Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Kandji Reviews & Ratings
    1,035 Ratings
    Company Website
  • Squaretalk Reviews & Ratings
    192 Ratings
    Company Website
  • Onspring Reviews & Ratings
    169 Ratings
    Company Website
  • Resolver Reviews & Ratings
    246 Ratings
    Company Website
  • Kroll Cyber Risk Reviews & Ratings
    64 Ratings
    Company Website
  • OpenDQ Reviews & Ratings
    9 Ratings
    Company Website
  • Hoxhunt Reviews & Ratings
    4,064 Ratings
    Company Website
  • Windocks Reviews & Ratings
    6 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • FrameworkLTC Reviews & Ratings
    44 Ratings
    Company Website

What is HCL iAutomate?

HCL iAutomate is a part of the HCLSoftware AI & Intelligent Operations suite, specifically within the Infrastructure Automation and Orchestration sector. This intelligent runbook automation solution merges artificial intelligence with automation to streamline and enhance the lifecycle of enterprise IT operations. By utilizing technologies such as machine learning and natural language processing, it effectively identifies problems, suggests solutions, and triggers automated fixes, enabling a seamless zero-touch automation experience. Moreover, it facilitates comprehensive incident resolution and task automation throughout the entire infrastructure and application landscape, leveraging an extensive library of over 3400 configurable and reusable runbooks. This innovation not only enhances operational efficiency but also significantly reduces the manual effort required for IT management tasks.

What is Entitle?

Entitle employs a security-driven approach to provisioning and governance, ensuring that it also facilitates business operations across all sectors, including research and development, sales, human resources, and finance. It enhances the provisioning workflow to support security measures that evolve in response to changing infrastructure and diverse employee requirements. Permissions can be allocated to specific resources like Google Drive folders, database tables, Git repositories, and more, enabling effective oversight. Sensitive resources and positions are protected by granting access only when required and retracting it when no longer necessary. This strategy allows colleagues, managers, and resource owners to approve access requests, which helps ensure the reliability of permissions granted. With the incorporation of automated access requests and a zero-touch provisioning model, teams in DevOps, IT, and other areas can greatly boost their efficiency and manage resources more effectively. Users can easily request access through communication platforms such as Slack, Teams, Jira, or email, creating a seamless approval process. Furthermore, the ability to quickly assign bulk permissions aids in expediting onboarding and offboarding tasks, allowing the organization to respond adeptly to its evolving needs. This holistic approach not only protects sensitive data but also cultivates a collaborative atmosphere that empowers teams to excel, ultimately driving overall business success.

Media

No images available

Media

Integrations Supported

Jira
ServiceNow
Amazon Web Services (AWS)
Asana
BMC Helix Remedyforce
Cherwell Software
Cloudflare Zero Trust
Dropbox
GitLab
Google Cloud Platform
Google Drive
Google Kubernetes Engine (GKE)
Google Workspace
Greenhouse
HCL BigFix
HashiCorp Boundary
Jenkins
PagerDuty
PostgreSQL
Twingate

Integrations Supported

Jira
ServiceNow
Amazon Web Services (AWS)
Asana
BMC Helix Remedyforce
Cherwell Software
Cloudflare Zero Trust
Dropbox
GitLab
Google Cloud Platform
Google Drive
Google Kubernetes Engine (GKE)
Google Workspace
Greenhouse
HCL BigFix
HashiCorp Boundary
Jenkins
PagerDuty
PostgreSQL
Twingate

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

HCLSoftware

Company Website

www.hcl-software.com

Company Facts

Organization Name

BeyondTrust

Date Founded

1985

Company Location

United States

Company Website

www.entitle.io

Categories and Features

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

HCL MyCloud Reviews & Ratings

HCL MyCloud

HCLSoftware

Popular Alternatives

HCL HERO Reviews & Ratings

HCL HERO

HCL Software