Audience

Companies interested in a powerful identity stack to protect users and non-human identities

About SlashID

Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure.

Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

SlashID
Founded: 2021
United States
www.slashid.dev/

Videos and Screen Captures

SlashID Screenshot 1
Other Useful Business Software
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Try Free

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Online

SlashID Frequently Asked Questions

Q: What kinds of users and organization types does SlashID work with?
Q: What languages does SlashID support in their product?
Q: What type of training does SlashID provide?

SlashID Product Features

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Real Time Notifications
Analytics / Reporting
Self-Service Portal
Single Sign On
User Provisioning
Privacy / Consent Management

Identity Management

Single Sign On
Compliance Management
Multifactor Authentication
Password Management
User Provisioning
Access Certification
Privileged Account Management
User Activity Monitoring
Self-Service Access Request

SlashID Additional Categories