Ratings and Reviews 1 Rating

Total
ease
features
design
support

Ratings and Reviews 7 Ratings

Total
ease
features
design
support

Alternatives to Consider

  • SuperOps Reviews & Ratings
    216 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    558 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    361 Ratings
    Company Website
  • Atera Reviews & Ratings
    2,970 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    3,472 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    114 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,695 Ratings
    Company Website
  • ConnectWise Automate Reviews & Ratings
    501 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    178 Ratings
    Company Website
  • Auvik Reviews & Ratings
    669 Ratings
    Company Website

What is JumpCloud?

Around the globe, small and medium-sized enterprises (SMEs) can achieve unparalleled freedom of choice by collaborating with JumpCloud. By utilizing its cloud-based open directory platform, JumpCloud streamlines the management and security of identities, access, and devices, allowing IT teams and managed service providers (MSPs) to efficiently support a variety of operating systems including Windows, Mac, Linux, and Android. This innovative solution enables users to manage identities either directly or through their chosen HRIS or productivity tools, while also granting access to numerous on-premises and cloud applications with a single, secure set of credentials. To explore the full potential of this comprehensive platform, consider starting a free 30-day trial of JumpCloud today and experience the benefits firsthand. Embrace the future of IT management and watch your business thrive.

What is Foxpass?

Foxpass offers identity and access management solutions tailored for businesses of varying scales. With our LDAP, RADIUS, and SSH key management systems available both in the cloud and on-premise, we guarantee that employees are granted access solely to the networks, servers, and VPNs they require, and only for the duration specified. Additionally, Foxpass easily integrates with popular platforms like Office365, Okta, and Bitium, allowing for a smooth and efficient access experience. This ensures that security protocols are maintained while optimizing productivity within organizations.

Media

Media

Integrations Supported

GitHub
Google Workspace
Microsoft 365
OpenVPN
AWS IAM Identity Center
Akitra Andromeda
Bitwarden
Buildstash
Joan
Junos Traffic Vision
LDAP
OneLogin
PrinterLogic
Quickwork
SSOReady
Secret Double Octopus
Shoreline
Slack
Torpago
Workativ Assistant

Integrations Supported

GitHub
Google Workspace
Microsoft 365
OpenVPN
AWS IAM Identity Center
Akitra Andromeda
Bitwarden
Buildstash
Joan
Junos Traffic Vision
LDAP
OneLogin
PrinterLogic
Quickwork
SSOReady
Secret Double Octopus
Shoreline
Slack
Torpago
Workativ Assistant

API Availability

Has API

API Availability

Has API

Pricing Information

$9/user
Free Trial Offered?
Free Version

Pricing Information

$3/User/Month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

JumpCloud

Date Founded

2012

Company Location

United States

Company Website

jumpcloud.com

Company Facts

Organization Name

Foxpass

Date Founded

2015

Company Location

United States

Company Website

Foxpass.com

Categories and Features

Authentication

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Cloud Management

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Service

Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Password Management

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Password Management

Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Auth0 Reviews & Ratings

Auth0

Okta

Popular Alternatives

RapidIdentity Reviews & Ratings

RapidIdentity

Identity Automation
Vault One Reviews & Ratings

Vault One

VaultOne Software