Submotion Description

Submotion provides an easy overview of who has which access to which systems. Submotion's central view gives you a spreadsheet-like overview of your team and services. It's quick and easy for everyone to see what access they have. Submotion is used by many companies. One of their first reactions to Submotion is often surprise at the old accounts they have that are being used by people who are not working with them. This is not only an expense but a liability. It can be especially problematic if someone has been laid off and feels disgruntled. It can lead to a poor onboarding experience for new members if they don't have access to the right systems or don't know who to contact to get them. Security is important to us! All communication is encrypted. All keys and tokens are encrypted in the database that is hosted with the world-class web hosting provider Amazon Web Services.

Pricing

Pricing Starts At:
$3 per user per month
Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
submotion
Year Founded:
2018
Headquarters:
Denmark
Website:
submotion.io

Media

Submotion Screenshot 1
Recommended Products
Deliver secure remote access with OpenVPN. Icon
Deliver secure remote access with OpenVPN.

Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Get started — no credit card required.

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Online

Submotion Features and Options

SaaS Management Software

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

Network Traffic Analysis (NTA) Software

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Submotion User Reviews

Write a Review
  • Previous
  • Next