PrivX

PrivX

SSH Communications Security
+
+

Related Products

  • Keeper Security
    1,740 Ratings
    Visit Website
  • 1Password
    16,373 Ratings
    Visit Website
  • FusionAuth
    169 Ratings
    Visit Website
  • Proton Pass
    31,996 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    117 Ratings
    Visit Website
  • Uniqkey
    180 Ratings
    Visit Website
  • Auth0
    977 Ratings
    Visit Website
  • Frontegg
    374 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,458 Ratings
    Visit Website

About

PrivX is a scalable, cost-efficient, and highly automated privileged access management (PAM) solution for hybrid and multi-cloud environments, quantum-safe connections and any combination of password vaulting, rotation, and passwordless authentication. PrivX makes PAM easy, productive, and secure while decreasing complexity and costs. PrivX reduces the risk of passwords, keys, and other leave-behind credentials by eliminating them right after access authentication. Instead, it uses short-lived, ephemeral certificates. Your privileged users and superusers get just-in-time, role-based Zero Trust access without the need to handle, vault, manage or rotate any secrets. PrivX also supports hybrid environments with a secrets vault and password rotation when necessary. It even allows you to make quantum-safe SSH connections.

About

Get frictionless, secure access to cloud infrastructure. Get passwordless access to major cloud platforms and thousands of cloud resources. We work seamlessly with AWS, GCP, Azure, and other cloud-native tools. Stop overprivileged access with just-in-time access for developers. DevOps users can request access to cloud resources with ‘just enough privileges’ to get timebound access to resources. Eliminate productivity bottlenecks of a centralized administrator. Configure approval policies based on a variety of factors. View a catalog of granted and unaccessed resources. Stop credential sprawl and worrying about credential theft. Developers can get passwordless access to cloud resources using Trusted Platform Module (TPM) based technology. Discover potential vulnerabilities now with our free assessment tool and understand how Procyon can help solve the problem in a matter of hours. Leverage TPM to strongly identify users and devices.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies and MSPs interested in a powerful hybrid PAM solution

Audience

Organizations in need of a tool to discover potential vulnerabilities and improve their cloud infrastructure

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/privileged-access-management-privx

Company Information

Procyon
United States
www.procyon.ai/

Alternatives

Alternatives

Tectia

Tectia

SSH Communications Security
PrivX

PrivX

SSH Communications Security
PrivIQ

PrivIQ

Compliance Technology Solutions

Categories

Categories

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

AWS CloudFormation
AWS Identity and Access Management (IAM)
Amazon Aurora
Amazon Kinesis
Dropbox
Google Cloud Pub/Sub
Google Cloud SQL
Google Kubernetes Engine (GKE)
Google Workspace
Jenkins
Kubernetes
MariaDB
Microsoft Azure
MongoDB
MongoDB Atlas
MySQL
Ping Identity
PostgreSQL
Slack
Terraform

Integrations

AWS CloudFormation
AWS Identity and Access Management (IAM)
Amazon Aurora
Amazon Kinesis
Dropbox
Google Cloud Pub/Sub
Google Cloud SQL
Google Kubernetes Engine (GKE)
Google Workspace
Jenkins
Kubernetes
MariaDB
Microsoft Azure
MongoDB
MongoDB Atlas
MySQL
Ping Identity
PostgreSQL
Slack
Terraform
Claim PrivX and update features and information
Claim PrivX and update features and information
Claim Procyon and update features and information
Claim Procyon and update features and information