P0 Security
p0.dev
P0 Security helps security engineers manage cloud access for developers by automating temporary privileged access without requiring ticketing or static group configurations.
Apono
apono.io
Apono automates permission management, enabling organizations to streamline access control and enhance security through features like permission revocation and predefined policies.
Ory
ory.sh
Ory app manages user identities and access with features like passwordless login and multi-factor authentication, supporting secure authentication and authorization across platforms.
Cerby
cerby.com
Cerby is an access management platform that streamlines identity management and enhances security for non-federated applications through passwordless authentication.
SuperTokens
supertokens.com
SuperTokens is an open-source user authentication solution that simplifies secure login processes for web and mobile applications.
AvePoint
avepoint.com
AvePoint provides a platform for optimizing and securing SaaS operations, focusing on management and backup solutions for Microsoft and other collaboration environments.
Kinde
kinde.com
Kinde provides authentication and user management for applications, allowing businesses to manage users, authorization, and data access in a secure platform.
Zilla Security
zillasecurity.com
Zilla Security is a platform for identity governance and administration that automates compliance, provisioning, and security management across applications.
Opal Security
opal.dev
Opal Security is a data-focused identity management platform that provides oversight and control of on-premises, cloud, and SaaS environments.
Curity
curity.io
Curity is an IAM and API security app that facilitates user authentication and authorization for digital services, ensuring secure identity management and API protection.
Josys
josys.com
Josys is a SaaS and device management platform that helps IT teams manage software and hardware assets efficiently, streamline operations, and enhance security.
Lumos
lumos.com
Lumos automates app governance, access requests, and reviews, ensuring least privilege access while optimizing SaaS spending and improving compliance and security.
Swif.ai
swif.ai
Swif.ai is an AI-powered platform for unified endpoint management that enhances device security and compliance, focusing on Shadow IT risk mitigation.
Adaptive
adaptive.live
Adaptive is a data security platform for managing access, protecting sensitive data, auditing activities, and ensuring compliance across data sources.
YeshID
yeshid.com
YeshID is an identity management tool that helps organizations manage user identities and applications efficiently, with features for onboarding, access requests, and compliance.
Zluri
zluri.com
Zluri is a platform for managing SaaS applications, automating access and compliance processes, and providing insights into software usage and security.
Zygon
zygon.tech
Zygon automates control of SaaS applications for teams, improving security, managing onboarding/offboarding, and assisting with compliance.
Torq
torq.io
Torq is an AI-driven platform that automates cybersecurity processes, integrates security tools, and enhances operational efficiency for organizations.
Corma
corma.io
Corma is an access management platform that centralizes app access, automates access reviews, and provisioning, helping to reduce software costs.
CloudEagle.ai
cloudeagle.ai
CloudEagle.ai helps organizations manage and optimize SaaS spending, automate procurement processes, and gain visibility into app usage and vendor negotiations.
AccessOwl
accessowl.io
AccessOwl automates employee access management to SaaS tools, streamlining requests, approvals, and onboarding/offboarding processes while ensuring clear audit trails.
© 2025 WebCatalog, Inc.