Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    Secure your company, employees, and customers with stronger authentication. 2FA can be deployed in minutes and not weeks. 2FA (and other user access policies) are built into the infrastructure and not fixed to applications. Allowing the use of all 2FA methods on the market, now and in the future, without changing the core. Protection is available to all employees, including those who work in the public, private, and on-premise sectors. Secfense is installed between your users and the applications they access. It tracks traffic patterns that are related to authentication. It can then enforce multifactor authentication logon and other sensitive actions, without interfering in applications existing code or databases. The platform always has the most current 2FA methods. Secfense and applied methods are not affected by application changes. You can control session expiration rules across all applications. Do not rely on VPNs. Instead, trust users and their devices.
                
            
        
            Description
                    UserLock | Two Factor Authentication & Access Management for Windows Active Directory
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    Google Cloud Platform
            
            
        
        
    
        
        
            
                
    Microsoft Azure
            
            
        
        
    
                
            Integrations
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    Google Cloud Platform
            
            
        
        
    
        
        
            
                
    Microsoft Azure
            
            
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        $2.00/month/user
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Secfense
Founded
2018
Country
Poland
Website
secfense.com
Vendor Details
Company Name
IS Decisions
Founded
2001
Country
France
Website
www.isdecisions.com
Product Features
Authentication
                                        Biometric
                                        
                                    
                                    
                                    
                                        Credential Management
                                        
                                    
                                    
                                    
                                        Knowledge-Based Authentication
                                        
                                    
                                    
                                    
                                        Mobile Authentication
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Out-of-Band Authentication
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Self Service Portal
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        Social Sign On
                                        
                                    
                            
                        Product Features
Identity Management
                                        Access Certification
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Privileged Account Management
                                        
                                    
                                    
                                    
                                        Self-Service Access Request
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        User Provisioning
                                        
                                    
                            
                        Network Access Control (NAC)
                                        Authentication
                                        
                                    
                                    
                                    
                                        Authorization
                                        
                                    
                                    
                                    
                                        Automated Hotfix / Updates
                                        
                                    
                                    
                                    
                                        Centralized Policy Management
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Device Auto-Provisioning
                                        
                                    
                                    
                                    
                                        Device Self-Registration
                                        
                                    
                                    
                                    
                                        Posture Assessment
                                        
                                    
                                    
                                    
                                        Quarantine / Remediation
                                        
                                    
                                    
                                    
                                        Secure Guest Access
                                        
                                    
                            
                        Network Security
                                        Access Control
                                        
                                    
                                    
                                    
                                        Analytics / Reporting
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Firewalls
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Response
                                        
                                    
                                    
                                    
                                        VPN
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                         
         
         
         
         
        