Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    489 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • StandardFusion Reviews & Ratings
    88 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    85 Ratings
    Company Website
  • Hyperproof Reviews & Ratings
    228 Ratings
    Company Website
  • Interfacing Enterprise Process Center (EPC) Reviews & Ratings
    55 Ratings
    Company Website
  • Veriam Reviews & Ratings
    3 Ratings
    Company Website
  • Safetica Reviews & Ratings
    356 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website

What is Torsion?

Torsion provides exceptional clarity and oversight regarding access permissions within Microsoft 365. It enables data owners to effectively manage their own information, leveraging their in-depth knowledge of the data. With comprehensive visibility and continuous audit trails, Torsion meets compliance demands with ease. Additionally, its smart automation swiftly rectifies any unauthorized permissions across extensive datasets, operating seamlessly and autonomously in real-time. This results in a more secure and organized data environment for all users.

What is Delinea DevOps Secret Vault?

Enable seamless interactions among applications while safeguarding database access by avoiding direct credential embedding in the code. It's crucial to provide secure access to vital tools necessary for software deployment, as well as for testing, orchestration, and configuration tasks. Centralized management, control, and auditing of secrets are key for automated processes that operate without human involvement. Utilizing cloud-native SaaS architecture allows for quick deployment and flexible scalability, features that traditional, IP-based PAM systems cannot match. The traditional concept of Privileged Access Management (PAM) is inadequate when confronting the rising threat of cyberattacks. For PAM to be effective, it must adapt to the growing number of identities and the intricacies of modern IT landscapes. Additionally, embracing a more adaptable strategy in PAM can significantly boost both security measures and operational effectiveness. This evolution is essential for organizations striving to stay ahead in a rapidly changing digital environment.

Media

Media

Integrations Supported

Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams

Integrations Supported

Microsoft 365
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Torsion

Date Founded

2017

Company Location

United Kingdom

Company Website

www.torsionis.com

Company Facts

Organization Name

Delinea

Date Founded

2022

Company Location

United States

Company Website

delinea.com/products/devops-secrets-management-vault

Categories and Features

Customer Identity and Access Management (CIAM)

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Categories and Features

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives