Pathlock Description

Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Pathlock
Year Founded:
2004
Headquarters:
United States
Website:
pathlock.com
Update This Listing
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
On-Premises
Type of Training
Documentation
Live Online
Webinars
Customer Support
Phone Support
Online

Pathlock Features and Options

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

User Provisioning and Governance Software

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Privileged Access Management Software

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Data Governance Software

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management