Secuve TOSSecuve
|
||||||
Related Products
|
||||||
About
Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
|
About
SECUVE TOS provides stonr user authentication based on digital signature and supports multiple access control policies. To control access privilege to illegal intruders including hackers, crackers and unauthorized internal users. Prevent forgery of modification of homepage or files, and data leakage. Protect computer systems againsts a variety of attacks resulting from security flaws inherent in operating systems. Detection and prevention of unauthorized network access to systems. Control over the execution of critical commands which can affect system operation. Delegation triggered when a system administrator executes a command requiring administrative privileges. Delegation triggered when the users of specific systems require the sessions for managing accounts. Event audit of user processes or background processes at the kernel level.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Organizations looking for a software solution for privileged access management on Linux and UNIX
|
Audience
Cybersecurity teams searching for a secure OS solution for system access control and internal data leakage prevention
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationFortra
Founded: 1982
United States
www.fortra.com/products/privileged-access-management
|
Company InformationSecuve
Founded: 2000
United States
www.secuve.com/eng/sub02/sub02_0201.php
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Privileged Access Management Features
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
|
||||||
Integrations
No info available.
|
Integrations
No info available.
|
|||||
|
|
|