Browse Software
List Your Product
Loading...
Okta logo

Okta

  Add to Compare

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

CyberArk Conjur logo
Visit Website

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Idaptive Next-Gen Access logo
Visit Website

Overview

Description CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets. Read more Idaptive provides Next-Gen Access solutions to enterprises to protect them from unauthorized data access, cyber-attacks, and data breaches. It follows a Zero Trust and Security First approach to regulate access of each of the users by verifying them and validating their devices. The Multi-Factor Authentication creates an additional layer of security before any access is granted to applications. The software can monitor the network, device, and learn user behavior context to assign risk levels to each accessed event. By securely authenticating every access with a wide range of supported factors that also includes FIDO2 keys, virtual and hardware tokens, etc, Idaptive eliminates the need of using passwords. Admins can route application access requests, create application accounts, revoke access whenever necessary, etc easily. Enterprises can frame centralized policy management and secure endpoints that are used to access enterprise resources. With device security management, institutions can also extend enterprise authentication services to the cloud without duplicating identities. One can even select trusted devices to limit access to certain information and applications. If needed, data sets can be locked and deleted within minutes in the case of cyberattacks. Besides, there are several other security features as well that can be implemented to build robust cybersecurity within an organization. Read more
Pricing Options
  • Free Trial Not Available
  • Free Trial Available
SW Score & Breakdown

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    80%
  • Reviews
    68%
  • Momentum
    62%
  • Popularity
    69%

90% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    85%
  • Momentum
    63%
  • Popularity
    76%
SaaSworthy Awards
Not Available
# 4 Highly Rated # 4 Most Popular

Features

Total Features
5 Features
11 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 2 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 8 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    • SaaS/Web/Cloud
    • Mobile - Android
    • Mobile - iOS
    Modes of Support
    • 24/7 (Live rep)
    • Business Hours
    • Online
    • 24/7 (Live rep)
    • Business Hours
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    4.8/5 2 user ratings
    4.5/5 11 user ratings
    Ratings Distribution
    • Excellent

      77.8%
    • Very Good

      22.2%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    • Excellent

      59.1%
    • Very Good

      33.9%
    • Average

      6.3%
    • Poor

      0.8%
    • Terrible

      0%
    Review Summary
    Not Available

    Reviewers praise Idaptive's user-friendliness, highlighting its intuitive interface and straightforward setup process. They also commend its robust security features, including multi-factor authentication and single sign-on, which enhance overall security posture. Additionally, reviewers appreciate Idaptive's seamless integration with existing IT infrastructure, enabling smooth deployment and centralized management. However, some users have expressed concerns regarding occasional performance issues and limited customization options.

      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • Free Trial Available
    Pricing Plans
    Monthly Plans Annual Plans

    Single Sign-on Others

    Multi-factor Authentication Others

    Lifecycle Management Others

    Mobile Devices Others

    Endpoint Management Others

      Not Available
    View Detailed Pricing

    Screenshots & Videos

    Videos Not Available Video Thumbnail
    + 2 More

    Vendor information

    Company Details Located in: Newton, Massachusetts Located in: Santa Clara, California Founded in: 2018
    Contact Details

    1-888-808-9005

    https://www.conjur.org/

    Not available

    https://www.idaptive.com/

    Social Media Handles

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed