Nudge Security Description

Discover all cloud and SaaS assets in your organization within minutes. Take control of your supply chains, eliminate shadow IT and reduce SaaS sprawl. Nudge Security can discover, inventory, and monitor continuously every cloud and SaaS accounts that employees have created in just minutes. No endpoint agents or browser extensions are required. With insights into each provider's risk, compliance, and security programs, you can accelerate security reviews to match adoption rates of SaaS. You can gain visibility into the SaaS supply chains to determine if you are within the blast radius of an incident. Engaging your workforce is the only way to manage SaaS Security at scale. Deliver security cues that are based on behavioral science to encourage employees to make better decisions and adopt better behaviors.

Pricing

Pricing Starts At:
$4 per user per month
Free Trial:
Yes

Integrations

API:
Yes, Nudge Security has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Nudge Security
Year Founded:
2022
Headquarters:
United States
Website:
www.nudgesecurity.com
Update This Listing

Media

Nudge Security Screenshot 1
You Might Also Like
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
Videos
Customer Support
Online

Nudge Security Features and Options

SaaS Management Software

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting