Best Vault One Alternatives in 2024
Find the top alternatives to Vault One currently available. Compare ratings, reviews, pricing, and features of Vault One alternatives in 2024. Slashdot lists the best Vault One alternatives on the market that offer competing products that are similar to Vault One. Sort through Vault One alternatives below to make the best choice for your needs
-
1
Cisco Duo
Cisco
1,285 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Auth0
Okta
809 RatingsAuth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO. -
3
ManageEngine ADManager Plus
ManageEngine
471 RatingsADManager Plus is an easy-to use Windows Active Directory (AD), management and reporting solution that aids AD administrators and help desk personnel in their day to day activities. The software has a web-based GUI that is intuitive and central. It handles complex tasks such as bulk management of user accounts, other AD objects, and delegate role-based access for help desk technicians. It also generates a comprehensive list of AD reports, which are essential to satisfy compliance audits. The Active Directory tool also includes mobile AD apps that enable AD technicians and administrators to perform user management tasks on the go, right from their mobile devices. -
4
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
5
Uniqkey
Uniqkey
175 RatingsUniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management. Uniqkey combats the most significant threats to company infrastructure by safeguarding critical systems and company credentials with state-of-the-art encryption. It also offers unique insights and a comprehensive view of IT infrastructure, employee access, and security scores, making it a valuable tool for IT teams to monitor security policies and assess the impact of awareness campaigns with confidence. With powerful integrations and synergies with existing infrastructure such as Microsoft, IT managers can quickly provision or de-provision users for seamless onboarding and offboarding, all while protecting their entire IT infrastructure with advanced encryption. Engineered by leading European security experts, we leverage the latest encryption methodologies and technology, including offline encryption of all our data. Our modern tech stack and servers, hosted locally in Denmark, ensure maximum security, data integrity, and compliance with European regulations, providing our customers with peace of mind. -
6
SolarWinds Access Rights Manager
SolarWinds
1 RatingSolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation. -
7
Securden Unified PAM
Securden
Privileges and associated credentials are extremely important as they grant access to your organization's most sensitive information. The type of sensitive information varies a lot based on the industry. For example, healthcare organizations hold a lot of patient data and banks and financial institutions hold payment details, customer data. It is important to lock down access to these privileged accounts. Often, these accounts are left unmanaged and spread around the entire organization. You need a Privileged Access Management solution like Securden Unified PAM that helps consolidate all privileged identities and accounts into a centralized vault for easy management. Restrict access to these privileged accounts and enforce principle of Just-in-time access. Users can launch one-click remote connections to IT assets they have access to. Monitor and manage remote sessions launched by users, third party vendors, IT admin with shadowing capabilities. Eliminate local admin rights from endpoints and use application control policies to efficiently enforce Zero-Trust without impacting productivity. Record and track all activities with comprehensive audit trails and actionable reports and ensure compliance with industry standards. -
8
The OptimalCloud
Optimal IdM
$2/user/ month The OptimalCloud from Optimal IdM provides a scalable and affordable Identity and Access Management Solution that meets the security and usability requirements of small, medium-sized and large enterprises. The OptimalCloud platform is available for both consumer and workforce deployments. Each pricing tier includes multi-factor authentication (MFA), because good security shouldn't be more expensive. The OptimalCloud integrates with over 11 thousand applications, making it easier to set up and configure. It also offers 24 x 7 x 365 support with a 99.99% uptime guarantee. -
9
AWS Identity and Access Management allows you to securely manage access to AWS resources and services. You can use IAM to create and manage AWS users, groups, and assign permissions to grant or deny access to AWS resources. IAM is an AWS feature that you can use at no additional cost. Only your users will be charged for access to other AWS services. IAM allows your users to restrict access to AWS service APIs or to specific resources. IAM allows you to specify conditions, such as the time of day, IP address, SSL used, multi-factor authentication, and whether a user is authorized to use AWS. AWS MFA is a security feature that enhances password and user names to protect your AWS environment. MFA requires that users prove physical possession of a hardware MFA token, or MFA-enabled smartphone device by providing a valid MFA Code.
-
10
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
11
Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
-
12
Every organization should consider Secure Identity & Access Management due to the increasing number of remote workers, increased dependence on cloud applications, as well as explosive increases in cyber theft. IT teams can quickly, easily, and economically enable the right people to access the right resources using Passly™, a Kaseya company. Secure Password Management, Single Sign On, Multi-Factor authentication, and many more. It's crucial to choose the right secure identity and access management platform in a world where cyberattacks are more common than ever. Nearly 80% of all data breaches are due to weak passwords. Passly is the most cost-effective and comprehensive solution to ensure security, compliance, efficiency, and compliance. Techs can store and manage passwords for personal, business, or shared accounts using shared password vaults. It is centralized and easy-to-use
-
13
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
14
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
15
Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
-
16
Your multi-vendor infrastructure can be centralized into one security domain. Core Privileged Access Manager, (BoKS), transforms multi-vendor Linux or UNIX server environments into one centrally managed security area. BoKS makes it easier for your organization to enforce security policies and control access to sensitive systems and information. IT and security teams can prevent attacks from internal and external sources on critical systems by having full control over access, privilege, and accounts. For simplified administration and scaling, centralize the management of user accounts and profiles. You can secure your systems by controlling user privileges and accessing sensitive data. This will not slow down productivity. You should limit access to users and ensure that the least privilege access is allowed in your hybrid environment.
-
17
Akku
CloudNow Technologies
$5.00/year/ user Simplified user lifecycle for corporate users. Akku is a flexible, robust identity and access management system that can help you manage each stage of your user lifecycle. Akku's versatile features help improve data security, standards compliance and efficiency, as well as productivity. Akku is a cloud SSO solution that integrates easily with any cloud or in-house applications. It also includes a range security and access control features that allow for seamless user provisioning, management, access control, and deprovisioning. Akku is an agentless IAM solution that does not require the installation of a user agent on your infrastructure. You can see exactly which parts of your sensitive user data Akku can access so you have transparency and control. -
18
miniOrange
miniOrange
$1 per user per month 1 RatingminiOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange. -
19
LastPass
LastPass
$4 per user per month 32 RatingsLastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere. -
20
Silverfort
Silverfort
1 RatingSilverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication. -
21
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
22
Teleport
Teleport
The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure. -
23
WALLIX Bastion
WALLIX
WALLIX Bastion's PAM solution is easy to use and deploy. It provides robust security and oversight of privileged access to critical IT infrastructure. With simplified Privileged Access Management, you can reduce the attack surface, protect remote access, and comply with regulatory compliance requirements. WALLIX Bastion provides top session management, secrets management and access management features to secure IT environments and enable Zero Trust policies. It also protects internal and external access of sensitive data, servers and networks in industries that range from healthcare to finance to industry, manufacturing, and even finance. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion can be used both on-premise or in the cloud for maximum flexibility, scalability and the lowest total cost of ownership. WALLIX Bastion PAM natively integrates to a full suite security solutions -
24
Deepnet DualShield
Deepnet Security
You are searching for an enterprise-grade 2-factor authentication (2FA), or multi-factor authentication(MFA) product that can protect all business applications and provide a wide range authentication methods, then you have come to the right place. Deepnet DualShield, a multi-factor authentication platform, unifies a variety authentication methods, protocols and solutions, as well as user experience, in one platform. DualShield offers self-service Password Recovery, Single Sign-On, Identity & Access Management, (IAM), and Adaptive Authentication. It is the most flexible and powerful multi-factor authentication system available. Deepnet DualShield is available on-premises or in a private cloud. This means that you have complete control over your user authentication system and can keep your users' credentials and identities safe. -
25
Simeio
Simeio
Simeio offers the best Identity and Access Management (IAM), which engages securely with anyone, anywhere and anytime with an unmatched "service first" philosophy. We can help you protect your customers, partners, and employees identities. Our job is to make access easy, reliable, and secure, wherever you are, in all areas of banking, hospitality and healthcare, as well as government and universities. We can also protect your brand reputation by protecting identities. To create a platform of exceptional reliability and security, we partner with, leverage, and interoperate solutions from the industry's most trusted businesses. Yes, our work is complex and specialized. You can let us handle all the complexity. We simplify the way your company manages identity. -
26
Symantec IGA
Broadcom
Although user experience and instantaneous access have become the norm, the IT infrastructure supporting these efforts has grown exponentially more complex. IT organizations are under constant pressure to reduce operational costs while still complying with increasing numbers of industry and government regulations. IT organizations must allow more people to access different applications in a shorter time span, while still being accountable to a multitude of parties who control access. Identity governance and administration technologies today must be able provide broad provisioning support for both on-premises as well as cloud apps. They also need entitlements certification to verify that privileges are appropriate. All this while scaling to store millions. -
27
CyberArk Workforce Identity
CyberArk
CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time. -
28
Finally, a password manager that is designed for collaboration. Secure, flexible, and ready for automation. Trusted by over 10,000 organizations, including Fortune 500 companies and newspapers as well as governments and military forces. Passbolt servers have been designed to be easy to set up and manage. They are enterprise-ready and can be configured to support high availability. Passbolt is available via your browser or your mobile phone. Real-time sharing is possible. Desktop apps are on the horizon. The JSON API allows you to retrieve, store, and share passwords programmatically. Automate at scale using Passbolt CLI Access logs in real-time. Privacy is part of our DNA, and also in the DNA European laws (to ensure we don't change minds). Passbolt's self-hosted source code is covered by an AGPL license. Yes, even the commercial version. It is free to be audited, contributed to, and redistributed. This is why we have thousands of organizations from all sectors.
-
29
IBM Verify
IBM
Cloud IAM can be combined with deep context for risk-based authorization to provide secure, frictionless access for your workforce and consumers. Identity and access management cannot be separated as organizations modernize hybrid multicloud environments with a zero trust strategy. Cloud IAM strategies must use deep context to automate risk protection, and authenticate every user to any resource. Your business needs should be considered when designing your journey. As you design and tailor the cloud IAM architecture that will either replace or enhance your existing infrastructure, you can protect your investments and preserve on-premises applications. Your users expect one-click access from any device, to any application. New federated applications can be integrated to one sign-on (SSO), embed modern multifactor authentication (MFA), simplify logistics, and provide developers with consumable APIs. -
30
TraitWare is a Real Passwordless Multifactor Authentication (MFA) that allows for True Zero Trust Access. TraitWare's plug-and-play, enterprise-class, patented solution combines Passwordless MFA (Multi-factor authentication) and SSO. This eliminates the need for usernames or passwords, reduces friction, and increases security for your company. You'll also save up to 60% on support budgets. Our QR solution can eliminate the need to create a username. Our software is easy to use and virtually eliminates the vulnerabilities associated with password logins and usernames. We eliminate the possibility of phishing usernames and passwords by replacing them. Our QR scan or Direct login ties a user directly to the login, eliminating credential sharing or theft.
-
31
EmpowerID
EmpowerID
$2 per user per monthEmpowerID, the award-winning all-in-one identity management system and cloud security suite created by The Dot Net Factory LLC dba EmpowerID, is an award-winning product. EmpowerID is responsible for managing millions of on-premise and cloud identities for organizations all over the world. EmpowerID offers a wide range of solutions, including single sign-on, user creation, identity governance, group management and role mining. It also provides delegated identity administration, password management and privileged access management. It also provides an identity platform for developers. All solutions use a single, sophisticated role and attribute-based authorization engine to handle complex organizations and multi-tenant SaaS provider SaaS providers. We offer a fully customizable, highly scalable IAM infrastructure that is more cost-effective and faster for your business. -
32
Evo Security
Evo Security
Evo Security allows you to eliminate credential sharing, set up powerful administrative permissions and mass deploy login security. It also helps you meet insurance and compliance requirements. EPIC is a next-generation solution for MSPs and MSSPs. It also provides secure logins to web applications, network devices and endpoints. The secret of managed services is that MSP administrators must share passwords and MFA codes with each other. Password Rotation Tools and Password Managers offer convenience in sharing passwords with some iterative improvement, but ultimately propagate the problem. This involuntary bad practice is no longer acceptable, as cybercriminals are targeting MSPs at an increasing rate and regulations demand a better solution. Easily accommodate scenarios where technicians and administrators require access to the Evo Platform using the Evo Privilege Access Manager. -
33
LogonBox
LogonBox
Find the LogonBox Advantage and our innovative solutions for modern Enterprises. LogonBox is an independent software vendor. It develops software that helps organizations manage and protect user identities and credentials. LogonBox solutions can reduce helpdesk calls, increase productivity, secure access across heterogeneous enterprise environments, and protect network resources through the extension of authentication beyond the password. -
34
OmniDefend
Softex
OmniDefend protects your employees, contractors, and vendors using universal single sign-on and strong authentication to secure business applications and processes. OmniDefend eliminates fraud by identifying and securing customer transactions online or in-person using multi-factor authentication. OmniDefend lets you quickly add authentication to a website, so that you can provide a password-free experience for your customers while securing e-commerce transactions. OmniDefend uses industry-proven standards when it comes to security. OmniDefend supports OpenId 2.0, OAuth 2.0 and SAML to ensure maximum compatibility and security when using single-sign-on applications. SCIM 2.0 enables OmniDefend to seamlessly integrate with identity management and user provisioning. -
35
Jellyfish
Cogito Group
Jellyfish was designed as a modular solution. A series of connectors (Cognectors) has significantly improved the management of identity, credentials, and access to security products. These connectors allow for automatic workflows, data passing through disparate systems, and triggers on one platform (example PACS), to affect another (example LACS). The Service Bus is fed data by the Cognectors from disparate systems. This allows for a variety of benefits, including improved monitoring and reporting of activity. As people move within and leave organisations, access to systems and building areas can be easily added or removed through existing HR functions. Jellyfish integrates with physical and logical access control systems using adaptive support and modern authentication protocols. Jellyfish is focused on future-proofing security by using emerging standards and multifactor authentication. -
36
ManageEngine AD360
Zoho
$595.00 /year AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV. -
37
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management provides a complete solution in the areas IAM (Identity and Access Management), and CIAM ("Customer Identity and Access Management") respectively. This platform has several modules: Single Sign-On (SSO), Multiple-Factor Authentication (2FA or 2FA), Adaptive Authentication and Directory Services. It also offers Lifecycle Management. -
38
One Identity
Quest Software
Enterprise identity and access management can be simplified. You can reduce risk, secure data and comply with compliance by allowing your users access only to the data and applications they require. Identity and access management (IAM), can now be driven by business requirements, not IT capabilities. Identity Manager allows you to unify information security policies, and meet governance requirements -- both today and in the future. -
39
Entrust Identity Enterprise
Entrust
Strong digital security is possible with the world's most trusted on-prem identity and access management (IAM). Identity Enterprise is an integrated IAM platform which supports a wide range of consumer, worker, and citizen use cases. Identity Enterprise is ideal for high-assurance applications that require zero trust for thousands or millions users. It can be deployed on-premises as well as virtual appliances. Never trust, always verify. Your organization and user communities are protected both within and outside the perimeter. High assurance use case coverage includes credential-based access, smart cards issuance and best-in class MFA. This will protect your workforce, consumers, and citizens. User friction can be reduced with adaptive risk-based authentication and passwordless login. You can use digital certificates (PKI), which provide a higher level security, whether you have a physical smartcard or a virtual one. -
40
PortalGuard
BIO-key International
BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods. -
41
CzechIDM
BCV solutions
The IT department is often overwhelmed with routine requests relating to account management, such as manual account creation, password reset, auditing work, long inactive accounts. There is often no accounting of who has access and where. Our customers can automate their routine processes, centralize data systems, delegate account management and keep transparent evidence of permissions granted. Identity Management (IdM), is about centralizing access and identity management within IT systems. It allows the right people to access the right data sources at the right time and for the right reasons. And, most importantly, it has reliable evidencing records. We assist companies in improving Identity and Access Management. Our goal is to make companies more efficient and safer by simplifying user management across company systems. -
42
Ilantus Compact Identity
Ilantus Technologies
It is the first time that an IAM solution is available that is comprehensive, deep, and easy to implement even by non-IT personnel. This includes Access Management, Identity Governance and Administration. You can implement the solution step by step and at your own pace with an online digital guidance system. Ilantus offers free implementation support, unlike other vendors. Seamless SSO with "no app left behind", including on-premise or thick-client apps. All web apps, whether they are federated, non federated or thick-client, legacy, custom, or other apps, will be included in your SSO environment. Support is also available for mobile apps and IOT devices. What is your homegrown app? This will not be a problem thanks to our interactive digital help guide. If you need help, you can call Ilantus' dedicated helpline, available 24 hours a day, Monday through Friday, and we will assist you with the integration. -
43
Avatier Identity Anywhere
Avatier
$5.00/one-time/ user Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time. -
44
Delinea Secret Server
Delinea
Our enterprise-grade Privileged Access Management solution (PAM), will protect your privileged accounts. Available on-premise and in the cloud. Solutions for privileged account discovery, turnkey installations, auditing and reporting tools as well as out-of-the box auditing and reporting help you get up and running quickly. You can manage multiple databases, software applications and hypervisors. You can create endless customizations by utilizing cloud and on-premise PAM. You can either work with professionals or your own experts. Secure administrator, root, service, and application privileges across your enterprise. Secure your privileged credentials in a central vault. To prevent sprawl and get a complete view of your privilege access, identify all service, administrator, root, and application accounts. Provision and deprovision, password complexity and rotation credentials. -
45
ManageEngine M365 Manager Plus
Zoho
$345 per yearM365 Manager Plus is a comprehensive Microsoft 365 tool that can be used to report, manage, monitor, audit, and create alerts for critical activities. It is easy to manage Microsoft 365 services such as Exchange Online, OneDrive for Business and Skype for Business from one place. M365 Manager Plus offers extensive pre-configured reports on Microsoft 365. It helps you perform complex tasks such as bulk user management, bulk mail management, secure delegation, and bulk mailbox management. You can monitor Microsoft 365 services 24/7 and receive email notifications about service interruptions. M365 Manager Plus simplifies compliance management with built in compliance reports. It also offers advanced auditing, alerting, and reporting features to help keep your Microsoft 365 setup safe. -
46
Devolutions Server
Devolutions
Team Edition $499.99IT teams often face difficulties managing shared credentials and accounts securely, especially when multiple users need access to the same resources. Devolutions Server (DVLS) offers a self-hosted, shared account and credential management solution that helps organizations centralize, secure, and audit their credentials. By providing role-based access controls, encryption, and audit logs, DVLS ensures that only authorized users can access critical accounts, minimizing security risks and improving compliance. In addition to core credential management, DVLS includes optional privileged access components for organizations needing enhanced control over sensitive accounts. Seamlessly integrated with Remote Desktop Manager, it allows IT professionals to manage both credentials and remote sessions securely from a single platform. With DVLS, organizations can optimize their credential management processes while maintaining the highest level of security and accountability. -
47
Secure and Protect Privileged Credentials, Sessions, and Accounts Everywhere! RevBits Privileged Access Management offers six-in-one solutions that include privileged access, privileged session and password, service accounts and key and certificate management, extensive session logging, keystrokes and video capture, and extensive session logging. Native clients for RevBits Privileged access Management are available on common operating systems. As organizations need to manage access in a more comprehensive manner, so will the number of vendors that they use. RevBits Privileged Access Management was designed to provide comprehensive access management and reduce vendor onboarding. Organizations can manage their access with five integrated modules. Product Features: Hardware Tokens Comprehensive Platform Coverage Password Management - Customizable Audit Logs - Extensive Access Granting Workflow Ephemeral Passwords Complete Key Management SSL Scanner
-
48
SecureKi
SecureKi
Our unparalleled identity security is backed by zero-trust principles. This will ensure that your customers, employees, and business are protected. Passwords are the weakest link in protecting your data. Multifactor authentication is the standard for access management and identity protection to prevent unauthorized access. SecureKi verifies the identity of all users. Most security breaches are caused by compromised access and credentials. Our comprehensive privileged management system is designed to manage and monitor privileged accounts and applications, alert system administrators to high-risk events, reduce operational complexity, and comply with regulatory compliance. Privilege escalation is the heart of most cyber-attacks. -
49
Cymmetri
Cymmetri
$2 per monthCymmetri manages and protects the entire identity ecosystem, from employees and partners to customers or privileged users. Control user access with ease, ensuring efficient and secure operations in the digital world. It provides seamless identity protection to safeguard individuals and organizations anywhere, anytime. Streamline the onboarding process for all new employees. Cymmetri experts are available to discuss your IAM needs or demonstrate the power of Cymmetri. Our solutions have measurable outcomes that demonstrate the positive and tangible effects on security, efficiency and overall performance. Implementing robust cybersecurity improves data protection and minimizes the risk of breaches or unauthorized access. Our solutions will boost productivity by empowering employees to thrive within a secure, efficient and safe work environment. Our innovative solutions and optimized process will help you to increase efficiency, streamline operations and save money. -
50
SlashID
SlashID
Identity is a common vector of lateral movement and data breaches. SlashID helps build a compliant, secure, and scalable infrastructure for identity. Manage the creation, rotation, and deletion of identities and secret in one place. Multi-cloud inventory of all identities and secrets. Detect initial access, privilege elevation, and lateral movements across your IdPs, cloud environments. Add authentication, authorization and conditional access to your services. Rotate key materials to detect leaks in real-time. This will prevent data breaches. To reduce the impact of an attacker, you can automatically block, suspend or rotate MFA based on a detection. Add MFA and conditional accessibility to your applications. Add authentication, authorization and credential tokenization to your APIs and workloads.