+
+

Related Products

  • Auth0
    991 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • 10Duke Enterprise
    8 Ratings
    Visit Website
  • Rippling
    16,003 Ratings
    Visit Website
  • FusionAuth
    173 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • 1Password
    16,393 Ratings
    Visit Website

About

Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.

About

A formidable cyber security defense should be mindful to thwart internal and external threats. External and internal threats have one common denominator. The end user’s adherence to security, policy, and best practices. External elements exploit an unsuspecting internal user’s adherence to sound security policies to find their way in. Granted, external threats can be addressed with various mechanisms such as firewalls, but, inherently it has its roots and seeds in weak internal shortcomings. However, you can easily curb internal threats by simply establishing “automatic & enforceable” security policies, advising end-users to adhere to secure access protocols with trusted credentials. Thankfully, LogMeOnce Patented Technology offers plenty of ways to protect your team members, credentials, and agency with advanced automated authentication. LogmeOnce dashboard creates powerful and unified access to a user’s entire disparate/numerous set of applications.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies and enterprises that want an identity management solution to identify, track, and block application usage and access

Audience

Organizations looking for advanced automated authentication solutions to provide secure single sign-on and mature identity management

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$3 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Juniper Networks
Founded: 1996
United States
www.juniper.net/us/en/products-services/security/jims/

Company Information

LogMeOnce
Founded: 2011
United States
www.logmeonce.com/government-ficam-identity-and-access-management/

Alternatives

Alternatives

Akku

Akku

CloudNow Technologies
Cisco Duo

Cisco Duo

Cisco
The OptimalCloud

The OptimalCloud

Optimal IdM
Juniper Secure Connect

Juniper Secure Connect

Juniper Networks
Auth0

Auth0

Okta

Categories

Categories

Integrations

Active Directory
Acceptto Zero Trust Identity (CIAM)
ArcGIS Indoors
Coeo
Dropbox
Google Drive
IPFire
LoginTC
Microsoft Exchange
Pliant
PowerTerm InterConnect
Prodea
SecHard
TCS Intelligent Urban Exchange
TCS MasterCraft TransformPlus
TCS Optumera
TeskaLabs SIEM
VirtualArmour
Zentry
inspace

Integrations

Active Directory
Acceptto Zero Trust Identity (CIAM)
ArcGIS Indoors
Coeo
Dropbox
Google Drive
IPFire
LoginTC
Microsoft Exchange
Pliant
PowerTerm InterConnect
Prodea
SecHard
TCS Intelligent Urban Exchange
TCS MasterCraft TransformPlus
TCS Optumera
TeskaLabs SIEM
VirtualArmour
Zentry
inspace
Claim Juniper Identity Management Service and update features and information
Claim Juniper Identity Management Service and update features and information
Claim LogMeOnce and update features and information
Claim LogMeOnce and update features and information