+
+

Related Products

  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    40 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    487 Ratings
    Visit Website
  • MedTrainer
    241 Ratings
    Visit Website
  • Incredable
    9 Ratings
    Visit Website
  • Securden Endpoint Privilege Manager
    5 Ratings
    Visit Website
  • 1Password
    16,511 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,506 Ratings
    Visit Website
  • CredentialStream
    161 Ratings
    Visit Website

About

Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review.

About

Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams seeking a tool to discover, manage, audit, and monitor their passwords

Audience

Organizations looking for an advanced Vulnerability Management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BeyondTrust
Founded: 1985
United States
www.beyondtrust.com/password-safe

Company Information

Intruder
Founded: 2015
United Kingdom
intruder.io

Alternatives

Alternatives

Astra Pentest

Astra Pentest

Astra Security
GateKeeper Password Manager

GateKeeper Password Manager

Untethered Labs, Inc.
Acunetix

Acunetix

Invicti Security
Silent Armor

Silent Armor

Silent Breach

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

1Kosmos
6clicks
Amazon EC2
Amazon Web Services (AWS)
BI Book
CardinalOps
Charityproud
CodeConductor
Datto RMM
Devolutions Remote Desktop Manager
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
Jira Work Management
Lucidum
Microsoft Azure
Quickwork
Seemplicity
Slack
Zapier

Integrations

1Kosmos
6clicks
Amazon EC2
Amazon Web Services (AWS)
BI Book
CardinalOps
Charityproud
CodeConductor
Datto RMM
Devolutions Remote Desktop Manager
Entrust Certificate Hub
Entrust Identity Enterprise
Entrust Identity Essentials
Jira Work Management
Lucidum
Microsoft Azure
Quickwork
Seemplicity
Slack
Zapier
Claim BeyondTrust Password Safe and update features and information
Claim BeyondTrust Password Safe and update features and information
Claim Intruder and update features and information
Claim Intruder and update features and information