|
80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
Visit Website
|
90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
Visit Website
|
Description | CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more | Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. Read more |
Pricing Options |
|
|
SW Score & Breakdown |
80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more
|
SaaSworthy Awards |
Not Available
|
# 4 Highly Rated # 4 Most Popular |
Total Features |
5 Features
|
11 Features
|
Common Features for All |
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Passwordless Login
Role Management
Single Sign-On (SSO)
Social Sign On
User Activity Monitoring
|
API Access Management
Access Request Management
Account Management
Compliance Management
Multi-factor Authentication
Password Management
Passwordless Login
Role Management
Single Sign-On (SSO)
Social Sign On
User Activity Monitoring
|
Organization Types Supported |
|
|
Platforms Supported |
|
|
Modes of Support |
|
|
API Support |
|
|
User Rating |
|
|
Ratings Distribution |
|
|
Review Summary |
Not Available
|
Reviewers praise Idaptive's user-friendliness, highlighting its intuitive interface and straightforward setup process. They also commend its robust security features, including multi-factor authentication and single sign-on, which enhance overall security posture. Additionally, reviewers appreciate Idaptive's seamless integration with existing IT infrastructure, enabling smooth deployment and centralized management. However, some users have expressed concerns regarding occasional performance issues and limited customization options. |
Read All User Reviews | Read All User Reviews |
AI-Generated from the text of User Reviews
Pricing Options |
|
|
Pricing Plans
Monthly Plans
Annual Plans
|
Single Sign-on Others Multi-factor Authentication Others Lifecycle Management Others Mobile Devices Others Endpoint Management Others |
|
Not Available |
View Detailed Pricing
|
|
|
|
Videos | Not Available |
+ 2 More
|
Company Details | Located in: Newton, Massachusetts | Located in: Santa Clara, California Founded in: 2018 |
Contact Details |
1-888-808-9005 https://www.conjur.org/ |
Not available https://www.idaptive.com/ |
Social Media Handles |
|
|
Looking for the right SaaS
We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.
Want more customers?
Our experts will research about your product and list it on SaaSworthy for FREE.