Best IT Security Software for inspace

Find and compare the best IT Security software for inspace in 2024

Use the comparison tool below to compare the top IT Security software for inspace on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Platform Reviews
    Top Pick

    Google Cloud Platform

    Google

    Free ($300 in free credits)
    55,132 Ratings
    See Software
    Learn More
    Google Cloud is an online service that lets you create everything from simple websites to complex apps for businesses of any size. Customers who are new to the system will receive $300 in credits for testing, deploying, and running workloads. Customers can use up to 25+ products free of charge. Use Google's core data analytics and machine learning. All enterprises can use it. It is secure and fully featured. Use big data to build better products and find answers faster. You can grow from prototypes to production and even to planet-scale without worrying about reliability, capacity or performance. Virtual machines with proven performance/price advantages, to a fully-managed app development platform. High performance, scalable, resilient object storage and databases. Google's private fibre network offers the latest software-defined networking solutions. Fully managed data warehousing and data exploration, Hadoop/Spark and messaging.
  • 2
    Cisco Meraki Reviews
    Network security is difficult. Current solutions are difficult to implement and complex. Cisco Meraki simplifies security! Influential brands trust Cisco Meraki around the globe. Meraki is trusted by organizations around the world to deliver reliable, premium experiences. Cisco Meraki devices can be centrally and safely managed in the cloud via a single web dashboard. Our feature-rich and intuitive architecture allows customers to save money, reduce operating expenses, and solve new problems. Easy-to-manage Wi-Fi that is fast and reliable. Protect and securely connect the things that matter most, no matter where you are. Performance and reliability uncompromising at the core of your network. Remote monitoring and identity based configuration of all your devices.
  • 3
    OneLogin Reviews
    OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
  • 4
    Mist Reviews
    Traditional enterprise wired and mobile solutions are more than 15 years old. They rely on monolithic code bases which are difficult to manage, expensive to scale and prone to bugs. They are not able to handle the complexity and scale of digital users today and they do not provide the reliability required for mission-critical wired or wireless operations. Mist changes all of this. Mist is a modern platform that delivers unprecedented scale, agility, and subscription services: Wi-Fi Assurance and Wired Assurance; AI-Driven Virtual Assistant; Premium Analytics, User Engagement, Asset Visibility; and Wi-Fi Assurance and Wired Assurance. Mist's inline AI engine provides unprecedented insight and automation. The enterprise-grade Access Points offer amazing wireless experiences at a low cost. Juniper EX Switches deliver new, mission-critical experiences.
  • 5
    Egnyte Reviews

    Egnyte

    Egnyte

    $10 per user per month
    6 Ratings
    Secure and manage all your content across distributed teams, devices and apps. Uncover new business insights, scale compliance and governance, reduce costs, and increase productivity. Right out of the box. Flexible deployment models, robust integration ecosystem, and open APIs to address the business needs of companies in diverse industries and regions, and at different levels of cloud adoption. Egnyte helps thousands of customers take their cloud office strategy into hyper-drive. Transform your approach to content governance, privacy, compliance, and workflow automation with a single, turnkey platform.
  • 6
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 7
    Rippling Reviews
    Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
  • 8
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 9
    Juniper Identity Management Service Reviews
    Access to corporate data should be a top priority. Access to corporate data can be abused by insiders who have direct access. User access must be controlled and enforced across all levels of the organization, including mobile and cloud, to ensure the safety of corporate resources. Juniper Identity Management Service improves enterprise security by authenticating and restricting user access. It is the first line of defense for protecting corporate assets and preventing corporate breaches. Employees are identified and assigned corporate roles which determine what data and applications they can access. Juniper Identity Management Service seamlessly integrates to SRX Series next generation firewalls. This allows security teams to match user roles and application activity to security policies. It can then generate detailed user-metrics as well as audit reports for detailed reporting.
  • 10
    OnSolve Reviews
    You can quickly and accurately identify and respond to threats that affect your people, property, and places. Every minute matters™. OnSolve puts importance on speed, relevance, and usability in order to help customers achieve the best outcome for critical events. Communicate faster with the right people, on any device. You can quickly activate crisis response plans and work together in real-time. To make informed and proactive decisions, filter out irrelevant data. To ensure appropriate action, create custom incident plans and assign task assignments. Use the risk intelligence dashboard to identify all active incidents at a glance. To improve response times, you can enhance the alert sending process. Mobile apps allow you to access business continuity plans from anywhere.
  • 11
    Delinea Cloud Suite Reviews
    User authentication to servers using any directory service such as Active Directory, LDAP and cloud directories like Okta can be simplified. With just-in-time privilege and enough privilege to minimize security breaches, enforce the principle of least privilege. Identify abuse of privilege and stop attacks. Quickly prove regulatory compliance by creating an audit trail and recording video. Delinea's cloud-based SaaS solution uses zero-trust principles to prevent privileged access abuse and lower security risks. You will enjoy elastic scalability, performance, and support for multi-VPCs, multiple-clouds, and multi-directory uses cases. Securely log in anywhere with a single enterprise identity. Flexible, just-in time model with privilege elevation Centrally manage security policies across users, machines, applications. All your business-critical and regulated systems should be consistent in applying MFA policies. You can monitor privileged sessions live and immediately terminate any suspicious sessions.
  • 12
    Everbridge Risk Center Reviews
    Risk Center is a risk monitoring tool that integrates risk intelligence technology with resources around all-hazards information gathering and analysis. This will enhance your ability to monitor, analyze and respond to risks. Risk Center's real-time alerting system streamlines your organization’s ability to monitor and analyze global incidents and events. It combines thousands of reliable data sources with an experienced team at the Risk Intelligence Monitoring Center. This will allow you to quickly respond to any risks that could threaten your organization, people, or supply chain. This configurable, comprehensive risk monitoring solution helps to reduce risk wherever your employees live, work, and travel. You can fulfill your Duty of Care obligations by providing real-time risk assessment as well as hyper-local data about the threat landscape where your employees live, travel, and work.
  • 13
    Microsoft Entra Identity Protection Reviews
    Identity Protection is based on the knowledge Microsoft has gained from its positions in the organization with Microsoft Entra ID and the consumer space with Microsoft Accounts as well as in gaming with Xbox. Microsoft analyzes trillions of signals every day to identify and protect its customers from threats. The signals generated and fed to Identity Protection can be fed into tools such as conditional access in order to make access decisions or fed back to an SIEM tool for further investigation. The risk signals may trigger remediation actions such as requiring multifactor authentication or requiring users to reset their passwords using self-service password recovery. Identity Protection allows organizations accomplish three key tasks. Automate the detection of identity-based threats and remediation. Investigate risks by using data from the portal. Export data for risk detection to other tools.
  • 14
    Cisco Identity Services Engine (ISE) Reviews
    Securing the workplace where everyone and everything connects is an essential component of any zero trust strategy. Cisco Identity Services Engine (ISE), a dynamic and automated method of policy enforcement, simplifies the delivery secure network access control. ISE allows software-defined access and automates network segments within IT and OT environments.
  • 15
    Aruba ClearPass Reviews
    Aruba Networks is a software organization and provides software named Aruba ClearPass. Aruba ClearPass is offered as SaaS software. Aruba ClearPass is a type of IT security software, and provides features like authentication, authorization, automated hotfix / updates, centralized policy management, dashboard, device Auto-Provisioning, device Self-Registration, posture assessment, quarantine / remediation, and secure guest access. Some alternatives to Aruba ClearPass are Forescout, NordLayer, and UserLock.
  • Previous
  • You're on page 1
  • Next