Sentinel Description

PeopleSoft Security Simplified. All you need to manage security and auditing easily. Instantly identify missing objects or security differences between PeopleSoft environments. Comparisons of PeopleSoft objects with security permissions side-by-side A summary of the missing, added, or removed objects during migrations of Roles and Permissions lists to another environment. Sentinel has helped clients improve their security controls while reducing support time. Securely manage users, roles and permission lists. To see the Roles that grant access to users, drill down on any menu. A menu makes it easy to create accurate Permission Lists and Roles in a fraction the time. You don't need to lookup components. You can manage data masking for PII/PCI fields right from your profile.

Pricing

Pricing Starts At:
$600 per month

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Sentinel Software
Year Founded:
2017
Headquarters:
United States
Website:
www.sentinelsoftware.com

Media

Sentinel Screenshot 1
Recommended Products
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*! Icon
Top Rated Business VoIP Provider for 2024 for as low as $20/mo*!

Message, video, and phone on any device. Trusted by over 400,000 businesses.

- Includes 100+ Premium Features
- Unlimited Calling, Faxing, SMS, Conferencing.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars

Sentinel Features and Options

ERP Software

Accounting Integration
Accounting Management
CRM
Dashboard
Distribution Management
Enterprise Asset Management
Financial Management
HR Management
Inventory Management
Order Management
Project Management
Purchase Order Management
Purchasing
Reporting/Analytics
Sales Management
Supply Chain Management
Warehouse Management

Application Security Software

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation