Access Control
Browse 93 cybersecurity tools tagged with "Access Control"

Flying Cloud Data
Data Classification
Flying Cloud Data Questions on SecurityListing: Data visibility and accountability platform with chain-of-custody tracking

Imprivata Vendor Privileged
Privileged Access Management
Imprivata Vendor Privileged Access Management on SecurityListing: Manages third-party vendor privileged access with Zero Trust controls

IDECSI MyDataManagement
Data Security Posture Management
IDECSI MyDataManagement on SecurityListing: Data governance & security platform for Microsoft 365 & file servers

Formal
Database Security
Formal on SecurityListing: A reverse proxy solution that provides data access control, monitoring, and security policy enforcement for databases and APIs within organization's infrastructure.

SecuPi Data De-identification
Data Masking
SecuPi Data De-identification on SecurityListing: Data de-identification platform using FPE, tokenization, and masking

DenyHosts
Intrusion Detection and Prevention Systems
DenyHosts on SecurityListing: DenyHosts is a script to block SSH server attacks by automatically preventing attackers after failed login attempts.

Auth0 Platform
API Security
Auth0 Platform on SecurityListing: Developer-focused customer identity platform for authentication & authorization

DataCloak Secure Workspace
Data Loss Prevention
DataCloak Secure Workspace on SecurityListing: Zero Trust secure workspace for enterprise data protection and access control

Risk Cognizance Data
Data Security Posture Management
Risk Cognizance Data Protection on SecurityListing: Data protection service with encryption, access controls, and compliance

Imprivata Mobile Access
Multi-Factor Authentication and Single Sign-On
Imprivata Mobile Access Management on SecurityListing: Manages secure access to shared mobile devices with fast authentication & SSO

Unbound Governance Layer
AI Model Security
Unbound Governance Layer on SecurityListing: Governance layer for monitoring and controlling AI coding agents within policy rules

Cymmetri CISO Dashboard
Identity Governance and Administration
Cymmetri CISO Dashboard on SecurityListing: Converged IAM platform with CISO dashboard for identity lifecycle management

Glide Identity Glide-In
API Security
Glide Identity Glide-In on SecurityListing: SIM-based identity verification for touchless check-in and authentication

Bravura Security Fabric
Password Management
Bravura Security Fabric on SecurityListing: Unified IAM & PAM platform with identity mgmt, privileged access & password mgmt

Lightbeam Data Identity
Data Classification
Lightbeam Data Identity Graph on SecurityListing: AI-powered data identity graph linking sensitive data to identities & access

Cypago Agentic-AI Cyber
Governance Risk and Compliance Platforms
Cypago Agentic-AI Cyber GRC on SecurityListing: AI-powered GRC platform automating compliance, audit prep, and control monitoring

IDECSI Permission Explorer
Identity Governance and Administration
IDECSI Permission Explorer on SecurityListing: Permission analysis and supervision tool for Microsoft 365 and file servers

Oleria Trustfusion
Privileged Access Management
Oleria Trustfusion on SecurityListing: AI-driven identity security platform for human, NHI, and AI identities

Fxiaoke DACS Lite
Zero Trust Network Access
Fxiaoke DACS Lite Zero Trust Network Access Control System on SecurityListing: Zero trust network access control system for secure remote enterprise access

Avigilon CVE-2025-56266 Scanner
Security Scanning
Avigilon CVE-2025-56266 Scanner on SecurityListing: Scanner for CVE-2025-56266 Host Header Injection in Avigilon ACM

Lightbeam Automated Remediation
Data Security Posture Management
Lightbeam Automated Remediation on SecurityListing: Automated remediation platform for data security risks and access control

Imprivata Privileged Access
Password Management
Imprivata Privileged Access Management on SecurityListing: PAM solution for discovering, managing, auditing privileged accounts & sessions

Oleria Trustfusion Platform
Identity Threat Detection and Response
Oleria Trustfusion Platform on SecurityListing: Identity security platform unifying IAM data with usage-level visibility

BAAR BAAR-IGA Identity
Identity Governance and Administration
BAAR BAAR-IGA Identity Lifecycle Management on SecurityListing: Identity lifecycle mgmt solution for workforce provisioning & access control

Lightbeam Protect the
Data Classification
Lightbeam Protect the Human Behind the Data on SecurityListing: Identity-centric DSPM platform for data discovery, classification & governance

NTT Data ControlPanelGRC
Governance Risk and Compliance Platforms
NTT Data ControlPanelGRC on SecurityListing: GRC and continuous controls monitoring platform for SAP environments

Omada Identity Cloud
Risk Assessment
Omada Identity Cloud on SecurityListing: Cloud-based IGA solution for identity lifecycle mgmt and access governance

CompanyName Microsegmentation
Zero Trust Network Access
CompanyName Microsegmentation on SecurityListing: Microsegmentation service for zero-trust network isolation and containment

Oleria Identity Security
Identity Threat Detection and Response
Oleria Identity Security on SecurityListing: Identity security platform for visibility & control across human, NHI & AI IDs

Gravwell
Security Information and Event Management
Gravwell on SecurityListing: Data analytics platform for security operations with search and automation

Portnox Cloud
Multi-Factor Authentication and Single Sign-On
Portnox Cloud on SecurityListing: Cloud-native unified access control platform with NAC, ZTNA, and RADIUS

Google Cloud Security
Cloud Security Posture Management
Google Cloud Security on SecurityListing: Cloud security platform with controls for workload protection and compliance

TrustLogix TrustAccess
Identity Governance and Administration
TrustLogix TrustAccess on SecurityListing: Data access governance platform enforcing least-privilege across data platforms

Boolebox Data Protection
Password Management
Boolebox Data Protection Software on SecurityListing: Data protection software with encryption for files, emails, and passwords

SecuPi Dynamic Authorization
Identity Governance and Administration
SecuPi Dynamic Authorization on SecurityListing: ABAC-based dynamic authorization for fine-grained access control

Readibots Bot Studio
Privileged Access Management
Readibots Bot Studio on SecurityListing: Automation platform for identity workflows using bots and playbooks

BAAR Privileged Access
Password Management
BAAR Privileged Access Management on SecurityListing: PAM solution for controlling, monitoring, and securing privileged accounts

BAAR Technologies BAAR-IGA
Privileged Access Management
BAAR Technologies BAAR-IGA on SecurityListing: IGA platform for managing identities, access rights, and compliance

ALTR Data Security
Data Classification
ALTR Data Security Platform on SecurityListing: Unified data security platform for cloud data access control and governance

NordLayer Zero Trust
Zero Trust Network Access
NordLayer Zero Trust Network Access (ZTNA) on SecurityListing: ZTNA solution providing identity-based access control to apps and resources

Ping Identity Platform
Multi-Factor Authentication and Single Sign-On
Ping Identity Platform on SecurityListing: Identity and access management platform for authentication and authorization

Dbapp Security Unified
Password Management
Dbapp Security Unified Security Management Platform (DAS-USM) on SecurityListing: Centralized privileged account mgmt platform with access control & auditing

Google BeyondCorp
VPN
Google BeyondCorp on SecurityListing: Google's zero trust implementation for secure access without VPN

EmpowerID Identity Management
Privileged Access Management
EmpowerID Identity Management on SecurityListing: Identity management platform for access governance and Zero Trust security

Saviynt Secure Your
Third-Party Risk Management
Saviynt Secure Your External Workforce on SecurityListing: External identity mgmt platform for contractors, vendors, and third-party access

Penta Security Encryption
Database Security
Penta Security Encryption on SecurityListing: Data encryption solutions for protecting data at rest and in transit

SecHard Cyber Hygiene
Privileged Access Management
SecHard Cyber Hygiene Platform on SecurityListing: Unified cyber hygiene platform for hardening, PAM, asset mgmt & vuln assessment

Unotech Cymmetri
Identity Governance and Administration
Unotech Cymmetri on SecurityListing: Enterprise IAM platform for identity management and access control

SecuPi Proactive Data
Data Classification
SecuPi Proactive Data Security Platform on SecurityListing: Data security platform for real-time protection of sensitive data access

Sentra AI-Powered Data
Data Classification
Sentra AI-Powered Data Security Platform on SecurityListing: AI-powered DSPM platform for data discovery, classification, and protection

syslog-ng Store Box
Security Information and Event Management
syslog-ng Store Box on SecurityListing: Enterprise log management appliance for collecting, indexing, and searching logs

Symmetry Systems DataGuard
Data Classification
Symmetry Systems DataGuard on SecurityListing: DSPM platform for data discovery, classification, access control, and AI governance

Verity
Compliance Management
Verity on SecurityListing: Verity is a comprehensive compliance management tool that helps organizations manage their governance, risk, and compliance initiatives.

Venn Blue Border
Data Loss Prevention
Venn Blue Border on SecurityListing: Secure workspace for BYOD/unmanaged devices without VDI or device takeover

Apono Zero Standing
Database Security
Apono Zero Standing Privileges Checklist on SecurityListing: Privileged access platform eliminating standing permissions via JIT access

Operant MCP Gateway
API Security
Operant MCP Gateway on SecurityListing: Enterprise security gateway for Model Context Protocol (MCP) ecosystems

BAAR Technologies IGA
Identity Governance and Administration
BAAR Technologies IGA for Oracle Applications Cloud on SecurityListing: IGA solution pre-integrated with Oracle Applications Cloud for ERP access

Imprivata Enterprise Access
Multi-Factor Authentication and Single Sign-On
Imprivata Enterprise Access Management on SecurityListing: Enterprise access management with SSO, MFA, and passwordless authentication

Penta Security D.AMO
Database Security
Penta Security D.AMO Key Management System (KMS) on SecurityListing: Enterprise key management system for encryption key lifecycle management

READI Access Studio
Identity Governance and Administration
READI Access Studio on SecurityListing: Identity automation platform with access policy, workflow, and connector mgmt

Securden Enterprise Password
API Security
Securden Enterprise Password Manager on SecurityListing: Enterprise password vault for IT teams with centralized storage and sharing

Securden Privileged Access
Password Management
Securden Privileged Access Management on SecurityListing: PAM platform for managing privileged accounts, sessions, and access control

Symmetry Modern Data
Data Classification
Symmetry Modern Data Security Platform on SecurityListing: DSPM and DDR platform for data discovery, classification, monitoring & response

RSA SecurID
Multi-Factor Authentication and Single Sign-On
RSA SecurID on SecurityListing: On-premises authentication and identity management with MFA and SSO capabilities

Wallarm Protect Agentic
API Security
Wallarm Protect Agentic AI on SecurityListing: API-first security platform protecting AI agents and AI-enabled APIs

Saviynt Privileged Access
Privileged Access Management
Saviynt Privileged Access Management on SecurityListing: PAM solution with zero standing privilege and just-in-time access controls

SecurEnds Unified Identity
Privileged Access Management
SecurEnds Unified Identity Platform on SecurityListing: Unified identity platform for IGA, PAM, compliance, and access governance

DACS Pro Zero
Data Classification
DACS Pro Zero Trust Endpoint Secure Workspace on SecurityListing: Zero trust endpoint workspace with data isolation and secure access control

StrikeOne Vulnerability Management
Vulnerability Assessment
StrikeOne Vulnerability Management on SecurityListing: Vulnerability management platform for SDLC integration and risk mitigation

RSA ID Plus
Multi-Factor Authentication and Single Sign-On
RSA ID Plus on SecurityListing: IAM platform with MFA, SSO, and adaptive access for cloud, hybrid, on-prem

RSA Risk AI
Multi-Factor Authentication and Single Sign-On
RSA Risk AI on SecurityListing: ML-based risk engine for contextual access risk assessment and MFA

Satori
Data Security Posture Management
Satori on SecurityListing: A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.

SecuPi Proactive DAM
Database Security
SecuPi Proactive DAM on SecurityListing: Database activity monitoring solution for cloud and on-premises databases

SecuPi Privileged Account
Multi-Factor Authentication and Single Sign-On
SecuPi Privileged Account Brokering on SecurityListing: Brokers privileged access with JIT provisioning and credential masking

TrustLogix TrustDSPM
Data Classification
TrustLogix TrustDSPM on SecurityListing: DSPM platform for data visibility, access control, and compliance across clouds

Alcor AccessFlow
Identity Governance and Administration
Alcor AccessFlow on SecurityListing: Automated IAM platform for centralized access management and compliance

TrustLogix TrustAI
Data Security Posture Management
TrustLogix TrustAI on SecurityListing: Secures AI agent data access with policy-based controls and monitoring

archTIS Spirion
Data Classification
archTIS Spirion on SecurityListing: Sensitive data discovery, classification, and remediation platform

Unosecur Identity Security
Identity Threat Detection and Response
Unosecur Identity Security on SecurityListing: Identity security platform for threat detection and access management

Invicti API Security
API Security
Invicti API Security on SecurityListing: API security testing platform with discovery, scanning, and remediation

ProLion DataAnalyzer
Data Classification
ProLion DataAnalyzer on SecurityListing: Storage analysis and optimization tool for unstructured data management

Tumeryk Secure Workforce
Data Loss Prevention
Tumeryk Secure Workforce Chatbot on SecurityListing: DLP solution preventing enterprise data loss through workforce AI tool usage

Permiso Non-Human Identity
Risk Assessment
Permiso Non-Human Identity Security on SecurityListing: NHI security platform for inventory, monitoring & threat detection across clouds

Virtru Data Security
Key Management
Virtru Data Security Platform on SecurityListing: Data-centric security platform with encryption and access controls for data

XFA Device Security
Mobile Device Management
XFA Device Security on SecurityListing: Agentless device security platform for BYOD, managed, and external devices.

ORDR AI Protect
Zero Trust Network Access
ORDR AI Protect for Segmentation on SecurityListing: AI-driven network segmentation platform with automated policy generation

ID North Identity
Identity Governance and Administration
ID North Identity Governance and Administration (IGA) on SecurityListing: IGA solution for managing digital identities and access permissions

AppGate High Performance
API Security
AppGate High Performance ZTNA on SecurityListing: Direct-routed ZTNA solution for enterprise secure access control

Huawei HiSec Endpoint
Endpoint Detection and Response
Huawei HiSec Endpoint on SecurityListing: EDR solution with ransomware recovery, threat detection, and access control

Sentra DSPM
Data Classification
Sentra DSPM on SecurityListing: Cloud-native DSPM platform for data discovery, classification, and risk mgmt.

Cypago UAR Engine
Identity Governance and Administration
Cypago UAR Engine on SecurityListing: Automated user access review platform for compliance and access management

Securden Endpoint Privilege
Privileged Access Management
Securden Endpoint Privilege Manager on SecurityListing: Endpoint privilege mgmt solution for removing local admin rights on endpoints

Sonrai Cloud Permissions
Privileged Access Management
Sonrai Cloud Permissions Firewall on SecurityListing: Automates least privilege enforcement in cloud via centralized policies & ChatOps