+
+

Related Products

  • Auth0
    977 Ratings
    Visit Website
  • FusionAuth
    169 Ratings
    Visit Website
  • Frontegg
    374 Ratings
    Visit Website
  • Iru
    1,457 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website
  • Rippling
    18,630 Ratings
    Visit Website
  • Uniqkey
    180 Ratings
    Visit Website
  • NinjaOne
    3,935 Ratings
    Visit Website
  • Keeper Security
    1,740 Ratings
    Visit Website

About

A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.

About

IBM Sterling Secure Proxy helps shield your trusted network by preventing direct connectivity between external partners and internal servers. It can secure your network and data exchanges at the network edge to enable trusted business-to-business transactions and managed file transfer (MFT) file exchanges. As a demilitarized zone (DMZ)-based proxy, Secure Proxy uses multifactor authentication, SSL session breaks, closing of inbound firewall holes, protocol inspection and other controls to ensure the security of your trusted zone. Provides firewall navigation best practices to help ensure perimeter security for enhanced protection of your data and trusted zone. Offers multifactor authentication before connection to backend systems, for tighter controls and validation. Includes proxy support and functions to improve the security of edge-based file exchanges. Provides advanced routing to simplify infrastructure changes, saving time and reducing risk during migrations.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT and security teams that need a unified identity, access, app, and endpoint management (IAM/EMM) platform

Audience

Organizations in need of an advanced edge security solution for their multi-enterprise data exchanges

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$6 per user per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Google
Founded: 1998
United States
cloud.google.com/identity/

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/secure-proxy

Alternatives

Alternatives

UserLock

UserLock

IS Decisions
Deepnet DualShield

Deepnet DualShield

Deepnet Security

Categories

Categories

Authentication Features

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Single Sign On Features

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Integrations

Asana
Complyance
Docusign
Freshsuccess
GW Apps
Google Calendar
Google Cloud Platform
Google Hangouts
Google Workspace
Luciq
Motivarnos
Nectar
Ping Identity
SAP SuccessFactors Learning
Secureframe
ServiceNow
Slack
Workday Extend
Zendesk
freispace

Integrations

Asana
Complyance
Docusign
Freshsuccess
GW Apps
Google Calendar
Google Cloud Platform
Google Hangouts
Google Workspace
Luciq
Motivarnos
Nectar
Ping Identity
SAP SuccessFactors Learning
Secureframe
ServiceNow
Slack
Workday Extend
Zendesk
freispace
Claim Google Cloud Identity and update features and information
Claim Google Cloud Identity and update features and information
Claim IBM Secure Proxy and update features and information
Claim IBM Secure Proxy and update features and information