Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Cisco Duo Reviews & Ratings
    1,313 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    177 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • Veriam Reviews & Ratings
    3 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,623 Ratings
    Company Website
  • Carbon Black EDR Reviews & Ratings
    281 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website

What is Stack Identity?

We identify, remove, and oversee shadow access, which is unauthorized and unmonitored entry into cloud data, applications, and infrastructure, thereby preventing potential attackers from taking advantage of these security gaps. By implementing an automated and risk-oriented approach, we transform cloud Identity and Access Management (IAM) practices, ensuring effective protection and oversight of cloud data. This methodology allows cloud and security teams to promptly evaluate all data access behaviors, detailing who accesses the data, the nature of the access, the timing and location of these actions, and the rationale behind them, as well as their implications for cloud data security. Stack Identity protects cloud data by focusing on the risks and consequences linked to identity, access, and data vulnerabilities, all of which are captured in our real-time data attack map. We play a critical role in mitigating various access risks—whether stemming from human actions or APIs—while guiding identity practitioners, governance and compliance teams, and data stewards to take proactive measures. Furthermore, we provide SecOps and DevOps teams with a straightforward view of cloud security threats, empowering them to make well-informed decisions about data protection strategies. Ultimately, our all-encompassing strategy not only bolsters security but also promotes a forward-thinking culture of compliance and risk management across organizations, leading to more resilient cloud environments. By continuously enhancing our services, we aim to stay ahead of evolving threats and support our clients in navigating the complexities of cloud security.

What is InsightCloudSec?

As you transform your business, we prioritize the protection of your cloud services. InsightCloudSec allows you to promote innovation while ensuring continuous security and compliance. With features like unified visibility, monitoring, and real-time automated remediation, you can maintain ongoing security and avoid misconfigurations. Our platform specializes in securing configurations and workloads through automated cloud security and vulnerability management specifically designed for dynamic cloud settings. Additionally, you can efficiently manage identities and access across transient resources at scale. InsightCloudSec acts as a comprehensive cloud-native security platform, delivering all necessary tools for cloud security in a single solution. Given the rising importance of consumer privacy, which is driving various protective measures including regulations such as the California Consumer Privacy Act and the General Data Protection Regulation, there is a heightened need for effective privacy safeguards. This increasing focus on the protection of personal data underscores its critical role in our modern society, compelling organizations to adopt more stringent security practices.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Google Cloud Platform
Okta
Avalor
BMC AMI Capacity and Cost
Brinqa
Checkmarx
Cisco Secure Cloud Analytics
Coalfire
CyberArk Conjur
Delinea Cloud Access Controller
Forescout
GitHub
Microsoft 365
Modulo Risk Manager
MongoDB
Palo Alto Networks AutoFocus
Splunk Cloud Platform
Stream Security
VMware Cloud

Integrations Supported

Amazon Web Services (AWS)
Google Cloud Platform
Okta
Avalor
BMC AMI Capacity and Cost
Brinqa
Checkmarx
Cisco Secure Cloud Analytics
Coalfire
CyberArk Conjur
Delinea Cloud Access Controller
Forescout
GitHub
Microsoft 365
Modulo Risk Manager
MongoDB
Palo Alto Networks AutoFocus
Splunk Cloud Platform
Stream Security
VMware Cloud

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$66,000 per year
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Stack Identity

Company Location

United States

Company Website

stackidentity.com

Company Facts

Organization Name

Rapid7

Date Founded

2000

Company Location

United States

Company Website

www.rapid7.com/products/insightcloudsec/

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Popular Alternatives

Popular Alternatives

Sonrai Security Reviews & Ratings

Sonrai Security

Sonraí Security