101 Ergebnisse
Warum Capterra kostenlos ist
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data.
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data.
Offers privileged access management for people. Gain easy and secure access to containers and sensitive data.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Gate any content or asset with the BioSig-ID password, a gesture biometric that identifies people by four characters they draw
Many types of biometrics exist but only one stands apart from the rest. Advantages such as rapid deployment, lightweight API and affordable licensing put BioSig-ID within reach for any company or institution that requires the highest level of identity assurance to secure its operations. Multiple applications developed with BioSig-ID stops impostor log-in and sharing of passwords to reduce the liability of identity theft and fraud in real-time.
Many types of biometrics exist but only one stands apart from the rest. Advantages such as rapid deployment, lightweight API and affordable licensing put BioSig-ID within reach for any company or...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Identity and provisioning management solution for users rights administration and authorization management.
Identity and provisioning management solution for users rights administration and authorization management.
Identity and provisioning management solution for users rights administration and authorization management.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Fastpath Assure verbindet dein ERP/HCM/CRM, um die Zugriffssicherheit, Aufgabentrennung, Audit-Trails und Audit-Berichterstattung zu unterstützen.
Fastpath ist eine Software-Suite, die eine Verbindung zu ERP, HCM oder CRM herstellt, um Governance, Risikomanagement und Compliance zu unterstützen. Module für Zugriffsüberprüfungen, Aufgabentrennung, Audit-Trails und Identitätsmanagement wickeln viele der Analyse-, Berichts- und Abmilderungsprozesse ab, die für regulatorische und Sicherheitsanforderungen nötig sind. Mit vorgefertigten Integrationen ermöglicht Assure die kohärente Prüfung und Sicherheit zwischen mehreren Systemen. Die Lösung verfügt auch über eine universelle Produktintegration für zusätzliche anwendungsinterne Anwendungen.
Fastpath ist eine Software-Suite, die eine Verbindung zu ERP, HCM oder CRM herstellt, um Governance, Risikomanagement und Compliance zu unterstützen. Module für Zugriffsüberprüfungen,...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Akku is an Identity and Access Management (IAM) solution that provides enterprises with complete control over data access and privacy
Akku provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also comes with a 24x7 dedicated support service to provide hands-on deployment support as well as operational support through a dedicated team of professionals. With this service, Akku makes it easy for integrating legacy on-premise applications with a companys cloud environment.
Akku provides enterprises with complete control over data access and privacy on the cloud while ensuring that they stay compliant to statutory industry standards. Akku also comes with a 24x7...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
ERP Maestro makes managing access risk, compliance, and security in SAP® environments incredibly easy.
ERP Maestro's award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and fraud and accelerating remediation. Its industry-leading segregation of duties (SoD) analysis is used by seven of the worlds top 10 audit firms and empowers organizations to establish effective GRC processes.
ERP Maestro's award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
A multi-level approval flow & empowers organizations to manage security administrators to retrieve & deposit privilege credential
AccessMatrix™ Universal Credential Manager (UCM) provides a virtual password safe deposit box with strong encryption using HSM devices to store privileged account IDs and passwords (aka credentials). UCM provides the security features to address the major audit and operational challenges faced by organizations in managing credentials and its session activities.
AccessMatrix™ Universal Credential Manager (UCM) provides a virtual password safe deposit box with strong encryption using HSM devices to store privileged account IDs and passwords (aka credentials)....

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Able+ is a comprehensive cloud identity and access management (IAM) solution that also provides single sign-on (SSO).
Able+ is a comprehensive cloud identity and access management (IAM) solution that provides single sign-on (SSO) enabling organisations secure and managed access to applications in the cloud and behind the firewall. Delivers enterprise grade, granular management, reporting and automation of access and role permissions.
Able+ is a comprehensive cloud identity and access management (IAM) solution that provides single sign-on (SSO) enabling organisations secure and managed access to applications in the cloud and...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Basic Bytes is a software vendor. We specialized in delivering easy-to-use software solutions for large-scale enterprises.
Basic Bytes is a group of Microsoft Certified Trainers and Microsoft Certified Solution Experts among a lot of other certifications - we do software development and consulting.
Basic Bytes is a group of Microsoft Certified Trainers and Microsoft Certified Solution Experts among a lot of other certifications - we do software development and consulting.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Powertech Identity & Access Manager transforms multi-vendor Linux/UNIX server environments into one centrally managed security domain
Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organizations ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external critical system attacks before they start.
Powertech Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. It simplifies your organizations ability to...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Provides a single platform to orchestrate authorization, authentication, and opening accounts across every channel and application.
Provides a single platform to orchestrate authorization, authentication, and opening accounts across every channel and application.
Provides a single platform to orchestrate authorization, authentication, and opening accounts across every channel and application.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
A solution to manage critical applications by using externalized dynamic authorization.
A solution to manage critical applications by using externalized dynamic authorization.
A solution to manage critical applications by using externalized dynamic authorization.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
CMS Enterprise is a top PKI and Certificate Management solution for issuing and managing certificates with no per-certificate fees.
CMS Enterprise is a top PKI and Certificate Management solution for issuing and managing certificates with no per-certificate fees.
CMS Enterprise is a top PKI and Certificate Management solution for issuing and managing certificates with no per-certificate fees.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Privileged access management solution that helps businesses add a master password to secure sensitive information on the computer.
WinLock is a comprehensive security software for personal or publicly accessible computers running all versions of Windows. It is a program that ensures that only authorized people can access sensitive information on your computer. This security tool allows you to restrict your users from accessing important system resources like Control Panel, desktop, and system registry, disable Windows hotkeys (such as Alt-Ctrl-Del, Alt-Tab, Ctrl-Esc, etc.), block mouse, hide the Star
WinLock is a comprehensive security software for personal or publicly accessible computers running all versions of Windows. It is a program that ensures that only authorized people can access...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Systancia Cleanroom provides sterile and disposable virtual desktop for the administration of all your resources, on premise or cloud.
Systancia Cleanroom, formerly IPdiva Cleanroom, provides another approach to PAM, a modern defense system with the only sterile and disposable virtual administration workstation that goes far beyond the traditional bastion host. Systancia Cleanroom provides solutions to recommendations and problems not covered by other PAM solutions.
Systancia Cleanroom, formerly IPdiva Cleanroom, provides another approach to PAM, a modern defense system with the only sterile and disposable virtual administration workstation that goes far beyond...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Manage, monitor, and control access to your systems, equipment, facilities, and all other critical data for Office 365 and SharePoint.
Manage, monitor, and control access to your systems, equipment, facilities, and all other critical data. Users can submit an access request that triggers built-in approval workflow. Excellent tool for employee Onboarding.
Manage, monitor, and control access to your systems, equipment, facilities, and all other critical data. Users can submit an access request that triggers built-in approval workflow. Excellent tool...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Vulnerability-Management-App, mit der Sicherheitsexperten das Arbeitssystem scannen, Schwachstellen erkennen und Eindringversuche verhindern können.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Laut Hersteller die sicherste Cybersicherheitssoftware für Unternehmen.
Laut Hersteller die sicherste Cybersicherheitssoftware für Unternehmen. Securden bietet vollständige Kontrolle über den privilegierten Zugang, Sichtbarkeit ohne Barrieren und eine Zugangskontrolle über Cloud-, physische und virtuelle Umgebungen hinweg.
Laut Hersteller die sicherste Cybersicherheitssoftware für Unternehmen. Securden bietet vollständige Kontrolle über den privilegierten Zugang, Sichtbarkeit ohne Barrieren und eine Zugangskontrolle...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. OSS & Enterprise editions.
Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that need to secure their infrastructure and comply with security best-practices and regulatory requirements. It helps in having complete visibility into activity happening across org infrastructure while reducing the operational overhead of privileged access management.
Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
An innovative secrets management tool that is simple, universal and versatile without comprising security.
SecretHub is an innovative secrets management tool designed for every engineer. With SecretHub, you can securely provision your passwords and keys to your cloud applications with just a few lines of code, simplifying secrets management and reducing its implementation time from months to only 5 minutes. Integrated with more than 25 tools, SecretHub allows developers to connect their secrets to their existing cloud providers.As a universal and straightforward tool, SecretHub also encrypts secrets.
SecretHub is an innovative secrets management tool designed for every engineer. With SecretHub, you can securely provision your passwords and keys to your cloud applications with just a few lines of...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Privilegierte Kontozugriffskontroll-Lösung, die verschlüsseltes Passwort-Vaulting und vollständige Sichtbarkeit privilegierter Benutzeraktivitäten bietet.
Privilegierte Kontozugriffskontroll- und -überwachungslösung, die verschlüsseltes Passwort-Vaulting, vollständige Transparenz bei privilegierten Benutzeraktivitäten und Risikoanalyse-Tools bietet.
Privilegierte Kontozugriffskontroll- und -überwachungslösung, die verschlüsseltes Passwort-Vaulting, vollständige Transparenz bei privilegierten Benutzeraktivitäten und Risikoanalyse-Tools...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Xperience IT Access
Xperience IT Access
Xperience IT Access

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Enforce access policies such as segregation of duties before violations get introduced into the ERP system.
Enforce access policies such as segregation of duties before violations get introduced into the ERP system.
Enforce access policies such as segregation of duties before violations get introduced into the ERP system.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Application control solution that helps create, edit, and manage privileged access and policies to prevent unauthorized code execution.
Application control solution that helps create, edit, and manage privileged access and policies to prevent unauthorized code execution.
Application control solution that helps create, edit, and manage privileged access and policies to prevent unauthorized code execution.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
ADAPT is a standards-based login MFA platform that provides added login security without additional devices.
Plurilock ADAPT is a standards-based login multifactor authentication (MFA) platform that provides added login security without relying on fingerprint scans, SMS codes, authenticator apps, hardware tokens, or other intrusive legacy MFA requirements.
Plurilock ADAPT is a standards-based login multifactor authentication (MFA) platform that provides added login security without relying on fingerprint scans, SMS codes, authenticator apps,...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Open platform for mobile access with an API, Mobile and Lock SDK to easily integrate access into existing apps & locks.
Tapkey is an open platform for mobile access. It comes with an open API, Mobile and Lock SDK for partners to seamlessly integrate smartphone-based access into existing apps and create new access solutions for a connected world. In addition, there is an entire ecosystem of compatible hardware such as cylinders, wall readers, padlocks, and car sharing boxes. The access technology comes with excellent features such as smartphone keys, NFC transponders, NFC & Bluetooth as well as high security.
Tapkey is an open platform for mobile access. It comes with an open API, Mobile and Lock SDK for partners to seamlessly integrate smartphone-based access into existing apps and create new access...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
ManageEngine PAM360 Complete privileged access security for enterprise IT
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation of privileged access data with overall network data from a single, central console. Apart from warranting a tight privileged access security, PAM360 also aids businesses pass compliance audits by providing various out-of-the box compliance reports that relay organizational security.
ManageEngine PAM360 is a comprehensive privileged access security solution for enterprise IT teams. It empowers businesses with complete privileged access governance and facilitates deep correlation...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Verwalte und prüfe Zugriffsrechte in deiner gesamten IT-Infrastruktur.
SolarWinds® Access Rights Manager wurde zur Unterstützung von IT- und Sicherheitsadministratoren entwickelt, um Benutzerzugriffsrechte für Systeme, Daten und Dateien schnell und unkompliziert zu vergeben, zu entziehen, zu verwalten und zu kontrollieren, sodass ihre Unternehmen vor möglichen Datenverlustrisiken und Verletzungen der Datensicherheit geschützt sind.
SolarWinds® Access Rights Manager wurde zur Unterstützung von IT- und Sicherheitsadministratoren entwickelt, um Benutzerzugriffsrechte für Systeme, Daten und Dateien schnell und unkompliziert zu...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Provides visibility, security and control for your privileged accounts.
Provides visibility, security and control for your privileged accounts.
Provides visibility, security and control for your privileged accounts.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Access management tool that helps monitor privileged user activities and stop risky transactions to prevent business disruption.
Privileged Access Management by Greenlight ensures that your processes run quickly and business-critical applications are safe from the insider threat. Effectively and efficiently manage privileged user access within any application. Automate the process of provisioning and deprovisioning privileged users while monitoring access risks in real time and preventing them for occurring. View audit trails of all change actions, simplify audit preparation & reporting, and much more.
Privileged Access Management by Greenlight ensures that your processes run quickly and business-critical applications are safe from the insider threat. Effectively and efficiently manage privileged...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Application Access Cloud Making private app access amazingly simple.
Axis Security makes secure remote access great for users and safer for businesses. The agentless solution quickly delivers tightly managed access to employees, partners and other stakeholders through a purpose-built zero-trust cloud security platform. Unlike legacy solutions that provide excess access and unnecessary risk, Axis Securitys unique Application Isolation Technology assures access to only the resources required, and users never enter the network.
Axis Security makes secure remote access great for users and safer for businesses. The agentless solution quickly delivers tightly managed access to employees, partners and other stakeholders through...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Software suite that provides full compliance to organizations.
Software suite that provides full compliance to organizations.
Software suite that provides full compliance to organizations.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Author ABAC/PBAC policy in natural English, translate one product's policy to another, and get sophisticated visualized analytics.
Author ABAC/PBAC policy in natural English, translate one product's policy to another, and get sophisticated visualized analytics.
Author ABAC/PBAC policy in natural English, translate one product's policy to another, and get sophisticated visualized analytics.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
SkyPoint makes it simple to give users control over their personal data and automate compliance to privacy laws such as CCPA or GDPR
SkyPoint Cloud is a customer data platform that champions privacy and compliance through connected privacy-first customer experiences. Using 200+ pre-built connectors and real-time integrated data, SkyPoint provides a customer 360 consent management platform that keeps your organization CCPA and GDPR compliant. Some of the best-known companies rely on SkyPoint for their data privacy, privacy-first marketing, sensitive data storage and compliance programs.
SkyPoint Cloud is a customer data platform that champions privacy and compliance through connected privacy-first customer experiences. Using 200+ pre-built connectors and real-time integrated data,...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
It detects security misconfigurations in SaaS solutions.
It detects security misconfigurations in SaaS solutions.
It detects security misconfigurations in SaaS solutions.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Security management tool that helps businesses monitor system activities, manage personnel, and generate reports on a unified platform.
Security management tool that helps businesses monitor system activities, manage personnel, and generate reports on a unified platform.
Security management tool that helps businesses monitor system activities, manage personnel, and generate reports on a unified platform.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Akeyless Vault is an unified platform for Secrets Management and Zero Trust Access
Akeyless Vault is an unified platform for Secrets Management and Zero Trust Access
Akeyless Vault is an unified platform for Secrets Management and Zero Trust Access

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Get visibility into access decisions of who is authorized to do what across all organization assets.
Bring visibility into access decisions so that IT Professionals and Application Owners can get a clear view of who is authorized to do what across all organization assets in todays complex business environment. This single source of truth contains, along with access entitlements, the business context that is essential to build a dynamic access authorization model. Utilize PlainID PBAC platform to deploy a Policy-Based Access Control (PBAC) model and supercharge your IAM.
Bring visibility into access decisions so that IT Professionals and Application Owners can get a clear view of who is authorized to do what across all organization assets in todays complex business...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Improve visibility and traceability of identities and access rights with Europe's best SaaS IAM.
Efecte IAM is the perfect tool for automated and compliant Identity and Access Management. In a service-driven world that's increasingly digital and intelligent, Efecte IAM helps increase the speed of IAM administration processes dramatically. Efecte IAM provides organizations with prebuilt workflow automation, real-time governance capabilities, and user self-service for identity and access requests through our Identity Governance and Administration baseline.
Efecte IAM is the perfect tool for automated and compliant Identity and Access Management. In a service-driven world that's increasingly digital and intelligent, Efecte IAM helps increase the speed...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Appgate SDP, eine Zero-Trust-Network-Access-Lösung, verstärkt und vereinfacht die Zugriffskontrolle mit identitätszentrierten Richtlinien.
Appgate SDP ist eine Zero-Trust-Netzwerkzugriffslösung, die die Zugriffskontrollen für alle Nutzer, Geräte und Workloads vereinfacht und stärkt. Der sichere Zugriff wird für komplexe und hybride Unternehmen durch die Verhinderung von komplexen Bedrohungen, der Reduzierung von Kosten und der Erhöhung der Betriebseffizienz ermöglicht. Mehrdimensionale Authentifizierungsmethoden ermöglichen den Nutzerzugriff nur, wenn die Identität (Nutzer und Gerät und Kontext) verifiziert ist, und Zero-Trust-Prinzipien werden mit feinkörnigen Berechtigungen für privilegierte Nutzer durchgesetzt.
Appgate SDP ist eine Zero-Trust-Netzwerkzugriffslösung, die die Zugriffskontrollen für alle Nutzer, Geräte und Workloads vereinfacht und stärkt. Der sichere Zugriff wird für komplexe und hybride...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Mit IDEE lassen sich digitale Identitäten anlegen und verwalten, ohne dass dabei Passwörter und Nutzerdatenbanken notwendig wären.
Bei IDEE handelt es sich um Software für die Authentifizierung ohne Passwörter. Kunden verwenden stattdessen ihr Smartphone, um sich an- und wieder abzumelden. Die Software verwaltet die digitalen Identitäten ohne Passwörter oder Datenbanken mit Zugangsdaten. Anwendungsbeispiele wären etwa der Sofort-Check-Out im Retail, im Reise-Bereich und der Bewirtung, beim Mieten in der Mobilität sowie KYC und Altersverifizierung im Bereich der Finanzdienstleistungen.
Bei IDEE handelt es sich um Software für die Authentifizierung ohne Passwörter. Kunden verwenden stattdessen ihr Smartphone, um sich an- und wieder abzumelden. Die Software verwaltet die digitalen...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Azure Active Directory is your universal platform to manage and secure identities.
Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9% of cybersecurity attacks. You get SSO, CA, a single identity platform, developer tools.
Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9% of cybersecurity attacks. You get SSO, CA,...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Streamline and simplify workflow management, access requests, access review, and identity lifecycle management across the organization.
Streamline and simplify workflow management, access requests, access review, and identity lifecycle management across the organization.
Streamline and simplify workflow management, access requests, access review, and identity lifecycle management across the organization.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Access management software that helps manage user sign-up and sign-in, secure access to web & mobile apps, and other operations.
Access management software that helps manage user sign-up and sign-in, authentication, secure access to web & mobile apps, and other operations.
Access management software that helps manage user sign-up and sign-in, authentication, secure access to web & mobile apps, and other operations.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
DevOps Secrets Safe helps enterprises improve their security posture, mitigate the risks associated with secrets sprawl, and meet compl
BeyondTrust DevOps Secrets Safe is a solution for centralized secrets administration (create, store, access, and audit) designed for the high volume and high change workloads found in DevOps environments. The solution helps enterprises to secure credentials and other secrets (passwords, API keys, certificates, etc.) used in their CI/CD tool chain, applications, and non-human identities
BeyondTrust DevOps Secrets Safe is a solution for centralized secrets administration (create, store, access, and audit) designed for the high volume and high change workloads found in DevOps...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
AD Bridge helps businesses manage authentication and access control for Unix and Linux environments.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities to these platforms. By extending Group Policy to these non-Windows platforms BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment.
BeyondTrust Active Directory Bridge centralizes authentication for UNIX, Linux and Mac environments by extending Microsoft Active Directory's Kerberos authentication and single sign-on capabilities...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Privileged access management tool that assists businesses with user management, behavior tracking and endpoint security.
Privileged access management tool that assists businesses with user management, behavior tracking and endpoint security.
Privileged access management tool that assists businesses with user management, behavior tracking and endpoint security.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
BigID.me brings data trust and transparency to your customers with easy, intuitive, and proactive privacy management.
BigID.me brings data trust and transparency to your customers with easy, intuitive, and proactive privacy management.
BigID.me brings data trust and transparency to your customers with easy, intuitive, and proactive privacy management.

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle
Privileged access management allows granular access control over privileged admin tasks in Office 365.
Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts with standing access to sensitive data or access to critical configuration settings. Privileged access management requires users to request just-in-time access to complete elevated and privileged tasks through a highly scoped and time-bounded approval workflow.
Privileged access management allows granular access control over privileged admin tasks in Office 365. It can help protect your organization from breaches that use existing privileged admin accounts...

Funktionen

  • Berechtigungsnachweis-Management
  • Überwachung der Benutzeraktivität
  • Passwort-Management
  • Zugriffskontrollen/Berechtigungen
  • Least Privilege
  • Anwendungs-Zugriffskontrolle