Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Okta
Amazon Aurora
Amazon EC2
Amazon Redshift
Amazon Web Services (AWS)
Apple Mail
Figma
GitHub
Gmail
Google Kubernetes Engine (GKE)
Jira
Kixie PowerCall & SMS
Kubernetes
Linear
Opsgenie
PagerDuty
PostgreSQL
Salesforce
Tarsal
Workday Extend

Integrations

Okta
Amazon Aurora
Amazon EC2
Amazon Redshift
Amazon Web Services (AWS)
Apple Mail
Figma
GitHub
Gmail
Google Kubernetes Engine (GKE)
Jira
Kixie PowerCall & SMS
Kubernetes
Linear
Opsgenie
PagerDuty
PostgreSQL
Salesforce
Tarsal
Workday Extend

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Vendor Details

Company Name

Opal

Country

United States

Website

opal.dev/

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

stealthbits.com/stealthbits-privileged-activity-manager-pam-product/

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives