+
+

Related Products

  • Keeper Security
    1,748 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • ThreatLocker
    499 Ratings
    Visit Website
  • 1Password
    16,393 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    118 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,482 Ratings
    Visit Website
  • Airlock Digital
    35 Ratings
    Visit Website
  • Auth0
    991 Ratings
    Visit Website

About

Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization. • Enforce remote password resets on devices. • Manage Windows domain, service, local admin accounts & their dependencies. • Eliminate hardcoded-credentials from scripts and configuration files. • Automate password access for non-human identities with APIs. • Protect SSH keys, track usage & associate with UNIX devices. • Share accounts with granular access controls. • One-click remote access to assets without revealing passwords. • Grant Just-In-Time access to privileged accounts. • Shadow, Monitor & record live sessions. • Endpoint privilege management with application controls. • Integrate with AD, AzureAD for user provisioning. • Integrate with solutions for MFA, SIEM, ITSM & SSO. • Comply with regulations with audit trails & custom reports

About

SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT Teams, CIO, CSO, Security Analyst

Audience

Companies searching for an end to end identity and access management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Securden
Founded: 2018
United States
www.securden.com/privileged-account-manager/index.html

Company Information

SecurEnvoy
Founded: 2003
United Kingdom
www.securenvoy.com/en-gb/identity-and-access-management-iam-platform

Alternatives

Alternatives

iGRIFFIN

iGRIFFIN

Secuve
IDM365

IDM365

ITMC Soft

Categories

Categories

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Password Management Features

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

Ping Identity
A10 Thunder ADC
Amazon Web Services (AWS)
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
Freshservice
IBM Cloud
IBM QRadar SIEM
Ivanti Connect Secure
Microsoft Authenticator
Microsoft Azure
Microsoft Entra ID
Microsoft Outlook
Microsoft SharePoint
Okta
Omnissa Horizon 8
OneLogin
ServiceNow
Splunk Enterprise

Integrations

Ping Identity
A10 Thunder ADC
Amazon Web Services (AWS)
Cisco Adaptive Security Appliance (ASA)
Citrix Gateway
Freshservice
IBM Cloud
IBM QRadar SIEM
Ivanti Connect Secure
Microsoft Authenticator
Microsoft Azure
Microsoft Entra ID
Microsoft Outlook
Microsoft SharePoint
Okta
Omnissa Horizon 8
OneLogin
ServiceNow
Splunk Enterprise
Claim Securden Unified PAM and update features and information
Claim Securden Unified PAM and update features and information
Claim SecureIdentity IAM and update features and information
Claim SecureIdentity IAM and update features and information