Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CyberArk Secure Cloud Access offers a comprehensive solution to safeguard identities and access within multi-cloud environments such as AWS, Azure, and Google Cloud. It enables security teams to enforce granular, just-in-time access controls that eliminate standing privileges and reduce the risk of unauthorized access. The platform features automated approval workflows integrated with existing service desk and ChatOps tools to streamline access management. With a native user experience and centralized policy control, CyberArk Secure Cloud Access empowers cloud users to work efficiently while ensuring robust security and compliance.

Description

Ivanti User Workspace Manager provides a cohesive digital workspace that enhances desktop setup, streamlines migration processes, and secures user sessions across various environments including physical, virtual, and cloud-based systems. By utilizing a multi-threaded logon engine, it supersedes inefficient scripts and Group Policy configurations with context-aware personalization that ensures rapid logon experiences. Additionally, the on-demand profile management feature minimizes data bloat and prevents corruption by only loading essential information. The Application Control feature enforces dynamic lists of allowed and denied applications through pre-configured templates, ensuring that only verified executables can run, while the Privilege Management function allows specific applications to receive elevated permissions without revealing full administrative credentials. Furthermore, Roaming Office 365 caches boost performance during virtual sessions, and seamless help-desk integration facilitates self-service options for urgent privilege elevation or application access requests. The system's granular policies are designed to adjust based on factors such as time, location, device type, network conditions, and user context, ensuring a tailored user experience. Overall, this comprehensive solution not only enhances efficiency but also strengthens security across diverse working environments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon EKS
Amazon Web Services (AWS)
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Ivanti
JDisc Discovery
Microsoft 365
Microsoft Azure
Microsoft Office 2024
Proofpoint Digital Risk Protection
RadiantOne
SAP Cloud Platform
ServiceNow
UiPath
VMware Cloud
VMware Tanzu
Waybook
Workday Extend

Integrations

Amazon EKS
Amazon Web Services (AWS)
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Ivanti
JDisc Discovery
Microsoft 365
Microsoft Azure
Microsoft Office 2024
Proofpoint Digital Risk Protection
RadiantOne
SAP Cloud Platform
ServiceNow
UiPath
VMware Cloud
VMware Tanzu
Waybook
Workday Extend

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CyberArk

Founded

1999

Country

United States

Website

www.cyberark.com/products/secure-cloud-access/

Vendor Details

Company Name

Ivanti

Founded

2017

Country

United States

Website

www.ivanti.com/products/user-workspace-manager

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Product Features

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

Alternatives

Alternatives

RadiantOne Reviews

RadiantOne

Radiant Logic