Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Map your cloud identity attack surface and secure it against identity-based attacks. Push is an identity security platform for cloud-first businesses. Push uses a lightweight browser extension to give you real-time visibility of all your employees’ cloud identities and uncover vulnerabilities that can be exploited by identity-based attacks. - Get real-time visibility of all your employees' cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. Prevent your employees creating new identity vulnerabilities. - Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk. Push supports Google Chrome, Microsoft Edge, Firefox, Safari, Brave and Opera.

Description

Theom is an advanced cloud data security solution designed to uncover and safeguard all types of data found in cloud storage, APIs, and message queues. Much like a vigilant bodyguard dedicated to protecting valuable assets, Theom ensures that security measures are consistently applied to data, regardless of its storage or access method. By utilizing agentless scanning and natural language processing classifiers, Theom effectively identifies personally identifiable information (PII), protected health information (PHI), financial data, and trade secrets, while accommodating customized taxonomies. Additionally, it reveals dark data—information that remains unused—and shadow data, which has a different security posture compared to its primary version. Theom excels in locating sensitive information, such as developer keys, within APIs and message queues. To assist organizations in prioritizing threats, Theom also assesses the financial impact of data. Furthermore, it maps the intricate relationships between datasets, access identities, and their associated security features, thereby revealing potential vulnerabilities. By illustrating how valuable data is accessed by different identities, such as users and roles, Theom provides a comprehensive view of security attributes, including user location and unusual access patterns. This holistic approach empowers organizations to make informed decisions about their data security strategies.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon DynamoDB
Amazon Redshift
Apache Cassandra
Apache Kafka
Azure Blob Storage
Azure Synapse Analytics
Confluent
Databricks
Elastic Cloud
Envoy
Google Workspace
Kong Konnect
Microsoft Azure
Microsoft Teams
MongoDB
MySQL
NGINX
Oracle Cloud Infrastructure
RabbitMQ
Slack

Integrations

Amazon DynamoDB
Amazon Redshift
Apache Cassandra
Apache Kafka
Azure Blob Storage
Azure Synapse Analytics
Confluent
Databricks
Elastic Cloud
Envoy
Google Workspace
Kong Konnect
Microsoft Azure
Microsoft Teams
MongoDB
MySQL
NGINX
Oracle Cloud Infrastructure
RabbitMQ
Slack

Pricing Details

$5 per employee per month
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Push Security

Founded

2019

Country

United Kingdom

Website

pushsecurity.com

Vendor Details

Company Name

Theom

Country

United States

Website

www.theom.ai/product

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Alternatives

Alternatives

Silent Armor Reviews

Silent Armor

Silent Breach
SailPoint Reviews

SailPoint

SailPoint Technologies
Forum Sentry Reviews

Forum Sentry

Forum Systems
PingDataGovernance Reviews

PingDataGovernance

Ping Identity
BooleBox Reviews

BooleBox

Boole Server