Audience

Companies seeking a solution offering security services for Java, C/C++, and web environments

About iLock Security Services

Manages users, groups and roles. Authentication, delegation, authorization and auditing. Role-based access control, entitlements and time-based access rules. Manages access control policies for Web, Java and CORBA® resources. Manages access control policies for fine-grain application data and/or features. Central administration with flexible deployment options. Features specifically designed to aid in meeting privacy legislation. Supports integration with existing security infrastructure. Provides foundation for orb2 for Java Security Services.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

2AB
United States
www.2ab.com/ilock.htm

Videos and Screen Captures

iLock Security Services Screenshot 1
Other Useful Business Software
Auth0 for AI Agents now in GA Icon
Auth0 for AI Agents now in GA

Ready to implement AI with confidence (without sacrificing security)?

Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
Start building today

Product Details

Platforms Supported
Cloud
Training
Documentation
Support
Online

iLock Security Services Frequently Asked Questions

Q: What kinds of users and organization types does iLock Security Services work with?
Q: What languages does iLock Security Services support in their product?
Q: What kind of support options does iLock Security Services offer?
Q: What type of training does iLock Security Services provide?

iLock Security Services Product Features

Computer Security

Audit Trail
Compliance Management
Database Security Audit
File Access Control
Anti Spam
Antivirus
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection