Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (3)
  • (3)
Deployment
  • (14)
  • (7)
  • (31)
  • (5)
  • (5)
Customer Types
  • (1)
  • (4)
  • (31)
  • (31)
  • (25)
Pricing Model
  • (12)
  • (4)
  • (1)
  • (6)
  • (28)
Integrated With
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 21 - 31 of 31 Products
ARCON PAM logo
Protect your data and privacy using an advanced security system 4.7 Based on 26 Ratings
View Details + Add to Compare

What is ARCON PAM and how does it work?

ARCON PAM is a privileged access management software that puts users’ data security and privacy protection on the top of its priority list. The software offers a host of fine-grained access control facilities for implementing a practice of privileged access on a ‘need-to-do basis’ and ‘need-to-know’ facility. An integrated feature like password vaulting, assures additional protection with an automatic and secured password changing process, besides randomizing privileged passwords in an instant. Users can use the software to mitigate risks and spot threats in real-time, securing their privileged access environment. With ARCON PAM, they can also allow one-time secure access to critical systems without sharing any privileged credentials. The platform offers appropriate assistance in reducing the surface of threats, by eliminating standing privileges to applications and systems. An in-built multi-factor authentication option empowers users to implement a powerful validation technology of their own, preventing unauthorized access. Furthermore, ACRON PAM offers access to audit trails, besides analytical tools and reports that help users improve their decision-making ability.

Read more Read less

ARCON PAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Foxpass logo
Get your network and servers managed in a simplified manner 4.9 Based on 64 Ratings
View Details + Add to Compare

What is Foxpass and how does it work?

Foxpass is a comprehensive Radius and LDAP system solution that helps companies bring the best practices to their infrastructure. The solution helps to enhance the organisation’s network and server security by allowing employees to get access to specific tools which are of utmost importance. Moreover, Foxpass also helps engineering teams to take advanced access control measures within minutes so that they can avoid costly security breaches and detrimental employee mistakes in no time. Its fully featured API is capable of controlling server access with high security in an automated manner, besides allowing users to change customer info, manage group memberships and much more. The cloud-hosted RADIUS and LDAP solution provided by Foxpass can be synced with Office365, Google and more to get full SSO on users’ WiFi, VPN and other devices. Moreover, companies also get to optimise real-time visibility into their preexisting infrastructure and automate threat detection and response time by logging the RADIUS and LDAP requests provided by Foxpass. Finally, it also ensures network wise safety and security by helping users apply dedicated passwords and self-service SSH keys.

Read more Read less

Foxpass Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
CyberArk PAS logo
Access Management and Security Software 4.6 Based on 54 Ratings
View Details + Add to Compare

What is CyberArk PAS and how does it work?

CyberArk’s Privileged Access Security solution is a tool that reduces users' security risk and helps them meet their compliance requirements in a hassle-free manner. This can be achieved without introducing additional operational complexity. Users can leverage a flexible architecture that can scale to the most demanding enterprise deployments and integrate seamlessly with their existing security, operations, and DevOps tools. Users can also enforce role-based access controls and ensure their users have to 'check out' credentials, generate detailed and full reporting and demonstrate compliance with an audit trail. It lets users discover and manage privileged credentials and accounts. They can also record and monitor privileged sessions and remediate risky activities, whether on-premises, cloud, and hybrid environments. Users can enable the least privilege on both NIX and Windows servers and detect and mitigate domain controllers' threats. Users can control, manage, and audit non-human privileged access for applications, including commercial off-the-shelf and applications developed using DevOps tools.

Read more Read less

CyberArk PAS Pricing

  • Free Trial Not Available

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Xton Access Manager logo
Privileged Access Management 5 Based on 1 Ratings
View Details + Add to Compare

What is Xton Access Manager and how does it work?

XTON Access Manager helps you maintain much-needed control and security of your privileged accounts and systems. Create secure, interactive remote sessions within your standard web browser to a remote server, network device, or website without disclosing the passwords to your employees or contractors. Maintain local endpoint privileges without deploying agents across your enterprise. Using your favorite web browser (desktop or mobile), have complete insight into who, what and where your accounts and systems are being accessed to conform to today’s rules and regulations.

Read more Read less

Xton Access Manager Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
WoTT logo
Security audit of Linux systems for restricting unauthorized access Write a Review
View Details + Add to Compare

What is WoTT and how does it work?

WoTT is a development tool which is used by IT professionals. It helps them to scan documents automatically while managing firewalls. It is also useful to establish a mutual transport security layer between clients and servers. There are many other operations which can be done with the help of this software. After audit, the software sends documentation through Slack or GitHub. Encryption of data via public key ensures the rotation of private key or the decryption of those data, thereby ensuring end-to-end security. Besides GitHub and Slack integrations, the software is integrated with Cloud Agnostics, providing users with unlimited cloud computing capability and storage. It provides open-source coding, letting public access, modification and enhancement of codes. It lets the DevOps developers ensure security at the very beginning rather than at the audit level, which helps provide a comprehensive protection cover at a minimal cost. Perimeter security is a notable feature that provides encryption of data as networks are generally impenetrable.

Read more Read less

WoTT Pricing

  • Free Trial Not Available
  • Starts at $9.00. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Omada CIAM logo
Seamless access to digitized services 4 Based on 4 Ratings
View Details + Add to Compare

What is Omada CIAM and how does it work?

Omada identity cloud is a leading SaaS identity governance and administration solution on the market providing comprehensive IGA capabilities.With Omada you get full-featured IGA. You get granular, automated, and intelligent controls for the enforcement of rules and policies. Provides modern access automation, reconciliation, and reporting capabilities to ensure that you have full oversight of access rights at all times.Omada can configure without code, IT systems, or cloud application uses the template-based approach. Provides the best framework for solution design and deployment and reduces customer risk. Some included services are a scalable cloud environment that is included for integration, staging, and production; continuous performance monitoring and enhancement- flexible upgrade windows that fit your business needs; high-availability services and continuity management and also has disaster recovery and backup.Comprehensive and responsive support is guaranteed within a maximum of 1 hour. You get access to the Omada service desk, online community, and knowledge-sharing HUB.The platform has a dedicated customer success team and standardized packages for improved time-to-value.

Read more Read less

Omada CIAM Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Thycotic Password Reset Server logo
A Reset Tool for Passwords 5 Based on 1 Ratings
View Details + Add to Compare

What is Thycotic Password Reset Server and how does it work?

Thycotic Password Reset Server software is a self-service tool to reset passwords in minutes. Manage employees enrollment and can validate user authenticity with phone verification via call or SMS. The software offers a secure identity verification tool for resetting passwords with Automate Active Directory password resets and AD account unlocks. IT Organizations, Medium and Large companies make use of the software.

Read more Read less

Thycotic Password Reset Server Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
ManageEngine Application Control Plus logo
A virtual checkpoint for all your applications Write a Review
Visit Website + Add to Compare

What is ManageEngine Application Control Plus and how does it work?

Application Control Plus automates the generation and maintenance of application whitelists and blacklists based on the specified control rules. With built-in sophisticated Endpoint Privilege Management, Application Control Plus is a comprehensive solution tailored to fit the application control needs of every growing enterprise. Ensure complete endpoint security by creating whitelists of applications that you trust, and keep all the unknowns at a safe distance from your network. Enhance productivity without compromising on security by prohibiting applications like games and instant messaging.

Read more Read less

ManageEngine Application Control Plus Pricing

  • Free Trial Available
  • Starts at $995.0. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
AWS Secrets Manager logo
Protect your company’s secrets with AWS Secrets Manager 4.6 Based on 34 Ratings
View Details + Add to Compare

What is AWS Secrets Manager and how does it work?

AWS Secrets Manager is a comprehensive data protection solution that helps companies to safeguard the data required to get access to their applications, IT resources and other essential metrics. The service enables users to rotate, manage and retrieve their database credentials, API keys and other sensitive information in an efficient manner. Also, it uses encryption keys to encrypt data and store them in AWS Key Management Service (KMS). With AWS Secrets Manager, companies can rotate secrets on-demand or as per schedule by using an inbuilt Secrets Manager console, AWS CLI or AWS SDK. In addition, brands can even replicate essential information and store them in multiple regions in an automated way. Thus getting access to easy recovery after data loss. The solution also helps users with the monitoring and audit of their protected data through a variety of useful integrations made available to them. AWS Secrets Manager can also be used to manage information for workloads related to the Department of Defense.

Read more Read less

AWS Secrets Manager Pricing

  • Free Trial Available
  • Starts at $0.40.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Centrify Zero Trust Privilege logo
Boosts Privileged Access Management 4.6 Based on 37 Ratings
View Details + Add to Compare

What is Centrify Zero Trust Privilege and how does it work?

Centrify Zero Trust Privilege respecifies the legacy of Privileged Access Management for modern-day enterprise IT infrastructure. It serves various industries including energy & utilities, banking, financial services, government, education and healthcare. Centrify Zero Trust Privilege minimises the attack surface, improves audit and compliance visibility as well as reduces risk, complexity and costs for modern or hybrid enterprises. It is designed to tackle requesters that are not only human but also machines, APIs and services. Furthermore, it integrates and interoperates with a much broader ecosystem including IaaS providers like Azure, AWS and with DevOps CI/CD pipelines tools like Ansible and HashiCorp. Centrify Zero Trust Privilege helps users to maintain a different population of identities across separate directories. It even establishes unique accounts for each administrator to use for the admin’s end-user identity, which is typically a publicly-known account with an email address. Furthermore, Centrify Zero Trust Privilege makes a sense of database administrator (DBA) and contextualises its requests.

Read more Read less

Centrify Zero Trust Privilege Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed