Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Frontegg Reviews & Ratings
    383 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    1,029 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,573 Ratings
    Company Website
  • Google Chrome Enterprise Reviews & Ratings
    2,061 Ratings
    Company Website
  • Stigg Reviews & Ratings
    25 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,755 Ratings
    Company Website
  • StrongDM Reviews & Ratings
    100 Ratings
    Company Website
  • HERE Enterprise Browser Reviews & Ratings
    2 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,699 Ratings
    Company Website
  • KrakenD Reviews & Ratings
    71 Ratings
    Company Website

What is iLock Security Services?

Manages users, groups, and roles while overseeing processes related to authentication, delegation, authorization, and auditing. It enforces role-based access control alongside entitlements and conditions that adhere to time limitations. The system administers access control policies for resources across Web, Java, and CORBA® environments. Furthermore, it oversees policies concerning access control to intricate application data and functionalities. Centralized management is further enhanced by flexible deployment options. Additionally, the system incorporates features designed to support compliance with privacy regulations. It also provides the capability to integrate with existing security frameworks, establishing a foundation for orb2 for Java Security Services, which significantly bolsters overall security management capabilities. This comprehensive approach not only streamlines the management process but also ensures a robust security posture across all platforms.

What is PingDataGovernance?

The swift increase in digital transactions and data has resulted in a scenario where authorization logic is scattered across various parts of organizations. This disorganization can complicate the processes of updating, auditing, and managing such logic, often rendering it a tedious task. PingDataGovernance provides a solution to this challenge by delivering a unified system for authorization policies that can evaluate a range of factors, such as identity attributes, entitlements, and contextual details, to streamline the authorization of critical actions and access to important data. With this system, organizations can act quickly without sacrificing security or compliance with relevant regulations. Featuring a user-friendly drag-and-drop interface, it allows individuals to adjust policies in mere minutes. Moreover, organizations have the autonomy to choose which teams are permitted to manage these policies, enabling customized governance. Unlike traditional role-based access control (RBAC), dynamic authorization utilizes significant contextual data attributes to assess access requests in real-time, ensuring centralized policy enforcement that adheres to regulatory requirements. This forward-thinking method not only simplifies access control management but also boosts the overall agility of organizations in a fast-evolving digital environment, paving the way for more innovative workflows. As a result, businesses can better adapt to new challenges while maintaining the integrity of their security frameworks.

Media

Media

Integrations Supported

Knak
RadiantOne

Integrations Supported

Knak
RadiantOne

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

2AB

Company Location

United States

Company Website

www.2ab.com/ilock.htm

Company Facts

Organization Name

Ping Identity

Date Founded

2002

Company Location

United States

Company Website

www.pingidentity.com/en/software/pingdatagovernance.html

Categories and Features

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Categories and Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Popular Alternatives

OpenFGA Reviews & Ratings

OpenFGA

The Linux Foundation

Popular Alternatives

Cedar Reviews & Ratings

Cedar

Amazon
Cedar Reviews & Ratings

Cedar

Amazon
Authress Reviews & Ratings

Authress

Rhosys