Average Ratings 0 Ratings
Average Ratings 1 Rating
Description
Experience a developer-centric approach to production environments that enhances security without hindering productivity. Easily implement approval workflows for sensitive actions, keep a detailed log of activities, and connect identity providers to command line interfaces, ensuring your team remains engaged and efficient. Compatible with any command line tool, Cased seamlessly integrates into your existing processes, from MySQL to bespoke deployment scripts, without causing disruptions. Set up takes just moments, thanks to our lightweight, agentless solution that maintains the integrity of your CLI commands. Enjoy straightforward, customizable just-in-time approvals for both developer and staff tools, with options to approve requests via Slack, Microsoft Teams, and SMS, integrating seamlessly into your current toolkit. Cased is aware of your on-call schedule, allowing for automatic approvals that facilitate smooth on-call rotations. Visibility into actions begins with identity, enabling you to provision access to production environments through your identity provider and know exactly who is performing each action. Tailored to meet your needs, Cased lets you carry your dotfiles across all servers, enhancing your development experience. With Cased, you gain the confidence of robust security measures while empowering your team to work efficiently and effectively.
Description
Silverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Azure Marketplace
Blink
GitHub
Google Cloud Platform
Heroku
Microsoft Azure
Microsoft Teams
MySQL
Okta
Integrations
Amazon Web Services (AWS)
Azure Marketplace
Blink
GitHub
Google Cloud Platform
Heroku
Microsoft Azure
Microsoft Teams
MySQL
Okta
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cased
Founded
2020
Website
cased.com
Vendor Details
Company Name
Silverfort
Founded
2016
Country
Israel, US
Website
www.silverfort.com
Product Features
Application Development
Access Controls/Permissions
Code Assistance
Code Refactoring
Collaboration Tools
Compatibility Testing
Data Modeling
Debugging
Deployment Management
Graphical User Interface
Mobile Development
No-Code
Reporting/Analytics
Software Development
Source Control
Testing Management
Version Control
Web App Development
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
PCI Compliance
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring