Alternatives to V:M Secure for z/VM

Compare V:M Secure for z/VM alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to V:M Secure for z/VM in 2026. Compare features, ratings, user reviews, pricing, and more from V:M Secure for z/VM competitors and alternatives in order to make an informed decision for your business.

  • 1
    Kolide

    Kolide

    Kolide

    Endpoint solutions for teams that value productivity, transparency, and employee happiness. Engage with employees on Slack providing customized security and compliance recommendations for their Mac, Windows, and Linux devices. Traditional security solutions don't interact with end-users and must rely on strict enforcement and surveillance. We believe that device security starts with the user. With Kolide you can clearly communicate your organization's security guidelines and help users achieve compliance without resorting to rigid management. Get a bird's eye view of your environment, then drill down into the nitty gritty to gain critical insights into your fleet's health and hygiene. A single device in your fleet can produce thousands of unique data points. This data is often intended to be read by programs and systems, not people. Kolide interpets and visualizes the data we collect so you can quickly understand the state of your devices.
    Starting Price: $6 per month
  • 2
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 3
    Trusted Access Manager for Z
    Reduce the risk of insider threats, from malicious attacks to inadvertent threats. Trusted Access Manager for Z helps deliver trusted systems and improve business efficiency through comprehensive privileged access management for your mainframe. By eliminating the need for shared credentials, working with existing tools, and producing forensics on all privileged user activity, you stay in complete control over vital mainframe data. Restrict users who have access to a privileged state and timebox the elevation duration to reduce the risk of insider threats. Simplify auditing by eliminating privileged credential sharing and maintaining a complete line of sight into individual privileged user activities. Maintain complete control of when users have access to the most sensitive data in the business, to deliver trusted systems and operate efficiently. Transform your company and build your career with Broadcom training, certifications, and resources.
  • 4
    IBM Resource Access Control Facility (RACF)
    IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
  • 5
    CA Auditor for z/OS
    With each new generation of computers, operating systems become more complex. These complexities have made auditing the operating systems more time consuming and difficult. Any operating system, even the mainframe, can be subject to security exposures due to errors in installation, customizations, and/or product bugs and maintenance. CA Auditor is a comprehensive software package that can perform an automated technical review of the system, hardware and software environment and identify integrity exposures. Identifies potential areas of security risk and exposure from improperly configured implementations. Capability to perform a high-level look at the operating system and components. Provides the capability to monitor usage and ensure the integrity of your system files. CA Auditor addresses a significant exposure point in the z/OS operating system by empowering you to perform comprehensive auditing, integrity checks, and verifications.
  • 6
    CA Cleanup

    CA Cleanup

    Broadcom

    Easily automate continuous and unattended security file cleanup. CA Cleanup is designed to help you comply with many regulations and laws requiring due diligence for information security, protection and privacy. Mainframe security databases accumulate obsolete user IDs and entitlement definitions which may be valid but not appropriate for an individual’s role. This creates uncertainty, risk and greater potential for security exposure. It also creates an unnecessary burden for administrators and the system. More so, increasing regulatory, statutory, audit and staffing pressures are bringing new concerns and mandates to address the problem of excessive security entitlements. This is why CA Cleanup is needed. Executes continuously, monitoring your security system activity to record the actual security definitions that the system is or is not using. Monitors security activity and can identify used and unused access for any user or application.
  • 7
    Tectia

    Tectia

    SSH Communications Security

    We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.
  • 8
    CA Compliance Event Manager
    Non-compliance can result in out-of-control costs and a serious impact to the bottom line. CA Compliance Event Manager helps you establish continuous data security and compliance. Gain deeper insight into your enterprise’s risk posture, protect your business, and comply with the regulations using advanced compliance management tooling. Monitor users, security settings, and system files and alert to changes and suspicious activity for complete oversight of your security systems and data. Get real-time notifications to proactively address potential threats. Filter critical security events and forward to SIEM platforms for a holistic view of your security infrastructure. Reduce costs by minimizing the number of security alerts undergoing real-time analysis. Inspect the source of incident with detailed audit and compliance information for deeper insights into your risk posture.
  • 9
    IBM Security zSecure
    The IBM® zSecure Suite adds layers of security assurance, including audits, alerts, administration, reporting and authentication, that enhance the security and risk management in IBM Z® hardware, software, virtualization, and standard external security managers (ESMs) such as IBM RACF, CA ACF2, and CA Top Secret. The zSecure Suite automates security administrative tasks to help increase efficiency and reduce errors, detects internal and external threats, issues real-time alerts, and monitors compliance. Automates security administrative tasks to help increase efficiency and reduce errors. Effective identity governance can help enforce compliance management of regulations and standards. Detect threats, issue real-time alerts, and monitory compliance such as pervasive encryption utilization for GDPR. Secure strong authentication to strengthen user controls with integration for easy administration.
  • 10
    IBM Hyper Protect Virtual Servers
    IBM Hyper Protect Virtual Servers take advantage of IBM Secure Execution for Linux. It provides a confidential computing environment to protect sensitive data running in virtual servers and container runtimes by performing computation in a hardware-based, trusted execution environment (TEE). It is available on-premise as well as a managed offering in IBM Cloud. Securely build, deploy, and manage mission-critical applications for the hybrid multi-cloud with confidential computing on IBM Z and LinuxONE. Equip your developers with the capability to securely build their applications in a trusted environment with integrity. Enable admins to validate that applications originate from a trusted source via their own auditing processes. Give operations the ability to manage without accessing applications or their sensitive data. Protect your digital assets on a security-rich, tamper-proof Linux-based platform.
  • 11
    CyberArk Privileged Access Manager
    Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.
  • 12
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 13
    IBM Crypto Analytics Tool (CAT)
    Crypto Analytics Tool (CAT) collects security-relevant information and helps build your cryptographic inventory. Through the graphical client, it is easy to analyze security information. Enterprise-wide overview of all z/OS cryptographic consuming LPARs from a single CAT monitor client. Offers a comprehensive data view of the cryptographic security of the system. Allows monitoring to ensure that keys and cryptographic functions are set up and protected, complying with best practices. Eases policy and compliance enforcement. Helps administrators understand weaknesses and gaps to prioritize improvements. Comprehensive overview of the cryptographic security of HSM, ICSF, and RACF of the system. Key data for better policy and compliance enforcement. Identify insecure keys and algorithms. Comparison of the current crypto state with the previous snapshot for error and problem determination or change control validation.
  • 14
    FEITIAN

    FEITIAN

    FEITIAN

    FEITIAN access control products provide robust and scalable solutions for managing and securing physical access to facilities, systems, and resources. FEITIAN access control solutions offer a comprehensive range of products designed to enhance security and streamline access management for organizations of all sizes. These solutions provide robust authentication and authorization mechanisms that ensure only authorized individuals gain entry to secured areas or resources. With advanced features such as biometric authentication, and smart card-based access control, FEITIAN empowers businesses to enforce stringent access policies, monitor activities, and protect sensitive assets. Whether it's securing physical facilities, controlling network access, or safeguarding critical data, FEITIAN's access control solutions provide reliable and efficient means of fortifying security, minimizing risk, and ensuring compliance with industry regulations.
  • 15
    UKM Universal SSH Key Manager

    UKM Universal SSH Key Manager

    Software Diversified Services

    UKM discovers, remediates, and manages SSH user keys without interrupting business systems or impeding workflow. UKM finds and tracks existing keys, verifies trusted connections, renews authorizations, and removes inactive keys as needed. No changes to processes, no guessing about compliance. And it cuts costs along the way. UKM is the solution for any size business that is concerned about managing and safeguarding the secure shell environment. UKM automatically traces SSH key usage and updates authorizations while detecting and removing potentially dangerous, unused keys. All without disrupting operations. Eliminate all the overhead costs related to SSH keys by centralizing oversight and automating administration. Savings can reach millions of dollars per year. While SSH is the gold standard for securing data transfers, improperly managed SSH keys represent a significant security risk. UKM solves this issue and assures compliance.
  • 16
    BMC Compuware Application Audit
    BMC Compuware Application Audit enables security and compliance teams to easily capture start-to-finish mainframe user behavior in real time, including all successful logins, session keyboard commands and menu selections, and specific data viewed without making any changes to mainframe applications. Application Audit enables enterprises to capture all relevant data about user access and behavior on the mainframe to mitigate cybersecurity risks and fulfill compliance mandates. Get deep insight into user behavior including data viewed, by whom, and which applications were used to access it. Deliver the granular intelligence and reporting needed to comply with regulations such as HIPAA, GDPR, the Australian NDB scheme, as well as company security policies. Separate the system administrator’s duties from the responsibilities of auditors with a web UI, so that no single person is in a position to engage in malicious activities without detection.
  • 17
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 18
    CA Mainframe Security Insights Platform
    Security Insights Platform helps ensure a trusted environment for your customers and employees by easily identifying and reducing risk from threats. It can quickly interpret and assess the security posture of your Mainframe. And, for risky findings, it helps develop remediation steps –all on an ongoing and ad hoc basis. Security Insights offers a foundation that enables your Mainframe to connect with your network and hybrid cloud across your enterprise. It enables you to securely deliver vital support for digital transformation. And, CA Security Insights output integrates with additional in-house tools such as SOC and SIEMs to provide a single, enterprise-wide view of your security posture. Collect, aggregate, and analyze security data to help remediate mainframe security risk. Eliminate manual, resource intensive, and time consuming data collection. Automate the heavy lifting.
  • 19
    TPX Session Management for z/OS
    Support the unique organizational specifications and session manager requirements within an enterprise. TPX Session Management for z/OS solves the problem of repeatedly logging in and out of your various applications connected to a VTAM network by enabling you to securely access and navigate between all the applications from a single menu. Securely grants authenticated access to dynamically built application menus. Supports multiple departmentalized requirements through customization of different users. Delivers enhanced performance and usability through data compression, simplified administration, and a single point of control, enabling commands and responses to be passed between instances. Transform your company and build your career with Broadcom training, certifications, and resources. Your hub for creating seamless integrations that tap into the full capabilities of mainframe services.
  • 20
    IBM Verify
    Infuse cloud IAM with deep context for risk-based authentication to enable frictionless, secure access for your consumers and workforce. As organizations modernize hybrid multi cloud environments using a zero-trust strategy, identity and access management can no longer remain siloed. In a cloud environment, you need to develop cloud IAM strategies that use deep context to automate risk protection and continuously authenticate any user to any resource. Your journey should match your business requirements. Maintain existing investments and protect on-premises applications as you design and customize the right cloud IAM architecture to either replace or complement your infrastructure. Your users want one-click access from any device to any application. Onboard new federated applications to single sign-on (SSO), embed modern multi-factor authentication (MFA) methods, simplify logistics and give developers consumable APIs.
  • 21
    BMC AMI Security

    BMC AMI Security

    BMC Software

    Suspicious and known malicious actions are automatically halted before your systems are compromised. Real-time visibility for security responders and your operations team to rapidly close the window of opportunity for attackers. Data is correlated across multiple systems and translated into common security terms for clarity and context. Out-of-the-box scorecards help improve adherence to HIPAA, PCI DSS, and GDPR. Automated security scans tailored by security experts uncover and halt threats before a compromise occurs. Reports crafted by experts help you address risks by informing you of threat events, suspicious activity and regulatory compliance risks. Policy scanning based on real-world penetration tests uncovers configuration vulnerabilities before they are exploited.
  • 22
    IBM Unified Key Orchestrator
    Unified Key Orchestrator for IBM z/OS, formerly IBM Enterprise Key Management Foundation-Web Edition, is a key management software that centrally orchestrates and secures the lifecycle of encryption keys across your enterprise for both on-premises and multiple cloud environments, including IBM Cloud, AWS KMS, Azure Key Vault, and Google Cloud. Unified Key Orchestrator for z/OS (UKO for z/OS) can help your enterprise manage and move key management workloads across and between your on-premises and cloud environments, assisting with compliance and security. With UKO for z/OS, you can manage your encryption keys across your enterprise from a single, trusted user interface. Deployed as a z/OS software, UKO for z/OS enables you to orchestrate keys across all your IBM z/OS systems and multiple public clouds. It even extends support to key management for zKey on Linux® on IBM Z and IBM Security Guardium key lifecycle manager.
  • 23
    zSecure Admin
    zSecure Admin enables you to automate time-consuming IT security management tasks by quickly identifying, analyzing, and preventing problems in IBM RACF. You can also monitor privileged users to help ensure old accounts are properly deleted and products have been integrated appropriately. zSecure Admin integrates smoothly with zSecure Audit for end-to-end monitoring and remediation. zSecure Admin can administer multiple systems with a single application interface. You can compare profiles, efficiently merge security rules from different databases, or rename IDs within the same database. When merging profiles from different databases, zSecure Admin performs extensive consistency checks and reports potential conflicts before generating commands, helping ease the burden of consolidation efforts ad compliance automation.
  • 24
    Top Secret

    Top Secret

    Broadcom

    The success of today’s business strategies depends on a reliable, comprehensive, and cost-effective security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. Consumers will only trust businesses that protect their personal information. Top Secret provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and efficiency. Get out-of-the-box identity and access management, logging, and audit reporting. Get comprehensive cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. Get a flexible configuration mechanism that monitors and adjusts your security policies and accommodates virtually all organizational structures.
  • 25
    ACF2

    ACF2

    Broadcom

    Reliable, scalable security and streamlined administration for your mainframe. The success of businesses today depends on a reliable, comprehensive, and efficient security infrastructure. Businesses need access to their mainframe databases but without the stress of security concerns. And consumers only trust businesses that protect their personal information. ACF2 provides comprehensive security for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness. ACF2 Supports multi-factor advanced authentication with ACF2 for z/OS and, with ACF2 for Db2 for z/OS, provides the ability to externalize security for IBM Db2 without the need for an exit. Out-of-the-box identity and access management, logging, and audit reporting. Provides complete cybersecurity for your valuable information assets, enabling your business to fully realize the mainframe's reliability, scalability, and cost-effectiveness.
  • 26
    AD Bridge

    AD Bridge

    BeyondTrust

    Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux.
  • 27
    SDS E-Business Server

    SDS E-Business Server

    Software Diversified Services

    SDS is now distributing, supporting, and actively developing new features for the proven E-Business Server, the authentic OpenPGP encryption tool originally developed by cryptography pioneer Phil Zimmerman. Using OpenPGP encryption technology and versatile APIs, SDS E-Business Server offers strong encryption that integrates with the widest range of applications and platforms, including the mainframe. E-Business Server is designed for companies that require the highest levels of protection for data stored internally, transmitted within the organization, and distributed beyond its firewalls. Today’s data security mandates are complex but critical. Gain compliance with GDPR and other required standards with unbreakable signature creation and reliable authentication. E-Business Server dramatically reduces file sizes, bandwidth consumption, processing time, and disk space to keep resources under control.
  • 28
    SDS IronSphere

    SDS IronSphere

    Software Diversified Services

    This continuous monitoring solution can further strengthen even the most secure mainframe. SDS IronSphere for z/OS also provides assistance, while complying with, standards that U.S. agencies are required to follow. Automatic z/OS STIG compliance monitoring is a major highlight, but IronSphere offers many more security compliance features for the mainframe. This tool was created by mainframe penetration testers and compliance-minded, security experts. Due to their experience in the field, IronSphere for z/OS follows the guidelines that play integral roles in the framework of security compliance mandates and are required to be followed within certain sectors. This solution automatically and continuously identifies system risks and then delivers easy-to-follow remediation steps as part of the assessment results. In addition, results are kept within the tool, proving to compliance auditors that you’ve been continuously monitoring your z/OS system and adhering to ISCM and RMF protocols.
  • 29
    SDS VitalSigns

    SDS VitalSigns

    Software Diversified Services

    Every product in the VitalSigns family is a money saver. Each VitalSigns product provides a quick install, an economical alternative to costly legacy products, minimal demand on the mainframe, and 24/7 access to our world-class support team. VitalSigns is a full-spectrum tool set for… Event Log Management and Compliance – VitalSigns SIEM Agent for z/OS FTP Monitoring – VitalSigns for FTP Complete FTP Security – The VFTP/SSH Collaboration IP Monitoring – VitalSigns for IP Network Automation – VitalSigns for Network Automation and Control SNA and IP Monitoring – VitalSigns for VTAM
  • 30
    IBM Z Multi-Factor Authentication
    Mainframe systems are the foundation of trusted digital experiences for most of the world’s largest companies and organizations. However, passwords protecting critical users, data, and applications are a relatively simple point of attack for hackers to exploit because the passwords rely on user education and compliance for both implementation and control. By using a variety of methods, such as social engineering and phishing, criminals have exploited employees, partners, and general users to hack into even the most secure platforms. IBM Z MFA raises the level of assurance of your mission-critical systems with expanded authentication capabilities and options for a comprehensive, user-centered strategy that helps mitigate the risk of compromised passwords and system hacks. Our designers are also IBM Z MFA users. Across every new version, we incorporate their growing knowledge and expertise in real-world mainframe security scenarios.
  • 31
    Rocket z/Assure VAP

    Rocket z/Assure VAP

    Rocket Software

    Rocket z/Assure Vulnerability Analysis Program (VAP) is a specialized mainframe security solution that scans and analyzes vulnerabilities in IBM z/OS operating system code to help organizations identify, assess, track, and mitigate security risks that could expose critical data. Unlike traditional vulnerability tools that focus on application layers, z/Assure VAP conducts thorough and precise binary code scanning at the OS level to detect zero-day and integrity-based vulnerabilities without relying on signature files, using an Interactive Application Security Testing (IAST)-style approach to pinpoint real weaknesses and guide developers to the exact code requiring remediation. It generates detailed vulnerability disclosure reports that provide actionable insights and clear paths to fix issues, enabling teams to prioritize risk, strengthen defenses, and make mainframe vulnerability management a repeatable part of IT security and compliance programs.
  • 32
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 33
    Tape Encryption
    Designed to be an innovative, flexible, easily implemented, and comprehensive z/OS tape encryption solution. It helps ensure that your data is protected from breaches, even if your tapes fall into the wrong hands. Tape Encryption helps you safeguard your sensitive data and automate full lifecycle key management. And it can be implemented without the need to purchase expensive and complex hardware. With this mainframe solution, you can take steps to shield your company from fines, costly corrective processes, and the negative publicity that can occur when personal and business-critical data are compromised. Tape Encryption helps you implement your security strategy while containing costs. Protect against data breaches and the inherent potential for loss of revenue and negative press. Offers an automated solution to key management that exploits other Broadcom facilities to deliver optimum performance and limit processor overhead.
  • 34
    SymLiv

    SymLiv

    SymLiv

    SymLiv is a comprehensive access control and community livability platform that unifies visitor management, resident tools, vendor registration, vacation rental guest control, amenity access, and security operations in one secure system designed for associations, gated communities, and property managers. It centralizes and automates gate access with real-time guard tools, license plate recognition, and ID scanning, eliminating manual logs and streamlining entry processing. Residents can manage guest and contractor access, issue digital passes, receive alerts, view access history, and book amenities from mobile devices, while rental hosts can generate reservation-based guest passes with QR or LPR entry that expire automatically and include guest orientation content. Vendor management lets communities schedule and track vendor visits, issue digital passes, maintain vendor directories, and enforce compliance by tracking insurance and certifications.
  • 35
    Cygna Auditor

    Cygna Auditor

    Cygna Labs

    Audit and roll back AD changes, enforce entitlements, and improve compliance reporting. Request a demo. Pinpoint changes and instantly roll back unwanted changes to Active Directory to recover from errors with minimal effort. Audit, alert and report on Windows file system and NetApp access faster and with greater detail than native auditing. Get real-time auditing, analysis, and alerts for Microsoft Exchange, and report on changes made to SQL Server. Cygna Auditor provides centralized real-time change auditing for Active Directory, file systems, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes; and helps to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, IT organizations can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements.
  • 36
    Content Suite Security and Productivity Pack
    Cassia’s Content Suite Security & Productivity Pack (SPP) is a powerful solution extension designed to enhance and streamline administration within OpenText Content Server. It offers a suite of configuration tools that help administrators manage permissions, control item creation, and enforce information governance more effectively. The pack strengthens existing security features by restricting user and group visibility, locking permissions, and managing role-based access. It also expands auditing capabilities, allowing extended tracking for specific users and folders. The solution improves system performance and resource usage with features like quota management, storage planning, and operational safeguards. Overall, SPP boosts adoption and usability by giving administrators more precise control and greater flexibility over their Content Suite environment.
  • 37
    Abbey

    Abbey

    Abbey Labs

    Abbey streamlines data access and frees engineers to focus on core responsibilities, without compromising security and compliance. Build and enforce rules for compliance without causing friction for engineering teams. Use our intuitive web app to discover, request, and manage access to resources. Log and audit access changes to meet compliance needs, within the Abbey app or a Git-based version control system. Build a more secure and compliant infrastructure for your organization while empowering your engineering team. With Abbey, you can improve your security and compliance programs by automatically controlling and right-sizing permissions so the risks around unauthorized access is limited in the event of a breach. Abbey acts as a companion to your existing infrastructure by automating access management for you. Your employees request access, Abbey collaborates with your infrastructure to provision access, they use the resources, and access is revoked when they're done.
    Starting Price: $20 per user per month
  • 38
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 39
    IBM QRadar SIEM
    Market-leading SIEM built to outpace the adversary with speed, scale and accuracy As digital threats loom large and cyber adversaries grow increasingly sophisticated, the roles of SOC analysts are more critical than ever. Going beyond threat detection and response, QRadar SIEM enables security teams face today’s threats proactively with advanced AI, powerful threat intelligence, and access to cutting-edge content to maximize analyst potential. Whether you need cloud-native architecture built for hybrid scale and speed or a solution to complement your on-premises infrastructure, IBM can provide you with a SIEM to meet your needs. Experience the power of IBM enterprise-grade AI designed to amplify the efficiency and expertise of every security team. With QRadar SIEM, analysts can reduce repetitive manual tasks like case creation and risk prioritization to focus on critical investigation and remediation efforts.
  • 40
    Adaptive

    Adaptive

    Adaptive

    Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources.
  • 41
    IBM Verify Privilege
    You trust your privileged users with elevated access to critical systems, data, and functions. However, their advanced entitlements need to be vetted, monitored, and analyzed to protect your resources from cybersecurity threats and credential abuse. Research has found as much as 40% of insider cyberattacks involved privileged users. IBM Verify Privilege products, powered by Delinea, enable zero trust strategies to help minimize risk to the enterprise. Discover, control, manage, and protect privileged accounts across endpoints and hybrid multi-cloud environments. Discover unknown accounts. Reset passwords automatically. Monitor anomalous activity. Manage, protect, and audit privileged accounts across their lifecycles. Identify devices, servers, and other endpoints with administrative privileges to enforce least-privilege security, control application rights, and reduce impact on support teams.
  • 42
    Precisely Ironstream
    Integrate mainframe and IBM i systems into leading IT analytics and operations platforms for an enterprise-wide view to support your digital business. In today’s digital, always-on world, IT is arguably the most important department across your organization. A single security breach or service outage can bring your business to a standstill. But knowing what’s happening across an increasingly complex landscape of infrastructure and apps, and resolving issues before they impact the business, is a daunting task. The good news is that there are several platforms to help you monitor IT security and operations across the enterprise in real-time, and take action fast. The challenge, however, is that mainframe or IBM i systems aren’t natively supported by these modern tools. So, if you rely on these critical servers to run your business and you’re managing them in isolation, you have a dangerous blind spot.
  • 43
    IBM z/OS Authorized Code Scanner
    The IBM z/OS Authorized Code Scanner (zACS) is a priced feature of z/OS version 2 release 4 and above to help support clients in their efforts to strengthen the security posture of the z/OS. The scanner searches for potential vulnerabilities within the Authorized Program Facility (APF) code libraries. Basic & advanced levels of testing for PCs & SVCs. AC(1) parameter testing for batch and USS environments. Visual z/OSMF experience providing diagnostics for remediation. Feeds off z/OS recovery processing non-invasively. Designed to run on production systems. Can automatically capture dumps for problem analysis.
  • 44
    Apono

    Apono

    Apono

    Use the Apono cloud-native access governance platform to work faster and more securely with self-service, secure, scalable access built for modern enterprises running in the cloud. Discover who has access to what with context. Identify access risk leveraging enriched identity and cloud resource context from the environment. Enforce access guardrails at scale. Apono automatically suggests dynamic policies that fit your business needs, streamlining the cloud access lifecycle and gaining control of cloud-privileged access. Improve your environment access controls with Apono’s AI, which detects high-risk unused, over provisioned and shadow access. Remove standing access and prevent lateral movement in your cloud environment. Organizations can enforce strict authentication, authorization, and audit controls for these high-level accounts, reducing the risk of insider threats, data breaches, and unauthorized access.
  • 45
    Remedio

    Remedio

    Remedio

    Remedio is an AI-powered, autonomous device posture management platform that continuously discovers, monitors, and remediates security misconfigurations and configuration drift across enterprise IT and OT environments to reduce attack surface, enforce compliance, and harden endpoint security without disruption. It delivers real-time visibility into configuration risks on devices running Windows, macOS, and Linux, as well as cloud instances and servers, and automatically applies safe remediation actions that are instantly reversible, giving security teams confidence when closing gaps without business impact. Remedio simplifies policy validation and enforcement by benchmarking settings against security standards such as CIS, NIST, and MITRE frameworks and continuously re-applies policies across updates, user changes, and new devices to maintain consistent secure baselines. It provides centralized control and governance of Active Directory, Group Policy, MDM, and Intune settings.
  • 46
    Jazz

    Jazz

    Jazz

    Jazz is an AI-native Data Loss Prevention (DLP) platform designed to help organizations understand and prevent sensitive data exposure by analyzing the full context of how information moves across their systems. Unlike traditional DLP tools that rely on rigid rules and pattern matching, Jazz uses artificial intelligence to learn how a company operates and interpret the intent and context behind data activity. This allows the system to determine whether a detected event represents a real security risk or a harmless action, reducing the volume of false alerts that security teams typically face. It captures activity across applications, users, and data flows throughout an organization’s environment, providing comprehensive visibility into how information is accessed, shared, and transferred. Instead of generating large numbers of raw alerts, Jazz focuses on producing clear explanations and prioritized insights that help security teams quickly understand what happened.
  • 47
    OpenText Open Enterprise Server
    OpenText™ Open Enterprise Server (OES) securely delivers file, print, network, and storage management services. It combines the power of Linux for enterprise workloads with workgroup specialization to save money and enhance productivity. Manage your data on premises or in the cloud without breaking access and rights control. Manage rights and provide access to users in any of the eDirectory, Active Directory, or Azure Active Directory systems. Enhance remote worker experience with SMB2 File and Directory Leases. Access data anywhere on any device for secure file sharing with OpenText™ Filr.
  • 48
    IBM Guardium Data Protection
    IBM Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories—stored on-premises, in private and public cloud and in containers. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.
  • 49
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • 50
    Quest Active Administrator
    Without effective Active Directory management tools, administrators will struggle to manage critical Microsoft AD environments efficiently. Doing more with less increases the likelihood of accidental changes to AD objects, configurations and Group Policy data that can raise your risk of errors and downtime. The need to enforce internal policies and address compliance regulations only adds to the challenge. Active Administrator is a complete and integrated Microsoft AD management software solution that helps you move faster and more nimbly than with native tools. With a single consolidated view into the management of your AD, you can address Active Directory administration gaps left by native tools and quickly meet auditing requirements and security needs. With integrated AD administration and seamless permissions management, you will maintain business continuity, increase IT efficiency and minimize security risks.