Logo
find AI list
TasksToolsCompareWorkflows
Submit ToolSubmit
Log in
Logo
find AI list

Search by task, compare top tools, and use proven workflows to choose the right AI tool faster.

Platform

  • Tasks
  • Tools
  • Compare
  • Alternatives
  • Workflows
  • Reports
  • Best Tools by Persona
  • Best Tools by Role
  • Stacks
  • Models
  • Agents
  • AI News

Company

  • About
  • Blog
  • FAQ
  • Contact
  • Editorial Policy
  • Privacy
  • Terms

Contribute

  • Submit Tool
  • Manage Tool
  • Request Tool

Stay Updated

Get new tools, workflows, and AI updates in your inbox.

© 2026 findAIList. All rights reserved.

Privacy PolicyTerms of ServiceEditorial PolicyRefund Policy
Home/Tasks/Kisi
Kisi logo

Kisi

Kisi is a cloud-based access control system that unifies hardware and software to secure spaces, streamline operations, and ensure compliance.

BusinessAPI available
Good for
Remotely manage and monitor access pointsGrant or revoke access permissions for users
0 views
0 saves
Visit Website
  • About
  • Main Tasks
  • Decision Summary
  • Key Features
  • How it works
  • Quick Start
  • Pros & Cons
  • FAQ
  • Similar Tools
Switch To Simple View

About Kisi

Kisi is a cloud-based access control system designed to modernize building security. It combines access control hardware with user-friendly software to provide a comprehensive solution for managing physical access. Kisi allows businesses to remotely manage locations, set specific access levels, and integrate with existing security and operational tools. Its key features include mobile unlocks, centralized control, access logs, and video intercom integration. Kisi serves businesses of various sizes, from fitness centers and coworking spaces to corporate offices, providing scalable and customizable access control to improve security, reduce operational costs, and enhance user experience. It aims to provide a seamless, secure, and efficient environment for employees and visitors.

Core Capabilities

Kisi is a cloud-based access control system designed to modernize building security.

Main Tasks

Remotely manage and monitor access points

Explore all tools that specialize in remotely manage and monitor access points. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools

Grant or revoke access permissions for users

Explore all tools that specialize in grant or revoke access permissions for users. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools

Generate access logs for compliance and auditing

Explore all tools that specialize in generate access logs for compliance and auditing. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools

Integrate with video intercom systems for enhanced security

Explore all tools that specialize in integrate with video intercom systems for enhanced security. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools

Automate user onboarding and offboarding processes

Explore all tools that specialize in automate user onboarding and offboarding processes. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools

Manage multiple locations from a single platform

Explore all tools that specialize in manage multiple locations from a single platform. This domain focus ensures Kisi delivers optimized results for this specific requirement.

Find Tools
Decision Summary

What this tool is best suited for

Best Fit
Cloud-Based Security SolutionSecurity
Buying Signals
Pricing not specified
API available
Web-first workflow
Setup And Compliance
Not specified
No onboarding steps listed
No compliance tags listed
Trust Signals
Pricing freshness unavailable
URL health not shown
Verification date unavailable
Compare And Alternatives

Shortlist Kisi against top options

Open side-by-side comparison first, then move to deeper alternatives guidance.

Compare nowView alternatives
No verified pros/cons are available yet for this tool.

Pros

  • No verified strengths listed yet.

Cons

  • No verified trade-offs listed yet.

Reviews & Ratings

Verified feedback from other users.

Reviews

No reviews yet. Be the first to rate this tool.

Write a Review

0/500

Core Tasks

  • Remotely manage and monitor access points
  • Grant or revoke access permissions for users
  • Generate access logs for compliance and auditing
  • Integrate with video intercom systems for enhanced security
  • Automate user onboarding and offboarding processes
  • Manage multiple locations from a single platform

Target Personas

Cloud-Based Security SolutionSecurity

Categories

BusinessMore & General

Alternative Tools

View More Explore All Tools
DeHashed logo

DeHashed

Business

DeHashed provides a comprehensive database of breach data, historical WHOIS data, and private records to help users assess risks and prevent fraudulent attacks.

24d ago
Best for Data Breach MonitoringHas API
PricingFreemium
Freemium
Search for compromised credentials
Monitor for data breaches affecting specific domains
Investigate potential identity fraud
Digital Ally logo

Digital Ally

Business

Digital Ally provides complete front- and back-end video solutions for law enforcement, commercial fleets, and situational security.

24d ago
Best for Law Enforcement Technology
PricingFreemium
Freemium
Capture video evidence with body-worn cameras
Record in-car video for law enforcement
Monitor driver behavior with AI-powered dashcams
Duo Security (Cisco) logo

Duo Security (Cisco)

Business

Duo Security provides security-first IAM that offers phishing-resistant MFA, identity intelligence, and a user-friendly experience.

24d ago
Best for Identity and Access Management (IAM)Has API
PricingFreemium
Freemium
Enable multi-factor authentication for user logins
Protect against phishing attacks with phishing-resistant MFA
Manage user access to applications and resources
Gophish logo

Gophish

Developer

Gophish is an open-source phishing framework that simplifies security awareness training by simulating real-world phishing attacks to test and educate users.

24d ago
Best for Security Awareness TrainingHas API
PricingFree
Free
Create phishing email templates
Manage target user lists
Launch phishing campaigns
HackerOne logo

HackerOne

Developer

HackerOne reduces risk continuously with AI and human-verified threat exposure management, uncovering, validating, and prioritizing critical vulnerabilities.

24d ago
Best for CybersecurityHas API
PricingFreemium
Freemium
Manage vulnerability disclosure programs
Run bug bounty programs to identify vulnerabilities
Conduct penetration testing to assess security
Semgrep logo

Semgrep

Developer

Semgrep is a high-signal code security platform that unifies SAST, SCA, and secrets scanning to find and fix vulnerabilities before they ship.

24d ago
Best for Software Composition Analysis (SCA)Has API
PricingFreemium
Freemium
Scan code for vulnerabilities
Detect hardcoded secrets
Identify vulnerable dependencies
SonarQube Cloud logo

SonarQube Cloud

Code Quality

SaaS solution for continuous code quality and security.

24d ago
Best for SecurityHas API
PricingFreemium
Freemium
Static code analysis
Security vulnerability detection
Code quality measurement
SonarLint logo

SonarLint

Code Quality

Advanced linter for better code quality and stronger security in your IDE.

24d ago
Best for Security
PricingFree
Free
Code Analysis
Security Vulnerability Detection
Code Smell Detection