BeyondTrust Privileged Access Management (PAM) Logo

BeyondTrust Privileged Access Management (PAM)

0
Free
Visit Website

BeyondTrust discovers, onboards, secures, and right-sizes privileges across your enterprise. Gain visibility and control over all privileged accounts and users in your environment. Simplify deployments, reduce costs, improve usability, and reduce privilege risks with the broadest set of privileged access security capabilities with BeyondTrust. BeyondTrust Privileged Access Management (PAM) solutions are deployed to satisfy a variety of security, service desk, and industry-specific use cases. Protect your business with the most proven PAM solutions for the cloud. Satisfy audit and compliance requirements out-of-the-box.

FEATURES

ALTERNATIVES

A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.

Free

Runs IAM policy linting checks against AWS accounts to identify security best practices and policy errors.

Free

Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.

Free

Okta Workforce Identity Cloud is an identity and access management platform that provides secure, streamlined access for an organization's workforce across various applications and resources.

Commercial

IAM Zero detects IAM issues and suggests least-privilege policies for AWS and other cloud platforms.

Free

Akamai MFA is a cloud-based multi-factor authentication solution using FIDO2 standard to secure workforce logins across various applications through smartphone push notifications.

Commercial

Okta Customer Identity Cloud is a CIAM solution that provides secure, customizable identity management for consumer and SaaS applications.

Commercial

Akamai Account Protector is a cybersecurity tool that prevents account abuse by detecting and mitigating fraudulent activities through user behavior analysis and real-time risk scoring.

Commercial
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved