Check Point Identity Awareness

Check Point Identity Awareness

Check Point Software Technologies
Zentry

Zentry

Zentry Security
+
+

Related Products

  • Auth0
    1,003 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    119 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • Google Chrome Enterprise
    2,051 Ratings
    Visit Website
  • UTunnel VPN and ZTNA
    118 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • FusionAuth
    174 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,505 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • iDenfy
    262 Ratings
    Visit Website

About

Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console. It is clear that username and passwords no longer prove the identity of a user. Access control to your valuable assets must be strengthened. Check Point Identity Awareness ensures access to your data is granted only to authorized users, and only after their identities have been strictly authenticated; using Single Sign-On, Multi-Factor Authentication, Context-aware policies and anomaly detection.

About

Least privileged application access with consistent security for any user, anywhere. Transient authentication provides granular, least-privileged access to mission-critical infrastructure. Zentry Trusted Access provides clientless, browser-based, streamlined zero-trust application access for small to medium-sized enterprises. Organizations see gains in security posture and compliance, a reduced attack surface, and greater visibility into users and applications. Zentry Trusted Access is a cloud-native solution that is simple to configure, and even simpler to use. Employees, contractors, and third parties just need an HTML5 browser to securely connect to applications in the cloud and data center, no clients are needed. Leveraging zero trust technologies like multi-factor authentication and single sign-on, only validated users obtain access to applications and resources. All sessions are encrypted end-to-end with TLS, and each is governed by granular policies.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams looking for a Zero Trust Security platform

Audience

Enterprises and professionals in need of a cloud-native solution to secure their remote access operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Check Point Software Technologies
Founded: 1993
United States
www.checkpoint.com/quantum/next-generation-firewall/identity-awareness/

Company Information

Zentry Security
United States
zentrysecurity.com

Alternatives

Alternatives

ZoneZero

ZoneZero

Safe-T Data
ZoneZero

ZoneZero

Safe-T Data
InstaSafe

InstaSafe

InstaSafe Technologies
Xage

Xage

Xage Security

Categories

Categories

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID

Integrations

Cisco ACI
Cisco Duo
Fortinet SD-WAN
Juniper Identity Management Service
Microsoft Defender XDR
Microsoft Entra ID
Okta
Palo Alto Networks AutoFocus
RSA SecurID
Claim Check Point Identity Awareness and update features and information
Claim Check Point Identity Awareness and update features and information
Claim Zentry and update features and information
Claim Zentry and update features and information