Best IT Security Software for Kintone

Find and compare the best IT Security software for Kintone in 2025

Use the comparison tool below to compare the top IT Security software for Kintone on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 2
    OneLogin Reviews
    Protect essential organizational data and enhance employee efficiency with OneLogin, a reliable identity and access management (IAM) platform tailored for contemporary businesses. This solution is crafted to bolster security within enterprises while streamlining login processes, making it an ideal choice for organizations aiming to implement security measures effortlessly. OneLogin boasts a variety of highly-rated functionalities, including single sign-on (SSO), a centralized directory, user provisioning, adaptive authentication, mobile identity management, compliance reporting, and additional features. By leveraging these tools, companies can ensure both security and ease of access for their users. As organizations continue to navigate the complexities of digital security, OneLogin stands out as a comprehensive solution to meet these evolving needs.
  • 3
    Zoho Directory Reviews

    Zoho Directory

    Zoho

    $1.70/user/month
    Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD.
  • 4
    Josys Reviews
    Uncover and visualize your SaaS applications, optimize all provisioning processes, and effectively manage shadow IT while gaining critical insights into spending on SaaS, ensuring resources are allocated where they are most beneficial. Make your SaaS and device management simpler, more efficient, and secure—all through a single, user-friendly console that requires only a few clicks. You can visualize devices, keep track of their statuses, and manage their entire lifecycle seamlessly. Easily select the appropriate equipment and configurations for your team, enhancing delivery logistics with remarkable efficiency. With access to an extensive catalog of popular SaaS integrations, you can significantly streamline your workflows and eliminate the hassle of navigating multiple SaaS consoles. Josys allows for integration with widely-used SaaS tools, facilitating unprecedented operational efficiencies and simplifying workflows through effortless connections across a variety of applications. This transformation not only leads to the optimization of processes and the elimination of redundant tasks but also minimizes manual errors and significantly boosts the overall fluidity of workflows between applications, ensuring your team operates at peak performance. Furthermore, the integration capabilities allow for continuous improvement in operational strategies, setting the stage for long-term success.
  • Previous
  • You're on page 1
  • Next