Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Amazon Verified Permissions provides a comprehensive solution for managing authorization, leveraging the reliable Cedar policy language to enhance application security. This service enables developers to expedite the development process by allowing them to separate authorization from the core business logic, thereby streamlining policy management. Furthermore, it ensures that authorization practices align with Zero Trust principles, enhancing overall security. Security and audit teams benefit from improved capabilities to scrutinize and track access within applications effectively. By adhering to the principle of least privilege, developers can ensure that application resources are well-protected and user access is appropriately managed. In essence, Amazon Verified Permissions serves as a fully managed service for permissions management and fine-grained authorization, facilitating the creation of secure applications. With Cedar, a powerful and expressive open-source policy language, both developers and administrators can easily establish and manage policy-driven access controls to meet their application needs. This makes it easier to maintain compliance and security across various applications, allowing teams to focus on innovation while ensuring robust protections are in place.

Description

OpenText ZENworks Endpoint Security Management offers fine-grained policy-based control over your Windows desktops and mobile PCs, including the ability to change security configurations automatically based on a user’s role and location. ZENworks' central console allows users to create and manage policies, allowing them to implement and enforce highly adaptive, tightly controlled security policies, without putting any burden on the end user. ZENworks Endpoint Security Management features robust client selfdefense abilities that ensure security policies are not bypassed. It also has a full suite of monitoring tools, alerts, reporting and auditing. Bring comprehensive, centralized protection to your most vulnerable assets - the mobile PCs at your organization's edges.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
AWS AppSync
AWS Lambda
Amazon API Gateway
Atos OneCloud
Cedar
Cognizant
Microsoft 365
OpenText ZENworks Suite
Wipro Cloud Studio

Integrations

Amazon Web Services (AWS)
AWS AppSync
AWS Lambda
Amazon API Gateway
Atos OneCloud
Cedar
Cognizant
Microsoft 365
OpenText ZENworks Suite
Wipro Cloud Studio

Pricing Details

$0.00015 per request
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Amazon

Founded

1994

Country

United States

Website

aws.amazon.com/verified-permissions/

Vendor Details

Company Name

OpenText

Founded

1991

Country

Canada

Website

www.opentext.com/products/zenworks-endpoint-security-management

Product Features

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Cedar Reviews

Cedar

Amazon