Latka logo

Top Assurit Alternatives, Competitors & Similar Software

Founded 2013

Find 20 competitors in the Security Compliance Software. Compare other SaaS such as Paperless.io, TrustLogix and Magna5. These Assurit competitors have raised - and together serve more than - customers and employ over 830 team members.

Compare Assurit with Paperless.io
1
Paperless.io

Security Compliance Software

Paperless is the only document workflow automation product that tackles the digital transformation needs of traditional industries in finance, insurance, banking and real-estate in the DACH region, by providing an easy-to-use, enterprise-ready and fully supported solution, in an era where customer experience, speed, and convenience matter. That’s when Paperless comes in. We want to break away from today’s manual processes and complex tools. We are document workflow automation software that empowers teams to claim back their work day, focus on what matters, and allow businesses to grow and succeed quicker. Unlike other tools, we focus on simplicity, a quick time to value, and security. And we don’t leave you hanging when you need help or support. As a first step, we are blending much of your individual processes into an all-in-one solution. Create, send, sign and archive business documents in one place. Proposals? NDAs? Contracts? No problem. Paperless makes getting paperwork done simple & effective.

Revenue
$2.1M
Customers
-
Year founded
2020
Funding
-
Team size
14
Location
Germany
Compare Assurit with TrustLogix
2
TrustLogix

Security Compliance Software

TrustLogix accelerates digital transformation, simplifying enterprise data security and privacy by enforcing fine-grained access control across all clouds.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
24
Location
United States
Compare Assurit with Magna5
3
Magna5

Security Compliance Software

Provider of managed IT services, cybersecurity, private and public cloud hosting, and more to mid-market and enterprise customers

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
245
Location
United States
Compare Assurit with Govly
4
Govly

Security Compliance Software

Govly is the #1 Market Network for Government Contractors.

Revenue
$2.1M
Customers
-
Year founded
2021
Funding
-
Team size
27
Location
United States
Compare Assurit with Tarsal
5
Tarsal

Security Compliance Software

Data pipeline for your security data lake.

Revenue
$2.1M
Customers
-
Year founded
2021
Funding
-
Team size
14
Location
United States
Compare Assurit with Magna5
6
Magna5

Security Compliance Software

Provider of managed IT services, cybersecurity, private and public cloud hosting, and more to mid-market and enterprise customers

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
245
Location
United States
Compare Assurit with Medsender
8
Medsender

Security Compliance Software

Medsender is a healthcare technology company specializing in AI-powered solutions designed to streamline administrative workflows within medical practices. Their platform offers a range of services, including HIPAA-compliant digital faxing, AI-driven document automation, and seamless integration with Electronic Medical Records (EMR) systems.

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
19
Location
United States
Compare Assurit with thatDot
9
thatDot

Security Compliance Software

Powering the next generation of cybersecurity applications thatDot presents a highly scalable streaming graph event processing engine that spun out of a DARPA project for advanced persistent threat (APT) detection. Creators of the Quine open source project, with funding from Crowdstrike, thatDot is rapidly becoming the most critical infrastructure for cybersecurity applications. thatDot Streaming Graph, the commercial version, is an event stream processor that interprets multiple simultaneous data streams as a graph, so it can do instant complex pattern detection on categorical data without having to turn it into bloated, sparse numerical data first. Standing queries allow you to ask questions of the past, present, and future at once, letting those answers flow in over time, with no time window limitations. No matter how long bad actors remain dormant, the moment they act, if your application is powered by thatDot, you’ve caught them. thatDot Novelty is a further advance with a pattern learning AI built in, so it finds anomalous event patterns without you even knowing what to look for. This advanced shift left style of event stream processing can do a lot more than just take cybersecurity to the next level, from real-time risk analysis and fraud detection to super-efficient data pipelines to IoT infrastructure optimization. Come check out where data processing is going next.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare Assurit with Banyan Security
10
Banyan Security

Security Compliance Software

Banyan Security provides secure, zero trust “work from anywhere” access to applications and resources for employees and third parties while protecting them from being phished, straying onto malicious web sites, or being exposed to ransomware. A Flexible Edge architecture enables rapid, incremental deployment on-premises or in the cloud without compromising privacy or data sovereignty. A unique device-centric approach intelligently routes traffic for optimal performance and security delivering a great end user experience. Banyan Security protects workers across multiple industries, including finance, healthcare, manufacturing, and technology.

Revenue
$2.1M
Customers
-
Year founded
2015
Funding
-
Team size
19
Location
United States
Compare Assurit with thatDot
11
thatDot

Security Compliance Software

Powering the next generation of cybersecurity applications thatDot presents a highly scalable streaming graph event processing engine that spun out of a DARPA project for advanced persistent threat (APT) detection. Creators of the Quine open source project, with funding from Crowdstrike, thatDot is rapidly becoming the most critical infrastructure for cybersecurity applications. thatDot Streaming Graph, the commercial version, is an event stream processor that interprets multiple simultaneous data streams as a graph, so it can do instant complex pattern detection on categorical data without having to turn it into bloated, sparse numerical data first. Standing queries allow you to ask questions of the past, present, and future at once, letting those answers flow in over time, with no time window limitations. No matter how long bad actors remain dormant, the moment they act, if your application is powered by thatDot, you’ve caught them. thatDot Novelty is a further advance with a pattern learning AI built in, so it finds anomalous event patterns without you even knowing what to look for. This advanced shift left style of event stream processing can do a lot more than just take cybersecurity to the next level, from real-time risk analysis and fraud detection to super-efficient data pipelines to IoT infrastructure optimization. Come check out where data processing is going next.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare Assurit with Project Portfolio Office
12
Project Portfolio Office

Security Compliance Software

Project Portfolio Office (PPO) helps organisations achieve greater project success by implementing and adopting a simple to use, cost effective, configurable yet enterprise scalable project portfolio management application to plan, manage, collaborate, execute and report on their projects, programmes and portfolios. With numerous offices and a global network of certified partners, PPO is available anywhere and anytime. Our happy users range from small consultancies to global Fortune 500 organisations, and no matter their methodology, we help them by ensuring PPO aligns to their way of work! By making use of one of our numerous pre-configured solutions, our free online trial, learning videos and legendary 24/7 support, you can self-implement within 30 days or request our awesome team to assist every step of the way. PPO is a cloud based application that is secure, immediately available with a robust API for configuring and integrating with other tools. With no long term contract required and tiered based pricing, you can be completing your projects on time and within budget tomorrow. PPO’s capabilities include: • methodology & governance alignment; • time & cost management; • planning & task management; • resource & capacity management; • issue & risk management; • change & quality management; • document & knowledge management; • reports & dashboards; • communication, collaboration & alerts; • portfolio management & prioritisation; • idea & innovation management; • online approvals & configurable workflow; • customisable & integratable; • secure, auditable & access controlled; and • online help & support.

Revenue
$2.1M
Customers
-
Year founded
2005
Funding
-
Team size
19
Location
United Kingdom
Compare Assurit with endgame.com
13
endgame.com

Security Compliance Software

Endgame makes military-grade endpoint protection as simple as anti-virus. Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection, stopping everything from ransomware, to phishing, and targeted attacks. Endgame is the only endpoint security platform to offer a unique hybrid architecture that delivers both cloud administration and data localization that meets all industry, regulatory, and global compliance requirements. Every branch of the US military as well as the world's largest commercial organizations rely on Endgame to protect their people, technology and mission, globally. For more information, visit www.endgame.com and follow us on Twitter @EndgameInc.

Revenue
$2.1M
Customers
-
Year founded
2008
Funding
-
Team size
19
Location
United States
Compare Assurit with Pacific Commerce
14
Pacific Commerce

Security Compliance Software

Pacific Commerce provides EDI solutions, automation and digitisation services to enable businesses to trade easily with each other. Our focus is to make the process of buying and selling secure, simple and accessible for you and all your trading partners. Our services: – EDI solutions – PEPPOL – AP/AR automation – Data digitalisation – Digital mailroom – Master data management We are ISO27001 certified, which means we have strict controls and processes in place to handle your information security, privacy and data. All data is also stored locally in our secure onshore servers. Reach out to us to learn more.

Revenue
$2.1M
Customers
-
Year founded
1996
Funding
-
Team size
19
Location
Australia
Compare Assurit with Kondukto
15
Kondukto

Security Compliance Software

Kondukto is an AppSec orchestration and posture management platform that helps AppSec teams achieve instant visibility into the overall security posture by integrating all security data into one crystal clear view. It also enables faster triage and remediation of vulnerabilities with its orchestration, automation and vulnerability management capabilities.

Revenue
$2.1M
Customers
-
Year founded
2019
Funding
-
Team size
19
Location
United States
Compare Assurit with IntelliGRC
16
IntelliGRC

Security Compliance Software

IntelliGRC is at the forefront of CMMC (Cybersecurity Maturity Model Certification) compliance solutions. Our intelligent Governance, Risk Management, and Compliance (GRC) platform is specifically designed to guide defense contractors and their suppliers through the complexities of CMMC certification. Our Mission: To efficiently and authentically implement and manage CMMC compliance, making it accessible for organizations and service providers within the Defense Industrial Base (DIB) to pass 3rd party assessments.

Revenue
$2.1M
Customers
-
Year founded
2016
Funding
-
Team size
19
Location
United States
Compare Assurit with Critical Design Associates
17
Critical Design Associates

Security Compliance Software

Who is CDA? Established in December 2001, Critical Design Associates, Inc. (CDA) is an IT consulting firm that delivers custom solutions to resolve clients’ unique business challenges. We specialize in Integration, Automation, Security, and Compliance. Our success is measured by the success of our clients, and we are committed to providing the highest quality service. There is a common challenge imposed on IT departments today: Too much to do and not enough resources to handle the load. We have the answer. We will work with you to develop a comprehensive solution serviced by our team of qualified technical experts from System Architects, Senior Consultants and Consultant Analysts to meet your project goals, to fill a resource staffing need or even if a fully managed services solution is required to fulfill specific IT functions.

Revenue
$2.1M
Customers
-
Year founded
2001
Funding
-
Team size
19
Location
United States
Compare Assurit with DigitalDots Inc
18
DigitalDots Inc

Security Compliance Software

Digital Platform for Intuitive Enterprise - Our non-intrusive platform operates independently of enterprise systems that bring together business, technology, governance, process, and people empowered to move quickly in the emerging technology landscape. When assembled from our company's technology, its capability enables enterprises to innovate, accelerate, and scale business solutions.

Revenue
$2.1M
Customers
-
Year founded
-
Funding
-
Team size
19
Location
United States
Compare Assurit with Exivity
19
Exivity

Security Compliance Software

Exivity is a cloud-agnostic metering and billing software solution for hybrid cloud environments. By retrieving data from any public and on-premises cloud, Exivity creates a 360-degree view across all IT consumption supporting any MSP/CSP customer billing or enterprise chargeback/showback use case. Exivity is a proud member of the FinOps Foundation and a FinOps Certified Platform.

Revenue
$2.1M
Customers
-
Year founded
2016
Funding
-
Team size
19
Location
Netherlands
Compare Assurit with ThreatSTOP, Inc.
20
ThreatSTOP, Inc.

Security Compliance Software

ThreatSTOP was started in 2009 with a mission: Give organizations of any size the same cybersecurity protection that Fortune 1000 companies have. Few companies have the resources to curate threat intelligence feeds into machine readable enforcement policies. Fewer still have the resources to update their network devices with those policies. ThreatSTOP addresses protection gaps for both inbound and outbound network traffic with cloud-based automated threat intelligence and Protective DNS, converting the latest threat data into enforcement policies, updating devices to stop attacks before they become breaches. The team has more than 120 years’ combined experience in security research.

Revenue
$2.1M
Customers
-
Year founded
2009
Funding
-
Team size
19
Location
United States
Top Assurit Alternatives, Competitors & Similar Software | GetLatka