Best IT Security Software for Oracle PeopleSoft

Find and compare the best IT Security software for Oracle PeopleSoft in 2024

Use the comparison tool below to compare the top IT Security software for Oracle PeopleSoft on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Quicklaunch Reviews

    Quicklaunch

    Quicklaunch

    $0.73 per month
    1 Rating
    It makes it easier for employees and students to access the apps they need to learn or work. Students and employees can reset their passwords at any time, which reduces the need for IT help. Increases cyber security by protecting user accounts against hacking and thwarting ransomware, phishing cyber attacks.
  • 2
    Sesame Software Reviews
    When you have the expertise of an enterprise partner combined with a scalable, easy-to-use data management suite, you can take back control of your data, access it from anywhere, ensure security and compliance, and unlock its power to grow your business. Why Use Sesame Software? Relational Junction builds, populates, and incrementally refreshes your data automatically. Enhance Data Quality - Convert data from multiple sources into a consistent format – leading to more accurate data, which provides the basis for solid decisions. Gain Insights - Automate the update of information into a central location, you can use your in-house BI tools to build useful reports to avoid costly mistakes. Fixed Price - Avoid high consumption costs with yearly fixed prices and multi-year discounts no matter your data volume.
  • 3
    DATPROF Reviews
    Mask, generate, subset, virtualize, and automate your test data with the DATPROF Test Data Management Suite. Our solution helps managing Personally Identifiable Information and/or too large databases. Long waiting times for test data refreshes are a thing of the past.
  • 4
    Centreon Reviews
    Centreon is a global provider for business-aware IT monitoring to ensure high performance and continuous operations. The company's AIOps-ready platform, which is holistic and ready for use in today's complex hybrid cloud infrastructures, is designed to meet the needs of these distributed clouds. Centreon monitors all aspects of the IT Infrastructure, from Cloud-to Edge for a clear and comprehensive view. Centreon eliminates blind spots by monitoring all equipment, middleware, and applications that are part modern IT workflows. This includes legacy assets on-premise, private and public clouds, and all the way to edge of the network where smart devices and customers come together to create business value. Centreon is always up-to-date and can support even the most dynamic environments. It has auto-discovery capabilities that allow it to keep track of Software Defined Network (SDN), AWS or Azure cloud assets and Wi-Fi access points, as well as any other component of today’s agile IT infrastructure.
  • 5
    AuthN by IDEE Reviews

    AuthN by IDEE

    IDEE

    €3 per user per month
    Award-winning, enterprise-wide, zero trust authentication as a service. AuthN™, a service from IDEE, eliminates password-based risks and lowers administrative overhead. The fastest time to market for your transition from passwordless to passwordless in the enterprise. AuthN™, which is interoperable, can be deployed alongside your existing SSOs, hardware tokens and password-management investments. You can reduce your risk exposure by completely removing your password, whether it is standalone or integrated. Using no central credential database, insider threats and human error are also reduced. Our passwordless multi-factor authentication will keep your attackers away and keep you out the news. You can upgrade your favorite applications, password managers, and SSO software with a simple plug-and-play upgrade. AuthN™, which supports open standards (e.g. RADIUS, SAML and OIDC are supported by AuthN™ and you can also use custom plugins to take advantage of the additional benefits offered by AuthN™.
  • 6
    Avast Secure Private Access Reviews
    VPNs are disliked by users because they require them to log in every time an application access is required. Users become frustrated by the latency of VPNs when working remotely. They often try to bypass security controls entirely to get work done. VPNs extend the corporate network to remote users, increasing the attack surface and the risk of breach. Remote employees can be infected by malware on their devices. This can spread to the entire network if the VPN is used. A complete VPN gateway appliance stack can be expensive and takes a lot of resources to manage. It becomes more expensive when latency and capacity limitations are considered. Organizations must replicate their gateway stacks at each data centre.
  • 7
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 8
    Kontra Reviews

    Kontra

    Security Compass

    $400 per year
    Kontra was created by industry veterans, who invented and pioneered interactive application security training. We do not offer secure coding tests, which are essentially multiple-choice questions re-skinned. If you want to educate developers about software security in this way, we're not the right company for you. We serve developers. We don't add artificial metrics, meaningless awards, or silly badges. We respect their time too much to be patronizing with these gimmicks. The days of heavily-scripted OWASP Top 10 videos with robotic voiceovers are gone. Interactive storytelling in short bursts with a real purpose and authenticity is what drives a truly engaging experience and puts developers at the center of the action. Developers will be more engaged with training if it is based on real-life examples rather than contrived ones. We set out to create the most beautiful application-security training experience ever created.
  • 9
    EdGuards Reviews
    Get the highest grade for education system compliance. We offer scanning solutions and services for PeopleSoft and Ellucian. The number of breaches in Education has increased 150% over the past five years. Education is more targeted than the Administrative and Retail industries. Kennesaw State University suffered a data breach that resulted in the loss of up to 7,500,000 records. Protect your PeopleSoft applications from cyber attacks. Identify vulnerabilities, fix misconfigurations and detect vulnerabilities in source code. Manage access control and user rights. The Education Industry Cyber Incidents Report, the only annual report covering high-profile cybersecurity incidents in K-12 schools and higher education institutions, is available. Don't wait for a breach. To avoid future risks, secure your business applications today. Get in touch to learn more about our products and services.
  • 10
    Sentinel Reviews

    Sentinel

    Sentinel Software

    $600 per month
    PeopleSoft Security Simplified. All you need to manage security and auditing easily. Instantly identify missing objects or security differences between PeopleSoft environments. Comparisons of PeopleSoft objects with security permissions side-by-side A summary of the missing, added, or removed objects during migrations of Roles and Permissions lists to another environment. Sentinel has helped clients improve their security controls while reducing support time. Securely manage users, roles and permission lists. To see the Roles that grant access to users, drill down on any menu. A menu makes it easy to create accurate Permission Lists and Roles in a fraction the time. You don't need to lookup components. You can manage data masking for PII/PCI fields right from your profile.
  • 11
    Appsian Reviews
    Appsian enables large organizations to maximize their ERP investments by natively integrating security solutions that are required to protect against today's threats. Appsian enables organizations to increase their ERP control and visibility by leveraging solutions such as Single Sign-On, Multi Factor Authentication, Location Based Security, Data Masking and Transaction Logging.
  • 12
    Gurucul Reviews
    Advanced threat detection, remediation, and response can be automated using data science-driven security controls. Gurucul's Unified Security and Risk Analytics platform addresses the question: Is anomalous behaviour risky? This is our competitive advantage, and why we are different from everyone else in this market. We won't waste your time alerting you to anomalous activity that isn’t risky. To determine if behavior is dangerous, we use context. Context is crucial. It is not helpful to tell you what is happening. Gurucul difference is telling you when something is wrong. This is information you can use to make decisions. We put your data to use. We are the only security company that can access all of your data outside of the box. We can ingest data of any source: SIEMs, CRMs and electronic medical records, identity management systems, endpoints, etc.
  • 13
    Securonix SOAR Reviews
    As the attack surface grows, there is a shortage in skilled security personnel to protect businesses and keep attackers away. Security teams need to be able to respond quickly to minimize the risk of cybersecurity threats. However, security teams often have to manage multiple security tools, which can lead to inefficient and time-consuming management. Securonix Security Orchestration, Automation, and Response helps security operations teams improve incident response times. It provides automation that adds context and suggests playbooks and next steps for analysts. SOAR streamlines orchestration by streamlining the incident response with integrated case management, integrations covering more than 275 applications and seamless access to your SIEM and UEBA and network detection and reaction (NDR) solutions all in one pane.
  • 14
    Clonetab Reviews
    Clonetab has many options to meet the needs of each site. Although Clonetab's core features will suffice for most site requirements, Clonetab also offers infrastructure to allow you to add custom steps to make it more flexible to meet your specific needs. Clonetab base module for Oracle Databases, eBusiness Suite, and PeopleSoft is available. Normal shell scripts used to perform refreshes can leave sensitive passwords in flat file. They may not have an audit trail to track who does refreshes and for which purpose. This makes it difficult to support these scripts, especially if the person who created them leaves the organization. Clonetab can be used to automate refreshes. Clonetab's features, such as pre, post and random scripts, target instances retention options like dblinks, concurrent processes, and appltop binary copying, allow users to automate most of their refresh steps. These steps can be done once. The tasks can then be scheduled.
  • Previous
  • You're on page 1
  • Next