Average Ratings 2 Ratings

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

RSA SecurID empowers organizations, regardless of their size, to effectively manage identity risks and ensure compliance while enhancing user productivity. The solution guarantees that users receive the necessary access and verifies their identities through a user-friendly and modern experience. Moreover, RSA SecurID offers comprehensive visibility and control over the diverse identity landscapes within organizations. By integrating multi-factor authentication with identity governance and lifecycle management, RSA SecurID tackles the security obstacles tied to providing seamless access for dynamic user groups in intricate environments. It assesses risk and situational context to deliver robust identity and access assurance. With the rise of digital transformation, organizations face unparalleled challenges in authentication, access management, and identity governance. Given that an increasing number of users require access to a wider range of systems through various devices, RSA SecurID is instrumental in helping organizations navigate these complexities and secure their identities effectively. Consequently, organizations can confidently embrace technological advancements while safeguarding their digital assets.

Description

SecureIdentity IAM effectively manages access control decisions related to applications and data repositories. By leveraging insights from the Universal Directory, it can dynamically determine which applications a user may access and the specific file servers or cloud storage they are permitted to use. This access control is enforced through a client present on the endpoints, which intercepts access requests for applications or data and evaluates them against established policies. If the requested action is permitted, the user experiences seamless access without any interruptions. Conversely, if access is denied, the system blocks the appropriate executable or DLL files from being executed, regardless of the method used to invoke them. Additionally, all actions are meticulously logged and sent to the platform's event database, creating a detailed forensic trail of user activity, which is essential for security audits and compliance. This comprehensive approach ensures both user convenience and stringent security measures are maintained throughout the access process.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Thunder ADC
Active Directory
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
FPS GOLD Banking Software
IBM Cloud
Intellicta
Keeper Security
Microsoft 365
Miro
Nexpose
Nexsure Insurance Platform
Omnissa Horizon 8
Oracle Identity Management
Orna
Securonix SOAR
ThreatQ

Integrations

A10 Thunder ADC
Active Directory
Barracuda SSL VPN
Cisco Adaptive Security Appliance (ASA)
FPS GOLD Banking Software
IBM Cloud
Intellicta
Keeper Security
Microsoft 365
Miro
Nexpose
Nexsure Insurance Platform
Omnissa Horizon 8
Oracle Identity Management
Orna
Securonix SOAR
ThreatQ

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

RSA Security

Founded

1982

Country

United States

Website

www.rsa.com/products/securid/

Vendor Details

Company Name

SecurEnvoy

Founded

2003

Country

United Kingdom

Website

www.securenvoy.com/en-gb/identity-and-access-management-iam-platform

Product Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Product Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Alternatives

Plurilock DEFEND Reviews

Plurilock DEFEND

Plurilock Security

Alternatives

Cisco Duo Reviews

Cisco Duo

Cisco
Auth0 Reviews

Auth0

Okta
IDM365 Reviews

IDM365

ITMC Soft
GateKeeper Enterprise Reviews

GateKeeper Enterprise

Untethered Labs, Inc.
Youzer Reviews

Youzer

YOUZER