80 results
Why Capterra is free
We provide a way to grant access to your wireless and LAN networks, as well as your Linux servers, and only for the duration needed Learn more about Foxpass
Free Trial Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need. Also, we provide SSH Key Management and enforcement. Learn more about Foxpass
Free Trial Our cloud-hosted LDAP and RADIUS systems help you ensure that employee accounts have access only to the resources they need. Also, we provide SSH Key Management and enforcement....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Cloud-based tool that helps businesses of all sizes manage users' profiles such as authentication details, locations, devices and more. Learn more about Auth0
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 provides the simplicity, extensibility, and expertise to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework. Learn more about Auth0
Auth0 is the first identity management platform for developers and application teams. It gives you a platform to authenticate and authorize, providing secure access to applications, devices, and users....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive files in an encrypted digital vault, securely share records with teams and seamlessly integrate with SSO, LDAP and 2FA. Learn how to protect your company with Keeper now. Learn more about Keeper for Business
Keeper is the leading cybersecurity platform for preventing password-related data breaches and cyberthreats. With Keeper, your business can auto-generate high-strength passwords, protect sensitive file...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Encrypted cloud-based, integrated, automated password protection to store, manage, and retrieve customer credentials and knowledge. Learn more about SolarWinds Passportal
An encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentation capabilities designed to streamline the technician's day by providing essential documentation at their fingertips to standardize service delivery and expedite issue resolution. Learn more about SolarWinds Passportal
An encrypted and efficient password and credential management solution built for MSPs, offering credential injection, reporting, auditing, password change automation, and privileged client documentatio...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
ADAudit Plus is an Active Directory, Azure AD, file server (including NetApp and EMC), and workstation change monitoring software. Learn more about ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Directory, Azure AD, and Windows servers. Additionally it provides insight on workstation and file server access (including NetApp and EMC). ADAudit Plus helps you track user logon and logoff; analyze account lockouts; audit ADFS, ADLDS, and printers; forward logs to SIEM tools; and do much more. Learn more about ADAudit Plus
ManageEngine ADAudit Plus is an IT security and compliance solution. With over 200 reports and real-time alerts, it provides knowledge about changes made to the content and configuration of Active Dire...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Enables companies to manage, consolidate & secure privileged accounts across cloud & on-premise infrastructure. Learn more about Spectra
Sectona was started with a purpose to engineer simplified, modernly architected cross-platform privileged access technology. Our core focus is to prevent & detect breaches that occur under the cover of insider threats &/or privileged attacks. With our cross-platform & deeply integrated Privileged Access Management (PAM) solution, Sectona enables enterprises achieve enhanced security by adopting a refreshed PAM approach. Sectona currently works with customers across sectors. Learn more about Spectra
Sectona was started with a purpose to engineer simplified, modernly architected cross-platform privileged access technology. Our core focus is to prevent & detect breaches that occur under the cover ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Role based access control for Windows, Linux and network device management. Dynamically create web forms for PowerShell without HTML. Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is audited, including the output from command-line tools. Integrate with other IT support applications in multiple ways to support your workflow. Manage servers, workstations, network devices, Active Directory objects or anything that supports remote API connections. Learn more about System Frontier
System Frontier enables organizations to easily delegate granular permissions to Tier 1 support staff, junior administrators, contractors and vendors without giving away admin rights. Every action is a...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
XTAM is a privileged account management software with a password vault, password rotation, session recording and task automation. Learn more about Xton Access Manager
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording with instant playback, full audit trail, elevated script automation, alerting and extensive analytics. XTAM integrates with AD/LDAP, SIEM, multi factor authentication providers and ticketing systems. XTAM is an agentless, scalable solution for on premises, hybrid and cloud deployments. Learn more about Xton Access Manager
XTAM is a privileged account management software which includes Web based password vault with password rotation, discovery, workflow controlled access, high trust login, session and keystroke recording...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Gate any content or asset with the BioSig-ID password, a gesture biometric that identifies people by four characters they draw Learn more about BioSig-ID
Many types of biometrics exist but only one stands apart from the rest. Advantages such as rapid deployment, lightweight API and affordable licensing put BioSig-ID within reach for any company or institution that requires the highest level of identity assurance to secure its operations. Multiple applications developed with BioSig-ID stops impostor log-in and sharing of passwords to reduce the liability of identity theft and fraud in real-time. Learn more about BioSig-ID
Many types of biometrics exist but only one stands apart from the rest. Advantages such as rapid deployment, lightweight API and affordable licensing put BioSig-ID within reach for any company or insti...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Manage and audit access rights across your IT infrastructure. Learn more about Access Rights Manager
SolarWinds Access Rights Manager is designed to assist IT and security admins in quickly and easily provisioning, deprovisioning, managing, and auditing user access rights to systems, data, and filesso they can help protect their organizations from the potential risks of data loss and breaches. Learn more about Access Rights Manager
SolarWinds Access Rights Manager is designed to assist IT and security admins in quickly and easily provisioning, deprovisioning, managing, and auditing user access rights to systems, data, and filesso...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Cloud-based solution that helps businesses manage workforce via multi-factor authentication, meta-directory, single sign-on and more.
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, the Okta Identity Cloud enables simple and secure access from any device. Thousands of customers, including Experian, 20th Century Fox, LinkedIn, and Adobe trust Okta to work faster, boost revenue and stay secure.
Okta is the leading provider of identity for the enterprise. The Okta Identity Cloud connects and protects employees of many of the worlds largest enterprises. It also securely connects enterprises to ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
JumpClouds Directory-as-a-Service securely manages and connects your users to their systems, applications, files, and networks.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems whether Mac, Linux, or Windows and provides access to cloud and on-prem resources such as Office 365, G Suite, AWS, Salesforce, and Jira. The same login connects users to networks & file shares via RADIUS and Samba, respectively, securing your organizations WiFi.
JumpCloud Directory-as-a-Service is Active Directory and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages us...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Cloud-based and on-premise platform that allows businesses to secure critical data with multi-factor authentication.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a caf. Pulse Connect Secure is the result of 15 years of innovation and refinement which had led to the most reliable and feature-rich VPN built for the next generation.
Enterprise access has been redefined by BYOD, mobility, and cloud services. Todays workers demand secure connectivity regardless of location their desk can be in a car, a hotel room, at home, or at a...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Identity management (IAM) and single sign-on (SSO) solution for companies of all sizes. Get started immediately with our free trial.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure and manage access to web applications both in the cloud and behind the firewall. Does your company have three or more SaaS or internal web apps? If so, then you will benefit from the security of OneLogin's cloud-based single sign-on solution.
Designed for companies with 100+ users, OneLogin provides a cloud-based identity and access management (IAM) solution that offers simple single sign-on (SSO) making it easier for companies to secure an...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
SecureLink is the leader in providing privileged access management for vendors for both enterprise organizations and technology vendors
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink's secure, purpose-built platform. SecureLink is headquartered in Austin, Texas.
SecureLink is the leader in providing privileged access management for vendors and remote support solutions for both highly regulated enterprise organizations and technology vendors. SecureLink serves ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
ADManager Plus is a web-based, unified privileged access management solution for Active Directory, Office 365 & Exchange environments.
ADManager Plus is a web-based, unified privileged user access management solution for Active Directory, Office 365, Exchange, and G Suite. It simplifies user identity and credential provisioning, granular access control, remote access, and privileged group membership management. It helps manage users¿ file server access permissions, identify and grant only the least privileges needed. It also offers 150+ reports including reports to find privileged users¿ group membership, and file permissions.
ADManager Plus is a web-based, unified privileged user access management solution for Active Directory, Office 365, Exchange, and G Suite. It simplifies user identity and credential provisioning, granu...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Website monitoring system that enables businesses security against malware for websites and web-based applications.
Website monitoring system that enables businesses security against malware for websites and web-based applications.
Website monitoring system that enables businesses security against malware for websites and web-based applications....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
LogMeOnce Password Management & IAM software helps to effectively protect and manage passwords for teams, businesses, and enterprises.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team. LogMeOnce helps you to transform your business, improve security, and reduce support cost. The powerful features of LogMeOnce improve security and take away frustration. Our security platform protects your teams and IT administrators. Our best practices help to protect your companys brand and identity.
While cyber criminals launch thousands of attacks, protecting security credentials is paramount. Your business continuity starts with protecting passwords. Not for the few, but the entire team. LogMeOn...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Passly helps IT teams and MSPs overcome employees' bad password habits by combining SSO, MFA, and Password Management all-in-one.
Passly helps IT teams needing to do more with less and MSPs seeking greater profitability to overcome employees' bad password habits by seamlessly integrating single-sign on, multi-factor authentication, and password vault/management all into one solution so that you can secure your workforce simply, easily, and affordibly. Get a demo today. - Passly was previously named AuthAnvil. All functionalities from AuthAnvil are included in Passly offering.
Passly helps IT teams needing to do more with less and MSPs seeking greater profitability to overcome employees' bad password habits by seamlessly integrating single-sign on, multi-factor authenticatio...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Ping Identity (NYSE: PING) offers intelligent identity capabilities like SSO and MFA for workforce, customer and partner use cases.
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity (TM) platform provides customers, employees, partners and, increasingly, IoT, with access to cloud, mobile, SaaS and on-premises applications and APIs, while also managing identity and profile data at scale.
Ping Identity is pioneering Intelligent Identity. We help enterprises achieve Zero Trust identity-defined security and more personalized, streamlined user experiences. The Ping Intelligent Identity (TM...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Secret Server is an enterprise-grade solution to discover, secure, manage, & audit privileged account passwords across an organization.
Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. Available in on-premises and cloud editions, Secret Server is feature-rich and user-friendly. Additionally, the available Secret Server SDK protects privileges used in the DevOps environment with the same security best practices and management tools used throughout the enterprise, while maintaining the velocity and scale DevOps teams demand.
Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. Available in on-premises and cloud editions, Se...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
HelloID features Provisioning, Service Automation, Access Management, access to a unified dashboard via Single Sign-On, and much more.
HelloID is Tools4ever's cloud-based Identity and Access Management solution that provides user account provisioning, self-service workflows, and single sign-on. With HelloID, your organization can ensure efficient and secure user management, simplified access to resources, compliance to industry-standard laws and regulations, all while removing the manual time-consuming tasks from your IT department.
HelloID is Tools4ever's cloud-based Identity and Access Management solution that provides user account provisioning, self-service workflows, and single sign-on. With HelloID, your organization can ensu...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Ensure the right level of access to resources for the appropriate people.
VaultOne blocks unauthorized access to corporate systems, ensuring that the appropriate level of access is established and maintained for diverse people, applications and devices. Its enables its users to work securely wherever they are, through secure remote access.
VaultOne blocks unauthorized access to corporate systems, ensuring that the appropriate level of access is established and maintained for diverse people, applications and devices. Its enables its users...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Ekran Systems® is universal software that can help you monitor employees, control subcontractors, PAM and handle compliance tasks.
The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Ekran System® provides easy to use access management solutions such as two-factor authentication, one-time passwords, privileged account and session management (PASM), ticketing system integrations, and others. They were designed to bring privileged activity control to the next level and meet compliance requirements.
The software platform delivers monitoring, recording and auditing of all user activity on critical endpoints, critical data and critical configurations. Ekran System® provides easy to use access mana...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Physical access control platform that provides identity management through process automation, scalable control and compliance.
Physical access control platform that provides identity management through process automation, scalable control and compliance. Built for organizations that want to strengthen security and ensure compliance with a single system of record. Automate the credentialing process with our out-of-the box identity management integrations.
Physical access control platform that provides identity management through process automation, scalable control and compliance. Built for organizations that want to strengthen security and ensure compl...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies.
Software to control access to administrative and privileged accounts to reduce information leaks & overall risk by automating policies....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
PHP security app which monitors logins to detect and block password sharing via GeoTracking.
PHP security app which monitors logins to detect and block password sharing via GeoTracking.
PHP security app which monitors logins to detect and block password sharing via GeoTracking....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis.
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis.
Identity based granular access control solution for users to access an enterprise's applications on a need-to-know basis....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
EventLog Analyzer is a comprehensive log management solution that provides multiple security capabilities in one unified platform.
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat intelligence and incident management platform. It offers predefined audit reports to help track activity happening in databases, web servers, Windows devices, network perimeter devices, and more. It also assists in meeting compliance regulations like the PCI DSS, SOX, HIPAA, FISMA, and GDPR.
EventLog Analyzer is a comprehensive log management solution withreal-time threat detection and analysis. It can correlate disparate events happening across your network and also has a built-in threat ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
On-premises privileged account management platform featuring robust role-based access control for all your admin users.
Devolutions Password Server (DPS) lets you control privileged accounts and manage sessions through a secure solution that can be deployed on-premises. When used in combination with Remote Desktop Manager, DPS becomes the single pane of glass of any IT department, integrating passwords and credentials vaulting with a robust and efficient remote connections management solution. While using the same backend, the DPS web interface offers your end-users a simplified password management solution.
Devolutions Password Server (DPS) lets you control privileged accounts and manage sessions through a secure solution that can be deployed on-premises. When used in combination with Remote Desktop Manag...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Secure, store and control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data.
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault enables fine grained authorization of which users and applications are permitted access to secrets and keys. Some of Vault's main use cases include: - Secrets Management - Identity Brokering - Data Encryption
Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platforms. Vault e...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Centrify's cloud-ready Zero Trust Privilege secures modern enterprises & stops the leading cause of breaches -- privilege access abuse.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never trust, always verify, enforce least privilege approach. Centrify Zero Trust Privilege helps customers grant least privilege access based on verifying who is requesting access, the context of the request, and the risk of the access environment.
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-ready Zero Trust Privilege to secure modern enterprise use cases. Zero Trust Privilege mandates a never tr...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management.
Open source identity & access governance product, featuring web & enterprise single sign on, privileged account management....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats.
Available as a virtual appliance, it enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats.
Available as a virtual appliance, it enables privileged access credential auditing and privilege user activity monitoring to prevent insider threats....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Identity governance and administration across cloud and enterprise infrastructures. Intelligent Identity. Smarter Security.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure.
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure.
Enables privileged account credentials management and privileged user activity monitoring across your entire IT infrastructure....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Secure access to elevated privileges, including administrator accounts and security groups.
Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. PAM secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups.
Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management.
Modular privileged account security solution that automates privileged sessions monitoring, SSH keys and password management....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
SecureONE is a privileged access management solution that is agent-less, vault-less, and based on a Zero-Standing Privilege model.
SecureONE is a privileged access management solution that is agent-less, vault-less, and based on a Zero-Standing Privilege model. We specifically do three things: (1) Privilege Inventory, (2) Rapid Access Revocation to stop lateral movement and (3) just-in-time administration (JITA)
SecureONE is a privileged access management solution that is agent-less, vault-less, and based on a Zero-Standing Privilege model. We specifically do three things: (1) Privilege Inventory, (2) Rapid Ac...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises.
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises.
Krontech's Single Connect platform secures, simplifies, and strengthens the management of privileged accounts for enterprises....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Secure access to apps with handsfree, passwordless authentication that makes users happy, unburdens IT staff & drives digital growth.
The IntelliTrust cloud authentication service secures access to devices, applications and resources with an analyst top-rated solution that has been proven across critical banking, government and healthcare infrastructures for more than 25 years. Point-and-click provisioning and out-of-the-box integrations with a variety of on-premises and cloud applications make the IntelliTrust cloud authentication service easy to deploy, so you can be up and running in under 30 minutes.
The IntelliTrust cloud authentication service secures access to devices, applications and resources with an analyst top-rated solution that has been proven across critical banking, government and healt...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data.
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data.
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Identity and provisioning management solution for users rights administration and authorization management.
Identity and provisioning management solution for users rights administration and authorization management.
Identity and provisioning management solution for users rights administration and authorization management....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Fastpath Assure connects your ERP/HCM/CRM to assist in access security, segregation of duties, audit trails, and audit reporting.
Fastpath is a software suite connecting to ERP, HCM or CRM to assist in governance, risk management, and compliance. Modules for Access Reviews, Segregation of Duties, Audit Trails, and Identity Management handle many of the analysis, reporting, and mitigation processes needed for regulatory and security requirements. With pre-developed integrations, Assure allows cohesive audit & security between multiple systems. It also has a universal product integration for additional in-scope applications.
Fastpath is a software suite connecting to ERP, HCM or CRM to assist in governance, risk management, and compliance. Modules for Access Reviews, Segregation of Duties, Audit Trails, and Identity Manage...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Akku

Akku

(0 reviews)
Akku is an Identity and Access Management (IAM) solution that provides enterprises with complete control over data access and privacy
Akku provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also comes with a 24x7 dedicated support service to provide hands-on deployment support as well as operational support through a dedicated team of professionals. With this service, Akku makes it easy for integrating legacy on-premise applications with a companys cloud environment.
Akku provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also comes with a 24x7 dedicate...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
ERP Maestro makes managing access risk, compliance, and security in SAP® environments incredibly easy.
ERP Maestro's award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and fraud and accelerating remediation. Its industry-leading segregation of duties (SoD) analysis is used by seven of the worlds top 10 audit firms and empowers organizations to establish effective GRC processes.
ERP Maestro's award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and f...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Web Access Management, Federated SSO & Externalized Authorization Management
Web Access Management, Federated SSO & Externalized Authorization Management
Web Access Management, Federated SSO & Externalized Authorization Management...
able

able

(0 reviews)
Able+ is a comprehensive cloud identity and access management (IAM) solution that also provides single sign-on (SSO).
Able+ is a comprehensive cloud identity and access management (IAM) solution that provides single sign-on (SSO) enabling organisations secure and managed access to applications in the cloud and behind the firewall. Delivers enterprise grade, granular management, reporting and automation of access and role permissions.
Able+ is a comprehensive cloud identity and access management (IAM) solution that provides single sign-on (SSO) enabling organisations secure and managed access to applications in the cloud and behind ...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Basic Bytes is a software vendor. We specialized in delivering easy-to-use software solutions for large-scale enterprises.
Basic Bytes is a group of Microsoft Certified Trainers and Microsoft Certified Solution Experts among a lot of other certifications - we do software development and consulting.
Basic Bytes is a group of Microsoft Certified Trainers and Microsoft Certified Solution Experts among a lot of other certifications - we do software development and consulting....
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control
Powertech Identity & Access Manager transforms multi-vendor Linux/UNIX server environments into one centrally managed security domain
Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organizations ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external critical system attacks before they start.
Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organizations ability to enforce...
  • Credential Management
  • User Activity Monitoring
  • Password Management
  • Granular Access Controls
  • Least Privilege
  • Application Access Control