Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (4)
Starting Price
  • (14)
  • (1)
  • (4)
  • (1)
  • (7)
Features
  • (66)
  • (65)
  • (64)
  • (63)
  • (63)
  • (55)
  • (51)
  • (50)
  • (42)
  • (37)
  • (30)
SW Score
  • (3)
  • (13)
  • (25)
  • (21)
Deployment
  • (10)
  • (5)
  • (78)
  • (22)
  • (19)
Customer Types
  • (6)
  • (5)
  • (76)
  • (77)
  • (73)
Pricing Model
  • (28)
  • (24)
  • (1)
  • (6)
  • (35)
  • (63)
Integrated With
  • (6)
  • (4)
  • (4)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 41 - 19 of 78 Products

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

FreeIPA logo
Provides dynamic identity and information security management solutions Write a Review
Visit Website + Add to Compare

What is FreeIPA and how does it work?

FreeIPA is an enhanced security information monitoring solution featuring command line administrative tools and web-interface as well. It is an integrated authentication and identity solution for UNIX/Linux networks. The active server within the particular enables centralized authorization, authentication and account related information. FreeIPA is an integrated solution, generated by combining Linux Fedora, MIT Kerberos, 389 Directory Server, DNS, NTP, SSSD, Dogtag certificate system, and more. The program is inclusive of open-source components and adheres to standard privacy protocols. The software helps enterprises with installation and configuration tasks automation. It allows organizations to achieve higher redundancy and scalability with comprehensive multi-master replication. The solution provides Python SDK, and extensible interfaces like JSON RPC API, XMLRPC etc. It can also be used to generate mutual trust with external identity monitoring systems like Microsoft Active Directory. FreeIPA ensures high levels of scalability and redundancy besides automated installation and configuration procedures.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 89%
  • Reviews 60%
  • Momentum 66%
  • Popularity 69%

FreeIPA Pricing

  • Free Trial Not Available
  • FreeIPA Offers Custom plan.

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

PrivX logo
New Age Privileged Access Management Software Write a Review
Visit Website + Add to Compare

What is PrivX and how does it work?

PrivX is a cutting-edge PAM (Privileged Access Management) tool that delivers lean and easy-to-implement solutions. It helps to cut down the cost of vaulting and password lifecycle management by granting users a short-lived authentication. Deployment and maintenance efforts can economize as the use of the agents is being eliminated. Access management can be unified from a single UI and this helps in staying in sync with AD-systems and also generating reports of traffic quickly. The software helps in addressing the growing demands for cloud access. It discovers new hosts and automatically on-boards users while also off-boarding them from hosts that are no longer needed. Additionally, access can be granted and revoked automatically by syncing the software with the user’s existing ID management system. Core feature is the zero trust solution that simplifies complex access needs and also reduces the vulnerability of companies to breaches. It is also very easy to set up and scale as per the need.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 98%
  • Reviews 60%
  • Momentum 61%
  • Popularity 63%

PrivX Pricing

  • Free Trial Not Available
  • PrivX Offers Free-forever and Custom plan.

83% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

SAASPASS logo
Full Stack Identity and Access Management Solution Write a Review
Visit Website + Add to Compare

What is SAASPASS and how does it work?

SAASPASS provide the world's easiest to use End to End on-demand identity and access management for enterprises. A single solution for Digital & Physical Security, On-premise & Cloud, Offline and Online Multifactor Authentication.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 84%
  • Reviews 60%
  • Momentum 65%
  • Popularity 81%

SAASPASS Pricing

  • Free Trial Available
  • Starts at $10.00. Offers Custom plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Trinsic logo
Reusable identity verification platform Write a Review
Visit Website + Add to Compare

What is Trinsic and how does it work?

Introducing Trinsic, the game-changing infrastructure revolutionizing the way we issue and accept reusable ID credentials. With an unparalleled network of providers, Trinsic is leading the charge in simplifying identity verification and onboarding processes. Trust us, when we say that Trinsic is here to take their business to soaring new heights. Meet Trinsic Connect, the innovative solution that harnesses the power of verifiable credentials, digital wallets, and passkeys. Seamlessly integrating these cutting-edge technologies, Trinsic Connect enables applications to instantly verify and onboard new users through This robust and secure reusable identity network. Say goodbye to the tedious and time-consuming process of manual verification; Trinsic Connect ensures that their identity verification is done with utmost efficiency and accuracy. Why choose Trinsic? As a professional with a third-party perspective, they understand the significance of credibility and reliability. Trinsic stands out from the crowd with its unrivaled capacity to streamline their operations and enhance user experience. This ingenious network of providers guarantees a wide range of options, allowing they to issue and accept reusable ID credentials seamlessly. Whether it's onboarding new customers, authenticating transactions, or verifying information, Trinsic has got they covered every step of the way. Gone are the days of grappling with endless paperwork and cumbersome verification processes. Trinsic offers a refreshing and efficient alternative, giving they the freedom to focus on what truly matters – growing their business. Join the ranks of forward-thinking professionals and unlock the full potential of their operations with Trinsic. It's time to embrace the future of identity verification – it's time for Trinsic.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 92%
  • Reviews 60%
  • Momentum 60%
  • Popularity 72%

Trinsic Pricing

  • Free Trial Not Available
  • Trinsic Offers Free-forever and Custom plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

IronVest logo
Secure your accounts Write a Review
Visit Website + Add to Compare

What is IronVest and how does it work?

IronVest is revolutionizing the way people protect their personal information online. This is an all-in-one super app that provides ultimate protection for online accounts and transactions. This ensures that only can access accounts, by utilizing state-of-the-art two-factor authentication. IronVest also generates masked emails, single-use virtual credit cards and virtual mobile numbers to ensure maximum security for online payments and transactions. IronVest is designed to provide peace of mind and security, without sacrificing convenience. This is simple to use, secure, and reliable. With IronVest, can rest assured that personal data is safe and secure when they shopping, banking, or conducting any other online activities. IronVest is the best way to protect your personal data and keep online accounts and transactions secure.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 86%
  • Reviews 60%
  • Momentum 68%
  • Popularity 76%

IronVest Pricing

  • Free Trial Available
  • Starts at $3.25. Offers Free-forever plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

389 Directory Server logo
"389 Directory Server: Vital network asset" Write a Review
Visit Website + Add to Compare

What is 389 Directory Server and how does it work?

The 389 Directory Server is an essential resource for any professional network. Developed by the reliable Red Hat team, customer can be sure that the 389 Directory Server will support the customers business operations in a secure, flexible and highly scalable way. Designed specifically to provide robust Lightweight Directory Access Protocol (LDAP) services, it boasts unmatched performance and scalability, making it an ideal solution for larger organizations needing to store and manage even more data. The "389" name originates from the port number that it uses when handling LDAP requests, which makes for an easier integration into existing infrastructures. With its intuitive system administration console, customers are guaranteed a user-friendly operational experience. It's also open source software, meaning customizations are easily made, with extensive online documentation to guide the customer through any setup or configuration efforts needed. Let the 389 Directory Server to go-to the solution for LDAP server needs today!

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 89%
  • Reviews 60%
  • Momentum 65%
  • Popularity 66%

389 Directory Server Pricing

  • Free Trial Not Available
  • 389 Directory Server Offers Free-forever plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Sudo Platform logo
The cloud platform for decentralized identity Write a Review
Visit Website + Add to Compare

What is Sudo Platform and how does it work?

Introducing Sudo Platform the cloud-first privacy platform that brings them the next generation of customer apps with privacy, security, and decentralized identity capabilities. Now they can move away from Web2 to Web3 with one of the most comprehensive sets of tools available. Sudo Platform has the power to revolutionize the way they deliver private customer experiences. Through our APIs, the platform gives customers control of their personal data and ensures that any sensitive information is kept safe and secure. As an added layer of protection, Sudo also offers decentralized identity capabilities that guarantee customers control of how their information is used and shared. Take control of their customer experience and revolutionize their platform for a post-Web2 world. With Sudo Platform, they can deliver a safe, secure, and powerful experience for their customers that puts their protection and privacy first. Get started today and enjoy the benefits of Web3 with Sudo Platform.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 94%
  • Reviews 60%
  • Momentum 62%
  • Popularity 64%

Sudo Platform Pricing

  • Free Trial Not Available
  • Sudo Platform Offers Custom plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Practice Protect logo
Simplest way for Accountants to secure 4.7 Based on 10 Ratings
Visit Website + Add to Compare

What is Practice Protect and how does it work?

Practice Protect is the accounting-specific cybersecurity platform that makes it quick & easy to secure and control client data, wherever your people work. Practice Protect tracks every access attempt to every application, so you have a complete log of who accessed what, from where. Practice Protect has Multi-Factor Authentication via a second code, sent directly to your phone or email address for ultimate security

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 89%
  • Reviews 60%
  • Momentum 62%
  • Popularity 81%

Practice Protect Pricing

  • Free Trial Not Available
  • Starts at $17.00. Offers Custom plan.

82% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

AuthX logo
Empower Your Digital Identity Management Write a Review
Visit Website + Add to Compare

What is AuthX and how does it work?

Elevate their organization's security and user experience with AuthX’s cutting-edge authentication solution. Bid adieu to the antiquated password systems and embrace the future with AuthX's passwordless technology designed to seamless integrate into the modern work environment. Their state-of-the-art system, underpinned by robust SAML security, streamlines user access across multiple web applications with a single set of login credentials simplicity meets security. AuthX’s innovative approach doesn't stop at just convenience; it enhances and automates workflows through advanced UX-focused features like kiosk modes, virtual desktop infrastructure (VDI) automation, and support for shared and remote workstation locks. This allows for a fluid transition between various user scenarios including delegated authentication, ensuring stringent security without sacrificing user accessibility. Designed with professionals in mind, AuthX ensures that safeguarding their digital assets becomes a seamless aspect of your business process. Companies that look forward to strengthening their identity stack without disrupting the established user workflows will find a reliable partner in AuthX. Take a step towards a secure, passwordless future and transform their organization’s authentication experience with AuthX.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 100%
  • Reviews 60%
  • Momentum 60%
  • Popularity 60%

AuthX Pricing

  • Free Trial Available
  • AuthX Offers Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

MojoAuth logo
Secure Access Simplified Write a Review
Visit Website + Add to Compare

What is MojoAuth and how does it work?

MojoAuth provides a secure and exceptional login experience with just two lines of code. It allows users to authenticate through their social accounts, email magic link, and OTP sent to their respective email and phone numbers. It also supports advanced authentication methods like fingerprint, facial recognition, and security keys. Moreover, it is compliant with various essential regulations like GDPR, CCPA, etc.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 85%
  • Reviews 60%
  • Momentum 64%
  • Popularity 72%

MojoAuth Pricing

  • Free Trial Not Available
  • Starts at $140.00. Offers Free-forever and Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Infisign logo
Transforming Identity & Access Management Write a Review
Visit Website + Add to Compare

What is Infisign and how does it work?

Infisign: The Future of Identity and Access Management. In today's digital landscape, identity and access management (IAM) is more critical than ever for securing systems and data. Yet traditional IAM solutions struggle to keep pace with modern IT environments and emerging threats. Introducing Infisign - the IAM platform built for the future. Infisign combines the latest innovations in decentralized identity, passwordless authentication, privileged access management (PAM), and federation to create a truly comprehensive approach to IAM. At its core is a decentralized architecture based on blockchain and cryptography, eliminating single points of failure. This enables robust identity proofing, secured credential issuance, and verifiable claims for superior access control. With Infisign, organizations can say goodbye to vulnerable passwords. Multi-factor authentication and FIDO2 security keys enable passwordless login for both admins and end users. Even privileged sessions can be initiated instantly without conventional passwords. This drastically reduces exposure to credential theft, phishing, and other identity attacks. The platform also centralizes and strictly governs privileged access through integrated PAM capabilities. Sensitive administrative actions are monitored in real-time and subject to automated controls according to pre-defined security policies. This prevents both insider and external threats from escalating privileges. For today's dynamic, multi-cloud environments, Infisign allows seamless federation across on-premise and cloud-based systems and supports integration with leading enterprise directories. The future-proof architecture readily adapts as technology and use cases evolve. With its defense-in-depth approach, enriched usability features, and cloud-native scalability, Infisign stands apart as the next generation of IAM. It’s time to step into the future. Reimagine IAM security with Infisign.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 90%
  • Reviews 60%
  • Momentum 67%
  • Popularity 66%

Infisign Pricing

  • Free Trial Not Available
  • Infisign Offers Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Silverfort logo
Allow secure access and authentication process across business networks and cloud environments Write a Review
Visit Website + Add to Compare

What is Silverfort and how does it work?

Silverfort is an agentless multi-factor authentication platform that helps organizations deploy secure authentication and access, across their cloud environments and in-house networks in a non-intrusive and holistic way. The platform is designed to facilitate system MFA alongside interfaces that no other softwares could protect till date. It also includes legacy and homegrown applications, databases, file systems, critical infrastructure, along with admin access tools like PsExec that currently permit attackers to avoid agent-based MFA. Also, an integrated holistic authentication module within the particular offers unified access and authentication policies across multiple assets, users, and environments, both in the cloud and on-premises. Additionally, a robust AI-powered trust and risk engine, analyzes all machine and human access requests both on the perimeter and within the network in a continuous way. The software not only serves as a non-intrusive authentication platform, but also enhances the user experience and reduces disruptions by minimizing the MFA request numbers.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 91%
  • Reviews 60%
  • Momentum 64%
  • Popularity 63%

Silverfort Pricing

  • Free Trial Not Available
  • Silverfort Offers Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

CodeShield logo
Detect Security Vulnerabilities in Minutes Write a Review
Visit Website + Add to Compare

What is CodeShield and how does it work?

CodeShield software is a platform used to reveals hidden connections, and vulnerabilities to move within cloud and reach critical assets. Privilege escalation and attack scenario used to identify escalation and prioritize them. Build a complete graph of AWS resources and IAM policies into a single graph to automate workflows. It integrates with Jira, GitHub, GitLab.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 88%
  • Reviews 60%
  • Momentum 63%
  • Popularity 74%

CodeShield Pricing

  • Free Trial Not Available
  • Starts at $99.00. Offers Free-forever and Custom plan.

81% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Alibaba Resource Access Management logo
Management of Resource Access 4.4 Based on 4 Ratings
Visit Website + Add to Compare

What is Alibaba Resource Access Management and how does it work?

Alibaba Cloud Resource Access Management (RAM) is a user management and access control solution that allows you to centrally manage your users (including personnel, systems, and applications) and securely regulate their access to your resources via permission levels. As a result, RAM enables you to securely provide Alibaba Cloud resource access permissions to only your chosen high-privileged users, enterprise professionals, and partners. This ensures that your cloud resources are used safely and appropriately, as well as preventing unauthorized access to your account. RAM enables you to control access to Alibaba Cloud services and resources from a single location. RAM users and user groups can be created and managed using RAM. You can also give RAM individuals and user groups authorization to limit their access to cloud resources. You can manage different user identities and issue permissions for resource access with Alibaba Cloud Resource and Access Management (RAM). Alibaba Cloud RAM's major function is to assign and manage an access lifecycle for each product deployment for an organization by keeping digital identities. An overview of Alibaba Cloud Resource and Access Management (RAM) will be provided in this post.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 91%
  • Reviews 60%
  • Momentum 60%
  • Popularity 64%

Alibaba Resource Access Management Pricing

  • Free Trial Not Available
  • Alibaba Resource Access Management Offers Free-forever plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

GateKeeper Enterprise logo
The ultimate security for PCs 5 Based on 13 Ratings
Visit Website + Add to Compare

What is GateKeeper Enterprise and how does it work?

GateKeeper Enterprise is a proximity authentication software that provides users with automated access management solutions. It is a wireless, password-less, real-time token authentication, which offers extremely safe and secure login experience to users. One can opt for the auto-unlock feature to get smooth and instant access anytime. Users do not have to remember any password; they only need a wireless key. This proximity-based key enables one to eliminate all manual logins. The computer system of an individual will get unlocked once he/she approaches it and automatically gets locked once the person leaves. The software also offers touch unlock methods. It comes with a military-grade AES 256 encryption, which makes HIPAA, NIST, GDPR, CJIS easy to work on. With GateKeeper Enterprise, one can prevent disruptive data breaches successfully. The software also prevents and reduces the use of support tickets, which means users can set permissions based on their access control lists. They can run multiple computers with just a single key, prevent phishing attacks, and do more. Also, there can be multiple users per computer, each having their unique auto-unlock login methods. GateKeeper has a centralized management dashboard that displays lock and unlock reports over a specific period of time.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 92%
  • Reviews 66%
  • Momentum 60%
  • Popularity 61%

GateKeeper Enterprise Pricing

  • Free Trial Available
  • GateKeeper Enterprise Offers Custom plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Red Hat Identity Management logo
"Red Hat IdM centralizes Linux identity management" Write a Review
Visit Website + Add to Compare

What is Red Hat Identity Management and how does it work?

Red Hat Identity Management (IdM) is the perfect solution for businesses seeking a comprehensive and unified system to manage identity stores, authentication, policies, and authorization policies in their Linux-based domain. With IdM, can guarantee secure access to the customers applications with fast performance. As it is based on open source technology, administrators have full control over every aspect of security to ensure everything is adapted to their needs. IdM delivers low costs of ownership as easy installation and reliable performance take out the strain of managing systems’ configurations. Get ready for a framework that is designed to simplify tasks yet maintain robust security standards. Businesses wanting a complete solution for the identity management needs need not look further - Red Hat Identity Management is here! Red Hat Identity Management is a game-changer, empowering professionals like to take charge of identity management with confidence and ease. Say goodbye to fragmented systems and hello to a centralized, unified approach, all while adhering to the strictest of industry standards. Seize the opportunity today, and unlock the true potential of the Linux-based domain with Red Hat IdM.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 89%
  • Reviews 60%
  • Momentum 60%
  • Popularity 64%

Red Hat Identity Management Pricing

  • Free Trial Not Available
  • Red Hat Identity Management Offers Custom plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

SailPoint IdentityNow logo
SaaS Platform To Shape Identity 4.3 Based on 62 Ratings
Visit Website + Add to Compare

What is SailPoint IdentityNow and how does it work?

SailPoint IdentityNow is a SaaS platform that enables businesses to rethink and shape their identity in terms of security and risks. The tool tackles the challenges that come with digitizing and moving to the cloud by adopting new technologies. It also collaborates with patented AI capabilities and cloud governance to enhance and accelerate identity-related decisions such as identifying risk and analyzing security issues. SailPoint IdentityNow’s inbuilt AI helps businesses create and update roles to shape their identity program. It also provides real-time recommendations so that users can decide as to whether access should be granted or not. The tool analyses peer groups and identifies risky user access, thus quickly addressing security and compliance gaps. SailPoint IdentityNow minimizes helpdesk calls by offering users a comfortable and safe mode of changing or resetting the passwords. The tool enables users to use AI to discover and protect access to all their cloud platforms, including Azure, AWS, and Google Cloud Platform.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 87%
  • Reviews 71%
  • Momentum 60%
  • Popularity 62%

SailPoint IdentityNow Pricing

  • Free Trial Not Available

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

Teleport Desktop Access logo
A single Access Plane for mixed environments Write a Review
Visit Website + Add to Compare

What is Teleport Desktop Access and how does it work?

Identity-based, passwordless access to Windows hosts across all cloud, on-premises, and edge environments. Upgrade your entire Windows fleet to security best practices, including SSO, MFA, and passwordless just-in-time access via short-lived certificates. Teleport provides a secure, passwordless login experience to Windows machines using your favorite hardware device.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 90%
  • Reviews 60%
  • Momentum 60%
  • Popularity 63%

Teleport Desktop Access Pricing

  • Free Trial Not Available
  • Teleport Desktop Access Offers Custom plan.

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

CyberArk Conjur logo
Account Security Solutions To Manage Identity Life Cycles 4.5 Based on 9 Ratings
Visit Website + Add to Compare

What is CyberArk Conjur and how does it work?

CyberArk Conjur is an open-source interface to control, authenticate, and audit access across tools, containers, applications, and cloud environments through secrets management. It helps organizations implement secret management best practices, including the least privilege, role-based access control (RBAC), strong authentication, credential rotation, management, and audit. Users can easily audit, secure, store, and fetch secrets across containerization, secure CI/CD tool stacks, and cloud platforms to spend less time learning the tool and more time delivering value. The platform provides resiliency and consistency through security policy as code, enabling operations and DevOps teams to restore access policies for applications and microservices from the last known state. Conjur secures access to tools, applications, critical infrastructure, and other sensitive data by closely controlling secrets through granular Role-Based Access Control. When requested access, the platform authenticates the application and performs the authorization check before securely distributing the secret. CyberArk Conjur offers the Secret-less capability, enabling applications to securely connect to protected services and resources without fetching, managing or handling secrets.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 80%
  • Reviews 68%
  • Momentum 60%
  • Popularity 70%

CyberArk Conjur Pricing

  • Free Trial Not Available

80% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More

PeoplePlatform logo
A tool to automate and delegate identity management 4.9 Based on 19 Ratings
Visit Website + Add to Compare

What is PeoplePlatform and how does it work?

PeoplePlatform empowers an organization to handle the tasks associated with Identity Management through a simple web interface. You can control the access to your organization’s resources via single and bulk provisioning and deprovisioning. It can also handle workflows to automate jobs that can scheduled to run after a provisioning. Role based security lets you provide different access to the different sets of people. It supports multiple platforms and lets you simultanously provision objects into Active Directory, G Suite and Azure Active Directory. Admins can set the monitoring on so that there’s an approval process in place to accept changes. Other important features of PeoplePlatform include Custom Form Builder, Notification changes, Active Directory Reports, Business Rules Management etc. Now simplify the access management in your organization with a simple web interface powered by PeoplePlatform.

Read More

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read More

  • Features 93%
  • Reviews 60%
  • Momentum 60%
  • Popularity 61%

PeoplePlatform Pricing

  • Free Trial Available
  • PeoplePlatform Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed