Ratings and Reviews 181 Ratings
Ratings and Reviews 0 Ratings
What is Uniqkey?
Uniqkey stands out as Europe's foremost password and access management solution, streamlining security for employees while granting organizations superior oversight of their cloud systems, access protocols, and workforce administration. By addressing major threats to corporate infrastructure, Uniqkey protects essential systems and organizational credentials through cutting-edge encryption techniques. Additionally, it provides exclusive insights and a holistic overview of IT frameworks, employee access, and security metrics, proving invaluable for IT departments to effectively monitor security strategies and evaluate the success of educational initiatives with assurance. Thanks to robust integrations with existing platforms like Microsoft, IT administrators can efficiently manage user provisioning and de-provisioning, facilitating smooth onboarding and offboarding while ensuring comprehensive protection of their IT ecosystems through sophisticated encryption measures. Developed by top-tier security professionals in Europe, we utilize the latest encryption technologies, including the offline encryption of all data. Our advanced technology stack and servers, located in Denmark, guarantee optimal security, data reliability, and adherence to European standards, ultimately providing our clients with a sense of security and trust in our services. Furthermore, Uniqkey’s commitment to continual improvement ensures that we stay ahead in the evolving landscape of cybersecurity threats.
What is Pomerium?
Pomerium offers a secure, clientless solution that enables users to easily access web applications and services without needing a corporate VPN. Its emphasis on improving developer productivity eliminates complicated access procedures that could hinder workflow efficiency. In contrast to traditional client-based tunneling solutions, Pomerium provides fast connections with low latency while upholding strong security and privacy measures. By using contextual information for access control, it embraces a principle of continuous verification, exemplifying a zero trust framework where each action is evaluated based on contextual factors before being approved or denied. This approach differs significantly from NextGen VPNs, which generally only verify authentication and authorization at the start of a session. Additionally, Pomerium allows secure access to a wide range of platforms, including web applications, databases, Kubernetes clusters, internal tools, and legacy systems, making it a versatile option for individuals as well as teams of various sizes. Through its innovative methodology, Pomerium is transforming how organizations oversee access to their digital assets while enhancing overall security protocols. As it continues to evolve, Pomerium’s unique features position it as a frontrunner in the realm of secure access solutions.
Integrations Supported
Auth0
Google Workspace
JSON
Keycloak
Microsoft Entra ID Protection
NGINX
OAuth
Okta
Skycloak
Tailscale
Integrations Supported
Auth0
Google Workspace
JSON
Keycloak
Microsoft Entra ID Protection
NGINX
OAuth
Okta
Skycloak
Tailscale
API Availability
Has API
API Availability
Has API
Pricing Information
€4.5 per employee, per month
Free Trial Offered?
Free Version
Pricing Information
$7 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Uniqkey
Date Founded
2018
Company Location
Denmark
Company Website
uniqkey.eu/
Company Facts
Organization Name
Pomerium
Company Location
United States
Company Website
www.pomerium.com
Categories and Features
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Password Management
Credential Management
Multifactor Authentication
Password Generator
Password Reset
Password Synchronization
Single Sign On
User Management
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Remote Work
Collaboration
Credential Management
Electronic Signature
Employee Monitoring
Live Chat
Meeting Management
Project Management
Remote Access
Remote Support
Screen Sharing
Softphone
Task Management
Time Zone Tracking
Video Chat
Web Conferencing
User Provisioning and Governance
Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service
Categories and Features
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring