+
+

Related Products

  • Uniqkey
    181 Ratings
    Visit Website
  • FusionAuth
    173 Ratings
    Visit Website
  • Auth0
    991 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • 1Password
    16,393 Ratings
    Visit Website
  • Rippling
    16,003 Ratings
    Visit Website
  • StrongDM
    96 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website

About

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your users. IAM enables your users to control access to AWS service APIs and to specific resources. IAM also enables you to add specific conditions such as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device. Protect your AWS environment by using AWS MFA, a security feature available at no extra cost that augments user name and password credentials. MFA requires users to prove physical possession of a hardware MFA token or MFA-enabled mobile device by providing a valid MFA code.

About

Eliminate credential sharing, establish powerful administrative permissions, mass deploy login security for your customers, and meet insurance and compliance requirements with Evo Security. EPIC is the next evolutionary step for MSPs, MSSPs, NOCs, and SOCs seeking to reduce credential sharing risk and secure logins for endpoints, network devices, and web applications all-in-one. The big secret about managed services is that MSP administrators are forced to share customer passwords and MFA codes internally. Password Managers and other Password Rotation tools offer sharing convenience with some iterative improvements, however ultimately propagate the same problem. With cybercriminals targeting MSPs more than ever, and regulation mandates demanding a better way, this involuntary poor practice has run its course. Easily accommodate managed or co-managed Customer scenarios when technicians and administrators need access to the Evo platform using the Evo Privileged Access Manager.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams that need a comprehensive IAM solution to improve their process operations

Audience

MSPs

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/iam/

Company Information

Evo Security
Founded: 2018
United States
www.evosecurity.com

Alternatives

Alternatives

SailPoint

SailPoint

SailPoint Technologies
Vault One

Vault One

VaultOne Software
Passly

Passly

IDAgent

Categories

Categories

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

MSP Features

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Integrations

AWS CodeArtifact
AWS Data Exchange
AWS Hybrid Cloud
AWS Virtual Waiting Room
Access Auditor
Amazon Translate
Amazon Web Services (AWS)
Azure Marketplace
CentreStack
Chronicle SOAR
Clarity Security
EagleEye
ImageSite
Josys
Lyftrondata
Nango
New Relic
RadiantOne
Symops
Tabular

Integrations

AWS CodeArtifact
AWS Data Exchange
AWS Hybrid Cloud
AWS Virtual Waiting Room
Access Auditor
Amazon Translate
Amazon Web Services (AWS)
Azure Marketplace
CentreStack
Chronicle SOAR
Clarity Security
EagleEye
ImageSite
Josys
Lyftrondata
Nango
New Relic
RadiantOne
Symops
Tabular
Claim AWS Identity and Access Management (IAM) and update features and information
Claim AWS Identity and Access Management (IAM) and update features and information
Claim Evo Security and update features and information
Claim Evo Security and update features and information