Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • ManageEngine Log360
    157 Ratings
    Visit Website
  • Auth0
    1,008 Ratings
    Visit Website
  • Rippling
    17,976 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    613 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website
  • Blumira
    149 Ratings
    Visit Website
  • Keeper Security
    1,752 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website

About

The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT departments seeking a tool to amplify their user authorization capabilities, administrative efficiency, and cybersecurity compliance

Audience

Companies searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IBM
Founded: 1911
United States
www.ibm.com/security/mainframe-security/zsecure

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Alternatives

Alternatives

SailPoint

SailPoint

SailPoint Technologies

Categories

Categories

Integrations

Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM Z
IBM z/OS
NetThunder

Integrations

Acceptto Zero Trust Identity (CIAM)
Entitle
HashiCorp Vault
IBM Z
IBM z/OS
NetThunder
Claim IBM Security zSecure and update features and information
Claim IBM Security zSecure and update features and information
Claim Tectia and update features and information
Claim Tectia and update features and information