Average Ratings 3 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity

Description

Data security often operates within isolated environments, yet sensitive information flows through various applications, platforms, storage systems, and devices, complicating the task of scaling security measures and maintaining uniform access controls. Machina offers a flexible and responsive authorization solution designed to tackle the complexities of modern data management. It empowers you to uphold your shared responsibility for securing both data at rest and in transit, whether in cloud settings or on-premises. You can monitor the handling and access of data while also auditing the enforcement of policies throughout your organization. By providing context-aware dynamic authorization for every access request, Machina ensures adherence to the principle of least privilege. It separates access logic from application code, facilitating policy enforcement across diverse environments. Consistent access policies can be implemented and enforced in real-time across various applications, repositories, workloads, and services. Furthermore, you will have the capability to monitor and analyze how data is managed and how policies are enforced within your enterprise, generating audit-ready evidence of compliance and enhancing your overall data governance strategies. This comprehensive approach not only strengthens security but also promotes greater transparency and accountability in data handling practices.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Accenture Cloud Trade Promotion Management
Active Directory
Amazon Web Services (AWS)
DigitalPersona
Google Cloud BigQuery
Google Cloud Platform
Hive Fabric
HyTrust
IBM Cloud
Kubernetes
LIAPP
Microsoft 365
Microsoft Azure
Palo Alto Networks AutoFocus
Splunk Cloud Platform
Swiftspeed
Titus Classification Suite
Twilio
Virtru
WonderPush

Integrations

Accenture Cloud Trade Promotion Management
Active Directory
Amazon Web Services (AWS)
DigitalPersona
Google Cloud BigQuery
Google Cloud Platform
Hive Fabric
HyTrust
IBM Cloud
Kubernetes
LIAPP
Microsoft 365
Microsoft Azure
Palo Alto Networks AutoFocus
Splunk Cloud Platform
Swiftspeed
Titus Classification Suite
Twilio
Virtru
WonderPush

Pricing Details

$3/user/month
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Untethered Labs, Inc.

Founded

2015

Country

United States

Website

www.gkaccess.com

Vendor Details

Company Name

Ionic

Founded

2012

Country

United States

Website

ionic.com

Product Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Password Management

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Product Features

Alternatives

Alternatives

GateKeeper Password Manager Reviews

GateKeeper Password Manager

Untethered Labs, Inc.
Aruba ClearPass Reviews

Aruba ClearPass

Aruba Networks
SecurePass Reviews

SecurePass

eMudhra
Allthenticator Reviews

Allthenticator

Allthenticate