Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (3)
  • (4)
Deployment
  • (14)
  • (7)
  • (31)
  • (6)
  • (6)
Customer Types
  • (1)
  • (4)
  • (31)
  • (31)
  • (25)
Pricing Model
  • (12)
  • (4)
  • (1)
  • (7)
  • (27)
Integrated With
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 21 - 31 of 31 Products
Thycotic Secret Server logo
Privileged access management solution 4.5 Based on 134 Ratings
View Details + Add to Compare

What is Thycotic Secret Server and how does it work?

Thycotic Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. The software-as-a-service model lets you sign up and start right away. Total control over your end-to-end security systems and infrastructure. Discover Privileges Identify all service, application, administrator, and root accounts to curb sprawl and gain a full view of your privileged access.

Read more Read less

Thycotic Secret Server Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

84% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

PrivX logo
New Age Privileged Access Management Software 4.5 Based on 13 Ratings
View Details + Add to Compare

What is PrivX and how does it work?

PrivX is a cutting-edge PAM (Privileged Access Management) tool that delivers lean and easy-to-implement solutions. It helps to cut down the cost of vaulting and password lifecycle management by granting users a short-lived authentication. Deployment and maintenance efforts can economize as the use of the agents is being eliminated. Access management can be unified from a single UI and this helps in staying in sync with AD-systems and also generating reports of traffic quickly. The software helps in addressing the growing demands for cloud access. It discovers new hosts and automatically on-boards users while also off-boarding them from hosts that are no longer needed. Additionally, access can be granted and revoked automatically by syncing the software with the user’s existing ID management system. Core feature is the zero trust solution that simplifies complex access needs and also reduces the vulnerability of companies to breaches. It is also very easy to set up and scale as per the need.

Read more Read less

PrivX Pricing

  • Free Trial Not Available
  • Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    98%
  • Reviews
    66%
  • Momentum
    62%
  • Popularity
    63%

User Sentiment

Not Enough Reviews!

Write a Review
View Details
ARCON PAM logo
Protect your data and privacy using an advanced security system 4.7 Based on 26 Ratings
View Details + Add to Compare

What is ARCON PAM and how does it work?

ARCON PAM is a privileged access management software that puts users’ data security and privacy protection on the top of its priority list. The software offers a host of fine-grained access control facilities for implementing a practice of privileged access on a ‘need-to-do basis’ and ‘need-to-know’ facility. An integrated feature like password vaulting, assures additional protection with an automatic and secured password changing process, besides randomizing privileged passwords in an instant. Users can use the software to mitigate risks and spot threats in real-time, securing their privileged access environment. With ARCON PAM, they can also allow one-time secure access to critical systems without sharing any privileged credentials. The platform offers appropriate assistance in reducing the surface of threats, by eliminating standing privileges to applications and systems. An in-built multi-factor authentication option empowers users to implement a powerful validation technology of their own, preventing unauthorized access. Furthermore, ACRON PAM offers access to audit trails, besides analytical tools and reports that help users improve their decision-making ability.

Read more Read less

ARCON PAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Foxpass logo
Get your network and servers managed in a simplified manner 4.9 Based on 64 Ratings
View Details + Add to Compare

What is Foxpass and how does it work?

Foxpass is a comprehensive Radius and LDAP system solution that helps companies bring the best practices to their infrastructure. The solution helps to enhance the organisation’s network and server security by allowing employees to get access to specific tools which are of utmost importance. Moreover, Foxpass also helps engineering teams to take advanced access control measures within minutes so that they can avoid costly security breaches and detrimental employee mistakes in no time. Its fully featured API is capable of controlling server access with high security in an automated manner, besides allowing users to change customer info, manage group memberships and much more. The cloud-hosted RADIUS and LDAP solution provided by Foxpass can be synced with Office365, Google and more to get full SSO on users’ WiFi, VPN and other devices. Moreover, companies also get to optimise real-time visibility into their preexisting infrastructure and automate threat detection and response time by logging the RADIUS and LDAP requests provided by Foxpass. Finally, it also ensures network wise safety and security by helping users apply dedicated passwords and self-service SSH keys.

Read more Read less

Foxpass Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
WoTT logo
Security audit of Linux systems for restricting unauthorized access Write a Review
View Details + Add to Compare

What is WoTT and how does it work?

WoTT is a development tool which is used by IT professionals. It helps them to scan documents automatically while managing firewalls. It is also useful to establish a mutual transport security layer between clients and servers. There are many other operations which can be done with the help of this software. After audit, the software sends documentation through Slack or GitHub. Encryption of data via public key ensures the rotation of private key or the decryption of those data, thereby ensuring end-to-end security. Besides GitHub and Slack integrations, the software is integrated with Cloud Agnostics, providing users with unlimited cloud computing capability and storage. It provides open-source coding, letting public access, modification and enhancement of codes. It lets the DevOps developers ensure security at the very beginning rather than at the audit level, which helps provide a comprehensive protection cover at a minimal cost. Perimeter security is a notable feature that provides encryption of data as networks are generally impenetrable.

Read more Read less

WoTT Pricing

  • Free Trial Not Available
  • Starts at $9.00. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Omada CIAM logo
Seamless access to digitized services 4 Based on 4 Ratings
View Details + Add to Compare

What is Omada CIAM and how does it work?

Omada identity cloud is a leading SaaS identity governance and administration solution on the market providing comprehensive IGA capabilities.With Omada you get full-featured IGA. You get granular, automated, and intelligent controls for the enforcement of rules and policies. Provides modern access automation, reconciliation, and reporting capabilities to ensure that you have full oversight of access rights at all times.Omada can configure without code, IT systems, or cloud application uses the template-based approach. Provides the best framework for solution design and deployment and reduces customer risk. Some included services are a scalable cloud environment that is included for integration, staging, and production; continuous performance monitoring and enhancement- flexible upgrade windows that fit your business needs; high-availability services and continuity management and also has disaster recovery and backup.Comprehensive and responsive support is guaranteed within a maximum of 1 hour. You get access to the Omada service desk, online community, and knowledge-sharing HUB.The platform has a dedicated customer success team and standardized packages for improved time-to-value.

Read more Read less

Omada CIAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
ManageEngine Application Control Plus logo
A virtual checkpoint for all your applications Write a Review
Visit Website + Add to Compare

What is ManageEngine Application Control Plus and how does it work?

Application Control Plus automates the generation and maintenance of application whitelists and blacklists based on the specified control rules. With built-in sophisticated Endpoint Privilege Management, Application Control Plus is a comprehensive solution tailored to fit the application control needs of every growing enterprise. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all the unknowns at a safe distance from your network. Enhance productivity without compromising on security by prohibiting applications like games and instant messaging.

Read more Read less

ManageEngine Application Control Plus Pricing

  • Free Trial Available
  • Starts at $995.0. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
Thycotic Password Reset Server logo
A Reset Tool for Passwords 5 Based on 1 Ratings
View Details + Add to Compare

What is Thycotic Password Reset Server and how does it work?

Thycotic Password Reset Server software is a self-service tool to reset passwords in minutes. Manage employees enrollment and can validate user authenticity with phone verification via call or SMS. The software offers a secure identity verification tool for resetting passwords with Automate Active Directory password resets and AD account unlocks. IT Organizations, Medium and Large companies make use of the software.

Read more Read less

Thycotic Password Reset Server Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
AWS Secrets Manager logo
Protect your company’s secrets with AWS Secrets Manager 4.6 Based on 34 Ratings
View Details + Add to Compare

What is AWS Secrets Manager and how does it work?

AWS Secrets Manager is a comprehensive data protection solution that helps companies to safeguard the data required to get access to their applications, IT resources and other essential metrics. The service enables users to rotate, manage and retrieve their database credentials, API keys and other sensitive information in an efficient manner. Also, it uses encryption keys to encrypt data and store them in AWS Key Management Service (KMS). With AWS Secrets Manager, companies can rotate secrets on-demand or as per schedule by using an inbuilt Secrets Manager console, AWS CLI or AWS SDK. In addition, brands can even replicate essential information and store them in multiple regions in an automated way. Thus getting access to easy recovery after data loss. The solution also helps users with the monitoring and audit of their protected data through a variety of useful integrations made available to them. AWS Secrets Manager can also be used to manage information for workloads related to the Department of Defense.

Read more Read less

AWS Secrets Manager Pricing

  • Free Trial Available
  • Starts at $0.40.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Centrify Zero Trust Privilege logo
Boosts Privileged Access Management 4.6 Based on 37 Ratings
View Details + Add to Compare

What is Centrify Zero Trust Privilege and how does it work?

Centrify Zero Trust Privilege respecifies the legacy of Privileged Access Management for modern-day enterprise IT infrastructure. It serves various industries including energy & utilities, banking, financial services, government, education and healthcare. Centrify Zero Trust Privilege minimises the attack surface, improves audit and compliance visibility as well as reduces risk, complexity and costs for modern or hybrid enterprises. It is designed to tackle requesters that are not only human but also machines, APIs and services. Furthermore, it integrates and interoperates with a much broader ecosystem including IaaS providers like Azure, AWS and with DevOps CI/CD pipelines tools like Ansible and HashiCorp. Centrify Zero Trust Privilege helps users to maintain a different population of identities across separate directories. It even establishes unique accounts for each administrator to use for the admin’s end-user identity, which is typically a publicly-known account with an email address. Furthermore, Centrify Zero Trust Privilege makes a sense of database administrator (DBA) and contextualises its requests.

Read more Read less

Centrify Zero Trust Privilege Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed