Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CyberArk Secure Cloud Access offers a comprehensive solution to safeguard identities and access within multi-cloud environments such as AWS, Azure, and Google Cloud. It enables security teams to enforce granular, just-in-time access controls that eliminate standing privileges and reduce the risk of unauthorized access. The platform features automated approval workflows integrated with existing service desk and ChatOps tools to streamline access management. With a native user experience and centralized policy control, CyberArk Secure Cloud Access empowers cloud users to work efficiently while ensuring robust security and compliance.

Description

At Kaspersky Lab, we operate under a core philosophy that emphasizes a crucial yet straightforward idea: cybersecurity is essential for ensuring the sustainability of businesses while safeguarding their growth and digital transformation. We view security as an integral partner to infrastructure instead of merely an obstacle, and we incorporate this belief into all our engineering endeavors. Our Hybrid Cloud Security solution offers exceptional multi-layered protection tailored for multi-cloud environments. No matter where you manage and store vital business information—whether in private or public clouds, or a combination of both—we provide a well-balanced approach that combines agile, continuous security with remarkable efficiency, defending your data against both current and future sophisticated threats without hindering system performance. Our solution guarantees robust security for virtual and physical servers, VDI setups, storage systems, and even data channels within your private cloud, ensuring comprehensive protection across all platforms. This commitment to security reflects our dedication to fostering a resilient digital landscape for businesses.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon EKS
Amazon Web Services (AWS)
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Indent
JDisc Discovery
Microsoft 365
Microsoft Azure
Proofpoint Digital Risk Protection
RadiantOne
SAP Cloud Platform
ServiceNow
Tenable One
UiPath
VMware Cloud
VMware Tanzu
Waybook
Workday Extend

Integrations

Amazon EKS
Amazon Web Services (AWS)
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Indent
JDisc Discovery
Microsoft 365
Microsoft Azure
Proofpoint Digital Risk Protection
RadiantOne
SAP Cloud Platform
ServiceNow
Tenable One
UiPath
VMware Cloud
VMware Tanzu
Waybook
Workday Extend

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

CyberArk

Founded

1999

Country

United States

Website

www.cyberark.com/products/secure-cloud-access/

Vendor Details

Company Name

Kaspersky

Founded

1997

Country

Russia

Website

usa.kaspersky.com/enterprise-security/cloud-security

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Alternatives

Alternatives

RadiantOne Reviews

RadiantOne

Radiant Logic
Check Point CloudGuard Reviews

Check Point CloudGuard

Check Point Software Technologies