Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cisco Duo Reviews & Ratings
    1,313 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    860 Ratings
    Company Website
  • Rippling Reviews & Ratings
    12,711 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    489 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    108 Ratings
    Company Website
  • 10Duke Enterprise Reviews & Ratings
    5 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    177 Ratings
    Company Website
  • Web APIs by Melissa Reviews & Ratings
    74 Ratings
    Company Website
  • PowerDMARC Reviews & Ratings
    148 Ratings
    Company Website
  • NetBrain Reviews & Ratings
    144 Ratings
    Company Website

What is Visual Identity Suite?

The Visual Identity Suite (VIS), an essential part of the Core Security Identity Governance and Administration portfolio that succeeded offerings from Courion, empowers organizations to reassess user privileges and access certifications through a novel, visual-oriented approach. Its intuitive graphical interface allows stakeholders to effortlessly assess common user entitlements and quickly identify discrepancies, enabling them to make well-informed decisions regarding access permissions. By providing a visual representation of access settings, VIS is instrumental in managing identity risks and preventing chaos related to identity management. For organizations to effectively mitigate these identity risks, they need to adopt a smart and transparent identity governance framework across all operational areas. This strategy involves employing a visual-first method for developing and administering roles as well as performing access reviews, which, when paired with contextually driven intelligence, optimizes the workflow of identity governance and administration while boosting overall operational effectiveness. Ultimately, embracing VIS not only enhances oversight but also cultivates a more robust and secure organizational environment, thereby ensuring that security measures are both comprehensive and effective. By prioritizing visual insights, organizations can stay ahead of potential risks and foster a culture of security awareness.

What is Token?

Token Security introduces a groundbreaking strategy designed specifically for the rapidly growing domain of Non-Human Identities (NHI), advocating for a machine-centric method to identity protection. In this digital age, identities are everywhere and frequently remain unmonitored; they emerge from machines, applications, services, and workloads that are created by diverse sources throughout each day. The complex and sluggish process of overseeing these identities has expanded the attack surface, making it challenging for organizations to manage effectively. Instead of focusing exclusively on human identities, Token emphasizes the significance of the resources being accessed, promptly illuminating who interacts with which resources, pinpointing vulnerabilities, and ensuring robust security without hampering operations. Additionally, Token proficiently maps all identities within cloud ecosystems, seamlessly incorporating complex elements such as Kubernetes, databases, servers, and containers, which leads to a unified view of critical identity data. This all-encompassing methodology not only bolsters security but also streamlines identity management amidst increasingly intricate infrastructures, ultimately fostering a more resilient digital environment. As organizations increasingly rely on automation and interconnected systems, the need for such innovative identity solutions becomes even more crucial, showcasing Token's relevance in today's technological landscape.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Microsoft Azure
Okta
Active Directory
CircleCI
Datadog
GitHub
Google Cloud Platform
Kubernetes
Microsoft Entra ID
Ping Identity
PostgreSQL
SailPoint
Snowflake

Integrations Supported

Amazon Web Services (AWS)
Microsoft Azure
Okta
Active Directory
CircleCI
Datadog
GitHub
Google Cloud Platform
Kubernetes
Microsoft Entra ID
Ping Identity
PostgreSQL
SailPoint
Snowflake

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Core Security (Fortra)

Date Founded

1996

Company Location

United States

Company Website

www.coresecurity.com/products/visual-identity-suite

Company Facts

Organization Name

Token

Date Founded

2023

Company Location

Israel

Company Website

www.token.security/

Categories and Features

Self-Service Password Reset (SSPR)

Access Control
Alerts / Notifications
Application Security
Compliance Management
Credential Management
Employee Directory
Group Passwords
Password Database
Password Management
Reminders
Reporting / Analytics
Single Sign On
Two-Factor Authentication (2FA)

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Popular Alternatives

Popular Alternatives

SailPoint Reviews & Ratings

SailPoint

SailPoint Technologies
midPoint Reviews & Ratings

midPoint

Evolveum
Ilantus Compact Identity Reviews & Ratings

Ilantus Compact Identity

Ilantus Technologies