|
84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
View Details
|
78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more ![]()
View Details
|
Description | Zilla Security stands out as the ultimate platform for unified identity and access security, compliance, and provisioning. Seamlessly integrating with over 1,000 applications and infrastructure components, it ensures comprehensive monitoring of identities and permissions. Its robotic automation enables rapid integration with any application, often within minutes. Zilla Security simplifies the user access review process by automating decisions, preparation, remediation, audit evidence, and reporting. This policy-driven approach ensures job-appropriate access while enhancing security and lowering costs. By automating identity and security operations, Zilla Security effectively addresses identity exposure and eliminates threats, offering a robust solution for modern enterprises. Read more | Apono's automatic granular permissions are essential for keeping their business running smoothly and securely. With Cloud Just-In-Time Access, manual permission management tasks become a thing of the past, thanks to Apono Access Flows. These flows enable automated, contextual permissions with auto-expiring capabilities, ensuring no permissions are left behind. Tailor access duration and resources precisely to each task, granting specific access to namespaces or resources with comprehensive audit logs. This approach not only removes permission bottlenecks but also satisfies customer requirements and prevents human errors in production. Gain full access control and visibility over their Kubernetes clusters with on-demand, granular permissions to databases, buckets, repositories, and other resources all managed directly from Slack, Teams, or their CLI. Dynamic, context-based access control and automated reporting capabilities allow them to see who has access to what, how, and why across their entire infrastructure and applications. With Apono, access management becomes effortless, providing peace of mind and operational efficiency. Read more |
Pricing Options |
|
|
SW Score & Breakdown |
84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
78% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
Total Features |
7 Features
|
4 Features
|
Common Features for All |
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Role Management
User Activity Monitoring
|
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Role Management
User Activity Monitoring
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
API Support |
|
|
User Rating |
|
Not Available
|
Rating Distribution |
|
Not Available
|
Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Zilla Security Custom |
Starter Free Standard $49.00 $49.00 per user / month Premium Custom |
View Detailed Pricing
|
View Detailed Pricing
|
Screenshots |
![]()
+ 3 More
|
Not Available |
Videos | Not Available |
![]()
+ 2 More
|
Company Details | Located in: Boston, MA - 02011 Founded in: 2020 | Located in: Wilmington, Delaware |
Contact Details |
Not available |
Not available |
Social Media Handles |
|
|
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.