Best Cisco Identity Intelligence Alternatives in 2024
Find the top alternatives to Cisco Identity Intelligence currently available. Compare ratings, reviews, pricing, and features of Cisco Identity Intelligence alternatives in 2024. Slashdot lists the best Cisco Identity Intelligence alternatives on the market that offer competing products that are similar to Cisco Identity Intelligence. Sort through Cisco Identity Intelligence alternatives below to make the best choice for your needs
-
1
Safetica
342 RatingsSafetica Intelligent Data Security protects sensitive enterprise data wherever your team uses it. Safetica is a global software company that provides Data Loss Prevention and Insider Risk Management solutions to organizations. ✔️ Know what to protect: Accurately pinpoint personally identifiable information, intellectual property, financial data, and more, wherever it is utilized across the enterprise, cloud, and endpoint devices. ✔️ Prevent threats: Identify and address risky activities through automatic detection of unusual file access, email interactions, and web activity. Receive the alerts necessary to proactively identify risks and prevent data breaches. ✔️ Secure your data: Block unauthorized exposure of sensitive personal data, trade secrets, and intellectual property. ✔️ Work smarter: Assist teams with real-time data handling cues as they access and share sensitive information. -
2
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
3
Sonrai Security
Sonraí Security
Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups. -
4
Beyond Identity
Beyond Identity
$0/User/ Month Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience -
5
Rapid7 Managed Threat Complete
Rapid7
$17 per asset per monthManaged Threat Complete combines comprehensive risk and threat coverage in a single subscription. Managed Detection and Response Services & Solutions. Multiple advanced detection techniques, including proprietary threat information, behavioral analytics and Network Traffic Analysis as well as human threat hunting, find evil in your environment. Our team will immediately contain user and endpoint risks to cut off the attacker. The detailed findings reports will guide you in taking additional remediation and mitigating actions tailored to your program. Let our team be your force multiplier. Experts in detection and response, from your security advisor to your SOC, can help you strengthen your defenses. Take immediate action. It's not as easy as purchasing and implementing the newest security products to set up a detection and response program. -
6
SentinelOne Singularity
SentinelOne
$45 per user per year 6 RatingsOne intelligent platform. Unprecedented speeds Infinite scale. Singularity™, enables unrestricted visibility, industry-leading detection and autonomous response. Discover the power of AI powered enterprise-wide security. Singularity is used by the world's largest enterprises to detect, prevent, and respond to cyberattacks at machine speed, greater scale, with higher accuracy, across endpoints, cloud, and identities. SentinelOne's platform offers cutting-edge security by providing protection against malware, scripts, and exploits. SentinelOne's cloud-based platform is innovative, compliant with industry standards and high-performance, whether you are using Windows, Mac, or Linux. The platform is prepared for any threat thanks to constant updates, threat hunting and behavior AI. -
7
Silverfort
Silverfort
1 RatingSilverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication. -
8
Microsoft Defender for Identity
Microsoft
2 RatingsSecurity Operations teams can help protect on-premise identities and correlate signals to Microsoft 365 using Microsoft Defender For Identity. It helps eliminate vulnerabilities on-premises to prevent attacks from happening. Security Operations teams can make the most of their time by understanding the most serious threats. Security Operations can prioritize information to help them focus on real threats and not false signals. Microsoft Defender for Identity provides cloud-powered intelligence and insights at every stage of an attack's lifecycle. With Microsoft Defender for Identity, Security Operations can help identify and resolve configuration vulnerabilities. Secure Score integrates identity security posture management assessments directly with Secure Score for visibility. The user investigation priority score is based on the number of incidents and risky behavior that has been observed in an organization. It allows you to prioritize the most dangerous users. -
9
Gurucul
Gurucul
Advanced threat detection, remediation, and response can be automated using data science-driven security controls. Gurucul's Unified Security and Risk Analytics platform addresses the question: Is anomalous behaviour risky? This is our competitive advantage, and why we are different from everyone else in this market. We won't waste your time alerting you to anomalous activity that isn’t risky. To determine if behavior is dangerous, we use context. Context is crucial. It is not helpful to tell you what is happening. Gurucul difference is telling you when something is wrong. This is information you can use to make decisions. We put your data to use. We are the only security company that can access all of your data outside of the box. We can ingest data of any source: SIEMs, CRMs and electronic medical records, identity management systems, endpoints, etc. -
10
Falcon Identity Threat Detection
CrowdStrike
Falcon Identity Threat Detection allows you to see all Service and Private accounts on your network or cloud. It also includes full credential profiles and weak authentication detection across every domain. Analyze all domains in your organization to identify potential vulnerabilities due to stale credentials and weak passwords. You can also see all service connections as well as weak authentication protocols. Falcon Identity Threat Detection monitors domain controllers on-premises and in the cloud (via API), to see all authentication traffic. It establishes a baseline for all entities, and compares behavior against unusual lateral movements, Golden Ticket attacks and Mimikatz traffic patterns. It can be used to detect Escalation of Privilege or suspicious Service Account activity. Falcon Identity Threat Detection cuts down on the time it takes to detect. It allows you to view live authentication traffic which speeds up the process of locating and resolving incidents. -
11
Proofpoint Identity Threat Defense
Proofpoint
In a hybrid world that is constantly changing, your organization relies on its employees and their virtual identities as well as the endpoints on which they operate to build and protect assets. By leveraging these identities, threat actors have discovered unique ways to move lateraly across your cloud environments. You need a new, innovative and agentless solution for detecting and responding to identity threats. This is a critical part of the attack chain today. Proofpoint Identity Threat Defense (previously Illusive) provides comprehensive prevention and visibility for all your identities, so you can fix identity vulnerabilities before they become real threats. You can also detect any lateral movement in your environments and activate the deception to ensure that threat actors are stopped before they gain access your corporate assets. You can stop real-time threats and prevent modern identity risks in action all in one place. -
12
Plurilock AI Cloud
Plurilock Security
$12/user/ year Plurilock AI Cloud, a cloud native single sign-on platform (SSO), passwordless platform (FIDO2/webauthn), as well as a cloud access security broker (CASB), is designed for cloud-centric businesses that rely on an army SaaS applications. Plurilock AI Cloud allows companies to give their employees the ability to sign in once and access all their applications. They can also gain extensive control over access to their applications and workflows by device, location and time of day. Plurilock AI Cloud, part of Plurilock AI Platform, is a simple way to expand to endpoint-based DLP and then to continuous, real time authentication and user/entity behaviour analytics (UEBA) to detect and respond to real-time biometric threats. Based on feedback from actual customers, Plurilock AI Cloud has been rated as the best in the industry for customer satisfaction. -
13
Deduce
Deduce
$200 per monthOur solutions are powered from a coalition over 150,000 websites, creating one the largest identity data networks in the globe. With one API score, you can identify bad actors, imposters and malicious activity. Notify customers about suspicious activity before any damage occurs. The Deduce Collective Intelligence platform uses a combination a user's historical data, identity risk intelligence, proactive alerting, and proactive alerting to provide a robust identity authentication solution. To gain unparalleled insight into user risks and threats, leverage your data and our extended network. The Identity Risk Index allows you to make intelligent authentication decisions. Customers Alerts empower users to fight fraud and reduce the risk of compromised accounts. Deduce Identity Risk Index assesses identity risk in real time to determine if a user should have access to an account at the moment of interaction. -
14
FYEO
FYEO
FYEO protects individuals and enterprises from cyber attacks through security audits, real time threat monitoring, decentralized identity management, anti-phishing and intelligence. Web3 auditing and security services for blockchains. Protect your employees and organization from cyberattacks using FYEO Domain Intelligence. Simple identity monitoring and password management services. End-user breach and phishing alarm system. Discover vulnerabilities and protect your application as well as your users. Identify and address the cyber risks within a company prior to taking on liability. Protect your company against ransomware, insider threats and malware. Our team collaborates with your development team in order to identify critical vulnerabilities before they are exploited by malicious actors. FYEO Domain Intelligence provides real-time cyber threat intelligence and monitoring to help secure your organisation. -
15
IBM's Identity Threat Detection and Response and Identity Security posture Management solution provides you with a complete view of user activity across a hybrid landscape of siloed IAM applications used in cloud, SaaS and on-prem environments. IBM Verify Identity Protection offers ISPM and ITDR capabilities to keep your organization secure. IBM Verify ID Protection is designed to be easily deployed without agents or clients, and can work in any cloud environment or network. It extends your existing cybersecurity solution by analyzing and providing actionable identity risk data that's critical for your security operations. Detects identity-related blindspots such as shadow accounts, unauthorized local account, missing multifactor authentication, or usage of unauthorized SaaS applications across any cloud platform. Detect vulnerable configurations due to human error, dangerous deviations from policies, and inadequate implementations for identity tools.
-
16
StealthDEFEND
Netwrix
You can detect and respond quickly to suspicious behavior and advanced attacks on active directory and file system with unparalleled accuracy and speed. 4 out 5 hacking breaches involve authentication-based attacks. Every attacker wants to steal data and credentials. Once inside, attackers will seek to discover your environment, compromise privileged credentials, and use those credentials to access, exfiltrate or destroy data. StealthDEFEND is the only real time threat detection and response system that was specifically designed to protect these two common elements in every breach scenario. Detect and respond the specific techniques and procedures (TTPs), attackers use to compromise file system and active directory data. Automatic tagging of privileged groups, users, data, resources adjusts risk ratings in response to abnormal or nefarious behavior. -
17
ShieldApps Identity Theft Preventer
ShieldApps
$49.99 one-time paymentIdentity Theft Preventer scans your device for vulnerabilities that may affect your privacy. It searches your computer for webmail credentials, bank details, health provider records and social networks profiles to identify any potential concerns. The latest version of the product is able to block hacking attempts on your webcams or microphones. Your audio and video ports are protected with the Identity Theft Preventer. You can enjoy your private life in confidence. Fend off hacking attacks on your devices. Identity Theft Preventer protects your webcam and mic from malicious threats. Enjoy web browsing without feeling as if you are being watched. -
18
Traced Security
Traced Security
Cybercriminals are increasingly targeting SaaS platforms, leading to severe data breaches. Maintaining security requires that you understand and mitigate these threats. SaaS environments are complex and can obscure security threats. It is important to achieve full visibility in order to identify and address potential vulnerabilities. Inadequate SaaS Security can lead to noncompliance with regulations. To avoid penalties and maintain confidence, it is important to ensure compliance. Weak data governance can lead to unauthorized access and loss of data. To protect sensitive information, it is necessary to implement robust data protection measures. Cybenta's AI provides comprehensive insights into user behavior, data exposure and SaaS risks. AI-driven analytics can help you prioritize and address vulnerabilities in your SaaS by automating remediation. Automate and orchestrate the management and governance for apps and identities. -
19
SlashID
SlashID
Identity is a common vector of lateral movement and data breaches. SlashID helps build a compliant, secure, and scalable infrastructure for identity. Manage the creation, rotation, and deletion of identities and secret in one place. Multi-cloud inventory of all identities and secrets. Detect initial access, privilege elevation, and lateral movements across your IdPs, cloud environments. Add authentication, authorization and conditional access to your services. Rotate key materials to detect leaks in real-time. This will prevent data breaches. To reduce the impact of an attacker, you can automatically block, suspend or rotate MFA based on a detection. Add MFA and conditional accessibility to your applications. Add authentication, authorization and credential tokenization to your APIs and workloads. -
20
Semperis
Semperis
Active Directory is becoming more important in today's cloud-first, mobile first world. This is a growing problem. Identify blind spots. Paralyze attackers. Minimize downtime. Hybrid enterprise cyber resilience is identity-driven The ever-expanding network of mobile workers, cloud services and devices means that identity is the only control plane to keep the bad guys out. Active Directory is essential for identity-centric security to be effective. Semperis protects your identity infrastructure, so you can venture boldly into the digital future. Active Directory is the main source of trust for access and identity in 90% of businesses. It's also the weakest link in the cyber kill chain - it can be hacked in almost every modern attack. Active Directory is also accessible via the cloud, so any tampering with it will have a ripple effect on the entire identity infrastructure. -
21
HYPR
HYPR | The Passwordless Company
$4.00 per user/month HYPR is The True Passwordless Company with cutting edge technology and backed up by major investment partners. The HYPR Cloud Platform allows Passwordless Authentication across an enterprise workforce. It combines the security and convenience of a smartcard with the convenience of a smartphone. With HYPR, businesses can eliminate customer passwords and provide a superior login experiences for your customers as well. Consumer-grade usability increases the productivity of your employees and reduces friction for your customers. -
22
QOMPLX
QOMPLX
QOMPLX Identity Threat Detection and Response System (ITDR) constantly validates to prevent network takeovers. QOMPLX ITDR detects attacks and misconfigurations in Active Directory (AD). Identity security is critical to network operations. Verify identity in real time. We verify everyone in order to prevent privilege escalation or lateral movement. We integrate your existing security stack to enhance our analytics, resulting in comprehensive transparency. Understanding the severity and priority of threats allows resources to be allocated where they are most needed. Real-time detection, prevention and detection stop attackers from bypassing the security measures. Our experts can help you with everything from Active Directory (AD), to red teams, to other needs. QOMPLX helps clients manage and reduce cybersecurity risk holistically. Our analysts will monitor your environment and implement our SaaS-solutions. -
23
Microsoft Entra Identity Protection
Microsoft
Identity Protection is based on the knowledge Microsoft has gained from its positions in the organization with Microsoft Entra ID and the consumer space with Microsoft Accounts as well as in gaming with Xbox. Microsoft analyzes trillions of signals every day to identify and protect its customers from threats. The signals generated and fed to Identity Protection can be fed into tools such as conditional access in order to make access decisions or fed back to an SIEM tool for further investigation. The risk signals may trigger remediation actions such as requiring multifactor authentication or requiring users to reset their passwords using self-service password recovery. Identity Protection allows organizations accomplish three key tasks. Automate the detection of identity-based threats and remediation. Investigate risks by using data from the portal. Export data for risk detection to other tools. -
24
Optery
Optery
$8.25 per monthData brokers on search engines like Google, Yahoo, or Bing can help troublemakers and smugglers get your home address. Data brokers are used by identity thieves to obtain personal information that can be used to forge documents and guess passwords. They also answer secret questions to gain access your accounts. Data brokers can sell your phone number and email address without your permission. This can lead to phishing attempts and unwelcome spam calls and emails. You can reduce your digital footprint and the surface area of attack by limiting how much information you have. Our product is the most complete, comprehensive, and transparent in information removal. This is why PCMag.com voted Optery "Editors Choice" as the best product in its category. -
25
RevealSecurity
RevealSecurity
1 RatingReveal Security ITDR detects identity threats - post authentication - in and across SaaS applications and cloud services. Powered by unsupervised machine learning, it continuously monitors and validates the behavior of trusted human users, APIs and other entities, accurately detecting anomalies that signal an in-progress identity threat. -
26
Rezonate
Rezonate
Rezonate automatically detects and corrects access configurations, risky activity, and weak security practices across all your identity providers and IaaS, reducing your identity risk. Rezonate continually synthesizes all of your cloud applications, resources, as well as your human- and machine identities. It gives you a single identity storyline that provides a comprehensive view of all your access risk and identity. Rezonate's Identity Storyline goes far beyond the traditional graph views. It tells you the story behind every identity, threat and exposure so that you can confidently identify, prioritize, and take action to eliminate access risks. Identity Storyline provides a detailed explanation of every threat, exposure, or active threat that is detected and how it got there, as well as the potential consequences. You can now see every activity and change across your cloud identity attack surface in real-time, beyond the periodic configuration scans. -
27
VeriClouds
VeriClouds
VeriClouds CredVerify, the only service that detects, verifies and remediates the use of weak or stole credentials throughout the entire user's lifecycle - from registration to authentication to password reset - is the only one to do so. It detects in seconds, provides immediate response and has a 90% coverage. VeriClouds is committed to providing the highest level of security. Automates the detection and integration of unauthorized login attempts with real-time enforcement measures. Reduces the threat of a weak password or a stolen one, the number one cause for data breaches. Reduces the chances of a successful account takeover or credential stuffed attack. CredVerify is available as a cloud service through VeriClouds or can be deployed by a customer in their own cloud environment using just a few lines code. -
28
Acceptto eGuardian
Acceptto
Acceptto monitors user behavior and transactions to create an enhanced user profile for each application landscape. This allows Acceptto to verify that access attempts are legitimate and safe. There are no passwords or tokens required. Acceptto's risk engine determines whether an attempt to access a user's account is legitimate or not. It tracks the user and device postures pre-authentication, during authentication and after-authorization. In an age where identities are constantly being attacked, we provide a continuous, step up authentication process with real time threat analytics. A dynamic level of assurance (LoA), is calculated based on a risk score that we have developed using our AI/ML algorithms. Our machine learning and AI analytics combine to automatically find the best policy for each transaction, maximising security and minimizing friction. This allows for a smoother user experience, without compromising enterprise security. -
29
Plurilock DEFEND
Plurilock Security
$9 per user per monthPlurilock DEFEND provides full-time, continuous authentication throughout active computing sessions using behavioral biometrics and your existing employee keyboard and pointer devices. DEFEND relies on an invisible endpoint agent and machine learning techniques to confirm or reject user's identity biometrically based on console input as they work, without visible authentication steps. When integrated with SIEM/SOAR, DEFEND can help to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides a just-in-time identity certainty signal behind the scenes, making truly invisible login workflows possible when identity is already confirmed. DEFEND supports Windows, Mac OS, IGEL, Amazon Workspaces VDI clients. -
30
Digital Resolve
Digital Resolve
Online Security and Fraud Protection with Real-time Identity Intelligence and Authentication. Access Control. Online security from login to logout: Protect online accounts, information and transactions, as well as your online interactions. Digital Resolve is an affordable and simple-to-implement solution that effectively mitigates risk from the moment it is deployed. The platform was developed by a team that includes seasoned experts to provide a complete view of all transactions and interactions. This is unlike other solutions that only detect certain events. You can also maintain trust and confidence among your users by providing real-time protection from potential risks and offering real-time intervention options. -
31
Proofpoint Digital Risk Protection
Proofpoint
Proofpoint Digital Risk Protection protects your customers and brand from digital security risks on web domains, social networks, and the dark and deep web. It is the only solution that provides a comprehensive defense for all digital engagement channels. Digital Risk Protection protects your company and customers against digital risks across your entire social media network. Our solution protects you social media presence against account takeovers, social phishing scams, malicious content, and social media phishing scams. Request a demo to map your social, mobile and domain footprints and discover brand-owned accounts as well as fraudulent or unauthorized accounts. Protect your customers and brand from dark web, social media and web domain threats. Protect your domain investments against domain squatters, typophishing campaigns, and other infringing domains. Our digital protection solution uses artificial intelligence to identify fraudulent domains that could pose a threat to your brand or customers. -
32
Axur
Axur
AI-driven solutions that protect your business against threats outside the perimeter. The threat of external threats is increasing and requires immediate action outside of the traditional perimeters. Act now to protect your organization's security posture and strengthen your cyber defenses. You need advanced solutions that provide rapid threat identification and neutralization workflows, comprehensive threat intelligence, and industry-leading takedown workflows. Axur offers advanced tools for global counterfeit identification and quick removal from major markets, using 24/7 automation to takedowns immediately and send alerts to authorities. This enhances response time and protects revenue. -
33
LinkShadow
LinkShadow
LinkShadow Network Detection and Response NDR ingests traffic and uses machine-learning to detect malicious activities and to understand security threats and exposure. It can detect known attack behaviors and recognize what is normal for any organization. It flags unusual network activity that could indicate an attack. LinkShadow NDR can respond to malicious activity using third-party integration, such as firewall, Endpoint Detection and Response, Network Access Control, etc. NDR solutions analyze the network traffic in order to detect malicious activities inside the perimeter, otherwise known as the "east-west corridor", and support intelligent threat detection. NDR solutions passively capture communications over a network mirror port and use advanced techniques such as behavioral analytics and machine-learning to identify known and unidentified attack patterns. -
34
BlackBerry Persona
BlackBerry
BlackBerry® Persona uses machine-learning (ML) and predictive AI (AI) to dynamically adjust security policy based upon user location, device type, and other factors. This protects against human error and well-intentioned workarounds. Continuous authentication uses passive biometrics and other usage-based patterns for unobtrusive verification of user identity. When users exhibit unusual behavior, they are automatically blocked from accessing apps. When an end user is in a trusted area, security policies are relaxed. The system dynamically adjusts for when the user travels to higher-risk locations. As an employee moves from one country to the next, adapts device security to meet local regulatory requirements. Streamlined access of apps and services without the need to re-authenticate in trusted locations. -
35
The market-leading SIEM is built to outpace your adversary in terms of speed, scale, and accuracy SOC analysts' roles are more important than ever as digital threats grow and cyber adversaries become more sophisticated. QRadar SIEM goes beyond threat detection and reaction to help security teams face today’s threats proactively. It does this with advanced AI, powerful intelligence and access to cutting edge content. IBM has a SIEM that will meet your needs, whether you are looking for a cloud-native solution with hybrid scale and speed, or a solution that complements your on-premises architecture. IBM's enterprise-grade AI is designed to increase the efficiency and expertise for every security team. With QRadar SIEM analysts can reduce repetitive tasks such as case creation and risk priority to focus on critical investigations and remediation efforts.
-
36
Syteca
Syteca
Syteca is a full cycle insider risk management platform with capabilities in employee monitoring, privileged access management, subcontractor control, and compliance tasks. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on Syteca! Key solutions: - Privileged Access Management - User activity monitoring - Insider threat management - User and entity behavior analytics - Employee activity monitoring - Enhanced Auditing and Reporting -
37
IdentityForce
IdentityForce
$17.95 per monthIdentityForce, a Sontiq company, offers credit security, privacy, identity, and identity solutions. Advanced detection technology, real time alerts, 24/7 U.S. support, and identity recovery combine with over 40 years of combined experience to get the job done. Our million-dollar insurance policy has made us the trusted choice of millions of people, Global 1000 companies, and the U.S. Government. Identity theft is when someone uses your information to make purchases or open new accounts. They may also use your information to get medical care at your expense. They may also commit crimes in your name. It is a federal offense and one of the biggest threats to businesses today. Internationally, bank account takeovers have been on the rise. Identity thieves today use email addresses, social accounts, and telephone numbers to impersonate people they trust, such as the head of HR. So don't hesitate to send them your SSN. Identity theft can even be as simple as sharing a Netflix password. -
38
IDShield
IDShield
$13.95IDShield provides protection beyond identity theft. It also offers complete privacy and reputation management services that help protect your online identity. IDShield is the best identity theft protection service. You will receive best-in-class service that includes continuous monitoring, unlimited recovery of your identity if compromised, and educates about identity theft. You have access to our simple interface via both our web and mobile app, in addition to all the amazing features. All your information is at your fingertips and online, so it's always available. You will be notified when an item is available for review. You can also add additional accounts to track your progress with the click of a button. In the United States, 150 million people are able to have their identities stolen each year. 70% of employers check social media, and 57% find disqualifying data. It takes an average 200 hours and 6 month to restore your identity. -
39
RapidIdentity
Identity Automation
Identity Automation is the most flexible, fully-integrated, full-lifecycle solution for identity, access, governance and administration. RapidIdentity, the company's flagship product is designed to help organizations increase their business agility, embrace security and provide a better user experience. RapidIdentity is a great tool for organizations that want to improve security, reduce risk of data breaches and lower IT costs. -
40
LifeLock
NortonLifeLock
$8.29 per monthCriminals can open new accounts, obtain payday loans, and file tax returns under your name. Every 3 seconds there is a victim. Don't wait to protect your identity from identity theft. Identity Lock allows you to lock your TransUnion credit file with one click. Home title monitoring helps prevent ID thieves from stealing your most valuable asset. Ultimate Plus is available. Privacy Monitor scans common sites for people searching, finds your information, and allows you to opt-out. It takes only a few minutes to register and install. We will notify you by email, text, phone++, or mobile app if we suspect that there is a threat to your identity. Our VPN protects your online activity and helps to prevent hackers from accessing your personal information. One of our U.S.-based agents can help you if you are a victim to identity theft. We will reimburse funds that were stolen from you due to identity theft up until the limit of your policy. -
41
IDStrong
IDStrong
$9.95 per monthIdentity monitoring is a way to keep track of the type and location of your credit and personal information online. It also notifies you when suspicious activity is detected or reported. Identity monitoring can help you protect yourself from identity theft. This is especially true if you use it in conjunction with our credit monitoring which allows for regular credit reports and credit score checks. Our alerts service will notify us if our identity profile information or credit report changes or if we discover your information in a data breach or other exposed personal records. We monitor credit bureaus, black market websites, chat rooms and social feeds. We also look at millions of data points to determine if any financial or personal information is being sold, bought, or traded online. We will notify you if we discover that your financial and personal information has been compromised. -
42
BloodHound Enterprise
BloodHound Enterprise
The problem of managing attack paths requires a unique, fundamentally different methodology that helps organizations understand, empirically quantify the impact and eliminate identity-based attacks path risks. Enterprise networks, user permissions, application permissions and security group memberships can be dynamic. Consider that every time a privileged system user logs in, they leave behind tokens or credentials that adversaries can use. The attack paths must be constantly mapped because the connections and behaviors which form the attack paths are constantly changing. The haphazard removal of AD misconfigurations provides zero security posture improvements and negatively impacts team productivity. If you can empirically identify specific misconfigurations which allow you to eliminate a large number of attack pathways, you can generate meaningful improvements in security posture and increase the productivity of your team. -
43
Authomize
Authomize
Authomize continuously detects any effective relationships between human and machine identities to company resources throughout all your organization's environments. (IaaS. PaaS. SaaS. Data. On-prem). This includes the most detailed company asset, and it is normalized consistently across all apps. Authomize keeps you informed about your identities, assets, and access policies. It can block unintended access by using guardrails, alerts on anomalies, and alerts on other risks. Authomize's AI engine harnesses its detailed and granular view of all environments in an organization to create the best access policies for any relationship between identity and asset. SmartGroup technology performs continuous access modelling, self-correcting because it incorporates new inputs like actual usage, activities, and decisions to create an optimal permission structure. -
44
Be aware of the warning signs that you may be a victim to privileged account abuse. An abrupt increase in privilege account access by certain users. Unusual access to the most secretive accounts or secrets. Access to a large number of privileged accounts at once. Accounts are accessed at unusual hours or in unusual locations. Privileged Behavior Analytics detects anomalous behavior quickly and alerts your security team immediately to a cyber attack or insider threat. Advanced machine learning is used by Delinea Privileged Behavior Analytics to analyze activity on privileged account in real-time. This allows you to spot anomalies and provide threat scoring as well as configurable alerts. Advanced machine learning analyzes all activity on privileged accounts to identify problems and determine the extent of a breach. Security improvements can reduce security risks for your organization and save your department time, money and resources.
-
45
AuthMind
AuthMind
AuthMind can help you prevent your next identity-related cyberattack. It works anywhere, and can be deployed in minutes. We use an increasing number of applications, systems and environments, which span different environments (clouds, SaaS apps or on-premises). It's obvious that keeping them safe is more difficult than ever. Traditional security tools are prone for human error and misconfiguration, which leaves the organization at risk. It is important to look beyond the organization's existing identity infrastructure. AuthMind provides end-to-end visibility of user activity across an integrated application landscape. AuthMind detects and remediates previously unknown security gaps, such as shadow access, exposed asset, compromised identities, unknown SaaS applications, shadow accesses and lack of MFA. AuthMind can be used in any cloud or network. -
46
AVG Internet Security
Avast
$3.29 per month 6 RatingsYou can have total security online. AVG Internet Security is an award-winning antivirus that offers customizable firewalls, remote access protection against hackers, as well as award-winning antivirus. AVG Internet Security protects you from viruses and malware, keeps emails safe, protects passwords and webcams from hackers, and allows you to shop and bank online with no worries. Advanced Antivirus scans your computer for viruses, ransomware and spyware. If suspicious software behavior is detected on your computer, Behavior shield will send alerts. AI Detection proactively detects malware samples to protect your computer from new threats. CyberCapture automatically uploads malware samples to our antivirus software for analysis. This prevents new threats. You can stay safe online by scanning downloads, emails, and links for potential threats. Also, avoid unsecure Wi-Fi networks. Link Scanner scans links for suspicious content to avoid dangerous websites. -
47
CrowdStrike Falcon
CrowdStrike
8 RatingsCrowdStrike Falcon, a cloud-native security platform, provides advanced protection from a wide range cyber threats including malware, ransomware and sophisticated attacks. It uses artificial intelligence (AI), machine learning, and incident response to detect and respond in real-time to threats. The platform uses a lightweight, agent-based solution that continuously monitors the endpoints to detect malicious activity. This provides visibility and protection with minimal impact on system performance. Falcon's cloud architecture ensures rapid updates, scalability and rapid threat response in large, distributed environments. Its comprehensive security capabilities help organizations detect, prevent, and mitigate cyber risks. This makes it a powerful tool in modern enterprise cybersecurity. -
48
Innspark
Innspark Solutions Private Limited
Innspark, a rapidly-growing DeepTech Solutions company, provides next-generation cybersecurity solutions to detect, respond and recover from sophisticated cyber threats, attacks, and incidents. These solutions are powered by advanced Threat Intelligence and Machine Learning to give enterprises a deep view of their security. Our core capabilities include Cyber Security and Large Scale Architecture, Deep Analysis and Reverse Engineering, Web-Scale Platforms. Threat Hunting, High-Performance Systems. Network Protocols & Communications. Machine Learning, Graph Theory. -
49
Appgate
Appgate
A collection of cloud- and hybrid-ready security products and services that brings together a variety of different products and services. Appgate currently protects more than 1,000 organizations in 40 countries. Zero Trust: A Focused Approach. Security problems were created by distributed, on-demand IT. Security leaders find themselves stuck trying to solve today's problems by using yesterday's solutions, despite having more assets to defend and more complex issues to overcome. You can become a smaller target, making it more difficult for threat actors to identify resources and making them more resilient. Adopt an identity-centric, Zero Trust mindset. This will consider context before granting access. You can take proactive steps to identify and eliminate threats that could be affecting your organization. -
50
ZeroFox
ZeroFox
Social media and digital presence are a major part of many people's engagement strategies. Organizations spend a lot of money on them. Security teams must be able to understand and address the risks presented by digital platforms, which are the largest unsecured IT network on the planet. This 2 minute overview video will show you how ZeroFox Platform works. The ZeroFox Platform protects your brand, cyber, and physical security on social media and digital platforms. You can assess your organization's digital risk exposure on a wide range of platforms where cyberattacks occur. The ZeroFox mobile app puts the powerful protection of ZeroFox at your fingertips wherever and whenever you need.