Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Cloudentity enhances the speed of development, improves audit processes, and reduces risks through advanced management of fine-grained authorization policies, ensuring ongoing enforcement at the transaction level across various environments like hybrid and multi-cloud, as well as microservices. By externalizing the management of authorization, developers are empowered to efficiently generate policy-as-code, set up standardized controls, and enforce contextual access and data exchange as close to the service as feasible. This not only accelerates application delivery but also speeds up security validation by providing comprehensive data lineage for auditing, forensic investigations, and regulatory compliance. Additionally, Cloudentity offers dynamic governance for authorization that automates policy management and adapts controls to maintain a Zero Trust framework among users, applications, services, and data. The platform also automates the inventory of applications, services, and APIs while standardizing authorization policies and facilitating declarative authorization provisioning, thus optimizing the security verification process during releases. Moreover, this proactive approach to security and compliance ensures that organizations can efficiently navigate complex regulatory landscapes while maintaining operational agility.
Description
Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions,
User management :
Create, modify & delete user accounts
Integrate with LDAP or Active Directory directories
Automatic synchronization of user information
Access control :
Fine-grained access rights to features and resources
Permission and Role Management
Multi-factor authentication (MFA)
Single Sign-On (SSO)
Security Audit and Monitoring :
Permission Matrix
Detailed logs
Historical & Real-time Graphs
Integration:
Compatibility with major development platforms, frameworks, and protocols.
APIs for integration of authentication and authorization features into custom applications
Benefits :
Simplified access management
Enhanced data security
Improved regulatory compliance
Reduce identity management cost
Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management.
API Access
Has API
API Access
Has API
Integrations
Auth0
Beam AI
Kubernetes
LDAP
Microsoft Azure
Microsoft Entra ID
Nango
OAuth
Visual Studio
Integrations
Auth0
Beam AI
Kubernetes
LDAP
Microsoft Azure
Microsoft Entra ID
Nango
OAuth
Visual Studio
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
1.55/month/user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cloudentity
Country
United States
Website
cloudentity.com
Vendor Details
Company Name
Novalys
Founded
1998
Country
France
Website
www.visual-guard.com
Product Features
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Product Features
Application Security
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Customer Identity and Access Management (CIAM)
Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning
Identity Management
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning