Best IT Security Software for Delinea Cloud Access Controller - Page 2

Find and compare the best IT Security software for Delinea Cloud Access Controller in 2026

Use the comparison tool below to compare the top IT Security software for Delinea Cloud Access Controller on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 2
    ESET Cyber Security Reviews
    Experience robust and efficient security that operates seamlessly without causing any slowdowns, defending against various forms of malware. It provides protection for Mac, Windows, and Linux systems, shielding you from a variety of threats such as viruses, ransomware, worms, and spyware. You can take full advantage of your computer's capabilities, whether playing, working, or browsing the web, all without interruptions. Our security solution is user-friendly, making installation, renewal, and upgrades a breeze while ensuring routine tasks are easily managed. We appreciate your loyalty, and renewing your ESET subscription takes just a few clicks, allowing you to use your current license key for activation effortlessly. Additionally, you can modify your subscription preferences and eStore account details with ease. ESET offers proven multilayered protection against ransomware and other malware, trusted by over 110 million users globally. Enjoy gaming sessions free from annoying pop-ups, and benefit from battery-saving mode to stay connected longer. Your online safety and smooth computing experience are our top priorities.
  • 3
    InsightCloudSec Reviews

    InsightCloudSec

    Rapid7

    $66,000 per year
    As you revolutionize your business, we ensure your cloud services remain protected. InsightCloudSec empowers you to foster innovation while maintaining ongoing security and compliance. By providing unified visibility and monitoring, along with real-time automated remediation, you can achieve continuous security and prevent misconfigurations. Our platform secures configurations and workloads through automated cloud security and vulnerability management tailored for dynamic cloud environments. You can effectively manage identities and access across transient resources at scale. InsightCloudSec serves as a comprehensive cloud-native security platform, offering all the essential tools for cloud security in one solution. In today's world, the concern for consumer privacy is more pressing than ever, influencing a variety of protective measures, including regulations such as the California Consumer Privacy Act and the General Data Protection Regulation, which highlight the need for robust privacy protections. This growing emphasis on safeguarding personal data reflects the increasing awareness of its significance in our society.
  • 4
    Omada Identity Suite Reviews
    Omada, a leading IGA provider, offers Omada Identity Cloud, a cloud-native SaaS platform that secures digital identities in complex environments. This AI-powered solution automates identity management and leverages advanced analytics to suggest optimal role structures, boosting efficiency and security. Omada Identity Cloud scales seamlessly and integrates effortlessly with other cloud services. Its API-first design facilitates easy connection to existing IT infrastructure and third-party applications. Additionally, the platform employs risk-based access governance with real-time predictive analytics to mitigate access risks. Omada offers configurable workflows that align with an organization's policies. It simplifies compliance management with pre-built reports and continuous monitoring ensures adherence to regulations. With Omada, organizations can effectively manage modern identity challenges, ensuring the right people have the right access to the right resources at the right time.
  • 5
    Rapid7 Incident Command Reviews
    Rapid7 Incident Command is a cloud-native, AI-powered SIEM built to replace legacy security monitoring tools. It unifies attack surface visibility, telemetry, and risk context to give security teams a clear, real-time understanding of threats. Incident Command applies advanced behavioral analytics and AI-driven triage to reduce false positives and prioritize critical incidents. The platform enriches alerts with vulnerability data, exposure scoring, and threat intelligence so analysts know exactly what to address first. Natural language search enables rapid investigation across massive volumes of security data. Incident Command correlates activity across users, endpoints, applications, and networks to reveal full attack paths. Automated SOAR workflows allow teams to isolate systems, revoke credentials, and contain threats quickly. Integrated digital forensics and incident response capabilities support deeper investigations. The platform is designed to scale across complex hybrid environments. Rapid7 Incident Command helps SOC teams detect faster, respond smarter, and operate more efficiently.
  • 6
    TeleSign Reviews
    Provide prompt and tailored communication through international SMS/RCS and voice cloud services. Enhance your customer insights with actionable intelligence derived from global phone numbers and subscriber data. Utilize TeleSign’s Messaging API to code once and effectively reach your audience at scale, leveraging seamless delivery across various channels. The TeleSign Messaging API supports SMS, RCS, and WhatsApp, empowering you to create secure digital interactions that engage customers globally. By integrating a unified Messaging API, you can begin dispatching dependable and secure messages via SMS, RCS, and WhatsApp to your clientele today. Opt for one, two, or all three channels to diversify your programmable messaging approach and broaden your reach. With over 120 optimized points-of-presence and more than 700 direct-to-carrier routes, connect with an even larger customer base effortlessly. This expanded network ensures your messages are delivered efficiently and effectively.
  • 7
    TWOSENSE.AI Reviews
    Swiftly identify unauthorized users and gain deeper insights into the top risks facing your organization, such as password reuse, credential sharing, and the use of unmanaged devices, with our interactive dashboard. By integrating with your SIEM, all alerts are conveniently centralized. TWOSENSE provides seamless user authentication throughout their session while automatically addressing 95% of MFA challenges, significantly alleviating MFA-related frustrations. Analyze the impact of security fatigue on your organization’s efficiency. Our software supports SSO and is compatible with SAML and RADIUS, allowing you to leverage your current login systems and implement it on the same day. Utilizing behavioral validation for employees or customers enhances security beyond traditional usernames and passwords; for years, the Defense Department has been exploring more secure methods of employee identification to improve upon the outdated ID cards in use since 2000, highlighting the importance of evolving security practices. This innovation reflects a growing trend toward adopting more advanced identification solutions across various sectors.
  • 8
    Qualys WAS Reviews
    A powerful cloud-based solution enables ongoing discovery and identification of vulnerabilities and misconfigurations in web applications. Designed entirely for the cloud, it offers straightforward deployment and management while accommodating millions of assets with ease. The Web Application Scanner (WAS) systematically locates and records all web applications within your network, including those that are new or previously unidentified, and can scale from just a few applications to thousands. Utilizing Qualys WAS, you have the ability to assign your own labels to applications, allowing for customized reporting and restricted access to scanning results. WAS employs dynamic deep scanning to thoroughly assess all applications within your perimeter, internal environment, active development stages, and APIs that serve mobile devices. Furthermore, it extends its coverage to public cloud instances, providing immediate insight into vulnerabilities such as SQL injection and cross-site scripting. The system supports authenticated, intricate, and progressive scanning methods. In addition, it incorporates programmatic scanning capabilities for SOAP and REST API services, effectively evaluating IoT services and the APIs utilized by contemporary mobile architectures, thereby enhancing your overall security posture. This comprehensive approach ensures that all aspects of your web applications are monitored and protected continuously.
  • 9
    AuthPoint Reviews
    Our distinctive multi-factor authentication (MFA) system not only minimizes the chances of network outages and data breaches due to lost or compromised credentials, but it also provides this crucial functionality entirely from the Cloud, ensuring effortless setup and management. AuthPoint transcends conventional 2-Factor Authentication (2FA) by exploring creative methods to reliably verify users, and our extensive network of third-party integrations enables you to implement MFA for safeguarding access. In essence, WatchGuard AuthPoint presents an optimal solution at a pivotal moment, making MFA attainable for businesses that urgently require it to thwart potential attacks. The system incorporates a push notification, QR code, or one-time password (OTP) as an extra verification step to confirm your identity, while our mobile device DNA technology aligns with the authorized user's phone when granting access to various systems and applications. Consequently, any malicious actor attempting to replicate a user's device in order to infiltrate a secured system would face an insurmountable barrier. This comprehensive approach not only secures sensitive information but also enhances overall organizational security protocols.
  • 10
    Cybrary Reviews

    Cybrary

    Cybrary

    $19 per month
    Engaging in practical experiences is essential for acquiring skills applicable in real-world scenarios. We offer structured career pathways and targeted learning based on specific roles. Our industry-recognized certification programs come with practice examinations to enhance preparation. Additionally, we provide access to dedicated mentors and opportunities for professional networking. Cybrary stands out as the fastest-growing and most dynamic catalog within the sector. Collaborating with a distinguished network of instructors, industry experts, and innovative learning providers allows us to offer relevant, high-caliber content that can be accessed anytime and from anywhere. Through immersive hands-on learning experiences, we ensure that learners have the most effective and captivating method to grasp essential concepts and skills for success. We have developed and compiled an extensive library of over 1,000 secure, browser-based virtual labs, practice tests, and assessments across various fields, including cybersecurity, IT, cloud technologies, and data science. With our courses and resources tied directly to the learning objectives of in-demand industry certifications, we empower learners to effectively prepare and achieve their career goals. This comprehensive approach enables individuals to stay ahead in an ever-evolving job market.
  • 11
    Syslog-ng Reviews
    Syslog-ng serves as a dependable, scalable, and secure solution for central log management. IT departments can utilize syslog-ng to gather and consolidate log information related to user behaviors, performance indicators, network activity, and other pertinent data. This functionality aids in eliminating data silos, enabling teams to achieve comprehensive visibility across their log information. Among its features, syslog-ng provides secure data transfer and storage, a scalable infrastructure, adaptable log routing capabilities, and real-time data transformation. Additionally, the platform is offered in both open-source and enterprise versions, catering to a variety of organizational needs. This versatility ensures that teams can select the edition that best aligns with their operational requirements.
  • 12
    Oracle Identity Management Reviews
    Oracle Identity Management empowers organizations to efficiently oversee the complete lifecycle of user identities across all enterprise resources, extending beyond the firewall and into cloud environments. This comprehensive platform provides scalable solutions for identity governance, access management, and directory services. By implementing this contemporary system, organizations can enhance security, streamline compliance processes, and seize business opportunities related to mobile and social access. As part of the Oracle Fusion Middleware suite, Oracle Identity Management contributes to increased agility, improved decision-making, and lowered costs and risks in various IT landscapes today. Furthermore, we are excited to introduce a groundbreaking, fully integrated service that encompasses all essential identity and access management functions via a multi-tenant Cloud platform, known as Oracle Identity Cloud Service, which further elevates the user experience and operational efficiency.
  • 13
    Cisco Secure Cloud Analytics Reviews
    Comprehensive threat detection integrates seamlessly between on-premises and cloud settings. It identifies early warning signs of compromises, whether they stem from insider threats, malware, policy breaches, misconfigured cloud resources, or user misconduct. By gathering diverse network telemetry and log data, it raises alerts upon detecting unusual behaviors or potential malicious activities, enabling swift investigations. This SaaS-based solution for network and cloud security is designed for effortless acquisition and usability, requiring no additional hardware purchases, software agent installations, or specialized knowledge. Moreover, it enhances your ability to monitor and identify threats across both your cloud and on-premises environments through a unified interface, simplifying threat management and response. Ultimately, this integrated approach fosters stronger security postures and operational efficiency.
  • 14
    SecureLink Reviews
    SecureLink is the market leader in vendor privileged access management and remote support for highly regulated enterprises and technology vendors. SecureLink is used by more than 30,000 organizations around the world. SecureLink's purpose-built platform is trusted by top-notch companies in many industries, including legal, gaming, healthcare, financial services and retail. SecureLink is headquartered at Austin, Texas.
  • 15
    Symantec Advanced Authentication Reviews
    Enhance security and drive growth through Symantec's Advanced Authentication solutions. Our technology offers real-time safeguarding for both online and mobile platforms. With our innovative approach, we can seamlessly verify the identity of employees, partners, or contractors while ensuring a smooth login process. This capability allows legitimate users to access their accounts anytime and anywhere, fostering trust and loyalty to your brand. Enjoy a versatile and scalable system that incorporates robust multi-factor authentication alongside risk-based techniques such as device recognition, geolocation, and monitoring of user actions. As catastrophic cyber incidents occur daily, we equip you to protect your organization effectively. By delivering an effortless and intuitive experience for your customers, you can cultivate their trust and commitment. Furthermore, leveraging accurate data empowers you to better differentiate between genuine interactions and fraudulent activities, bolstering your overall security measures.
  • 16
    SonicWall Email Security Reviews
    Safeguard your organization from sophisticated email threats by utilizing a cloud email security service, as email remains the primary infiltration method for cybercriminals. Implementing a cloud-based solution is essential for defending against advanced threats, including targeted phishing schemes, ransomware, business email compromise (BEC), and various forms of email fraud. SonicWall's offerings simplify the administrative process with straightforward deployment, management, and reporting features. As the landscape of distributed IT continues to grow, it creates a multitude of vulnerabilities that cunning cybercriminals can exploit. For organizations in need of a specific on-premises solution, SonicWall Email Security provides a versatile option, available as a hardened physical appliance, a powerful virtual appliance, or a software application. This multi-layered approach ensures comprehensive protection for both inbound and outbound emails, effectively countering advanced threats such as ransomware. Consequently, investing in such robust email security measures is crucial for maintaining the integrity and safety of your organization's communication.
  • 17
    SonicWall Next Generation Firewall Reviews
    Advanced threat protection is essential for organizations ranging from small businesses to multinational corporations and cloud-based environments. Experience limitless network security tailored to your needs. SonicWall next-generation firewalls (NGFW) offer the necessary security, control, and visibility to help you uphold a robust cybersecurity framework, regardless of whether you operate from a small office or a vast cloud infrastructure. Each firewall is equipped with SonicWall's award-winning hardware and cutting-edge technology, ensuring you stay ahead of emerging threats. Designed for networks of various sizes, SonicWall firewalls cater to your unique security requirements while remaining budget-friendly, ensuring effective protection for your digital assets. Furthermore, the SonicWall NSv Series virtual firewall combines the protective features of a physical firewall with the advantages of virtualization, including enhanced scalability, rapid system deployment, straightforward management, and significant cost savings, making it an ideal solution for modern businesses. By leveraging these advanced technologies, organizations can confidently navigate the complexities of today’s cyber landscape.
  • 18
    Tenable One Reviews
    Tenable One offers a groundbreaking solution that consolidates security visibility, insights, and actions across the entire attack surface, empowering contemporary organizations to identify and eliminate critical cyber risks spanning IT infrastructure, cloud systems, essential infrastructure, and beyond. It stands as the only AI-driven platform for managing exposures in the market today. With Tenable's advanced vulnerability management sensors, you can gain a comprehensive view of every asset within your attack surface, including cloud systems, operational technologies, infrastructure, containers, remote employees, and modern web applications. By analyzing over 20 trillion components related to threats, vulnerabilities, misconfigurations, and asset data, Tenable’s machine-learning capabilities streamline remediation efforts by allowing you to prioritize the most significant risks first. This focused approach fosters necessary enhancements to minimize the likelihood of serious cyber incidents while providing clear and objective assessments of risk levels. In this rapidly evolving digital landscape, having such precise visibility and predictive power is essential for safeguarding organizational assets.
  • 19
    Yubico YubiKey Reviews
    Secure your digital environment with YubiKey, ensuring that account takeovers are thwarted while embracing a password-free future and enhancing your multifactor authentication approach. As the top security key in the industry, it offers unparalleled security, an excellent user experience, and a great return on investment. Tailored for both personal and professional applications, the YubiKey is available in various designs and features to meet diverse needs. To help you select the most suitable option, take our quick Product Finder Quiz. Compatible with numerous services and software, the YubiKey simplifies your online security process. Whether for individual or corporate use, we provide support to help you get started with ease. By facilitating robust two-factor, multi-factor, and passwordless authentication, the YubiKey ensures that accessing your computers, networks, and online platforms is as effortless as a simple touch. Forget the hassle of fumbling for your phone or repeatedly entering passcodes; just insert your YubiKey, tap it, and let it handle the rest seamlessly. With its versatility and reliability, the YubiKey is an essential tool for anyone looking to enhance their digital security.
  • 20
    Auditor for z/OS Reviews
    Broadcom Auditor for z/OS is an advanced mainframe security and compliance platform created to help enterprises manage cybersecurity risks across z/OS environments. The software automates the auditing process, allowing IT teams to quickly analyze operating system configurations, hardware components, and software settings. It identifies vulnerabilities and integrity exposures that may result from incorrect implementations, routine maintenance, or system customization changes. The platform delivers clear visibility into potential areas of risk, helping organizations improve compliance efforts and strengthen operational security. Auditor for z/OS also includes file usage monitoring capabilities that support the protection and integrity of sensitive system resources. Businesses can use the solution to simplify complex audit tasks while gaining deeper insights into their mainframe security posture. Broadcom supports users with extensive training resources, documentation, and professional services to maximize the value of the platform. The software integrates into broader mainframe cybersecurity strategies, helping enterprises maintain secure and reliable infrastructure operations. With automated reviews and comprehensive reporting features, Auditor for z/OS enables organizations to proactively address security concerns before they become larger operational issues.
  • 21
    IBM Guardium Vulnerability Assessment Reviews
    IBM Guardium Vulnerability Assessment conducts scans of data infrastructures, including databases, data warehouses, and big data environments, to uncover vulnerabilities and recommend corrective measures. This solution effectively identifies risks like unpatched software, weak passwords, unauthorized modifications, and improperly configured access rights. Comprehensive reports are generated, along with actionable recommendations to mitigate all identified vulnerabilities. Additionally, Guardium Vulnerability Assessment uncovers behavioral issues, such as shared accounts, excessive administrative logins, and suspicious activities occurring outside of normal hours. It pinpoints potential threats and security weaknesses in databases that hackers may exploit. Furthermore, the tool assists in discovering and classifying sensitive data across diverse environments, while providing in-depth reports on user entitlements and risky configurations. It also streamlines compliance audits and manages exceptions automatically, enhancing overall security posture. By leveraging this solution, organizations can better safeguard their data assets against evolving threats.
  • 22
    HID IdenTrust Reviews
    Efficiently manage the entire lifecycle of certificates within your network, whether for on-premise or cloud-based Public Key Infrastructure (PKI) setups. Transition seamlessly from your current certificate authority through policy-driven automated processes for issuance, renewal, and revocation, effectively removing manual tasks and their associated mistakes. As enterprises increasingly depend on PKI to safeguard machines, devices, and user access via keys and digital certificates, HID IdenTrust, in collaboration with Keyfactor, provides a streamlined approach to PKI and large-scale automation of certificate lifecycle management. HID IdenTrust offers a managed PKI solution in the cloud that can issue public, private, and U.S. Government interoperable (FBCA) digital certificates, thereby enhancing the security of websites, network infrastructures, IoT devices, and workforce identities. Moreover, you can uncover all certificates throughout both network and cloud infrastructures with real-time inventories of public and private Certificate Authorities (CAs), along with distributed SSL/TLS discovery tools and direct linkages to key and certificate repositories, ensuring comprehensive visibility and management. This holistic approach not only improves security but also boosts operational efficiency across the organization.
  • 23
    SonicWall Cloud App Security Reviews
    SonicWall Cloud App Security provides cutting-edge protection for users and their data across various cloud applications, such as email, messaging, file sharing, and storage within Office 365 and G Suite. As organizations increasingly embrace Software as a Service (SaaS) solutions, SonicWall ensures top-tier security while maintaining an effortless user experience. This solution offers comprehensive visibility, robust data protection, and advanced defense against threats, along with ensuring compliance in cloud environments. It effectively combats targeted phishing attempts, impersonation schemes, and account takeover incidents in platforms like Office 365 and G Suite. By examining both real-time and historical data, organizations can pinpoint security breaches and vulnerabilities. Furthermore, SonicWall enhances user satisfaction through out-of-band traffic analysis enabled by APIs and log collection, ensuring a secure yet convenient cloud experience for all users.
MongoDB Logo MongoDB