What Integrates with SailPoint?

Find out what SailPoint integrations exist in 2024. Learn what software and services currently integrate with SailPoint, and sort them by reviews, cost, features, and more. Below is a list of products that SailPoint currently integrates with:

  • 1
    Box Reviews
    Top Pick

    Box

    Box

    $5.00 per user per month
    61 Ratings
    See Software
    Learn More
    Secure collaboration with anyone, anyplace, on any device. It is our top priority to protect your cloud files. We have developed advanced security controls, intelligent threats detection, and complete information governance. We also know that your needs are not limited to these security controls. Strict data privacy? Check. Check. Check. Check. You should check. Collaboration is key to your business. This includes customers, partners, vendors, and teammates. Everyone can work together on your most important content easily if they are in the same place. You should not be sharing files but frustration. You should be able to rest assured that your data is safe. It is a waste of time to work on cumbersome, manual processes every day. We let anyone automate repeatable workflows that are important to your business, such as HR onboarding and contract management. Your workflows will move faster. You have more time for what is most important.
  • 2
    Microsoft Exchange Reviews
    Business-class email and calendaring make it easier to work smarter. Exchange allows you to collaborate on critical documents and gives an organized inbox that prioritizes important messages. It adapts to your work style and adapts to your needs so you can get more done faster. Access to a personalized inbox with helpful features, a smarter way to view and interact via email and a smarter way to organize it. Search enhancements provide faster and more complete results. Add-ins allow for powerful customization and extensibility that connects you to modern services as well as internal line-of business applications. A calendaring system that does more than just schedule appointments and make commitments will help you organize your time. Automatically capture events such as hotel reservations and flights from email. Get suggestions based on where you are located about where to meet. Microsoft 365 offers many benefits that can help you and your company be more productive.
  • 3
    Cisco Duo Reviews
    Top Pick

    Cisco Duo

    Cisco

    $3 per user per month
    12 Ratings
    Secure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix.
  • 4
    Microsoft SharePoint Reviews
    Top Pick

    Microsoft SharePoint

    Microsoft

    $1.00/one-time/user
    15 Ratings
    Your mobile, intelligent intranet. You can share and manage knowledge, content, and applications to support teamwork, find information quickly, and collaborate seamlessly across the organization. SharePoint facilitates teamwork by providing dynamic and productive team sites that can be used by every project team, division, and department. Files, data, news and other resources can be shared. To streamline the work of your team, customize your site. You can collaborate securely and effortlessly with your team members, both within and outside of your organization, on PCs, Macs, or mobile devices. Your intranet can help you build cohesion and inform employees. You can increase organizational efficiency by sharing resources and applications on your home sites and portals. Beautiful communication sites can tell your story. Stay in the loop with personalized, targeted news via the web and the SharePoint mobile app. With powerful search and intelligent ways of finding information, you're only a click away.
  • 5
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 6
    Microsoft 365 Reviews
    Top Pick

    Microsoft 365

    Microsoft

    $5 per user per month
    105 Ratings
    Microsoft 365 (formerly Microsoft Office 365) is now available. Outlook, OneDrive and Excel, Word, PowerPoint, Excel, PowerPoint and OneNote allow you to be more creative and achieve the things that matter with Microsoft 365 (formerly Microsoft Office 365). You get the latest Office apps, both online and desktop, when you subscribe to Microsoft 365. You can access Office apps on your desktop, tablet, and phone. * Microsoft 365 + your device + Internet = productivity wherever and whenever you are. OneDrive makes it easy to access the work you have done from anywhere, and to others when you share or collaborate. There is help at every turn. Chat, email, or call to speak with a live person. Get Office today - choose the right option for you
  • 7
    Dropbox Reviews
    Top Pick

    Dropbox

    Dropbox

    $12.50 per month per user
    217 Ratings
    Dropbox Business is more than secure file storage. It's a smart workspace that brings together teams, tools, content, and other resources. You can create, store, and share cloud content using Google Docs, Sheets and Slides, Microsoft Office files and Dropbox Paper. Dropbox Spaces allows you to combine cloud content and files, so your PowerPoints can live alongside your Trello boards, Google Docs, and other tools. Access your team's work easily from any computer, mobile device or web browser. Connect tools such as Zoom and Slack to keep your team's files and conversations in one place. Intelligently suggested folders and files keep your team one step ahead. They will have the content they need when they need it. Dropbox offers a secure, distributed infrastructure with admin tools to control and visibility. Keep your company's data safe with Dropbox.
  • 8
    Workday HCM Reviews
    A HCM system that adapts to the future. Your workforce, where and how they work, and even the skills that you need to adapt, all change. How can you adapt to the future? Meet Workday Human Capital Management (HCM). Machine learning allows you to understand the skills of your people today and build talent around those skills tomorrow. Workday Human Capital Management allows you to make recommendations, suggest learning, and keep the lines of communication open. It's possible to do it at scale. Our augmented analytics uncovers insights from large data sets and explains why in stories that you can understand. Intelligent automation is provided throughout the attract-to-pay process. This eliminates manual tasks and empowers your employees to be their best selves. Workday HCM can help you manage your workforce, from compensation and payroll to benefits tracking and time tracking, to time tracking and more.
  • 9
    ServiceNow Reviews

    ServiceNow

    ServiceNow

    $100 per month
    1 Rating
    Digitize your workflows and they will love you for it. Your company will be more productive and your employees more engaged. ServiceNow makes work more enjoyable for employees. ServiceNow transforms old, manual ways to work into modern digital workflows so customers and employees get what they need when they need it. It's fast, simple, and easy. ServiceNow provides digital workflows that deliver great experiences and increase productivity for employees and enterprises. ServiceNow simplifies the complexity of work with a single enterprise cloud platform. The Now Platform: An intelligent, intuitive cloud platform that allows you to work smarter. You can choose from our workflows, or create your own apps. Our product portfolio is built on the Now Platform and delivers the IT, Employee, Customer, and Customer Workflows that matter. We also offer enterprise solutions to help you drive every aspect of your digital transformation. Get the amazing experiences you desire and unlock the productivity that you need. Now, native mobile capabilities are available for every day work across the enterprise.
  • 10
    Active Directory Reviews

    Active Directory

    Microsoft

    $1 per user per month
    Active Directory stores information about objects in the network and makes it easy for administrators and users find and use this information. Active Directory uses a structured database store to organize directory information in a hierarchical, logical way. This data store, also known by the directory, contains information about Active Directory object. These objects usually include shared resources like servers, volumes and printers as well as the network user account and computer accounts. See Directory data store for more information on Active Directory. Active Directory security is integrated through logon authentication. This allows for access control to objects within the directory. Administrators can manage their directory and organization through one network logon. Authorized network users have access to all resources on the network. The management of complex networks can be made easier by policy-based administration.
  • 11
    RadiantOne Reviews

    RadiantOne

    Radiant Logic

    Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes.
  • 12
    Indent Reviews

    Indent

    Indent

    $8 per month
    Faster access unlocks more revenue. Give your team on-demand access to apps that is faster and easier without frustrating them. Slack allows users to request access to apps. Managers can approve or deny the request from Slack. All of this is auditable. Stop manually catherding approvals. Every time an access is granted, there's a security risk. Indent helps teams to scale security and least-privilege by shifting users from permanent access without slowing things down. Automate spreadsheet-based processes for SOC 2, SOX ISO and HITRUST. Controls and policies are baked directly into the access request workflows. Reduce your license footprint by only providing access when needed, instead of granting permanent access. Indent reduces costs without adding friction to the end user experience. If you want to lead a rapidly growing company to success, you need to take on big risks.
  • 13
    SAP BusinessObjects Business Intelligence Reviews
    Access to real-time insights from a single, scalable platform allows you to make better and more informed decisions. SAP BusinessObjects Business Intelligence provides a central suite for data reporting, visualization and sharing. It is the on-premise BI layer of SAP's Business Technology Platform. It transforms data into useful insights that are available anywhere, anytime. The SAP BusinessObjects Business Intelligence suite (BI) allows you to share insights and make better decisions. Our analytics platform supports your growth by offering flexibility. It can be used to support a variety of users and multiple interfaces. This product can be deployed on-premise and requires a perpetual licence. You can license and pay only for the functionality and users that you require.
  • 14
    PrivacyPerfect Reviews
    Your accountability solution to GDPR compliance. You can enjoy a smoother and easier regulatory compliance process that empowers privacy professionals around the world. You can empower your privacy program using one smart, simple-to-use and secure tool. It also integrates automation to assist you in all your compliance tasks. Your compliance should be visible to your key stakeholders. Pre-designed, automated reports make it easy to communicate your results to the privacy team as well as to upper management. You have full control over your privacy administration. Smart automation can be used to standardize and streamline your processes. Ensure compliance with the GDPR and simplify your data protection efforts.
  • 15
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 16
    Visual Identity Suite Reviews

    Visual Identity Suite

    Core Security (Fortra)

    Visual Identity Suite (VIS), previously offered by Courion as part of its Core Security Identity Governance and Administration portfolio, empowers organizations to view user privileges and access certificates in a new way. It uses an intelligent, visual-first approach. You can quickly identify outliers and see common user entitlements using an intuitive graphical interface. This allows you to quickly identify the right people to access what information. VIS allows you to see what access looks like within your business so that you can manage identity chaos and mitigate identity risk. Intelligent and visible identity governance across all your environments is essential for reducing identity risk within your organization. To simplify your identity governance and administration, you should use a visual-first approach to the creation and management access reviews and roles.
  • 17
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 18
    SafePaaS Reviews
    SafePaaS provides proven solutions to specific industry Governance Risk and Compliance issues. SafePaaS Industry Controls Solutions increase margins by mitigating operational losses in all major industries, including Consumer Goods, Education, Energy, Financial Services, Health Care, High Tech, Life Sciences, Manufacturing, Media & Entertainment, Public Sector, Retail and Transportation, Construction, Banking. SafePaaS optimizes every significant business process and provides embedded controls to ensure that organizations can shift to a proactive, predictive GRC management approach. This is in contrast to an informal or reactive approach. SafePaaS Process Controls Solutions can be used in all major business areas, including Financial Management, OrderManagement and Supply Chain Management. SafePaaS provides a complete governance, risk and compliance platform with integrated ERP application controls management for all major ERP systems.
  • 19
    Sendmail Reviews
    The Sentrion platform for sending mail is designed to handle large, complex environments. However, we make a portion of it open-source. Sentrion isn't for everyone. However, if you use open-source email in a complex environment and need an enterprise platform to support your messaging roadmap for years (virtualization of consolidation, cloud migration, etc.) Sentrion may be right for you. The Domain Keys Identified Mail Internet standard allows email senders to digitally sign messages so that recipients can verify that they have not been forged. DKIM sender authentication scheme lets the recipient of a message confirm that the message was sent from the sender's domain. It also ensures that the message content is not altered. DKIM, a cryptography-based solution, provides businesses with an industry-standard way to reduce email fraud and protect their brand and reputation at a relatively low cost.
  • 20
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 21
    Proofpoint Insider Threat Management Reviews
    Proofpoint's Insider Threat Management solution (ITM) is the most comprehensive and people-centric ITM solution available. It protects against brand damage and data loss caused by insiders who act maliciously, negligently or unknowingly. Proofpoint correlates data and activity, empowering security teams with the ability to identify risk, detect insider data breaches, and speed up security incident response. In the last three year, the cost of insider security threats has doubled. 30% of data breaches were caused by insiders. Proofpoint empowers teams to reduce the risk and frequency of insider threats, accelerate their insider response and increase efficiency. We have gathered all of the resources you need, including reports and strategies, to help you reduce the risk of insider threat. Users' activity, data interactions, and risk are correlated in unified explorations, and visualized using timeline-based views.
  • 22
    Omnistrate Reviews
    Build and operate a multi-cloud service at a tenth of the cost using enterprise-grade features like SaaS provisioning and billing, serverless autoscaling and monitoring, auto-recovery and intelligent patching. Create a managed cloud service for your data products with enterprise-grade features. Automate platform engineering for software delivery and zero-touch management. Omnistrate simplifies SaaS launches by combining all the essentials. No more building undifferentiated products from scratch. Scale across clouds, regions and environments, service offerings and infrastructure with just one API call. We don't require access to the data of your customers or your software because we are built on open standards. Scale your cloud offering seamlessly using auto-scaling, with a scale of zero. Automate mundane, repetitive and undifferentiated tasks to focus on your core product.
  • 23
    BeyondTrust Privileged Remote Access Reviews
    Without a VPN, you can secure, manage, audit, and audit vendor access and internal remote privilege access. Watch demo. Allow legitimate users to access the information they need to be productive while keeping hackers out. Contractors and vendors can have privileged access without the need for a VPN. With session forensics and audit trails, you can satisfy both internal and external compliance requirements. Adopting a system that allows users to do their jobs more efficiently and effectively than today is a guarantee of adoption. Protect your IT assets by preventing "privilege creep" by quickly enforcing least privilege. Protect your data without compromising security by making least privilege productive.
  • 24
    Proofpoint Digital Risk Protection Reviews
    Proofpoint Digital Risk Protection protects your customers and brand from digital security risks on web domains, social networks, and the dark and deep web. It is the only solution that provides a comprehensive defense for all digital engagement channels. Digital Risk Protection protects your company and customers against digital risks across your entire social media network. Our solution protects you social media presence against account takeovers, social phishing scams, malicious content, and social media phishing scams. Request a demo to map your social, mobile and domain footprints and discover brand-owned accounts as well as fraudulent or unauthorized accounts. Protect your customers and brand from dark web, social media and web domain threats. Protect your domain investments against domain squatters, typophishing campaigns, and other infringing domains. Our digital protection solution uses artificial intelligence to identify fraudulent domains that could pose a threat to your brand or customers.
  • 25
    Securonix Security Operations and Analytics Reviews
    The Securonix Security Operations and Analytics Platform combines log monitoring, user and entity behavior analytics, next-generation security information and management (SIEM), network detection and response, (NDR), and security orchestration automation and response. It is a complete, end to end security operations platform. Securonix's platform is able to scale up to unlimited levels, thanks to advanced analytics, behavior detection and threat modeling, as well as machine learning. It improves security by increasing visibility, actionability, security posture, and management burden. The Securonix platform supports thousands of third-party vendors, technology solutions, making security operations, events and escalations much easier. It scales easily from startups to large enterprises, while offering the same security ROI and transparent and predictable cost.
  • 26
    Securonix NDR Reviews
    Advanced threat monitoring that combines security logs, network traffic, and entity context. Advanced threats can be detected using security information and event management (SIEM), or standalone network traffic analysis (NTA). Securonix threat chains, which span across security events and network traffic, can reduce false positives by more than 90%. You can improve efficiency and reduce operational overhead associated with training and enablement by only using one console and database for all events. Advanced cyberattacks are often slow, low-level and require multiple steps. Monitoring and correlating indicators for compromise (IOC), across event sources is necessary to detect such threats. Securonix Spotter allows for lightning-fast threat hunting via natural language search.
  • 27
    TrU Identity Platform Reviews
    TruU Identity Platform. The most complete and advanced passwordless identity solution available today. TruU uses specialized AI and ML algorithms for 99.99% accuracy to identify individuals. To secure access across the enterprise from desktops to VDI, you can use local phone PINs or biometrics to adapt. Activate behavioral biometrics when you're ready for maximum UX without compromising security. TruU allows remote workers to work seamlessly with out-of-the box VPN and VDI integration. It is designed to ensure security throughout the employee's entire lifecycle, from onboarding through user self-service. You can use your Android or iOS phone to unlock Windows, Mac, or Linux workstations even when you are offline. We integrate with leading PACS to remove kludgy badges, and transform the workplace experience. Passwords, especially, are the most common culprit in data breaches. It is estimated that up to 80% of data breaches begin with compromised credentials. It is also true that strict password policies can frustrate end users and lead them to adopt behaviors that make compromise easier.
  • 28
    PlainID Reviews
    PlainID is The Authorization Company. PlainID is a platform that allows both Business and Admin teams to easily manage their authorization process. It's based on your business logic. PlainID allows you to implement virtually any type of rule you can imagine, without the need for coding and in fine-grained detail. PlainID makes authorization easier by converting thousands of Roles, Attributes, and Environmental Factors into a few logical SmartAuthorization Policies using our Graph Database decision engine. PlainID offers in-depth analytics and insights. PlainID also provides full audit trails. They are easy to manage using a graph-based UI. Access is determined dynamically and immediately based on user attributes and environmental attributes (time, place, etc.). Access can be granted based on event-based authorizations as well as user attributes. PlainID combines ABAC & RABC to a united policy.
  • 29
    Aquera Reviews
    The Aquera Identity Integration Platform as a service is a cloud-based platform that provides SCIM gateway services to account provisioning and aggregation. It also offers orchestration services for password synchronization and user orchestration. Workflow services for the governance and management of disconnected applications. It also offers password rotation gateway services for privileged accounts management. There are also a wide range of connectors available for cloud and on-premises applications. Built-on-demand connectors that are out-of-the box and ready-to-use can be used to connect to any cloud or onpremises application, directory, device or portal, as well as HR applications. The identity integrations are quick and easy to deploy. The platform features multi-purpose gateway services and out-of-the-box connectors for user provisioning/deprovisioning, HR application user onboarding/mastering, delta account aggregation, file operations, etc.
  • 30
    Core Security Access Assurance Suite Reviews
    Access Assurance Suite, previously known as Courion is a core security identity governance and administration portfolio of solutions. It's an intelligent identity and access management software solution that enables organizations deliver informed provisioning, meet ongoing regulatory compliance and leverage actionable analytics to improve identity governance. Our identity management software, which is comprised of four industry-leading modules offers the best way to mitigate identity risk. It provides a complete solution for streamlining provisioning, reviewing access requests and managing compliance. Access to a web portal that allows end users to request access. Managers can approve, deny, or deny access. Core Access uses a shopping cart approach to manage access. It is more efficient than email forms, paper forms, or tickets.
  • 31
    Intercede Reviews
    MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability.
  • 32
    Intellicta Reviews

    Intellicta

    TechDemocracy

    TechDemocracy's brainchild, Intellicta is the first to provide a comprehensive assessment of an entity's cybersecurity compliance, risk, and governance. It is the only product that can predict potential financial liabilities arising from cyberspace vulnerabilities. Intellicta empowers non-technical business decision makers to evaluate, measure and evaluate the effectiveness of their cybersecurity, governance, and compliance programs. The platform can be tailored to meet any company's specific business requirements. It uses quantifiable metrics that are based on proven models such as ISO, NIST, ISM3, and NIST to provide solutions. Intellicta boasts an open-source architecture that aggregates, analyzes, and monitors every aspect of an enterprise's unique ecosystem. It can extract critical information from cloud-based, on premises and third-party systems.
  • 33
    Elevate Security Reviews
    Pinpoint the users and actions that are most likely to cause a security breach. To reduce breach risk, proactively implement tailored policies and controls. Leaders and employees will receive personalized, actionable feedback. Pinpoint the users most likely to cause a security breach and proactively implement policies & controls to quickly and effectively reduce risk. Elevate Security Platform helps security teams automate controls to reduce risk, prevent breaches and eliminate friction. It supports strong security decisions. Intelligent and adaptive security controls that are based on Human risk scores can help reduce the human attack surface. They also automate interventions instead of burdening employees with ineffective one-size-fits all controls. You can tailor communications to individual behavior and policy controls. Know which controls are effective and which ones are not. Personalize responses at all levels of an organization, including staff, managers, and executives.
  • 34
    Optiv Managed XDR Reviews
    Attackers are sneaky, persistent, and motivated and may use the same tools as you. They can hide in your environment and expand access quickly. Because it's our cyber ecosystem, we know it. The secret sauce to our MXDR solution's success is based on our experience, proven IP, best technology, leveraged automation, and top-shelf talent to manage all of it. Let's work together to create a customized solution that protects your company from threats and attacks. We will start with your existing investments in network, cloud, email, and endpoint/IoT tools. Our experts will bring together all the relevant technology specialists, enabling technology orchestration. This reduces the attack surface, detects threats quicker, and automates deep investigations through a continuous approach.
  • 35
    XYGATE SecurityOne Reviews
    XYGATE SecurityOne, the next-generation risk management platform and security analytics platform, has all the components you need to make sure your team is prepared to face security threats. SecurityOne is a browser-based dashboard that combines patented contextualization technology with real-time threat detection and integrity monitoring. It can also manage privileged access management. SecurityOne is available on-premise or in cloud. SecurityOne provides real-time threat and compliance data that strengthens your team and allows them to respond quickly to risks. This saves time, increases operational efficiency, and maximizes the return on security investment. XYGATE SecurityOne®, provides real-time security analytics and intelligence for the HPE integrity nonstop server. XYGATE SecurityOne can detect non-stop specific indicators of compromise and alert on suspicious activities.
  • 36
    XYGATE Identity Connector Reviews
    It can be difficult to manage strong passwords and credentials. It can be difficult to manage and store strong passwords and credentials. Current methods of managing user access are inefficient and out-of-date. These processes are manual and complex, and they don't relate to core business initiatives that drive change within an enterprise. Governance is often a last-minute decision, making many enterprises more vulnerable to security risks and non-compliance of internal corporate mandates or external regulations. SailPoint IdentityIQ allows you to view and control non-stop user data. Rapidly identify entitlement and risk issues. Automate the provisioning process. Account compliance issues can be addressed. SailPoint certified integration. CyberArk certified integration. Integrated with XYGATE Suite
  • 37
    SQLXPress Reviews
    Modern, graphical-based solutions for managing NonStop SQL and Enscribe database. SQLXPress is a Windows-based graphical user interface that allows for the comprehensive management of HPE NonStop SQL database. It can be configured to support SQL/MX or SQL/MP, as well as both. SQLXPress offers comprehensive support for managing complex databases. This solution is an essential companion product to NonStop SQL. It is an integrated set that includes tools specifically designed for SQL/MX version 3.0 or later and SQL/MP Version 350. SQLXPress's modular design makes it easy to use for database administrators, software developers and quality assurance analysts as well as technical support staff. SQL "whiteboard" supports syntax-highlighting, code completion, command histories, and many other features. NonStop SQL allows you to import and export data from other databases. Track plans for modules, programs, and standalone queries.
  • 38
    BeyondTrust Cloud Privilege Broker Reviews
    Cloud Privilege Broker provides your team with the tools to visualize, manage and monitor entitlements across multi-cloud infrastructure. A centralized dashboard that is cloud-agnostic and provides key metrics. Continuous discovery of users, roles and policies across all cloud platforms. From a single interface, you can make granular policy recommendations for IaaS and PaaS platforms. BeyondTrust Cloud Privilege Broker is an entitlements and authorizations management solution that allows customers to visualize and manage cloud access risks in hybrid and multi-cloud environments. It can be accessed from one interface. Each cloud service provider has its access management tools. However, they are limited to their own environments and cannot be extended to other providers. Teams are left to move from console to console trying to manage permissions for each cloud provider. There are also different ways to apply policy to each platform.
  • 39
    Blink Reviews

    Blink

    Blink Ops

    Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls.
  • 40
    Jellyfish Reviews

    Jellyfish

    Cogito Group

    Jellyfish was designed as a modular solution. A series of connectors (Cognectors) has significantly improved the management of identity, credentials, and access to security products. These connectors allow for automatic workflows, data passing through disparate systems, and triggers on one platform (example PACS), to affect another (example LACS). The Service Bus is fed data by the Cognectors from disparate systems. This allows for a variety of benefits, including improved monitoring and reporting of activity. As people move within and leave organisations, access to systems and building areas can be easily added or removed through existing HR functions. Jellyfish integrates with physical and logical access control systems using adaptive support and modern authentication protocols. Jellyfish is focused on future-proofing security by using emerging standards and multifactor authentication.
  • Previous
  • You're on page 1
  • Next