|
87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
Description | Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. Read more | Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. Read more |
Pricing Options |
|
|
SW Score & Breakdown |
87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
SaaSworthy Awards | # 4 Fastest Growing | # 4 Highly Rated # 4 Most Popular |
Total Features |
9 Features
|
11 Features
|
Common Features for All |
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Passwordless Login
Role Management
Single Sign-On (SSO)
Social Sign On
User Activity Monitoring
|
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Passwordless Login
Role Management
Single Sign-On (SSO)
Social Sign On
User Activity Monitoring
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
User Rating |
|
|
Rating Distribution |
|
|
User Sentiments |
Not Available
|
Secure Password Management, Single Sign-On (SSO), Easy Implementation, Extensive Integrations Mobile App Issues, Limited Customization Options, Inadequate Reporting Features, Occasional Technical Glitches |
Review Summary |
Not Available
|
Reviewers praise Idaptive's user-friendliness, highlighting its intuitive interface and straightforward setup process. They also commend its robust security features, including multi-factor authentication and single sign-on, which enhance overall security posture. Additionally, reviewers appreciate Idaptive's seamless integration with existing IT infrastructure, enabling smooth deployment and centralized management. However, some users have expressed concerns regarding occasional performance issues and limited customization options. |
Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Keycloak Free |
Single Sign-on Others Multi-factor Authentication Others Lifecycle Management Others Mobile Devices Others Endpoint Management Others |
View Detailed Pricing
|
View Detailed Pricing
|
|
||
Screenshots |
![]()
+ 5 More
|
Not Available |
Videos | Not Available |
![]()
+ 2 More
|
Company Details | Located in: Raleigh, North Carolina | Located in: Santa Clara, California Founded in: 2018 |
Contact Details |
Not available |
Not available |
Social Media Handles |
|
|
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.