search
Join or Log In

Access Control

Browse 93 cybersecurity tools tagged with "Access Control"

Flying Cloud Data Questions

Flying Cloud Data

language

Data Classification

Flying Cloud Data Questions on SecurityListing: Data visibility and accountability platform with chain-of-custody tracking

4.7(2)
Imprivata Vendor Privileged Access Management

Imprivata Vendor Privileged

language

Privileged Access Management

Imprivata Vendor Privileged Access Management on SecurityListing: Manages third-party vendor privileged access with Zero Trust controls

4.7(2)
IDECSI MyDataManagement

IDECSI MyDataManagement

language

Data Security Posture Management

IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers

4.7(2)
Formal

Formal

language

Database Security

Formal on SecurityListing: A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.

4.7(2)
SecuPi Data De-identification

SecuPi Data De-identification

language

Data Masking

SecuPi Data De-identification on SecurityListing: Data de-identification platform using FPE, tokenization, and masking

4.7(2)
DenyHosts

DenyHosts

language

Intrusion Detection and Prevention Systems

DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

4.7(2)
Auth0 Platform

Auth0 Platform

language

API Security

Auth0 Platform on SecurityListing: Developer-focused customer identity platform for authentication & authorization

4.7(2)
DataCloak Secure Workspace

DataCloak Secure Workspace

language

Data Loss Prevention

DataCloak Secure Workspace on SecurityListing: Zero Trust secure workspace for enterprise data protection and access control

4.7(2)
Risk Cognizance Data Protection

Risk Cognizance Data

language

Data Security Posture Management

Risk Cognizance Data Protection on SecurityListing: Data protection service with encryption, access controls, and compliance

4.5(3)
Imprivata Mobile Access Management

Imprivata Mobile Access

language

Multi-Factor Authentication and Single Sign-On

Imprivata Mobile Access Management on SecurityListing: Manages secure access to shared mobile devices with fast authentication & SSO

4.5(3)
Unbound Governance Layer

Unbound Governance Layer

language

AI Model Security

Unbound Governance Layer on SecurityListing: Governance layer for monitoring and controlling AI coding agents within policy rules

4.5(3)
Cymmetri CISO Dashboard

Cymmetri CISO Dashboard

language

Identity Governance and Administration

Cymmetri CISO Dashboard on SecurityListing: Converged IAM platform with CISO dashboard for identity lifecycle management

4.5(3)
Glide Identity Glide-In

Glide Identity Glide-In

language

API Security

Glide Identity Glide-In on SecurityListing: SIM-based identity verification for touchless check-in and authentication

4.5(1)
Bravura Security Fabric

Bravura Security Fabric

language

Password Management

Bravura Security Fabric on SecurityListing: Unified IAM & PAM platform with identity mgmt, privileged access & password mgmt

4.5(1)
Lightbeam Data Identity Graph

Lightbeam Data Identity

language

Data Classification

Lightbeam Data Identity Graph on SecurityListing: AI-powered data identity graph linking sensitive data to identities & access

4.5(1)
Cypago Agentic-AI Cyber GRC

Cypago Agentic-AI Cyber

language

Governance Risk and Compliance Platforms

Cypago Agentic-AI Cyber GRC on SecurityListing: AI-powered GRC platform automating compliance, audit prep, and control monitoring

4.5(1)
IDECSI Permission Explorer

IDECSI Permission Explorer

language

Identity Governance and Administration

IDECSI Permission Explorer on SecurityListing: Permission analysis and supervision tool for Microsoft 365 and file servers

4.5(1)
Oleria Trustfusion

Oleria Trustfusion

language

Privileged Access Management

Oleria Trustfusion on SecurityListing: AI-driven identity security platform for human, NHI, and AI identities

4.5(1)
Fxiaoke DACS Lite Zero Trust Network Access Control System

Fxiaoke DACS Lite

language

Zero Trust Network Access

Fxiaoke DACS Lite Zero Trust Network Access Control System on SecurityListing: Zero trust network access control system for secure remote enterprise access

4.5(1)
Avigilon CVE-2025-56266 Scanner

Avigilon CVE-2025-56266 Scanner

language

Security Scanning

Avigilon CVE-2025-56266 Scanner on SecurityListing: Scanner for CVE-2025-56266 Host Header Injection in Avigilon ACM

4.5(1)
Lightbeam Automated Remediation

Lightbeam Automated Remediation

language

Data Security Posture Management

Lightbeam Automated Remediation on SecurityListing: Automated remediation platform for data security risks and access control

4.5(1)
Imprivata Privileged Access Management

Imprivata Privileged Access

language

Password Management

Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions

4.5(1)
Oleria Trustfusion Platform

Oleria Trustfusion Platform

language

Identity Threat Detection and Response

Oleria Trustfusion Platform on SecurityListing: Identity security platform unifying IAM data with usage-level visibility

4.5(1)
BAAR BAAR-IGA Identity Lifecycle Management

BAAR BAAR-IGA Identity

language

Identity Governance and Administration

BAAR BAAR-IGA Identity Lifecycle Management on SecurityListing: Identity lifecycle mgmt solution for workforce provisioning & access control

4.5(1)
Lightbeam Protect the Human Behind the Data

Lightbeam Protect the

language

Data Classification

Lightbeam Protect the Human Behind the Data on SecurityListing: Identity-centric DSPM platform for data discovery, classification & governance

4.5(1)
NTT Data ControlPanelGRC

NTT Data ControlPanelGRC

language

Governance Risk and Compliance Platforms

NTT Data ControlPanelGRC on SecurityListing: GRC and continuous controls monitoring platform for SAP environments

4.5(1)
Omada Identity Cloud

Omada Identity Cloud

language

Risk Assessment

Omada Identity Cloud on SecurityListing: Cloud-based IGA solution for identity lifecycle mgmt and access governance

4.5(1)
CompanyName Microsegmentation

CompanyName Microsegmentation

language

Zero Trust Network Access

CompanyName Microsegmentation on SecurityListing: Microsegmentation service for zero-trust network isolation and containment

4.5(1)
Oleria Identity Security

Oleria Identity Security

language

Identity Threat Detection and Response

Oleria Identity Security on SecurityListing: Identity security platform for visibility & control across human, NHI & AI IDs

4.5(1)
Gravwell

Gravwell

language

Security Information and Event Management

Gravwell on SecurityListing: Data analytics platform for security operations with search and automation

4.3(2)
Portnox Cloud

Portnox Cloud

language

Multi-Factor Authentication and Single Sign-On

Portnox Cloud on SecurityListing: Cloud-native unified access control platform with NAC, ZTNA, and RADIUS

4.3(2)
Google Cloud Security

Google Cloud Security

language

Cloud Security Posture Management

Google Cloud Security on SecurityListing: Cloud security platform with controls for workload protection and compliance

4.3(2)
TrustLogix TrustAccess

TrustLogix TrustAccess

language

Identity Governance and Administration

TrustLogix TrustAccess on SecurityListing: Data access governance platform enforcing least-privilege across data platforms

4.3(2)
Boolebox Data Protection Software

Boolebox Data Protection

language

Password Management

Boolebox Data Protection Software on SecurityListing: Data protection software with encryption for files, emails, and passwords

4.2(3)
SecuPi Dynamic Authorization

SecuPi Dynamic Authorization

language

Identity Governance and Administration

SecuPi Dynamic Authorization on SecurityListing: ABAC-based dynamic authorization for fine-grained access control

3.8(1)
Readibots Bot Studio

Readibots Bot Studio

language

Privileged Access Management

Readibots Bot Studio on SecurityListing: Automation platform for identity workflows using bots and playbooks

3.8(1)
BAAR Privileged Access Management

BAAR Privileged Access

language

Password Management

BAAR Privileged Access Management on SecurityListing: PAM solution for controlling, monitoring, and securing privileged accounts

3.8(1)
BAAR Technologies BAAR-IGA

BAAR Technologies BAAR-IGA

language

Privileged Access Management

BAAR Technologies BAAR-IGA on SecurityListing: IGA platform for managing identities, access rights, and compliance

3.8(1)
ALTR Data Security Platform

ALTR Data Security

language

Data Classification

ALTR Data Security Platform on SecurityListing: Unified data security platform for cloud data access control and governance

3.8(1)
NordLayer Zero Trust Network Access (ZTNA)

NordLayer Zero Trust

language

Zero Trust Network Access

NordLayer Zero Trust Network Access (ZTNA) on SecurityListing: ZTNA solution providing identity-based access control to apps and resources

3.8(1)
Ping Identity Platform

Ping Identity Platform

language

Multi-Factor Authentication and Single Sign-On

Ping Identity Platform on SecurityListing: Identity and access management platform for authentication and authorization

3.8(1)
Dbapp Security Unified Security Management Platform (DAS-USM)

Dbapp Security Unified

language

Password Management

Dbapp Security Unified Security Management Platform (DAS-USM) on SecurityListing: Centralized privileged account mgmt platform with access control & auditing

3.8(1)
Google BeyondCorp

Google BeyondCorp

language

VPN

Google BeyondCorp on SecurityListing: Google's zero trust implementation for secure access without VPN

3.8(1)
EmpowerID Identity Management

EmpowerID Identity Management

language

Privileged Access Management

EmpowerID Identity Management on SecurityListing: Identity management platform for access governance and Zero Trust security

3.8(1)
Saviynt Secure Your External Workforce

Saviynt Secure Your

language

Third-Party Risk Management

Saviynt Secure Your External Workforce on SecurityListing: External identity mgmt platform for contractors, vendors, and third-party access

Penta Security Encryption

Penta Security Encryption

language

Database Security

Penta Security Encryption on SecurityListing: Data encryption solutions for protecting data at rest and in transit

SecHard Cyber Hygiene Platform

SecHard Cyber Hygiene

language

Privileged Access Management

SecHard Cyber Hygiene Platform on SecurityListing: Unified cyber hygiene platform for hardening, PAM, asset mgmt & vuln assessment

Unotech Cymmetri

Unotech Cymmetri

language

Identity Governance and Administration

Unotech Cymmetri on SecurityListing: Enterprise IAM platform for identity management and access control

SecuPi Proactive Data Security Platform

SecuPi Proactive Data

language

Data Classification

SecuPi Proactive Data Security Platform on SecurityListing: Data security platform for real-time protection of sensitive data access

Sentra AI-Powered Data Security Platform

Sentra AI-Powered Data

language

Data Classification

Sentra AI-Powered Data Security Platform on SecurityListing: AI-powered DSPM platform for data discovery, classification, and protection

syslog-ng Store Box

syslog-ng Store Box

language

Security Information and Event Management

syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs

Symmetry Systems DataGuard

Symmetry Systems DataGuard

language

Data Classification

Symmetry Systems DataGuard on SecurityListing: DSPM platform for data discovery, classification, access control, and AI governance

Verity

Verity

language

Compliance Management

Verity on SecurityListing: Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.

Venn Blue Border

Venn Blue Border

language

Data Loss Prevention

Venn Blue Border on SecurityListing: Secure workspace for BYOD/unmanaged devices without VDI or device takeover

Apono Zero Standing Privileges Checklist

Apono Zero Standing

language

Database Security

Apono Zero Standing Privileges Checklist on SecurityListing: Privileged access platform eliminating standing permissions via JIT access

Operant MCP Gateway

Operant MCP Gateway

language

API Security

Operant MCP Gateway on SecurityListing: Enterprise security gateway for Model Context Protocol (MCP) ecosystems

BAAR Technologies IGA for Oracle Applications Cloud

BAAR Technologies IGA

language

Identity Governance and Administration

BAAR Technologies IGA for Oracle Applications Cloud on SecurityListing: IGA solution pre-integrated with Oracle Applications Cloud for ERP access

Imprivata Enterprise Access Management

Imprivata Enterprise Access

language

Multi-Factor Authentication and Single Sign-On

Imprivata Enterprise Access Management on SecurityListing: Enterprise access management with SSO, MFA, and passwordless authentication

Penta Security D.AMO Key Management System (KMS)

Penta Security D.AMO

language

Database Security

Penta Security D.AMO Key Management System (KMS) on SecurityListing: Enterprise key management system for encryption key lifecycle management

READI Access Studio

READI Access Studio

language

Identity Governance and Administration

READI Access Studio on SecurityListing: Identity automation platform with access policy, workflow, and connector mgmt

Securden Enterprise Password Manager

Securden Enterprise Password

language

API Security

Securden Enterprise Password Manager on SecurityListing: Enterprise password vault for IT teams with centralized storage and sharing

Securden Privileged Access Management

Securden Privileged Access

language

Password Management

Securden Privileged Access Management on SecurityListing: PAM platform for managing privileged accounts, sessions, and access control

Symmetry Modern Data Security Platform

Symmetry Modern Data

language

Data Classification

Symmetry Modern Data Security Platform on SecurityListing: DSPM and DDR platform for data discovery, classification, monitoring & response

RSA SecurID

RSA SecurID

language

Multi-Factor Authentication and Single Sign-On

RSA SecurID on SecurityListing: On-premises authentication and identity management with MFA and SSO capabilities

Wallarm Protect Agentic AI

Wallarm Protect Agentic

language

API Security

Wallarm Protect Agentic AI on SecurityListing: API-first security platform protecting AI agents and AI-enabled APIs

Saviynt Privileged Access Management

Saviynt Privileged Access

language

Privileged Access Management

Saviynt Privileged Access Management on SecurityListing: PAM solution with zero standing privilege and just-in-time access controls

SecurEnds Unified Identity Platform

SecurEnds Unified Identity

language

Privileged Access Management

SecurEnds Unified Identity Platform on SecurityListing: Unified identity platform for IGA, PAM, compliance, and access governance

DACS Pro Zero Trust Endpoint Secure Workspace

DACS Pro Zero

language

Data Classification

DACS Pro Zero Trust Endpoint Secure Workspace on SecurityListing: Zero trust endpoint workspace with data isolation and secure access control

StrikeOne Vulnerability Management

StrikeOne Vulnerability Management

language

Vulnerability Assessment

StrikeOne Vulnerability Management on SecurityListing: Vulnerability management platform for SDLC integration and risk mitigation

RSA ID Plus

RSA ID Plus

language

Multi-Factor Authentication and Single Sign-On

RSA ID Plus on SecurityListing: IAM platform with MFA, SSO, and adaptive access for cloud, hybrid, on-prem

RSA Risk AI

RSA Risk AI

language

Multi-Factor Authentication and Single Sign-On

RSA Risk AI on SecurityListing: ML-based risk engine for contextual access risk assessment and MFA

Satori

Satori

language

Data Security Posture Management

Satori on SecurityListing: A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.

SecuPi Proactive DAM

SecuPi Proactive DAM

language

Database Security

SecuPi Proactive DAM on SecurityListing: Database activity monitoring solution for cloud and on-premises databases

SecuPi Privileged Account Brokering

SecuPi Privileged Account

language

Multi-Factor Authentication and Single Sign-On

SecuPi Privileged Account Brokering on SecurityListing: Brokers privileged access with JIT provisioning and credential masking

TrustLogix TrustDSPM

TrustLogix TrustDSPM

language

Data Classification

TrustLogix TrustDSPM on SecurityListing: DSPM platform for data visibility, access control, and compliance across clouds

Alcor AccessFlow

Alcor AccessFlow

language

Identity Governance and Administration

Alcor AccessFlow on SecurityListing: Automated IAM platform for centralized access management and compliance

TrustLogix TrustAI

TrustLogix TrustAI

language

Data Security Posture Management

TrustLogix TrustAI on SecurityListing: Secures AI agent data access with policy-based controls and monitoring

archTIS Spirion

archTIS Spirion

language

Data Classification

archTIS Spirion on SecurityListing: Sensitive data discovery, classification, and remediation platform

Unosecur Identity Security

Unosecur Identity Security

language

Identity Threat Detection and Response

Unosecur Identity Security on SecurityListing: Identity security platform for threat detection and access management

Invicti API Security

Invicti API Security

language

API Security

Invicti API Security on SecurityListing: API security testing platform with discovery, scanning, and remediation

ProLion DataAnalyzer

ProLion DataAnalyzer

language

Data Classification

ProLion DataAnalyzer on SecurityListing: Storage analysis and optimization tool for unstructured data management

Tumeryk Secure Workforce Chatbot

Tumeryk Secure Workforce

language

Data Loss Prevention

Tumeryk Secure Workforce Chatbot on SecurityListing: DLP solution preventing enterprise data loss through workforce AI tool usage

Permiso Non-Human Identity Security

Permiso Non-Human Identity

language

Risk Assessment

Permiso Non-Human Identity Security on SecurityListing: NHI security platform for inventory, monitoring & threat detection across clouds

Virtru Data Security Platform

Virtru Data Security

language

Key Management

Virtru Data Security Platform on SecurityListing: Data-centric security platform with encryption and access controls for data

XFA Device Security

XFA Device Security

language

Mobile Device Management

XFA Device Security on SecurityListing: Agentless device security platform for BYOD, managed, and external devices.

ORDR AI Protect for Segmentation

ORDR AI Protect

language

Zero Trust Network Access

ORDR AI Protect for Segmentation on SecurityListing: AI-driven network segmentation platform with automated policy generation

ID North Identity Governance and Administration (IGA)

ID North Identity

language

Identity Governance and Administration

ID North Identity Governance and Administration (IGA) on SecurityListing: IGA solution for managing digital identities and access permissions

AppGate High Performance ZTNA

AppGate High Performance

language

API Security

AppGate High Performance ZTNA on SecurityListing: Direct-routed ZTNA solution for enterprise secure access control

Huawei HiSec Endpoint

Huawei HiSec Endpoint

language

Endpoint Detection and Response

Huawei HiSec Endpoint on SecurityListing: EDR solution with ransomware recovery, threat detection, and access control

Sentra DSPM

Sentra DSPM

language

Data Classification

Sentra DSPM on SecurityListing: Cloud-native DSPM platform for data discovery, classification, and risk mgmt.

Cypago UAR Engine

Cypago UAR Engine

language

Identity Governance and Administration

Cypago UAR Engine on SecurityListing: Automated user access review platform for compliance and access management

Securden Endpoint Privilege Manager

Securden Endpoint Privilege

language

Privileged Access Management

Securden Endpoint Privilege Manager on SecurityListing: Endpoint privilege mgmt solution for removing local admin rights on endpoints

Sonrai Cloud Permissions Firewall

Sonrai Cloud Permissions

language

Privileged Access Management

Sonrai Cloud Permissions Firewall on SecurityListing: Automates least privilege enforcement in cloud via centralized policies & ChatOps