Best IT Security Software for SAP SuccessFactors

Find and compare the best IT Security software for SAP SuccessFactors in 2025

Use the comparison tool below to compare the top IT Security software for SAP SuccessFactors on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Rublon Reviews

    Rublon

    Rublon

    $1/month/user
    2 Ratings
    Rublon allows your workforce to securely connect to your organization's servers, networks, and applications. Multi-factor authentication makes it easy to protect your data and comply with data protection regulations such as GDPR. Rublon can be deployed across your organization, enabling multi-factor authentication (MFA) for all cloud apps, VPNs servers, workstations, on-premise and internal apps.
  • 2
    Spintly Reviews
    For a seamless, hassle-free and contactless user experience, a cloud-based, wireless door access control system is available. Modern access management system that uses the power of the cloud and mobile technology. Spintly's fully wireless, cloud-based access management system is revolutionizing the security industry. It eliminates the complexity involved in installing an access control system in a building. Installers can save over 60% on their time and costs by not having to wire. This allows them to be more productive and reduce their cost. Our vision is to make building smarter and easier by offering a frictionless access experience to users. We also aim to make buildings smarter using our fully wireless mesh platform for intelligent building devices. Spintly provides solutions for various industries with its fully wireless access control hardware and cloud-based software.
  • 3
    Gnowbe Reviews

    Gnowbe

    Gnowbe

    $5/month/user
    1 Rating
    Gnowbe, a multimedia mobile-first, desktop-friendly communications platform, training and engagement platform, is an award-winning platform that enables rapid authoring and mobile-first communication. It also supports microlearning. You can also access a curated course library and marketplace, as well as a selection templates that will allow you to create turnkey courses and content. The app/platform includes community boards for learning and engagement, scheduled sessions deployment, rapid curation, rapid curation, access to multimedia options, gamification and offline access, as well as push notifications. Use cases include corporate training and communications (including sales enablement, product training, employee engagement, upskilling/reskilling, compliance, safety, and wellness training), education and training (asynchronous and synchronous, blended learning) and NGO enablement. Gnowbe supports your organization from any location, with seamless desktop/mobile experiences and support for more than 100 languages.
  • 4
    Symantec Content Analysis Reviews
    Symantec Content Analysis automatically escalates potential zero-day threats and brokers them for dynamic sandboxing before delivering content to users. Unknown content can be analyzed from one central location. This malware analyzer, which uses Symantec ProxySG to detect malicious behavior and expose zero day threats, uses a unique multilayer inspection and dual sandboxing approach. It can safely detonate suspicious URLs and files by using safe and secure encryption. Content Analysis provides multi-layer file inspection to help protect your organization from unknown and known threats. Content Analysis receives suspicious or unknown content from sources such as ProxySG, messaging gateway or other tools for deep inspection, interrogation and analysis. If deemed malicious, Content Analysis will block the file. This platform has been strengthened by recent enhancements.
  • 5
    BrainStorm QuickHelp Reviews
    Equip your team with the only learning platform that’s purpose-built for software adoption. Accelerate onboarding, reduce support, deepen engagement, and grow usage. Whether you’re a Solution Provider onboarding new clients, an IT team needing a more scalable way to manage end-user training, or an L&D team focused on onboarding employees to the company tech stack, BrainStorm will make your results better. Activate un-engaged users – BrainStorm is the only learning platform that proactively targets licensed users who haven’t logged in yet. When you convert dark users, your usage impact moves from incremental to exponential. Accelerate adoption – Don’t just teach users how, teach them when and why to use features and applications. BrainStorm is built to automate training that gets people to change the way they work. Course authoring: Upload and assemble your learning assets into BrainStorm Flows™, adaptive workflows that deliver relevant, timely learning to every learner. Role-based learning: Custom-content flows organized by groups ensure the right content is teed up for the right audience. Targeted communications: Attract and activate unengaged learners through timely communications.
  • 6
    TrustBuilder Reviews

    TrustBuilder

    TrustBuilder

    € 10 per user / per year
    TrustBuilder is a European-based Access Management software vendor based in Europe, specializing in strengthening digital landscapes with identity-centric solutions. It's SaaS platform seamlessly integrates passwordless and deviceless Multifactor Authentication into a comprehensive Customer Identity and Access Management platform, combining airtight security with a frictionless user experience. Committed to enabling secure and efficient operations, TrustBuilder offers tailor-made solutions, empowering businesses to customize their cybersecurity defenses.
  • 7
    Learningbank Reviews
    User-friendly, intuitive LMS & onboarding platform. Save time with automation, build engaging content or use ready-made learning modules. Collect your digital and physical training in one place and report progress easily. Perfect match for companies with 100+ employees. Read more & get a free demo.
  • 8
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business.
  • 9
    Avatier Identity Anywhere Reviews

    Avatier Identity Anywhere

    Avatier

    $5.00/one-time/user
    Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time.
  • 10
    imc Learning Suite Reviews
    The e-learning system imc Learning Suite can help you improve the performance of your company. The system can be easily adapted to fit your company's needs and seamlessly integrated into any ecosystem. The e-learning platform is extensible and can be extended at any time. It is intuitively easy to use, even for novice learners. The Learning Suite is available on-premise, SaaS-based, or in a dedicated cloud. All learning needs can be managed in one e-learning platform. Modular, customizable, and scalable. imc Learning Suite is completely customizable to meet your needs. The LMS lets you choose when and where you want to learn: Online, offline, on tablet, smartphone, or desktop PC. Automate repetitive or complex processes to save time and reduce administrative burden. Integrates and interfaces that are reliable: We have been meeting the strictest security standards for more than 20 years.
  • 11
    Google Cloud Identity Reviews

    Google Cloud Identity

    Google

    $6 per user per month
    Unified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud.
  • 12
    Citrix Enterprise Browser Reviews

    Citrix Enterprise Browser

    Cloud Software Group

    $2 per user per month
    Keep your data secure from browser-based attacks. Internet is one of your biggest enemies when it comes to security. This is a problem because employees need to be able to access the internet in order to be productive. Citrix Enterprise Browser can help. This cloud-hosted web browser allows you to protect your network thoroughly without complicating the user experience. Go ahead--let employees browse away. We'll isolate this traffic and keep your network safe. Your devices and data are protected even if someone visits a compromised website. Teams have more freedom. You get greater control. Employees want unlimited browsing. IT must keep web-based threats at bay. Citrix Enterprise Browser allows you to do both. Citrix Enterprise Browser is completely independent of your network. Each session is destroyed once used, so browsing is completely isolated. Even as you give employees more options to work on the go, your corporate resources are still safe.
  • 13
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 14
    VIDchain Reviews
    Digital identity is not new. Since the advent of the internet, it has been difficult to verify the identity of individuals in a digital environment. This is both for users who have lost their privacy and control over their personal information, and for companies who have experienced inefficient and constant security breaches. VIDchain is a decentralized self-rule identification (SSI) service based upon Blockchain. It gives people control over their identities and allows them secure access to online services. It improves processes and lowers identity verification costs. It improves anti-fraud and eIDAS compliance. It is based on standards that eliminate the need to have hundreds of credentials. You can easily verify your digital identity with anyone.
  • 15
    Cisco Identity Intelligence Reviews
    Cisco Identity Intelligence, a solution powered by AI, bridges the gap between authentication & access and provides top-tier security insight without interruptions. Cisco Identity Intelligence Solution protects you from attackers by closing the gaps in authentication and access. Get a complete picture of identity activity, clean up accounts that are vulnerable, remove risky privileges and block high-risk attempts to access. Cisco Identity Intelligence solution, with its seamless deployment, powers other Cisco security suites. This results in deeper functionality, which informs the correct response to any threat. Cisco Identity Intelligence is designed to protect your organization from identity threats no matter how sophisticated.
  • 16
    Cypago Reviews
    Automated workflows with no-code reduce manual effort, lower costs and increase trust with customers. Using automated and simplified cross-functional processes, you can improve your security governance, risks, and compliance (GRC). You will learn everything you need to achieve and maintain compliance across all IT environments and security frameworks. Get a detailed, ongoing view of your compliance and risk. Automated processes can save thousands of hours in manual work. Put security policies and procedure into action to maintain accountability. Finally, a complete audit experience that includes audit scope generation, customization, 3600 evidence gathering across data silos and in-context gap analyses, as well as auditor-trusted reporting. Audits can be much easier and more efficient than what they are now. Enjoy instant insights into your employee and user base's access privileges and rights.
  • 17
    Kontra Reviews

    Kontra

    Security Compass

    $400 per year
    Kontra was created by industry veterans, who invented and pioneered interactive application security training. We do not offer secure coding tests, which are essentially multiple-choice questions re-skinned. If you want to educate developers about software security in this way, we're not the right company for you. We serve developers. We don't add artificial metrics, meaningless awards, or silly badges. We respect their time too much to be patronizing with these gimmicks. The days of heavily-scripted OWASP Top 10 videos with robotic voiceovers are gone. Interactive storytelling in short bursts with a real purpose and authenticity is what drives a truly engaging experience and puts developers at the center of the action. Developers will be more engaged with training if it is based on real-life examples rather than contrived ones. We set out to create the most beautiful application-security training experience ever created.
  • 18
    Secfix Reviews
    Secfix, founded in Munich and with offices in London, Berlin and Berlin, has been leading the market in security compliance. It has helped hundreds of small, medium and startup businesses achieve ISO 27001 compliance, TISAX compliance, GDPR compliance and SOC 2 with a 100% audit rate. Our mission is simplifying security compliance for SMBs, startups and other businesses across Europe. Secfix was created after a clear realization: Small and medium-sized business were struggling to achieve security compliance using outdated, expensive, and inefficient methods. Secfix was founded by our founders Fabiola and Grigory to solve this problem. Secfix combines automation with hands-on experience to help SMBs and startup companies achieve ISO 27001 compliance, TISAX compliance, NIS 2 compliance, SOC 2 compliance, and GDPR faster and easier. Secfix is powered a growing team of experts who are committed to helping SMBs achieve regulatory compliance.
  • 19
    Citrix Workspace Reviews

    Citrix Workspace

    Cloud Software Group

    An intelligent workspace will improve employee experience. Work smarter and more flexible. You have hired the best. Let them be the best. Citrix Workspace redefines what it means to be productive. Simpler IT can increase employee productivity and engagement. You can simplify the way you manage, secure, and administer apps, devices, users, networks, so that you can provide the best employee experience. Easily return employees to the office. Your cloud strategy can be used to its full potential. Replace traditional VPNs by a zero trust approach.
  • 20
    Nightfall Reviews
    Protect your sensitive data by identifying, classifying, and classifying it. Nightfall™, which uses machine learning to identify sensitive data such as customer PII across your SaaS, APIs and data infrastructure, allows you to manage and protect it. To monitor your data, integrate with cloud services via APIs in minutes. Machine learning accurately classifies sensitive data and PII, so nothing is missed. Automated workflows can be set up to save time and keep your business safe. Nightfall integrates directly to all your SaaS, APIs and data infrastructure. Nightfall APIs are available for sensitive data protection and classification. You can programmatically access structured results from Nightfall’s deep learning-based detectors, such as API keys and credit card numbers. Just a few lines of code are required to integrate. Nightfall's REST API allows you to easily add data classifications to your applications and workflows.
  • 21
    Cyber360 Reviews
    With a best-in class cloud platform, streamline cybersecurity assessments and transform your practice so you can serve more clients. You can identify, analyze, and mitigate cybersecurity risk with full transparency. Flexible, out-of-the box workflows and controls allow for flexibility while increasing efficiency. Create a repeatable cybersecurity assessment process that is tailored to your organization's needs. You can see the risk profile of your organization across business units, third parties, and regions. All assessments, documents, policies, and issues should be gathered and stored in a central repository. Analytics, alerts, and collaboration can be used to prevent exceptions. You can use pre-built or pre-seeded industry assessment template templates or upload your standard practice questionnaire. There are many options for assessments. These include self assessments, onsite assessments and others.
  • 22
     Yokoy Reviews
    Using all receipts, vendor invoices, and actions, the Yokoy Tool learns and can automatically fill out expense forms, invoices, and VAT for you. Yokoy detects outliers, rule violations, and possible fraudulent cases and sends them to you for manual review. Everything else, from submission to export to your accounting system, is completely automated. Yokoy is a cost management tool that allows users to map their company's process flow without the need for a team of developers. Robust integrations can automate data flow between tools. Yokoy integrates all major third-party tools, and provides all customers and partners with the "OpenAPI" platform for free.
  • Previous
  • You're on page 1
  • Next