The B2B platform for the best purchasing descision. Identify and compare relevant B2B manufacturers, suppliers and retailers
Close
Filter
Result configuration
Continents
Select continent
Locations
Result types
Company type
Select company type
Industries
Select industry
Company status
Select company status preset
Number of employees
Min.
Max.
Founding year
Rosslare
Migdal, Israel
B
11-50 Employees
1980
Key takeaway
Rosslare has been providing trusted access control solutions for over 40 years, offering a comprehensive portfolio that includes advanced controllers, readers, and biometric terminals. Their innovative AxTraxPro™ management software enhances security and scalability, making it easier for organizations to manage access effectively.
Reference
Core business
Rosslare
Rosslare offers a complete range of state-of-the-art solutions meeting nearly any access control challenge. We cover the full gamut of access control products
accSenSe - Digital Identity Resilience
Tel-Aviv, Israel
B
11-50 Employees
2020
Key takeaway
AcSense is dedicated to enhancing enterprise identity access management (IAM) by providing a resilient and secure solution that addresses vulnerabilities in IAM infrastructure. Their platform ensures uninterrupted access and immediate operational recovery for cloud identity providers like Okta, emphasizing the importance of robust access control to mitigate risks associated with compromised systems.
Reference
Core business
acsense - The IAM Resilience Platform
Experience uninterrupted access and enhanced protection for your cloud identity provider (IdP) with acsense, the enterprise IAM resilience platform.
Authomize
Tel-Aviv, Israel
B
11-50 Employees
2020
Key takeaway
Authomize, in conjunction with the Microsoft Intelligent Security Association, offers a Cloud Infrastructure Entitlements Management (CIEM) solution that enhances visibility and control over access risks in multi-cloud environments. Their approach emphasizes achieving least privilege and preventing privilege escalation through advanced analytics, making it a key player in access control.
Reference
Product
Cloud Infrastructure Entitlements Management (CIEM) | Authomize.com
Authomize's CIEM solution provides unprecedented visibility and control over access risks in multi-cloud environments. Achieve Least Privilege and harden your security posture with advanced analytics. Request a demo today.
Looking for more accurate results?
Find the right companies for free by entering your custom query!
25M+ companies
250M+ products
Free to use
Perimeter 81
Tel-Aviv, Israel
B
101-250 Employees
2018
Key takeaway
Perimeter 81 offers robust access control solutions through features like single sign-on access and two-factor authentication. Their platform enables businesses to create custom access and security policies based on user identity, enhancing overall network security in a cloud-forward environment.
Reference
Product
Identity Provider Integration | Perimeter 81
Enable single sign-on access and two-factor authentication and build custom access and security policies based on role or user identity.
Portnox
Raanana, Israel
B
11-50 Employees
2007
Key takeaway
Portnox provides a comprehensive zero trust access control solution that integrates passwordless authentication, authorization, risk monitoring, and compliance enforcement, ensuring secure access for networks, applications, and infrastructure. Their products, CORE and CLEAR, specifically address secure network access control and visibility for devices.
Reference
Product
Products - Portnox.com
For secure network access control, Portnox offers CORE and CLEAR. Secure all access layers and ensure visibility of devices for BYOD on IoT controls.
SecuPi
Ramat Gan, Israel
B
11-50 Employees
2014
Key takeaway
SecuPi specializes in data-centric security and compliance, offering robust access control measures that ensure sensitive data is only accessible on a need-to-know basis. Their solutions include dynamic masking, redaction, and tokenization, which help organizations protect against unauthorized access and comply with GDPR regulations.
Reference
Product
Data Access Governance - SecuPi
SecuPi provides the capability to centrally control sensitive data access on a “need to know” basis. Set rules and apply policies to determine who can access which sensitive data across your high-risk applications. SecuPi can prevent access to sensitive data by either dynamic masking, redaction, tokenization, or blocking; all without affecting the data, network, applications or databases.
Safe-T
Herzliya, Israel
B
11-50 Employees
2013
Key takeaway
TerraZone offers a robust access control solution through its truePass platform, which provides secure access management and fine-grained access controls tailored for hybrid workforces. Their approach emphasizes Zero Trust principles, ensuring that users have access only to the resources they need based on identity and context, thereby enhancing security against vulnerabilities and unauthorized access.
Reference
Service
truePass Zero Trust | TerraZone
truePass Zero Network means that each user only has access to the resources they need and that this access depends on identity and context. Within our truePass dashboard, you can quickly segment your users into groups and create policies that define which of your connected resources (Hybrid, on-prem servers or apps, public cloud apps etc.) are accessible to specific groups.
Provision-ISR
Kfar Saba, Israel
B
51-100 Employees
2007
Key takeaway
Provision-ISR is a rapidly growing CCTV brand that emphasizes accessible and efficient security solutions. Their diverse hardware and accessories cater to various surveillance needs, promoting a safer environment through reliable technology.
Reference
Product
Provision-ISR
KNOCK N'LOCK LTD
Yokneam Ilit, Israel
B
11-50 Employees
2007
Key takeaway
OUTLOCKS is a global leader in Outdoor and Safes Access Management Solutions, dedicated to providing high-quality access control systems that enhance security and efficiency. Their innovative Wi-Key™ management system offers real-time control and the ability to integrate biometric features, addressing the critical needs of access control.
Reference
Product
Control Unit - OUTLOCKS
Cyblock
Tel-Aviv, Israel
B
1-10 Employees
2018
Key takeaway
Cyblock provides exclusive Information Security consulting services, emphasizing their expertise in developing effective strategies and scalable solutions that can enhance access control for businesses. Their partnership approach with VIP clients ensures tailored security measures that align with specific business needs.
Reference
Core business
Home | Cyber Security Exclusive Services
Technologies which have been searched by others and may be interesting for you:
In the Access Control industry in Israel, several key considerations are essential for informed decision-making. The regulatory landscape is influenced by stringent security requirements due to the country's unique geopolitical situation, necessitating compliance with national security standards and privacy laws. Challenges include the rapid technological advancements in security solutions and the need for continuous adaptation to emerging threats. Opportunities abound, particularly in integrating advanced technologies such as biometrics, IoT, and AI-driven systems, which are increasingly in demand for enhancing security measures. Environmental concerns, such as the sustainability of materials used in access control systems, are gaining traction, prompting companies to adopt eco-friendly practices. The competitive landscape features a mix of established players and innovative startups, fostering a dynamic environment that encourages technological collaboration and development. Additionally, Israel's reputation as a global leader in cybersecurity positions its access control solutions favorably in international markets, opening avenues for export and collaboration with foreign partners. Understanding these facets is crucial for anyone researching companies in this field, as they reflect the interplay between security needs, technological evolution, and market opportunities within the context of Israel's specific landscape.
Some interesting numbers and facts about your company results for Access Control
Country with most fitting companies | Israel |
Amount of fitting manufacturers | 60 |
Amount of suitable service providers | 34 |
Average amount of employees | 11-50 |
Oldest suiting company | 1980 |
Youngest suiting company | 2020 |
Some interesting questions that has been asked about the results you have just received for Access Control
What are related technologies to Access Control?
Based on our calculations related technologies to Access Control are Space Technologies, Military, Commercial Aviation, Airport Security
Which industries are mostly working on Access Control?
The most represented industries which are working in Access Control are IT, Software and Services, Other, Defense, Automation, Computer Hardware
How does ensun find these Access Control Companies?
ensun uses an advanced search and ranking system capable of sifting through millions of companies and hundreds of millions of products and services to identify suitable matches. This is achieved by leveraging cutting-edge technologies, including Artificial Intelligence.