Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Josys Reviews & Ratings
    204 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    383 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,755 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    181 Ratings
    Company Website
  • Setyl Reviews & Ratings
    48 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,029 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    632 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    4,625 Ratings
    Company Website
  • SuperOps Reviews & Ratings
    220 Ratings
    Company Website
  • Freshservice Reviews & Ratings
    1,967 Ratings
    Company Website

What is Zluri?

Zluri serves as a comprehensive management platform tailored for IT Teams overseeing SaaS operations. This platform empowers teams to seamlessly oversee, safeguard, and ensure compliance across various SaaS applications through a unified dashboard. By illuminating instances of shadow IT, Zluri enables the tracking and optimization of SaaS expenditures while automating the entire process of application renewal management. With its focus on data-driven insights, Zluri equips IT teams to strategize, streamline, secure, and maximize the benefits derived from their collection of SaaS applications. Furthermore, it enhances operational efficiency and fosters better decision-making within organizations.

What is Entitle?

Entitle employs a security-driven approach to provisioning and governance, ensuring that it also facilitates business operations across all sectors, including research and development, sales, human resources, and finance. It enhances the provisioning workflow to support security measures that evolve in response to changing infrastructure and diverse employee requirements. Permissions can be allocated to specific resources like Google Drive folders, database tables, Git repositories, and more, enabling effective oversight. Sensitive resources and positions are protected by granting access only when required and retracting it when no longer necessary. This strategy allows colleagues, managers, and resource owners to approve access requests, which helps ensure the reliability of permissions granted. With the incorporation of automated access requests and a zero-touch provisioning model, teams in DevOps, IT, and other areas can greatly boost their efficiency and manage resources more effectively. Users can easily request access through communication platforms such as Slack, Teams, Jira, or email, creating a seamless approval process. Furthermore, the ability to quickly assign bulk permissions aids in expediting onboarding and offboarding tasks, allowing the organization to respond adeptly to its evolving needs. This holistic approach not only protects sensitive data but also cultivates a collaborative atmosphere that empowers teams to excel, ultimately driving overall business success.

Media

Media

Integrations Supported

Adobe Creative Cloud
Amazon Web Services (AWS)
Asana
Box
GitHub
Google Workspace
Intercom
Jira
Okta
OneLogin
Salesforce
Slack
Zoom
Cisco Duo
Cloudflare Zero Trust
Jamf Connect
JumpCloud
Mozilla Firefox
QuickBooks Online
Twingate

Integrations Supported

Adobe Creative Cloud
Amazon Web Services (AWS)
Asana
Box
GitHub
Google Workspace
Intercom
Jira
Okta
OneLogin
Salesforce
Slack
Zoom
Cisco Duo
Cloudflare Zero Trust
Jamf Connect
JumpCloud
Mozilla Firefox
QuickBooks Online
Twingate

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Zluri

Date Founded

2020

Company Location

United States

Company Website

www.zluri.com/

Company Facts

Organization Name

BeyondTrust

Date Founded

1985

Company Location

United States

Company Website

www.entitle.io

Categories and Features

Identity Management

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

SaaS Management

License Management
Onboarding
Renewal Management
SaaS Operations Management
Shadow IT Detection
Spend Management
Subscription Management
Usage Tracking / Analytics
Vendor Management

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

User Provisioning and Governance

Access Governance
Access Verification Workflow
Audits / Reports
Automatic Provisioning / Deprovisioning
Delegated Access Authorization
Identity Synchronization
Lifecycle Management
Multi-Factor Authentication (MFA)
Password Management
Policy Enforcement
Single Sign-On (SSO)
User Self-Service

Popular Alternatives

Popular Alternatives

CoreSuite Reviews & Ratings

CoreSuite

CoreView
Bravura Identity Reviews & Ratings

Bravura Identity

Bravura Security