Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • FusionAuth Reviews & Ratings
    163 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    178 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    942 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    119 Ratings
    Company Website
  • Syncro Reviews & Ratings
    451 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    360 Ratings
    Company Website
  • Proton VPN Reviews & Ratings
    41,010 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    480 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    114 Ratings
    Company Website
  • OpenVPN Reviews & Ratings
    198,328 Ratings
    Company Website

What is UserLock?

UserLock | Access Control and Two-Factor Authentication Solutions for Windows Active Directory Systems.

What is SpecTrust?

SpecTrust provides an all-encompassing defense mechanism against identity theft and fraud, enabling your team to focus on core business operations. Its cloud-native system efficiently detects and verifies dubious users before they gain access to your servers, emphasizing security as a top priority. The solution utilizes customer-specific 256-bit encryption keys to protect data and enforces strict TLS encryption for all data entering or leaving the system. Equipped with a cutting-edge secure stream processor, SpecTrust rapidly transforms disorganized internet traffic into coherent data and actionable insights in under 10 milliseconds, achieving impressive horizontal scalability. This speed is over ten times quicker than the typical blink of an eye. Moreover, SpecTrust's architecture is tailored for global scalability, incorporating automatic replication, limitless horizontal expansion, and self-recovery features that ensure constant operation, efficiency, and accuracy. To bolster security further, customer-specific data shards can be restricted to designated regions, granting you full control over the location of your data. This robust strategy not only fortifies your information but also streamlines your business operations, leading to improved overall efficiency. Ultimately, SpecTrust empowers organizations to navigate the digital landscape with confidence and security.

Media

Media

Integrations Supported

Additional information not provided

Integrations Supported

Additional information not provided

API Availability

Has API

API Availability

Has API

Pricing Information

$2.00/month/user
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

IS Decisions

Date Founded

2001

Company Location

France

Company Website

www.isdecisions.com

Company Facts

Organization Name

SpecTrust

Date Founded

2020

Company Location

United States

Company Website

www.spec-trust.com

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Network Access Control (NAC)

Authentication
Authorization
Automated Hotfix / Updates
Centralized Policy Management
Dashboard
Device Auto-Provisioning
Device Self-Registration
Posture Assessment
Quarantine / Remediation
Secure Guest Access

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Categories and Features

Popular Alternatives

Popular Alternatives