming harder due to increased regulations and requirements. Our powerful policy compliance software automatically keeps track of expiration dates and notifies managers of expiring policies. Our policy compliance software lets you easily tag and group policies or procedures related to a particular audit, so you can find all policies related to Joint Commission or HIPAA in a single search.
  • 20
    AirDroid Business
    AirDroid Business is a full-fledged Enterprise Mobile Device Management (EMM/MDM) Solution for managing and securing all Android endpoints with powerful remote monitoring and remote control features. Some popular device types are smartphones and tablets, digital signages, POS, restaurant kiosks, IoT, and other OEM Android endpoints. It is a solution that can ensure SMBs and Enterprises enhance their business mobility and device security, along with an excellent support team for the best customer service. AirDroid Business MDM Solution Highlights: *Multiple enrollment options: Zero-Touch Enrollment, AE Enrollment, Enroll with Device Owner, Regular Enrollment *Google Play apps management *Unattended remote access *Batch operations *Kiosk mode & Policy *Remote control with Black Screen security mode *Location tracking *Application management service(AMS) *Whitelisting and blocklisting browsers & apps *Remote monitor devices’ status *Real-time alerts & notifications
    Leader badge
    Starting Price: $12 /device/year
  • 21
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 22
    PolicyManager

    PolicyManager

    PolicyMedical

    PolicyManager by MCN is a SaaS-based policy management software for hospitals and healthcare organizations. Reliable and easy-to-use, PolicyManager aids team communications and streamlines policy management workflows and approvals to ensure compliance, mitigates risks, and improve services for healthcare professionals.With PolicyManager, you can enhance workflow collaboration and optimize your operational efficiencies using a wide range of features that include administrative reporting, data mapping, Microsoft Office integration, automatic notifications and reminders, customizable templates, and more.
  • 23
    PolicyPro

    PolicyPro

    First Reference

    PolicyPro® is the complete online policy management service and it is Canada’s best source for current model policies, procedures and forms for HR, finance, IT, accessibility, non-profits and more. PolicyPro® gives you the tools you need to create and update policies and includes a platform for distributing policies to staff and tracking that they have read and understood them. PolicyPro® is the only policy management solution that does it all, from Policy to Sign-Off™, in one secure centralized cloud application hosted in Canada. In the current work environment, organizations may face rising claims related to fraud, wrongful dismissal, harassment, privacy breach, etc. The first question lawyers, courts and tribunals will ask is, “Where are your policies and can you demonstrate they have been read and understood by your employees?”
  • 24
    AWS Directory Service
    AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active Directory (AD), enables your directory-aware workloads and AWS resources to use managed Active Directory (AD) in AWS. AWS Managed Microsoft AD is built on actual Microsoft AD and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use the standard AD administration tools and take advantage of the built-in AD features, such as Group Policy and single sign-on. With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to your domain, and use AWS End User Computing (EUC) services, such as Amazon WorkSpaces, with AD users and groups. AWS Managed Microsoft AD makes it easy to migrate AD-dependent applications and Windows workloads to AWS. With AWS Managed Microsoft AD, you can use Group Policies to manage EC2 instances and run AD-dependent applications in the AWS Cloud.
    Starting Price: $0.018
  • 25
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 26
    Google Cloud Policy Intelligence
    Reduce risk with automated policy controls: Security teams in cloud are faced with an overwhelming amount of information to process in order to keep their environments secure. Keeping up with everything manually is a difficult, never-ending task where failure can have high consequences. Google Cloud Policy Intelligence helps enterprises understand and manage their policies to reduce their risk. By providing more visibility and automation, customers can increase security without increasing their workload.
  • 27
    Kyverno

    Kyverno

    Kyverno

    Kyverno is a policy engine designed for Kubernetes. With Kyverno, policies are managed as Kubernetes resources and no new language is required to write policies. This allows using familiar tools such as kubectl, Git, and Kustomize to manage policies. Kyverno policies can validate, mutate, and generate Kubernetes resources plus ensure OCI image supply chain security. The Kyverno CLI can be used to test policies and validate resources as part of a CI/CD pipeline. Kyverno allows cluster administrators to manage environment specific configurations independently of workload configurations and enforce configuration best practices for their clusters. Kyverno can be used to scan existing workloads for best practices, or can be used to enforce best practices by blocking or mutating API requests. Block non-conformant resources using admission controls, or report policy violations.
  • 28
    Digital.ai App Management
    Enterprise mobile app management (MAM) enables IT to balance the unique needs of IT and remote users. Connect with our MAM mobile BYOD security experts listen to an in-depth discussion on the mobile security landscape and view a product demonstration. Receive guidance on enterprise app store capabilities and the values of internal app-store testing. Easily manage and update any app, complete security management of sensitive app data down to the physical mobile device using MAM in tandem with existing MDM solutions. Distribute policy-enabled apps through existing app stores, and support the secure distribution and management of any app using MAM centralized policy management and App Store or Google Play. Developers can improve overall app quality, improve ‘time-to-market’ metrics, and continuously innovate on features by gathering user data and feedback. Securely manage and distribute apps to external employees or trusted internal employees.
  • 29
    Specops Deploy

    Specops Deploy

    Specops Software

    Specops Deploy simplifies the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Extending the functionality of Group Policy, the solution lets you target any number of computer objects within Active Directory. Use Specops Deploy to save user state during installation, manage local user settings, or capture operating system images. Specops Deploy removes time-consuming manual tasks and improves IT efficiency through a simplified software deployment process. Whether you are installing applications on multiple devices, or upgrading your computers to a new operating system, it is the key to ensuring your time is well spent. Specops Deploy uses existing technologies such as Active Directory, Group Policy, Windows Deployment Services (WDS), Windows Assessment and Deployment Kit (Windows ADK), and Microsoft Deployment Toolkit (MDT).
  • 30
    ConvergePoint Policy Management
    ConvergePoint Policy Management Software is a solution designed to streamline policy management, particularly for organizations on Microsoft 365 SharePoint Online. It offers tools for policy creation, review, approval, and distribution, aiming to improve compliance, transparency, and operational efficiency. The software also includes features like version control, user roles and permissions, and automated notifications.
  • 31
    Delinea Privilege Manager
    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution that operates at cloud speed and scale. You can prevent malware from exploiting applications by removing local administrative rights from endpoints and implementing policy-based application controls. Privilege Manager prevents malware attacks without causing any end user friction that slows productivity. Available both on-premises and in the cloud, enterprises and fast-growing teams can manage hundreds of thousands of machines through Privilege Manager. With built-in application control, real-time threat intelligence, and actionable reporting, it is easier than ever to manage endpoints and demonstrate compliance with least privilege policies to executives and auditors.
  • 32
    Instant Security Policy

    Instant Security Policy

    Instant Security Policy

    Create your own custom IT security policies using our groundbreaking IT policy creation wizard. This packs the power of the cloud and cyber security experts with over 30 years' experience to generate custom policies for you to be audit-ready within minutes. Our innovative policy creation WIZARD asks you questions in plain English to determine your IT security policy needs, and then generates a custom policy to meet those needs. Your IT security policies are emailed to you as soon as they are created. We do not send you thousands of policies and force you to find and customize the ones that apply to you. You will immediately receive your policies that are complete, comprehensive, guaranteed. You can literally have a custom IT security policy in ten minutes. Better yet, your policies are easily editable in all major word processing programs, allowing you to tweak them to fit your needs exactly. Visit the products page for more information about the IT policies we provide.
    Starting Price: $149 one-time payment
  • 33
    Quest Active Administrator
    Without effective Active Directory management tools, administrators will struggle to manage critical Microsoft AD environments efficiently. Doing more with less increases the likelihood of accidental changes to AD objects, configurations and Group Policy data that can raise your risk of errors and downtime. The need to enforce internal policies and address compliance regulations only adds to the challenge. Active Administrator is a complete and integrated Microsoft AD management software solution that helps you move faster and more nimbly than with native tools. With a single consolidated view into the management of your AD, you can address Active Directory administration gaps left by native tools and quickly meet auditing requirements and security needs. With integrated AD administration and seamless permissions management, you will maintain business continuity, increase IT efficiency and minimize security risks.
  • 34
    myPolicies

    myPolicies

    Info-Tech Research Group

    Policy management is complex, but it does not have to be. Restore order to your policies with our policy management software, simplifying the creation, approval, distribution, and monitoring of your corporate policies. Policy acknowledgment has never been easier with the effortless document distribution and tracking of myPolicies. Find and revise your policies quickly and efficiently by using an easy-to-navigate policy management platform. Protect against unforeseen risks by quickly and confidently reporting on policy activity that matters to you, your stakeholders, and your auditors. Never again will your policies become out of date or scattered across your organization. From policy creation through to retirement, myPolicies drives the document lifecycle, establishes individual accountability, and archives every step. myPolicies helps organizations stay compliant by restoring order to their policies.
  • 35
    PolicyTech
    PolicyTech, a part of our NAVEX One GRC Information System, is a cloud-based policy and procedure management software solution. Secure and simple to use, PolyTech helps organizations and their employees improve their efficiency by giving them the ability to access all their policies and procedures easily. Using rules-based workflows and alerts, PolicyTech keeps policies moving through the process, alerting compliance managers in case of unread policies as well as reminding document owners when to retire or update their policies.
  • 36
    Quest ControlPoint

    Quest ControlPoint

    Quest Software

    Confidently secure and protect your SharePoint environment from internal and external threats by with comprehensive permissions management, auditing, reporting and governance policy enforcement. With Quest ControlPoint, you can manage, secure, automate and govern your entire SharePoint environment—whether it’s an on-premises, Microsoft 365 or hybrid SharePoint deployment. Ensure permission policy compliance and prevent security breaches and unauthorized access to sensitive content. Audit, clean up and manage SharePoint permissions and users from a single console across all sites, site collections or farms. Analyze and manage all aspects of permissions whether they are directly assigned, inherited or granted through Active Directory or SharePoint groups.
  • 37
    EQS Policy Manager
    EQS Policy Manager: An end to policy chaos. Manage policies centrally with a clear audit trail. Automate distribution, confirm policies digitally. Hosting and IT security in accordance with ISO 27001. Familiar with these problems? Employees do not know which policies apply to them and where to find them. Hand-signed, disorganized policies create paper chaos. Conclusive reports are extremely time-consuming or impossible to pull together. The solution: EQS Policy Manager. Organize all policies in a central library and define the appropriate target audience. Employees receive policies digitally, can confirm them with one click and read them any time while on the move. Track the success of your policy system with real-time dashboards and reports. Advantages for your compliance program. Comprehensive overview thanks to a central, digital policy library. Employees automatically receive the guidelines relevant to them. Employees can easily confirm policies digitally by clicking or uploading.
  • 38
    MetaCompliance Policy Management
    MetaCompliance Advantage is a policy management software that enables organisations to automate and manage the key tasks associated with user awareness and engagement for information assurance, including risk assessment, the measurement of organisation wide IT security posture and policy management. From creation and management to publishing and delivery, cloud-based policy management software enables organisations to measure and demonstrate the continuing improvements in awareness, and highlight areas that require attention before they pose a risk to security and compliance. The magic of the MetaCompliance policy management software lies in its unique ability to obtain employee attestation of staff policies. This avoids the need for management to chase staff participation and sign up, saving huge amounts of time. The software will encourage the user to electronically sign the policy through levels of insistence determined by you.
  • 39
    Raivana

    Raivana

    Raivana

    Write access control policy. Easily. Discover the faster, easier way to write access control policy. Our team consists of experts who have worked in many industries. Raivana allows you to write access control policy in plain old English. This means everyone in your organization can write policy from day one. This saves you time, resources, and money. You can upload documents created in popular applications like Microsoft Word, TextEdit, and Notepad documents. We support DOC, DOCX, TXT, and RTF file formats. We translate the documents automatically to eXtensible Access Control Markup Language (XACML). Don't worry about managing infrastructure. We take care of all that for you. With 99.999% uptime, you are almost guaranteed to be able to author policy 24/7.
  • 40
    Powertech Policy Minder
    Powertech Policy Minder for IBM i is a security administration tool that automates critical tasks and provides comprehensive security compliance reporting. By automating security administration, Policy Minder saves time and eliminates labor-intensive manual tasks usually required to administer the details of security. Policy Minder for IBM i features a graphical user interface (GUI) in addition to the traditional green screen. Policy Minder provides an easy way to define your security policy on IBM i, whether you want to customize a security policy based on your organization's unique requirements or use a template based on cybersecurity best practices. Comparing your security policy to your system's current configuration is simple and automated. You can even schedule your policy checks so that they run automatically. The FixIt function automatically finds settings that are out of compliance and fixes them.
  • 41
    TotalCompliance

    TotalCompliance

    ComplianceBridge

    TotalCompliance® is the most cost-effective compliance software spanning policy and procedure management, and efficient risk, audit and assessment management. At ComplianceBridge, our mission is to make Policy and Procedure Management and Risk Management easier. That’s why we built TotalCompliance, the world’s most powerful cloud-based compliance solution that makes it all a breeze. Discover why hundreds of organizations choose TotalCompliance by taking a look at a few of our features: Users always have instant access to the most current version of policies and procedures. Document editors, reviewers and stakeholders collaborate using powerful workflows on one central version. Send new policies & procedures to exactly who needs them. Define by individual, groups and distribution lists. Notify users when tasks or documents are assigned. Keep records of who has read, tested on and signed off documents. Set automated reminders.
    Starting Price: $749 per user per year
  • 42
    Policy Manager

    Policy Manager

    Steele Compliance Solutions

    Companies are spending countless hours each week updating policies, managing policies, and ensuring comprehension. The challenges and risks associated with effective policy management can quickly become overwhelming. Keeping policies up to date, coordinating the review and approval process across departments, navigating government and industry regulation, ensuring that all policies are read and understood, and having an audit-friendly policy management compliance program are just a few of many policy-related concerns. Steele’s Policy Manager is a powerful, web-based tool designed to be a comprehensive solution for simplified, effective policy management. Easy to use–so that you can focus less on administration, and more on building stronger compliance. Now, more than ever, a policy management program that is nimble and effective is critical. Steele’s Policy Manager provides your team with the ability to review, create, deploy and administer new policies quickly and seamlessly.
  • 43
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 44
    Diligent Policy Manager
    Take control of your policy program and adapt to changing regulations. Work with the confidence of knowing your policies are always up to date. Itemize and track key policies with a 100% configurable revision and approval workflow engine. Keep documents prepared for audits and provide a seamless, transparent process. Send automated policy updates to target audiences, test policy comprehension and receive attestation that policies are universally understood. Manage your user capabilities efficiently and ensure the right people have access to the right information at the right time. Streamline communications and effectively convey policies, along with other important information. Keep data reportable and readily available via interactive, digestible visualizations. Unlock real-time insights and capitalize on the flexibility of customizable reports. We are committed to providing a robust and secure service that protects all our customers’ data.
  • 45
    Workspace ONE
    Simply and securely deliver and manage any app on any device with Workspace ONE, an intelligence-driven digital workspace platform. Workspace ONE integrates access control, application management and multi-platform endpoint management into a single platform and is available as a cloud service or on-premises deployment. Enables enterprises to maximize employee engagement and productivity by empowering employees with a personalized experience and Day One access to any app on any device. Embrace a single, cloud-native solution for unified endpoint management—for any device and any use case. Eliminate silos and manage every device and app type faster, with fewer point solutions and more capabilities. Secure devices, users, and data with conditional access, automated patching, and configuration policies to achieve a comprehensive Zero Trust security approach.
  • 46
    Procedure Rock

    Procedure Rock

    Gerald Fanning Consulting

    ProcedureRock is a smart, cloud-based Operations and Procedures Management Software that systemizes your business operations. It makes it easy for you to document and manage your procedures, processes, manuals, guidelines and much much more. Launched in Apr 2013, ProcedureRock is a cloud-based online tool designed to help organizations and companies improve their policy and procedural management. Built by a strong team of smart engineers and lead by a group of experienced executives, we adopt your passion and diligence to provide you with this great tool that solves any of your problems present in procedural management. A secure, cloud-based platform to manage policies and procedures throughout the entire lifecycle. Save time and reduce paper costs by developing, reviewing, approving, distributing, and tracking employee acknowledgement with our user-friendly solution.
    Starting Price: $59 per month
  • 47
    AC Policy Manager

    AC Policy Manager

    CFM Partners

    The complex process of managing policy and procedure development and implementation directly affects organizational performance. Employees need to find the right policies and procedures quickly and administrators need tools to simplify the policy management process. The Policy Management GRC Tool enables your organization to achieve these results. It helps you centralize, organize, communicate, and track your policies and procedures. Please contact us for more information or to request a demonstration. Organizing and maintaining policies and procedures across lines of business or departments can be challenging. The Policy and Procedure Management application simplifies this process. Administrators can organize policies and procedures by type, category, line of business, etc.; control who sees what; and manage individual policies and procedures throughout the policy life cycle.
  • 48
    Mitratech PolicyHub
    Solve daunting policy and procedure challenges with Mitratech's PolicyHub, a policy management platform. Complete and cost effective, PolicyHub has features such as policy management, automated knowledge assessments, audit, and reporting. PolicyHub gives an organization the edge it needs to demonstrate corporate responsibility and defensible compliance program. PolicyHub also enables users to create detailed reporting in real-time and instantly react to investigations or audits.
  • 49
    MCN Policy Manager

    MCN Policy Manager

    MCN Healthcare

    Policy Manager’s intelligent document control and workflow management software solution automates policy access, review, approval and attestation throughout your organization. Easy to implement and intuitive to manage, the policy management software’s automated tracking and reporting features ensure audit and regulatory compliance. With MCN’s Policy Management Software, your staff are able to access the most current policies and procedures with our robust search functionality. Manager-assigned competencies track your staff’s knowledge of policies and procedures.
  • 50
    DynamicPolicy

    DynamicPolicy

    Zequel Technologies

    DynamicPolicy by Zequel Technologies is a web-based policy and procedure management software built to help companies streamline regulatory compliance and corporate governance program. With DynamicPolicy, organizations can easily create, distribute, publish, and enforce corporate policies and procedures. The platform also comes with a quiz module to help management teams measure employees' understanding of company policies.