Citrix Secure Private Access

Citrix Secure Private Access

Cloud Software Group
+
+

Related Products

  • Auth0
    1,008 Ratings
    Visit Website
  • FusionAuth
    178 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    120 Ratings
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • EasyDMARC
    188 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine ADManager Plus
    613 Ratings
    Visit Website

About

You need to know that your customers are who they say they are, customers don’t want to jump through hoops to prove it and they want you to keep their credentials safe. Protect your customers identities through a delicate balance of security and a frictionless, pleasant customer experience. Real-time, continuous identity monitoring & validation Post-Authorization. Eliminate account takeover (ATO) instantly with intelligent MFA. Risk-based policy orchestrated continuous authentication. Acceptto is a transformative cybersecurity company driving a paradigm shift in identity access management by treating authentication not as a single event, but rather a continuum. Our AI/ML powered Passwordless Continuous AuthenticationTM technology analyzes and verifies user identity, inferring behavioral data to detect anomalies and eliminate dependence on vulnerable binary authentications. We deliver the smartest, most resilient and breach-proof identity validation technology.

About

Citrix Secure Private Access (formerly Citrix Secure Workspace Access) provides the zero trust network access (ZTNA) your business needs to stay competitive, with adaptive authentication and SSO to IT sanctioned applications. So you can scale your business and still meet today’s modern security standards—without compromising employee productivity. With adaptive access policies based on user identity, location, and device posture, you can continually monitor sessions and protect against threats of unauthorized login from BYO devices—all while delivering an exceptional user experience. And with integrated remote browser isolation technology, users can securely access apps using any BYO device—no endpoint agent needed.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises in need of a security and identity management solution to protect their customers' identities

Audience

Cloud Access Security Brokers platform for organizations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$5 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Acceptto
United States
www.acceptto.com/zero-trust-identity/

Company Information

Cloud Software Group
Founded: 2022
United States
www.citrix.com/products/citrix-secure-private-access/

Alternatives

Cisco Duo

Cisco Duo

Cisco

Alternatives

Kasm Workspaces

Kasm Workspaces

Kasm Technologies
Auth0

Auth0

Okta
Citrix Enterprise Browser

Citrix Enterprise Browser

Cloud Software Group

Categories

Categories

Integrations

Active Directory
Amazon Web Services (AWS)
Atlassian Clover
Cisco AnyConnect
ConnectWise PSA
Dropbox
GitHub
HID IdenTrust
Juniper Identity Management Service
Microsoft Azure
Microsoft Outlook
Okta
OpenVPN
Palo Alto Networks Threat Prevention
Ping Identity
Salesforce
ServiceNow
Tectia
WordPress

Integrations

Active Directory
Amazon Web Services (AWS)
Atlassian Clover
Cisco AnyConnect
ConnectWise PSA
Dropbox
GitHub
HID IdenTrust
Juniper Identity Management Service
Microsoft Azure
Microsoft Outlook
Okta
OpenVPN
Palo Alto Networks Threat Prevention
Ping Identity
Salesforce
ServiceNow
Tectia
WordPress
Claim Acceptto Zero Trust Identity (CIAM) and update features and information
Claim Acceptto Zero Trust Identity (CIAM) and update features and information
Claim Citrix Secure Private Access and update features and information
Claim Citrix Secure Private Access and update features and information