CyberArk Secure Cloud AccessCyberArk
|
||||||
Related Products
|
||||||
About
CyberArk Secure Cloud Access protects cloud identities by managing access securely across multi-cloud environments without compromising user experience. It centralizes control with granular access policies and just-in-time privilege granting, helping reduce risk while maintaining productivity. Designed to integrate seamlessly with existing workflows, it ensures secure and efficient cloud access for developers, engineers, and administrators.
|
About
Saviynt provides intelligent identity access management and governance for cloud, hybrid and on-premise IT infrastructures to accelerate enterprise digital transformation. Our platform integrates with leading IaaS, PaaS, and SaaS applications including AWS, Azure, Oracle EBS, SAP HANA, SAP, Office 365, SalesForce, Workday, and many others. Our innovative IGA 2.0 advanced risk analytics platform won the Trust Award and was named an industry leader by Gartner.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises in need of a solution to remove excessive permissions across their cloud footprint
|
Audience
Enterprise, United States Federal Agencies
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCyberArk
Founded: 1999
United States
www.cyberark.com/products/secure-cloud-access/
|
Company InformationSaviynt
United States
www.saviynt.com
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
|
||||||
Integrations
RadiantOne
Amazon EKS
Amazon Web Services (AWS)
Captain Compliance
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Indent
Intellicta
Netwrix Threat Manager
|
Integrations
RadiantOne
Amazon EKS
Amazon Web Services (AWS)
Captain Compliance
CrowdStrike Falcon
FortiTrust Identity
Google Cloud Platform
Indent
Intellicta
Netwrix Threat Manager
|
|||||
|
|
|