Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cisco Duo Reviews & Ratings
    1,325 Ratings
  • FusionAuth Reviews & Ratings
    119 Ratings
  • Auth0 Reviews & Ratings
    884 Ratings
  • Kinde Reviews & Ratings
    48 Ratings
  • Uniqkey Reviews & Ratings
    177 Ratings
  • ManageEngine ADSelfService Plus Reviews & Ratings
    108 Ratings
  • ManageEngine ADManager Plus Reviews & Ratings
    507 Ratings
  • Udentify Reviews & Ratings
    12 Ratings
  • 1Password Reviews & Ratings
    16,148 Ratings
  • ID.me Reviews & Ratings
    65 Ratings

What is Entrust Identity as a Service?

Identity management (IAM) in the cloud encompasses features like multi-factor authentication (MFA), passwordless access based on credentials, and single sign-on (SSO). By employing cloud-based multi-factor authentication, secure access is granted to all applications, networks, devices, and accounts utilized by your users. The user experience is further enhanced through methods such as adaptive authentication and proximity-based login, ensuring that satisfied users are less likely to circumvent security protocols. This approach is simpler than many alternatives you've encountered. With features designed to save time, including integrated provisioning tools and seamless integrations for both on-premises and cloud environments, the burden on IT teams is significantly lightened from the initial setup through daily operations. To accelerate your progress, implementing robust IAM is essential. Additionally, the scalability of cloud-based Identity as a Service allows for the quick adaptation to new users, diverse use cases, and ever-changing security threats, making it a vital component of modern digital security strategies. As organizations continue to grow and evolve, the importance of a strong IAM framework becomes increasingly clear.

What is CyberArk Endpoint Privilege Manager?

Your security must be as flexible as your operations. The Endpoint Privilege Manager offers real-time modifications, enabling users to obtain local admin access instantly when necessary. Cybercriminals are constantly on the lookout for vulnerabilities, but we mitigate this risk by automatically blocking credential theft before it can cause any damage. With the myriad of ransomware strains existing today, our solution effectively defends against all of them. It facilitates the temporary elevation of user privileges for specific tasks swiftly and effortlessly, reducing the need for help desk intervention. Prevent ransomware from standing in your way. Take charge of local admin accounts without disrupting everyday activities. Securely operate from any device and location, ensuring that both your assets and your organization's reputation remain intact. Protect every endpoint while enabling a smooth operational process. By focusing on robust security, you can boost productivity while still prioritizing safety. Ultimately, a well-structured security approach not only protects but also enhances overall efficiency within your organization.

Media

Media

Integrations Supported

Azure Marketplace
Microsoft 365
AWS Marketplace
Axonius
BlueCat Gateway
Dropbox
Entrust Identity Essentials
Forescout
Google Workspace
Intercede MyID
Microsoft Azure
OctoXLabs
OneLogin
Optiv Managed XDR
Proofpoint Insider Threat Management
RadiantOne
Rapid7 InsightConnect
Salesforce
Slack

Integrations Supported

Azure Marketplace
Microsoft 365
AWS Marketplace
Axonius
BlueCat Gateway
Dropbox
Entrust Identity Essentials
Forescout
Google Workspace
Intercede MyID
Microsoft Azure
OctoXLabs
OneLogin
Optiv Managed XDR
Proofpoint Insider Threat Management
RadiantOne
Rapid7 InsightConnect
Salesforce
Slack

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Entrust

Date Founded

1969

Company Location

United States

Company Website

www.entrust.com/products/iam/identity-as-a-service

Company Facts

Organization Name

CyberArk

Date Founded

1999

Company Location

United States

Company Website

www.cyberark.com/products/endpoint-privilege-manager/

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Self-Service Password Reset (SSPR)

Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

IDmelon Authenticator Reviews & Ratings

IDmelon Authenticator

IDmelon Technologies

Popular Alternatives

Cisco Duo Reviews & Ratings

Cisco Duo

Cisco
PortalGuard Reviews & Ratings

PortalGuard

BIO-key International