+
+

Related Products

  • Uniqkey
    181 Ratings
    Visit Website
  • FusionAuth
    174 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Auth0
    1,003 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    595 Ratings
    Visit Website
  • 1Password
    16,511 Ratings
    Visit Website
  • Rippling
    16,712 Ratings
    Visit Website
  • Securden Password Vault
    40 Ratings
    Visit Website

About

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your users. IAM enables your users to control access to AWS service APIs and to specific resources. IAM also enables you to add specific conditions such as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device. Protect your AWS environment by using AWS MFA, a security feature available at no extra cost that augments user name and password credentials. MFA requires users to prove physical possession of a hardware MFA token or MFA-enabled mobile device by providing a valid MFA code.

About

Centralize your multi-vendor infrastructure into a single security domain. Core Privileged Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start. Centralize management of user profiles and accounts for simplified administration and scalability. Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity. Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams that need a comprehensive IAM solution to improve their process operations

Audience

Organizations looking for a software solution for privileged access management on Linux and UNIX

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/iam/

Company Information

Fortra
Founded: 1982
United States
www.fortra.com/products/privileged-access-management

Alternatives

Alternatives

SailPoint

SailPoint

SailPoint Technologies
Vault One

Vault One

VaultOne Software
Passly

Passly

IDAgent

Categories

Categories

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

AWS CodeArtifact
AWS Command Line Interface (CLI)
AWS Data Exchange
AWS Hybrid Cloud
AWS Step Functions
AWS Virtual Waiting Room
Amazon Web Services (AWS)
AppSecEngineer
Azure Marketplace
CentreStack
EagleEye
ImageSite
Indent
IntelliGrants IGX
Lyftrondata
Martini
RadiantOne
Symops
Tabular
Workativ Assistant

Integrations

AWS CodeArtifact
AWS Command Line Interface (CLI)
AWS Data Exchange
AWS Hybrid Cloud
AWS Step Functions
AWS Virtual Waiting Room
Amazon Web Services (AWS)
AppSecEngineer
Azure Marketplace
CentreStack
EagleEye
ImageSite
Indent
IntelliGrants IGX
Lyftrondata
Martini
RadiantOne
Symops
Tabular
Workativ Assistant
Claim AWS Identity and Access Management (IAM) and update features and information
Claim AWS Identity and Access Management (IAM) and update features and information
Claim Core Privileged Access Manager (BoKS) and update features and information
Claim Core Privileged Access Manager (BoKS) and update features and information