Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Utilize our innovative IT policy creation wizard to craft tailored IT security policies, leveraging the expertise of cyber security professionals with over three decades of experience. This cloud-powered tool quickly generates policies that ensure you are audit-ready in just minutes. The user-friendly WIZARD engages you with straightforward questions to accurately assess your IT security requirements, producing a customized policy that aligns with those specifications. Upon creation, the completed policies are promptly emailed to you without overwhelming you with a multitude of irrelevant options. You’ll receive thorough and guaranteed IT security policies right away, making it possible to have a unique policy ready in as little as ten minutes. Moreover, these policies are easily modifiable in all major word processing applications, enabling you to adjust them precisely to your needs. For further details about the IT policies we offer, please explore our products page, where you can find a wide range of solutions tailored to your organizational requirements.

Description

Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon EMR
Amazon Redshift
Amazon S3
Amazon SageMaker
Amazon Web Services (AWS)
Apache Hive
Apache Spark
Azure Data Lake
Databricks Data Intelligence Platform
Dataiku
Delta Lake
Dremio
Hadoop
Looker
Microsoft Azure
Okta
PostgreSQL
Snowflake
Splunk Cloud Platform
Tableau

Integrations

Amazon EMR
Amazon Redshift
Amazon S3
Amazon SageMaker
Amazon Web Services (AWS)
Apache Hive
Apache Spark
Azure Data Lake
Databricks Data Intelligence Platform
Dataiku
Delta Lake
Dremio
Hadoop
Looker
Microsoft Azure
Okta
PostgreSQL
Snowflake
Splunk Cloud Platform
Tableau

Pricing Details

$149 one-time payment
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Instant Security Policy

Founded

2008

Country

United Kingdom

Website

www.instantsecuritypolicy.com

Vendor Details

Company Name

Okera

Founded

2016

Country

United States

Website

www.okera.com/overview/

Product Features

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Product Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Alternatives

Alternatives

myPolicies Reviews

myPolicies

Info-Tech Research Group