Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Uniqkey Reviews & Ratings
    181 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    100 Ratings
    Company Website
  • gPanel Reviews & Ratings
    68 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    632 Ratings
    Company Website
  • Securden Unified PAM Reviews & Ratings
    12 Ratings
  • Frontegg Reviews & Ratings
    383 Ratings
    Company Website
  • Josys Reviews & Ratings
    204 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    681 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,755 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    516 Ratings
    Company Website

What is Entitle?

Entitle employs a security-driven approach to provisioning and governance, ensuring that it also facilitates business operations across all sectors, including research and development, sales, human resources, and finance. It enhances the provisioning workflow to support security measures that evolve in response to changing infrastructure and diverse employee requirements. Permissions can be allocated to specific resources like Google Drive folders, database tables, Git repositories, and more, enabling effective oversight. Sensitive resources and positions are protected by granting access only when required and retracting it when no longer necessary. This strategy allows colleagues, managers, and resource owners to approve access requests, which helps ensure the reliability of permissions granted. With the incorporation of automated access requests and a zero-touch provisioning model, teams in DevOps, IT, and other areas can greatly boost their efficiency and manage resources more effectively. Users can easily request access through communication platforms such as Slack, Teams, Jira, or email, creating a seamless approval process. Furthermore, the ability to quickly assign bulk permissions aids in expediting onboarding and offboarding tasks, allowing the organization to respond adeptly to its evolving needs. This holistic approach not only protects sensitive data but also cultivates a collaborative atmosphere that empowers teams to excel, ultimately driving overall business success.

What is Akku?

Akku offers a streamlined approach to managing the user lifecycle for corporate users through its robust identity and access management system. Its flexible features not only enhance data security but also ensure compliance with industry standards while boosting overall efficiency and productivity. As a cloud-based single sign-on (SSO) solution, Akku integrates effortlessly with both cloud and on-premise applications. It encompasses a wide array of security and access control functionalities that facilitate smooth user provisioning, management, access regulation, and deprovisioning processes. Notably, Akku operates as an agentless IAM solution, eliminating the need for a user agent installation within your infrastructure. Furthermore, it provides you with clear visibility into which aspects of your sensitive user data are accessible, ensuring you maintain both transparency and control over your information. With Akku, organizations can effectively streamline their user management processes while enhancing security measures.

Media

Media

Integrations Supported

Amazon EKS
Asana
Cloudflare
Confluence
Docusign
GitHub
Google Cloud Platform
Google Kubernetes Engine (GKE)
Jenkins
PostgreSQL
RingCentral RingCX
SQL Server
Salesforce
ServiceNow
Slack
Tableau
Teleport
Twingate
monday work management

Integrations Supported

Amazon EKS
Asana
Cloudflare
Confluence
Docusign
GitHub
Google Cloud Platform
Google Kubernetes Engine (GKE)
Jenkins
PostgreSQL
RingCentral RingCX
SQL Server
Salesforce
ServiceNow
Slack
Tableau
Teleport
Twingate
monday work management

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$5.00/year/user
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

BeyondTrust

Date Founded

1985

Company Location

United States

Company Website

www.entitle.io

Company Facts

Organization Name

CloudNow Technologies

Date Founded

2014

Company Location

India

Company Website

www.akku.work/

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

The OptimalCloud Reviews & Ratings

The OptimalCloud

Optimal IdM
Bravura Identity Reviews & Ratings

Bravura Identity

Bravura Security
Accops HyID Reviews & Ratings

Accops HyID

Accops Systems