Ratings and Reviews 102 Ratings
Ratings and Reviews 0 Ratings
What is StrongDM?
The landscape of access and access management has evolved into a more intricate and often frustrating challenge. strongDM reimagines access by focusing on the individuals who require it, resulting in a solution that is not only user-friendly but also maintains rigorous security and compliance standards. This innovative approach is referred to as People-First Access.
Users benefit from quick, straightforward, and traceable access to essential resources, while administrators enjoy enhanced control that reduces the risk of unauthorized and excessive permissions. Additionally, teams in IT, Security, DevOps, and Compliance can effortlessly track activities with detailed audit logs answering critical questions about actions taken, locations, and timings. The system integrates seamlessly and securely across various environments and protocols, complemented by reliable 24/7 customer support to ensure optimal functionality. This comprehensive approach guarantees both efficiency and security in managing access.
What is ZEDI?
ZEDI serves a diverse range of organizations, from solo farmers to major multinational corporations, across sectors including manufacturing, retail, logistics, financial services, and scientific industries, all of which need to manage import and export transactions in any machine-readable format. What differentiates ZEDI from its competitors? While keeping EDI in-house grants complete oversight and control, it also places the entire burden of responsibility on the organization. Conversely, outsourcing EDI may relieve some obligations but restricts visibility and control based on what the service provider allows, often bound by their timelines. ZEDI distinguishes itself by providing both full visibility and control, enabling your service provider to execute tasks tailored to your business needs. The true strength of ZEDI is its adaptability; you can determine how much you want to participate, sharing responsibilities with your provider. Should your current service provider not meet your standards, transitioning to another is a seamless process. This innovative approach empowers organizations to retain their autonomy while effectively utilizing external expertise, making ZEDI a compelling choice for businesses seeking a balanced solution. Ultimately, ZEDI offers a unique combination of flexibility and agency that can drive efficiency and improve outcomes for all types of organizations.
Integrations Supported
Amazon CloudWatch
Amazon DynamoDB
Blink
Box
CockroachDB
Datadog
Debian
Google Colab
Google Kubernetes Engine (GKE)
Kubernetes
Integrations Supported
Amazon CloudWatch
Amazon DynamoDB
Blink
Box
CockroachDB
Datadog
Debian
Google Colab
Google Kubernetes Engine (GKE)
Kubernetes
API Availability
Has API
API Availability
Has API
Pricing Information
$70/user/month
Free Trial Offered?
Free Version
Pricing Information
$125 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
StrongDM
Date Founded
2015
Company Location
United States
Company Website
www.strongdm.com/
Company Facts
Organization Name
ZirconBlue
Date Founded
2017
Company Location
United Kingdom
Company Website
www.zirconblue.com
Categories and Features
Computer Security
Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Database
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
Privileged Access Management
Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Categories and Features
EDI
AS2 Applications
AS2 Specification Compliance
Archiving & Retention
Certificate Management
Configuration Data Searching
Data Format Translator
Flexible Licensing
Full Logging
Labeling