+
+

Related Products

  • Securden Unified PAM
    12 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • Auth0
    1,029 Ratings
    Visit Website
  • Securden Endpoint Privilege Manager
    7 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    122 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,699 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • Frontegg
    383 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website

About

Secure access for your business, customers, or employees with our unparalleled identity security backed by a zero–trust philosophy. When it comes to protecting your data, passwords are the weakest link. That is why multifactor authentication has become the identity and access management standard for preventing unauthorized access. Verify the identity of all users with SecureKi. Compromised access and credentials most often are the leading attack vectors of a security breach. Our comprehensive privileged access management is designed to manage and monitor privileged access to accounts and applications, alert system administrators on high-risk events, reduce operations complexity, and meet regulatory compliance with ease. Privilege escalation is at the core of most cyber-attacks and system vulnerabilities.

About

Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies searching for a powerful Privileged Access Management solution

Audience

Companies interested in a powerful identity stack to protect users and non-human identities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SecureKi
Founded: 2015
Malaysia
www.secureki.com

Company Information

SlashID
Founded: 2021
United States
www.slashid.dev/

Alternatives

Alternatives

Auth0

Auth0

Okta
RapidIdentity

RapidIdentity

Identity Automation

Categories

Categories

Integrations

No info available.

Integrations

No info available.
Claim SecureKi and update features and information
Claim SecureKi and update features and information
Claim SlashID and update features and information
Claim SlashID and update features and information