Oasis Security NHI Cloud is a Non-Human Identity Management (NHIM) platform designed to manage and secure non-human identities across hybrid cloud environments. The platform provides comprehensive identity management capabilities for service accounts, IAM users, API keys, and tokens across multiple environments including AWS, Azure, GCP, on-premise Active Directory, and various PaaS/SaaS platforms like Snowflake, Databricks, and GitHub. Core functionalities include: - Identity discovery and inventory management across cloud and on-premise environments - Context-based identity analysis showing ownership, usage patterns, and privilege levels - Automated threat and anomaly detection for identity-based security risks - Automated remediation workflows for identity-related issues - Lifecycle management including provisioning, secret vaulting, and rotation - Compliance management tools for maintaining security standards The platform addresses common non-human identity challenges such as: - Lack of centralized management - Absence of multi-factor authentication - Scale management for large numbers of machine identities - Ownership tracking and attestation - Standardization of security practices across distributed teams
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An automated script that configures Active Directory domains using customizable XML configuration files.
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
A simple drop-in library for managing users, permissions, and groups in your application.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.