14 Integrations with SecureAuth

View a list of SecureAuth integrations and software that integrates with SecureAuth below. Compare the best SecureAuth integrations as well as features, ratings, user reviews, and pricing of software that integrates with SecureAuth. Here are the current SecureAuth integrations in 2024:

  • 1
    Ideawake

    Ideawake

    Ideawake

    Idea management software that makes it easier for organizations to collect, evaluate, and implement targeted and actionable ideas from their employees, customers, and partners. With fast onboarding, easy-to-use features, opportunities for live collaboration across departments and locations, and offline programs for employee-driven innovation, we guarantee high engagement and a serious return on your innovation efforts.
  • 2
    Simpplr

    Simpplr

    Simpplr

    Simpplr is the leading AI-powered employee experience platform. Organizations use our forward-looking, adaptable products to deliver personalized experiences that inspire and engage their employees. Wherever people work, Simpplr enables them to flourish. Trusted by more than 500+ leading brands, including Zoom, Snowflake, Moderna, Eurostar, and AAA, our customers are achieving measurable improvements in employee engagement, productivity, and accelerated business performance. Simpplr is headquartered in Silicon Valley, CA with offices in the UK, Canada, and India, and is backed by Norwest Venture Partners, Salesforce Ventures, and Tola Capital. Learn more at simpplr.com
  • 3
    AgilityPortal

    AgilityPortal

    Agility Online Ltd

    AgilityPortal enables organizations to establish a united intranet space for remote workers. The platform lets teams connect, communicate, and collaborate on projects in a secure and cloud-based environment. Managers can track operations costs, monitor productivity, and provide collaboration capabilities across multiple locations, teams, and departments. Features include knowledge sharing, rewards and recognition, search functionality, and more. Teams can't work in silos. We help unify remote teams to work better. Connect. Communicate, and Collaborate using AgilityPortal.
    Starting Price: $3.00
  • 4
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 5
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 6
    Avatier Identity Anywhere
    Introducing Identity Anywhere, the world’s first Identity Management solution based on Docker containers making it the most portable, scalable and secure solution on the market. Docker container technology allows Identity Anywhere to run anywhere: on any cloud, on premise or a private cloud instance hosted by Avatier. Avatier Identity Management products brings separately administered back office applications and assets together to manage them as one system. Now armed with a unified digital dashboard, C-level executives deliver measurable business growth and increased profits. Eliminate the #1 Help Desk request with military grade self-service password reset. Reduce Costs. Only pay for the cloud app licenses you need. Maximize company utilization with a phenomenal shopping cart experience. Avoid fines, lawsuits, negative publicity, and even jail time due to non-compliance.
    Starting Price: $5.00/one-time/user
  • 7
    Ivanti vADC

    Ivanti vADC

    Ivanti

    Delight your users with faster, more reliable applications, with no compromise on performance or security. More than just a software load balancer, Ivanti vADC drives more transactions, even at peak load conditions, ensuring continuous uptime and real-time security monitoring of application traffic. Enhance your customer experience and grow your business with more attractive and responsive services. Increase systems efficiency and boost the throughput of application servers and security by up to 50%. Reduce costs with flexible capacity-based licensing. Ivanti vADC is natively designed for virtualization and cloud portability. Ivanti vADC provides unprecedented scale and flexibility to enhance the performance and security of applications across the widest range of environments, from physical and virtual data centers to public and hybrid clouds.
  • 8
    Delinea Cloud Access Controller
    Gain granular control over web applications and web-based cloud management platforms. Delinea's Cloud Access Controller provides a comprehensive PAM solution that operates at cloud speed and is quick to deploy and secure access to any web application. With Cloud Access Controller, you can easily integrate your existing authentication solutions with any web application without having to write any additional code. Apply granular RBAC policies that enforce least privilege and zero trust initiatives, even to custom and legacy web applications. Specify what an individual employee is allowed to read or modify within any web application. Grant, manage and revoke access to cloud applications. Specify who gets access to what, at a granular level. Track usage of each and every cloud application. Clientless session recording without agents. Secure access to all web applications, including social media, custom, and legacy web applications.
  • 9
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.
  • 10
    Hubstar Utilization
    HubStar is a dynamic workplace platform informs and guides your hybrid workplace strategy with insights on how much space you need to improve employee experience while reducing costs and carbon emissions. The HubStar platform includes space scheduling, an employee experience app powered by machine learning, space utilization measurement and prediction, automated floor plans, and space management. Shut down ghost town spaces on quiet days to save energy, then guide people into alternative spaces with HubStar Scheduling to deliver the best workplace experience. Get intelligent recommendations on exactly the size and type of spaces you need to improve your workplace experience. Ignite social connection, collaboration, and belonging by making it a breeze to get together, with purpose.
    Starting Price: $5,000 per year
  • 11
    LogRhythm UEBA

    LogRhythm UEBA

    LogRhythm

    LogRhythm UEBA applies self-evolving analytics against long periods of user data to detect anomalies that indicate a potential threat. Join Senior Technical Product Manager and Data Scientist, Melissa Ruzzi, for a breakdown of our user behavior analytics capability. With the shortage of qualified analysts, inefficient manual processes, and complexity of attacks, it’s crucial to have a user and entity behavior analytics solution that provides extra layers of detection to protect the organization against potential threats. LogRhythm enhances your threat detection coverage in addition to existing out-of-the-box AI Engine UEBA rules. LogRhythm UEBA helps detect outliers and automatically sets scores without the need of explicit defined logic. As a cloud-native add-on, LogRhythm UEBA functions as an advanced UEBA log source in the LogRhythm SIEM Platform. You can build customizable dashboards, run and save searches, and leverage AI Engine rules setting alarms and SmartResponse™ automated ac
  • 12
    IDmission

    IDmission

    IDmission

    Identity solutions require more than just verification. In today's digital world, businesses need to integrate identity solutions as a strategic part of their business processes. IDmission offers effortless end-to-end customer journeys using passive liveness biometrics, Identity-as-a-Service, and multi-factor authentication, coupled with our industry expertise. IDmission provides solutions that orchestrate digital transformations for companies relying on identity and ID verifications. We utilize standards compliant security, passive liveness biometrics, AI, and our industry expertise to help you create an effortless end to end customer journey. IDmission provides solutions for demanding applications that rely on identity and document authentication integrated into an end to end solution. IDmission provides much more than the best biometric technologies and AI in the industry. We take our technology and help our customers orchestrate their entire digital transformation.
  • 13
    Optiv Managed XDR
    Attackers are stealthy, relentless and motivated, and might use the same tools you do. They hide in your environment and quickly expand access. We understand the cyber ecosystem because it’s where we live, it’s where we operate. Our MXDR solution’s secret sauce derives from that pedigree, tested processes, proven IP, best-of-breed technology, leveraged automation and providing top-shelf talent to manage it all. Let’s collaborate and develop a custom solution with comprehensive threat visibility, accelerated incident identification, investigation, triage and mitigation actions to protect your enterprise from attacks and threats. We’ll start with your existing investments in endpoint, network, cloud, email and OT/IoT tools. Our experts will get those on the same team, actual technology orchestration! Reduces the attack surface, detects threats faster and automates deep investigation through a continuous approach.
  • 14
    Slice

    Slice

    Slice

    Both the company and the employees are exposed to legal and financial risks. Many factors are in play that make today’s process challenging and complicated. Each country has specific regulations around equity which constantly change. It exposes you and your employees to financial penalties. Tax codes for equity are extremely complicated. Mistakes are irreversible and it’s easy to miss on large tax breaks. Setting up and maintaining global equity plans is heavily time-consuming. It requires deep and expensive research. It’s hard to follow what's happening, takes a lot of time and mistakes happen. Stay compliant worldwide and avoid problems altogether with preemptive alerts that steer you clear of any potential exposure issues.
  • Previous
  • You're on page 1
  • Next