+
+

Related Products

  • FusionAuth
    169 Ratings
    Visit Website
  • Auth0
    977 Ratings
    Visit Website
  • 1Password
    16,373 Ratings
    Visit Website
  • Frontegg
    374 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    117 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,188 Ratings
    Visit Website
  • TruGrid
    73 Ratings
    Visit Website
  • Uniqkey
    180 Ratings
    Visit Website
  • Cerberus FTP Server
    159 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website

About

Fast, cost effective multi-factor authentication (MFA) solution that lets Windows-based organizations realize a Zero Trust approach. Start with an easy-to-use, easy-to-deploy on-premises MFA solution, then, if and when it makes sense, migrate to the cloud with Identity as a Service. Seamless integration between the two ensures a frictionless experience while benefitting from three extra authentication options: device fingerprint, mobile push, and grid cards. Secure and enable your company´s digital business with one solution, one license. Limit user friction with adaptive authentication and self-service password resets. Provision different authentication methods for different users and requirements. Available authenticators include SMS, email, voice, and OTP. Option to leverage smart phone biometrics including fingerprint and facial match. ActiveSync for Outlook protects unauthorized devices from accessing users’ email without requiring MDM integration.

About

IBM Sterling Secure Proxy helps shield your trusted network by preventing direct connectivity between external partners and internal servers. It can secure your network and data exchanges at the network edge to enable trusted business-to-business transactions and managed file transfer (MFT) file exchanges. As a demilitarized zone (DMZ)-based proxy, Secure Proxy uses multifactor authentication, SSL session breaks, closing of inbound firewall holes, protocol inspection and other controls to ensure the security of your trusted zone. Provides firewall navigation best practices to help ensure perimeter security for enhanced protection of your data and trusted zone. Offers multifactor authentication before connection to backend systems, for tighter controls and validation. Includes proxy support and functions to improve the security of edge-based file exchanges. Provides advanced routing to simplify infrastructure changes, saving time and reducing risk during migrations.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Windows-based organizations interested in a cost effective multi-factor authentication solution to secure and enable their digital business

Audience

Organizations in need of an advanced edge security solution for their multi-enterprise data exchanges

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Entrust
Founded: 1969
United States
www.entrust.com/products/iam/identity-essentials

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/secure-proxy

Alternatives

Alternatives

UserLock

UserLock

IS Decisions
Deepnet DualShield

Deepnet DualShield

Deepnet Security
Deepnet DualShield

Deepnet DualShield

Deepnet Security
Censornet MFA

Censornet MFA

Censornet

Categories

Categories

Integrations

AVX ONE
Agile Requirements Designer
Bravura Identity
CyberArk Conjur
CyberArk Machine Identity Security
Datacard ID Works
Delinea Privilege Manager
Entrust Identity Enterprise
Entrust IoT Agent
Entrust TLS/SSL Certificates
F5 BIG-IP Advanced WAF
HashiCorp Boundary
HyTrust
IBM Cloud
Microsoft Azure
Mirantis Cloud Platform
Red Hat Cloud Suite
SigningHub
Trellix Data Encryption
VaultCore

Integrations

AVX ONE
Agile Requirements Designer
Bravura Identity
CyberArk Conjur
CyberArk Machine Identity Security
Datacard ID Works
Delinea Privilege Manager
Entrust Identity Enterprise
Entrust IoT Agent
Entrust TLS/SSL Certificates
F5 BIG-IP Advanced WAF
HashiCorp Boundary
HyTrust
IBM Cloud
Microsoft Azure
Mirantis Cloud Platform
Red Hat Cloud Suite
SigningHub
Trellix Data Encryption
VaultCore
Claim Entrust Identity Essentials and update features and information
Claim Entrust Identity Essentials and update features and information
Claim IBM Secure Proxy and update features and information
Claim IBM Secure Proxy and update features and information