Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,122 Ratings
    Company Website
  • Psono Reviews & Ratings
    92 Ratings
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,066 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    85 Ratings
    Company Website
  • Hyperproof Reviews & Ratings
    228 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    74 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website

What is BeyondTrust Password Safe?

Identify and manage privileged accounts across various categories, ensuring effective oversight and analysis. Implement automated scanning to detect and classify all assets and applications while simplifying the onboarding process for privileged accounts. Securely store, manage, and rotate passwords for these accounts, eliminating hardcoded credentials and enforcing strong password policies. Maintain continuous logging and monitoring of all activities related to privileged credentials and sessions to comply with regulatory standards and facilitate forensic evaluations. Utilize Password Safe for accurate, automated password management, which includes approval mechanisms for privileges, detailed session monitoring—such as live observation—and all essential audit trails for compliance purposes. Furthermore, enhance the processes for discovering and onboarding accounts, while also managing the storage and rotation of privileged passwords to eradicate hardcoded credentials in scripts. This holistic approach not only provides a secure environment but also ensures meticulous oversight of privileged account activities, thus meeting all regulatory compliance requirements effectively and efficiently. It is vital to continually assess and refine these practices to adapt to evolving security threats.

What is Astrix Security?

Astrix offers an effective solution to ensure that your critical systems maintain secure links with external cloud services by improving access management and threat prevention for various components like API keys, OAuth tokens, and service accounts. Our deployment is agentless and user-friendly, allowing you to uncover and rectify risky interactions between applications that may result in supply chain threats, data breaches, and violations of regulations. You will gain a detailed perspective of all connections tied to your essential systems, which encompasses internal and external applications, access keys, secrets, and operational processes. Furthermore, you can pinpoint and remove over-privileged, unnecessary, and untrusted connections while receiving notifications for any applications that display unusual activity. This forward-thinking strategy not only protects your infrastructure but also fosters a security-conscious culture within your organization, ultimately enhancing your overall risk management framework. By adopting this comprehensive approach, you can ensure that your cloud integrations remain resilient against emerging threats.

Media

Media

Integrations Supported

1Kosmos
Amazon Web Services (AWS)
Charityproud
Datto RMM
Devolutions Remote Desktop Manager
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
GitHub
Google
Google Cloud BigQuery
Google Cloud Platform
Microsoft 365
Okta
Salesforce
Slack
Snowflake
Workato
Workday Extend
Zapier

Integrations Supported

1Kosmos
Amazon Web Services (AWS)
Charityproud
Datto RMM
Devolutions Remote Desktop Manager
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
GitHub
Google
Google Cloud BigQuery
Google Cloud Platform
Microsoft 365
Okta
Salesforce
Slack
Snowflake
Workato
Workday Extend
Zapier

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

BeyondTrust

Date Founded

1985

Company Location

United States

Company Website

www.beyondtrust.com/password-safe

Company Facts

Organization Name

Astrix Security

Date Founded

2021

Company Location

Israel

Company Website

astrix.security/

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Popular Alternatives

Popular Alternatives

GateKeeper Password Manager Reviews & Ratings

GateKeeper Password Manager

Untethered Labs, Inc.
Entro Reviews & Ratings

Entro

Entro Security
Coro Reviews & Ratings

Coro

Coro Cybersecurity