Saviynt

Company Description:

Saviynt is a leading provider of Cloud Security and Identity Governance solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud (Office 365, AWS, Azure, Salesforce, Workday) and Enterprise (SAP, Oracle EBS). Saviynt is pioneering IGA 2.0 by integrating advanced risk analytics and intelligence with fine-grained privilege management. Their vision is to redefine IGA by converging traditional Identity Management with CASB and Application GRC capabilities. One of their most sought after features is the advanced risk analytics and intelligence capabilities, able to dig down to work at the fine-grained privilege management levels.

Related Topics:

Cloud, IGA, Application Risk & Governance and SOD solution


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Alert Logic

Company Description:

Alert Logic seamlessly connects an award-winning security platform, cutting-edge threat intelligence, and expert defenders – to provide the best security and peace of mind for businesses 24/7, regardless of their size or technology environment. More than 4,000 organizations rely on Alert Logic SIEMless™ Threat Management to ensure the right level of security and compliance coverage at a lower total cost than point solutions, SIEM tools, or traditional security outsourcing vendors.

Related Topics:

Hybrid Cloud, Public Cloud, Intrusion Detection, Log Management


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Thycotic

Company Description:

We make it simple to access, configure and manage your privileged access management solution on your own terms, without sacrificing functionality. Modular, integrated solution lets you start solving problems right away and expand at your own pace, for multiple layers of privileged account protection. We build on a Microsoft stack vs. a complex, proprietary system so it’s accessible to your team. Our design uses versatile resources instead of a siloed structure to ensure high availability, increase speed, and reduce cost.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


One Identity

Company Description:

One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


CyberArk

Company Description:

CyberArk has teamed with the world’s leading technology providers to create the industry’s only Privileged Access Security Marketplace with hundreds of certified hardened joint solutions and plug-ins. With CyberArk’s Privileged Access Security Solution, you can meet your compliance requirements and reduce your security risk without introducing additional operational complexity.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Centrify

Company Description:

Centrify is at the forefront of redefining the legacy approach to Privileged Access Management (PAM) with cloud-ready Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases and stop the leading cause of breaches – privileged access abuse.

Related Topics:


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


BeyondTrust

Company Description:

BeyondTrust’s unified solutions offer the industry’s broadest set of privileged access management capabilities with a flexible design that simplifies integrations, enhances user productivity, and maximizes IT and security investments. Their extensible platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers.


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.


Radiflow

Company Description:

Radiflow develops trusted Industrial Cyber-Security Solutions for critical business operations. We offer a complete portfolio of game-changing solutions for ICS/SCADA networks that empowers users to maintain visibility and control of their OT networks, including an Intelligent Threat Detection tool that passively monitors the OT network for anomalies, as well as Secure Gateways that protect OT networks from any deviations from set access policies.

Radiflow’s solution suite for OT networks provides multi-layered cyber-protection, adaptable to the topology and operational characteristics of each user:

  • The iSID Industrial Threat Detection system is a server-based software that analyzes all OT network traffic (via mirrored stream) to generate and display a network topology model, which serves as a baseline for detecting exceptions on the network. iSID packs six detection engines, each for a distinct threat vector or operational aspect: network visibility, maintenance management, cyber attack detection, policy monitoring and enforcement, anomaly detection and operational behavior measuring.
  • Radiflow’s Ruggedized Secure Gateways provide DPI-firewalled access to production processes, with configurable access rights for different stakeholders. The Gateways’ authentication proxy authenticates each user and restricts the user’s access based on role or predefined tasks.
  • An effective ICS/SCADA protection plan requires comprehensive identification and mapping of all devices, connections, ports and other network assets. Only then will you be able to detect vulnerabilities and exposures and assess them in terms of severity and potential impact if compromised.  Radiflow’s Security Assessment Services can help you understand current vulnerabilities and provide a roadmap for mitigation and further enhancement of your cybersecurity.   

Related Topics:


Disclaimer: Protect Our Power does not endorse this vendor's products or services unless explicitly stated, but rather includes this vendor's content for utility ease of access and for the sake of completeness.