Browse Software
List Your Product
Loading...
Refine Results Clear All
Starting Price
  • (4)
  • (1)
  • (3)
Deployment
  • (14)
  • (7)
  • (32)
  • (6)
  • (6)
Customer Types
  • (3)
  • (32)
  • (32)
  • (27)
Pricing Model
  • (13)
  • (4)
  • (1)
  • (8)
  • (27)
Integrated With
  • (4)
  • (3)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Showing 21 - 12 of 32 Products
WoTT logo
Security audit of Linux systems for restricting unauthorized access Write a Review
Visit Website + Add to Compare

What is WoTT and how does it work?

WoTT is a development tool which is used by IT professionals. It helps them to scan documents automatically while managing firewalls. It is also useful to establish a mutual transport security layer between clients and servers. There are many other operations which can be done with the help of this software. After audit, the software sends documentation through Slack or GitHub. Encryption of data via public key ensures the rotation of private key or the decryption of those data, thereby ensuring end-to-end security. Besides GitHub and Slack integrations, the software is integrated with Cloud Agnostics, providing users with unlimited cloud computing capability and storage. It provides open-source coding, letting public access, modification and enhancement of codes. It lets the DevOps developers ensure security at the very beginning rather than at the audit level, which helps provide a comprehensive protection cover at a minimal cost. Perimeter security is a notable feature that provides encryption of data as networks are generally impenetrable.

Read more

WoTT Pricing

  • Free Trial Not Available
  • Starts at $9.0. Offers Free-forever and Custom plan.
Xton Access Manager logo
Privileged Access Management 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Xton Access Manager and how does it work?

XTON Access Manager helps you maintain much-needed control and security of your privileged accounts and systems. Create secure, interactive remote sessions within your standard web browser to a remote server, network device, or website without disclosing the passwords to your employees or contractors. Maintain local endpoint privileges without deploying agents across your enterprise. Using your favorite web browser (desktop or mobile), have complete insight into who, what and where your accounts and systems are being accessed to conform to today’s rules and regulations.

Read more

Xton Access Manager Pricing

  • Free Trial Available
  • Xton Access Manager Offers Custom plan.
Thycotic Secret Server logo
Privileged access management solution 4.5 Based on 133 Ratings
Visit Website + Add to Compare

What is Thycotic Secret Server and how does it work?

Thycotic Secret Server is an enterprise-grade solution to discover, secure, manage, and audit privileged account passwords and credentials across an organization. The software-as-a-service model lets you sign up and start right away. Total control over your end-to-end security systems and infrastructure. Discover Privileges Identify all service, application, administrator, and root accounts to curb sprawl and gain a full view of your privileged access.

Read more

Thycotic Secret Server Pricing

  • Free Trial Available
  • Thycotic Secret Server Offers Custom plan.
Thycotic Password Reset Server logo
A Reset Tool for Passwords 5 Based on 1 Ratings
Visit Website + Add to Compare

What is Thycotic Password Reset Server and how does it work?

Thycotic Password Reset Server software is a self-service tool to reset passwords in minutes. Manage employees enrollment and can validate user authenticity with phone verification via call or SMS. The software offers a secure identity verification tool for resetting passwords with Automate Active Directory password resets and AD account unlocks. IT Organizations, Medium and Large companies make use of the software.

Read more

Thycotic Password Reset Server Pricing

  • Free Trial Available
  • Thycotic Password Reset Server Offers Custom plan.
Adioma logo
Online professional-grade infographic maker 3.5 Based on 4 Ratings
Visit Website + Add to Compare

What is Adioma and how does it work?

Adioma online diagram maker finds extensive application in creating and designing infographics within shortest possible time period. This software features multiple infographic templates to add ease to the process of its creation. This SaaS product does not require any extra software installation and doing hardware maintenance. Users can easily import as well as export data and designs using this tool. Using this you can create organizational chart depicting visually the internal structure of an enterprise. It contains a few important content marketing features like it helps in doing brand monitoring and supports multi-channel publishing. Adioma has automatic infographic color option.

Read more

Adioma Pricing

  • Free Trial Available
  • Starts at $29.0.
Secureframe logo
One powerful platform to maintain compliance 4.8 Based on 298 Ratings
Visit Website + Add to Compare

What is Secureframe and how does it work?

Secureframe is a cybersecurity software that helps companies – from startups to enterprises – to automate their SOC 2 and ISO 27001 compliance frameworks and complete audits simultaneously. The software aims to protect companies at every stage of their growth. Businesses get access to readymade SOC 2 within weeks rather than months. They also get to streamline a protected audit management facility using the software’s preferred auditor network. Further, automated alerts and reports help businesses stay compliant and scale safely with personalised automation and workflows. At Secureframe, there is a team of security and compliance experts that promises to respond to the queries in 1 business day or less. Some of the additional benefits offered by the platform are infrastructure monitoring and scanning, vendor risk management, seamless integration facilities, personalised security policy generator, hassle-free employee onboarding facility, automated security workflows, preferred auditor network and more.

Read more

Secureframe Pricing

  • Free Trial Not Available
  • Secureframe Offers Custom plan.
Teleport logo
Provides privileged access management for elastic infrastructure Write a Review
Visit Website + Add to Compare

What is Teleport and how does it work?

Gravitational Teleport is a cloud-native infrastructure in order to provide privileged access management (PAM). This software is required to replace SSHD or be used along with SSHD for organizations that are required to conduct SSH audit along with session replay/recording and also organizations that have Kubernetes or SSH access behind firewall clusters without any open ports. It enables the user to manage trust among teammates, data centers and organizations effectively. There is no need to manage individuals’ keys as the software provides short-lived certs for authorization. In order to provide familiar and seamless logins, the software integrates with the existing identity management solutions. The software also works with open-source standards such as Kubernetes and OpenSSH to enable the user to choose between a web client or a simple command. Teleport supports could support cloud-native and can run on any operating system and infrastructure which is compatible with SSH 2.0, OpenSSH and other open standards. It also supports the traditional Kubernetes and SSH Workflows for cloud-native infrastructure.

Read more

Teleport Pricing

  • Free Trial Available
  • Teleport Offers Free-forever and Custom plan.
Foxpass logo
Get your network and servers managed in a simplified manner 4.9 Based on 64 Ratings
Visit Website + Add to Compare

What is Foxpass and how does it work?

Foxpass is a comprehensive Radius and LDAP system solution that helps companies bring the best practices to their infrastructure. The solution helps to enhance the organisation’s network and server security by allowing employees to get access to specific tools which are of utmost importance. Moreover, Foxpass also helps engineering teams to take advanced access control measures within minutes so that they can avoid costly security breaches and detrimental employee mistakes in no time. Its fully featured API is capable of controlling server access with high security in an automated manner, besides allowing users to change customer info, manage group memberships and much more. The cloud-hosted RADIUS and LDAP solution provided by Foxpass can be synced with Office365, Google and more to get full SSO on users’ WiFi, VPN and other devices. Moreover, companies also get to optimise real-time visibility into their preexisting infrastructure and automate threat detection and response time by logging the RADIUS and LDAP requests provided by Foxpass. Finally, it also ensures network wise safety and security by helping users apply dedicated passwords and self-service SSH keys.

Read more

Foxpass Pricing

  • Free Trial Available
  • Starts at $3.0.
RevBits Privileged Access Management logo
A PAM Software for Business 5 Based on 1 Ratings
Visit Website + Add to Compare

What is RevBits Privileged Access Management and how does it work?

RevBits Privileged Access Management software with privileged access, privileged session, password, service accounts, key and certificate management for native clients with a single click. The Password Module provides strong password suggestions and encryption model for maximum data security with DBA monitoring capability. It supports Windows, Linux, MacOS, and Android & iOS and browser support for Chrome, Firefox, Safari, Internet Explorer, Edge and Opera. It integrates with SIEM providers like Splunk and LogRhythm.

Read more

RevBits Privileged Access Management Pricing

  • Free Trial Not Available
  • RevBits Privileged Access Management Offers Custom plan.
NextLabs logo
Data centric security and dynamic authorization platform Write a Review
Visit Website + Add to Compare

What is NextLabs and how does it work?

NextLabs is an advanced data centric security and dynamic authorization platform that ensures the protection of all of your business critical applications and data. It enables you to monitor and control data usage and activity, classify and identify sensitive information and data, apply digital rights, prevent risky activities and meet compliance. With NextLabs, you can use policy enforcement to manage and control access, allow secure access to proprietary and commercial applications, prevent unauthorized access of sensitive files, and share secure information with partners, mobile employees, and suppliers. It provides visibility, centralized policy management, and control for NextLab’s Rights Management and Entitlement Management. You can shield your data by enabling data filtering and protect your original and sensitive data via data masking with NextLabs. Users additionally get the feature of data loss prevention and data protection with NextLabs. It also provides audit reports and logs to ensure compliance additional to activity monitoring and tracking across various apps and servers. The platform offers a team of experts to assist and guide you whenever you are stuck using the platform or want to know about anything.

Read more

NextLabs Pricing

  • Free Trial Not Available
  • NextLabs Offers Custom plan.
Britive logo
A cloud-native security solution for cloud-forward enterprises Write a Review
Visit Website + Add to Compare

What is Britive and how does it work?

Britive is a cloud-native security solution that empowers companies to manage privileged access to multi-cloud environments. The software enables users to temporarily grant access privileges and expire them Just in Time (JIT) so that they can effectively protect their cloud data. It also allows users to grant and revoke Just in Time secrets that significantly reduce their credential exposure. With Britive, companies can maintain Least Privilege Access (LPA) by regularly managing the overly-broad permissions and eliminating unused credentials and accounts. The software can be integrated with users’ SIEM, UEBA and data lake technologies to get centralised cross-cloud visibility into risky activities and privileges. It even enables users to quickly gain information about high-risk identities, activities and privileges with the help of a unified cross-cloud access model. In addition, the other advantage of Britive that companies get includes easier cloud migration, better compliance, faster app development and exceptional security.

Read more

Britive Pricing

  • Free Trial Not Available
  • Britive Offers Custom plan.

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed