Best IT Security Software for Notion

Find and compare the best IT Security software for Notion in 2024

Use the comparison tool below to compare the top IT Security software for Notion on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CloudEagle.ai Reviews

    CloudEagle.ai

    CloudEagle.ai

    $2000/month
    1 Rating
    CloudEagle.ai helps IT, security & Procurement teams manage, govern & renew all their SaaS apps from one single platform. Along with making SaaS management & governance a breeze, CloudEagle.ai has processed over $2bn and saved enterprises like RingCentral, Shiji, Recroom $150M. Using 500+ direct connectors and no code slack-enabled workflows, IT & security teams get 100% visibility into all applications, streamline employee onboarding/offboarding, access reviews, licence harvesting and renewals.
  • 2
    Vault Vision Reviews

    Vault Vision

    Vault Vision

    $25/month for 10k users
    User auth for web and mobile apps with industry-leading security and passwordless login convenience for end users. Vault Vision's low-code user authentication platform allows applications to securely manage user auth and login management. Our platform helps application owners increase user login engagement with passwordless application logins powered by mobile passkeys, two factor auth (2FA), multi-factor auth (MFA), face id auth, fingerprint auth, USB key auth, pin based auth, SSO with email, OIDC logins for Apple, Google and Microsoft, and more.
  • 3
    Vanta Reviews
    Vanta is the leading trust management platform that helps simplify and centralize security for organizations of all sizes. Thousands of companies rely on Vanta to build, maintain and demonstrate trust in a way that's real-time and transparent. Founded in 2018, Vanta has customers in 58 countries with offices in Dublin, New York, San Francisco and Sydney.
  • 4
    MemberSpace Reviews

    MemberSpace

    MemberSpace

    $25 per month
    You can simply lock access to any page on your website and then decide what people pay to gain access. You have complete control over the design and feel of your memberships. We believe that anyone should be able build and manage a membership website. You don't have to be a programmer or have technical knowledge. We designed MemberSpace so that it is easy for anyone to start and grow a membership company on any website. They can sign up, log in, access your content, and manage their account all from within your site.
  • 5
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 6
    Protective.ai Reviews

    Protective.ai

    Protective.ai

    $38 per month
    Protective.ai is a tool that helps developers and startups improve their data protection, while increasing user trust and adoption. It's now easier than ever to connect third-party apps with your favorite platforms. This means that customer information, e mails, docs, as well as internal conversations, are stored and processed by tens to hundreds of companies with different data security standards and privacy standards. AI is used to analyze cloud security, privacy policies, social signals, and determine the data protection level for more than 10K business applications & integrations. Our score will help you understand which apps are protecting your data with care and which ones need to improve security and privacy. We expose the actual risks of cloud vulnerabilities and promiscuous privacy policy terms. This is not just a self-reported compliance. Our PRO solution provides ongoing monitoring, alerts and protection against unsafe integrations for R&D, marketing and sales managers.
  • 7
    ScalePad ControlMap Reviews

    ScalePad ControlMap

    ScalePad

    $200 per month
    You have thousands of steps to take before you reach your cybersecurity compliance goals. With the right cybersecurity management software, you can get started quickly. Start with customizable templates that have been verified by experts. Cross mapping helps you find the overlaps between standards so that you can get on with your compliance tasks. Manage evidence and policies to keep everything in one place. You can also keep track of risks and vendors. No more spreadsheets or scattered documents. Compliance is a team effort. This personalized portal allows them to access policies and perform any tasks that they need.
  • 8
    UpGuard BreachSight Reviews

    UpGuard BreachSight

    UpGuard

    $5,999 per year
    Know that your assets will always be monitored and protected. Be the first to learn about risks that may impact your external security posture. Identify vulnerabilities, detect any changes and uncover potential threats at all times. Monitor and manage all exposures to your company, including domains and IPs as well as employee credentials. Identify and prioritize vulnerabilities to be remedied. Make informed decisions using accurate, real-time insight. You can rest assured that external assets are continuously monitored and protected. Be proactive in your cybersecurity by constantly monitoring, tracking and reporting on your external threat surface. Ensure that your digital assets are constantly monitored and protected by using comprehensive data leak detection. You can see all of your external assets, both known and unknown.
  • 9
    elba Reviews
    elba provides the ultimate experience for securing your team's daily work. Scan, monitor and resolve vulnerabilities at scale. Our collaborative approach will boost the security of your company. Reduce your risk of data loss by detecting all sensitive data shared with external parties. Automatically correct potential alerts using the context of your employees. Get a complete view of all SaaS applications used by your company. Clean up unused, noncompliant and risky applications. Reduce phishing risk by 99%, and encourage your employees to activate multi-factor authentication across all SaaS applications. From day one, educate your collaborators with a delightful user experience. elba makes sure that your team is trained and aware of the latest requirements for your internal policies at every stage of their journey. We've got you covered on everything from security guidelines to GDPR and SOC2. Our automated, hyper-customized, phishing reduces phishing risks dramatically. Measure their progress and track their improvement over the weeks.
  • 10
    AgentAuth Reviews

    AgentAuth

    Composio

    $99 per month
    AgentAuth is an authentication platform that enables AI agents to access over 250 applications and services from third parties in a secure and seamless manner. It provides comprehensive support for different authentication protocols and ensures reliable connections through automatic token refresh. The platform integrates seamlessly into leading agentic frameworks, such as LangChain CrewAI and LlamaIndex. This enhances the capabilities of AI Agents. AgentAuth offers a dashboard that provides complete visibility of all user-connected accounts. This allows for efficient monitoring and issue resolution. It also offers white labeling options that allow customization of the authentication to align with product branding or OAuth developer applications. AgentAuth is committed to high security standards. It complies with SOC 2 type II and GDPR.
  • 11
    Josys Reviews
    Discover and visualize SaaS applications, streamline all provisioning and IT operations, and conquer the shadow IT, while gaining valuable insight into SaaS expenses and optimizing where it matters. With just a few mouse clicks, you can simplify, optimize, and secure SaaS management and device management. Visualize devices, monitor their statuses and manage the lifecycle. You can choose the right equipment for your team and streamline delivery logistics. Choose from a wide range of popular SaaS Integrations to simplify your workflows. Eliminate the need to switch between different SaaS consoles. Josys integrates popular SaaS applications to streamline your workflows and enable operational efficiency like never before. This results in streamlined processes, reduced errors and manual tasks, and improved workflow fluidity between apps.
  • 12
    Blink Reviews
    Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls.
  • 13
    SURF Security Reviews
    Create a security gap, reduce the attack surface, and isolate your business against internal and external exploits while streamlining SaaS applications and accessing your information. Access to SaaS and on-premise apps is granted based on user identity and device. By encrypting content, sandboxing it, and rendering it, you can isolate your work environment from web and device threats. Enforcing enterprise security policies such as DLP, web filters, phishing protection and extension management. SURF applies Zero-Trust principles via the browser to protect everyone and everything within the enterprise, regardless of their role. By configuring a few policies, the IT and security teams are able to reduce the attack surface. Learn the benefits of using SURF in an information technology perspective.
  • 14
    deeploi Reviews
    Managing IT can be stressful. Deeploi is a complete IT solution, from onboarding through to cybersecurity. Security and cybersecurity using the latest hardware and software. Switch to deeploi to reduce your IT costs by up to half. Deeploi automates painful workflows and connects important tools to cover the most critical IT processes. Upgrade your security infrastructure and protect your endpoints. Fortify your cloud. Managed by deeploi, state-of-the art technology. We help IT owners create and maintain an infrastructure that follows best practices. Platform for IT workflows that is easy to use, highly automated and integrated. Helpdesk experts assist your employees with IT issues. Cybersecurity risks are minimized by robust protection against threats. Deeploi costs 50% less than an internal IT team. Deeploi is less expensive than an internal IT team. Our IT-as a-service solution transforms pain and insecurity into peace by eliminating IT-related inefficiencies.
  • 15
    Clutch Reviews
    Clutch addresses the growing challenge of non-human security in modern enterprises. As digital infrastructures grow and become more complex the management and security non-human identity, from API keys and secret to tokens and services accounts, has emerged as an important yet often overlooked aspect of cybersecurity. Clutch has developed an enterprise platform to manage and protect these identities. Our solution is designed for enterprises to strengthen their digital backbone, ensuring a safe, resilient and trustworthy environment. The number of digital identities is growing at an astonishing rate of 45 to 1 compared to human ones. Has extensive access and critical privileges, which are essential for mission-critical automated process. Lacks inherent security measures such as MFA or conditional access policies.
  • 16
    Clarity Security Reviews
    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove implementation takes the burden off team members, reducing the impact of other IT initiatives. Automated evidence gathering into a downloadable ledger reduces the need to waste time gathering spreadsheets and screenshots. Clarity Explorer and nested entitlements provide insights into what users are granted access to and why. Role-based access control and automated workflows aligned with your organization's structure and needs. Clarity is a powerful tool that allows you to upgrade your identity governance program quickly and adapt it seamlessly as your organization grows. Fast reviews to certify user access, entitlements and roles, application access and more.
  • 17
    MINDely Reviews
    MIND is the world's first data security platform to automate data loss prevention (DLP), insider risk management programs (IRM), so you can identify, detect and prevent data leaks automatically at machine speed. Find sensitive data in your IT environments, whether they are in motion, at rest or in use. MIND continuously reveals blindspots for sensitive data in your IT environments, including SaaS apps, AI apps, email, endpoints and on-premise file sharing. MIND analyzes and monitors billions of data events in real-time, enriches every incident with context and remediates automatically. MIND blocks sensitive data from escaping control in real-time, or works with users to mitigate risks and educate them on your policies. MIND continuously reveals blindspots for sensitive data in transit, at rest, and during use by integrating data sources across all your IT workloads. SaaS, AI applications, on-premises endpoints and emails.
  • Previous
  • You're on page 1
  • Next