Top Zilla Security Alternatives
NordPass
nordpass.com
NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari.
Rippling
rippling.com
Rippling gives businesses one place to run HR, IT, and Finance—globally. It brings together all of the workforce systems that are normally scattered across a company, like payroll, expenses, benefits, and computers. For the first time ever, you can manage and automate every part of the employee lifecycle in a single system. Take onboarding, for example. With Rippling, you can hire a new employee anywhere in the world and set up their payroll, corporate card, computer, benefits, and even third-party apps like Slack and Microsoft 365—all within 90 seconds.
OneLogin
onelogin.com
OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management system (UAM) platform to enterprise-level businesses and organizations. Founded in 2009 by brothers Thomas Pedersen and Christian Pedersen, OneLogin is a late stage venture, privately held company.OneLogin was named a visionary in the Gartner Magic Quadrant for Access Management. The OneLogin UAM platform is an access management system that uses single sign-on (SSO) and a cloud directory to enable organizations to manage user access to on-premises and cloud applications. The platform also includes user provisioning, lifecycle management, and multi-factor authentication (MFA). OneLogin is based in San Francisco with a developer office in Redmond, Washington, as well as London and Guadalajara. The company hosts an annual Connect user conference.
JumpCloud
jumpcloud.com
JumpCloud is a U.S.-based enterprise software company headquartered in Denver, Colorado. The company was formally launched in 2013 at TechCrunch Disrupt Battlefield as an automated server management tool. JumpCloud’s cloud based directory platform is used to securely manage users identity, devices, and access.
WorkOS
workos.com
Your app, Enterprise Ready. Start selling to enterprise customers with just a few lines of code. Add Single Sign-On (and more) in minutes instead of months. WorkOS Dashboard - WorkOS provides an API for Single Sign-On (SSO), Directory Sync (SCIM), Audit Trail (SIEM), and more. Easily integrate Okta SAML, Google OAuth, and more.
jamf
jamf.com
Jamf Pro is a purpose-built device management solution for Apple devices that allows organizations to automate every aspect of device and application management. It empowers IT professionals to deploy devices to any employee, anywhere, automate ongoing management and security tasks, provide a comprehensive app management experience and gain critical visibility into every device used for work. Jamf Pro preserves the best-in-class user experience and personal privacy that Apple users expect.
CoreView
coreview.com
CoreView is the Global Leader in Effortless M365 Security, Governance, and Administration. Offering an end-to-end solution that stretches across the whole M365 ecosystem; from your tenant level configurations, right up to your most critical workloads. M365 is your most critical cloud environment. Despite this, delivering best practice security, governance, and administration is complex work. CoreView makes it effortless. We give you a unified and simplified view of M365 with powerful security, governance, and administration tools and automations that make best practice effortless. Our offerings: - Policy Enforcement: 50+ OOTB security and governance policies to auto-detect and remediate issues in M365 - Configuration Management: Template and back up your M365 configurations, detect configuration drift, and effortlessly roll back to your ideal state - Delegation Management: Enable virtual tenant segmentation, configure least privilege roles in a few clicks, and delegate administration for M365 - No Code Task Automation: Create no code automated workflows for user onboarding, offboarding, and repetitive tasks - Unified Visibility & Control: Unify & simplify the admin user experience of M365 including multi-tenant and hybrid environments For more information, please visit www.coreview.com.
Auth0
auth0.com
Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.
Teleport
goteleport.com
Teleport is the easiest, most secure way to access all your infrastructure. Faster. More Secure. Identity-Native Infrastructure Access. Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.
Indent
indent.com
With Indent, your team can quickly get the access they need to cloud apps and infrastructure when they need it. User-friendly access control - Indent provides team members with on-demand access to cloud apps and infrastructure in seconds, not days.
Kinde
kinde.com
Powerful authentication and user management for modern applications. Created by founders and engineers to help your business generate more revenue, reduce costs, and make lifelong loyal customers – in one place. Every aspect of Kinde is designed to help your business grow and scale. We went to great lengths to make sure that you don’t have to worry about anything. From startup to IPO in a single platform. Authentication Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Our powerful builder allows you to make sure that your pages are on brand and as beautiful as the rest of your website and product experience. Up-level your security with multi-factor authentication (MFA). Give your users access to advanced authentication options, protecting them from reused or breached passwords. Take control of user authorization and access with enterprise SSO and custom SAML so that you can support your biggest customers as quickly as possible. Manage users from one beautiful dashboard. Add and invite users, manage roles and permissions, and get a complete picture of your user activity. We’ll keep you and your users safe. Kinde is built from the ground up using best-in-class security protocols. Access Control and Multi-tenancy Complex businesses need software that reflects their structure and restricts data access to only the people who should see it. That’s why we’ve included outrageously powerful controls to help you manage your businesses, teams, and users in the most frictionless way possible. Controlling who can access which individual pieces of data and interface is critical to protecting your business and your customers. Hierarchical role-based access control (RBAC) is the best way to manage this. Allowing strict control and flexible assignment – aligning everything from your business view of the world right down to the code you ship to customers. Feature flags Deliver new experiences and increase the speed that your team deploys, learns and releases with feature-based continuous deployment. Shipping to production introduces a degree of risk. Continuous deployment helps to reduce risk and accelerate learning by empowering the team to deploy when ready and separating releasing from shipping. Feature flags are the heart of what makes this work. Mistakes happen. Rollouts are no exception. The important thing is how your team deals with problems, and what tools they have at their disposal to manage problems. Feature flags are a powerful tool for preventing and managing failed change. Billing Coming in Q3, 2024.
CyberArk
cyberark.com
CyberArk is a leader in identity security and access management, dedicated to protecting organizations against cyber threats by securing identities, both human and machine. Key Features: * Identity Security Platform: Offers a comprehensive suite of tools to manage and secure user identities, including single sign-on (SSO), multi-factor authentication (MFA), and identity governance. * Privileged Access Management (PAM): Safeguards privileged accounts and sensitive credentials across various environments, ensuring secure access to critical systems. * CyberArk CORA AI: An advanced AI hub designed to enhance identity security by providing intelligent insights and automation capabilities. * Endpoint Privilege Security: Reduces attack surfaces by managing and controlling privileges on endpoints.
BetterCloud
bettercloud.com
BetterCloud is the market-leading SaaS management platform, enabling IT teams to eliminate up to 78% of SaaS management work. BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies in a multi-SaaS environment. By streamlining and automating critical work like user lifecycle processes and day-to-day operations, BetterCloud's thousands of customers enjoy greater operational efficiency and employee productivity. With 10+ years experience pioneering the SaaS Operations movement, BetterCloud now serves the world’s largest community of SaaSOps experts. As host of Altitude, the industry’s leading SaaSOps event, and publisher of the annual State of SaaSOps Report, the category’s definitive market research, BetterCloud is recognized by customers (G2) and leading analyst firms (Gartner and Forrester) as the market leader in SaaS Operations Management. For IT teams that manage multi-SaaS environments, BetterCloud automates onboarding, offboarding & mid-lifecycle changes, SaaS application access & entitlements, and security policies. Unlike Identity & Access Management solutions that require manual intervention and custom scripting, or IT Service Desk solutions that generate tickets to be manually worked, BetterCloud’s granular, powerful automation and unlimited customizable workflows complement your IAM and help desk automation to improve IT efficiency by reducing up to 78% of SaaS management work. If your IT team is scripting or manually managing access to applications, files, folders, and groups for anyone joining, leaving, or moving inside your organization, you’re throwing talent and resources you can't spare at problems BetterCloud can automate. Headquartered in New York City, with a product and engineering office in Atlanta, GA as well as innovation hubs & remote talent across the U.S., BetterCloud is backed, among others, by some of the best technology investors including Vista Equity Partners, Warburg Pincus, Bain Capital, and Accel.
DoControl
docontrol.io
DoControl provides organizations with the automated, self-service tools they require for Software as a Service (SaaS) application data access monitoring, orchestration, and remediation. The solution uncovers all SaaS users, 3rd party collaborators, assets/metadata, OAuth apps, groups, and activity events. From there, security teams can create granular data access control policies to reduce the risk of data overexposure and exfiltration. We take a unique, customer-focused approach to the challenge of labor-intensive security risk management and data loss prevention (DLP) in SaaS. DoControl has no agents, no inline redirections, and no slow response times as commonly found in Cloud Access Security Broker (CASB) solutions.
AvePoint
avepoint.com
Collaborate with Confidence. AvePoint provides the most advanced platform to optimize SaaS operations and secure collaboration. Over 17,000 customers worldwide rely on our solutions to modernize the digital workplace across Microsoft, Google, Salesforce and other collaboration environments. AvePoint's global channel partner program includes over 3,500 managed service providers, value added resellers and systems integrators, with our solutions available in more than 100 cloud marketplaces. Founded in 2001, AvePoint is a five-time Global Microsoft Partner of the Year and headquartered in Jersey City, New Jersey.
FusionAuth
fusionauth.io
FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome. You'll get all the features your app needs plus a customizable, scalable solution you can run on any computer, anywhere in the world.
Swif.ai
swif.ai
The Modern AI-powered unified endpoint management platform. Handle your employee devices smarter with AI-powered Unified Endpoint Management, compliance automation, and device security — all in one place.
StackBob
stackbob.ai
StackBob is a modern Employee Access and License Management Platform that integrates with over 300,000 apps, even without SSO. Organizations that use StackBob are securing access to all their tools, boost team productivity and also cut software and license costs. StackBob is the only IAM platform that can connect with any web app your team is using (including even your internal tools) and doesn't require upgrades to expensive enterprise plans in all your apps, nor going through a complex SAML SSO setup.
Opal Security
opal.dev
Opal is a modern, data-centric identity security platform. Our platform offers consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS. Opal is backed by Greylock, Battery Ventures, and some of the top security experts around the world, including Silicon Valley CISO Investments (SVCI).
ConductorOne
conductorone.com
ConductorOne helps organizations secure their workforce identities through modern access controls and governance. Security and IT teams use ConductorOne to automate user access reviews, identify and remove unused access, and save time with self-service access requests. Forward-thinking companies like DigitalOcean, Ramp Financial, Loom, and Baron Funds trust us to achieve least privilege and ensure compliance.
Ory
ory.sh
Ory Network is a global, high availability and low latency user identity & access management network that protects identities and other first party data. It offers cloud-native, end-to-end services dedicated to securing and managing user authentication, authorisation and API protection for humans, robots, devices, and software across various internet services. State-of-the-art solutions for access security include passkeys, passwordless login, social login, second factor authentication, multi factor authentication and hardware tokens. Ory Network helps its customers use zero-trust security across their stack including data protection, compliance and risk management. It delivers information security using advanced AI analytics for any data created by system access including authentication, authorisation and API traffic. Ory is an open source organization welcoming collaboration and contributions to its leading products from an active global community. With more than 30,000 community members and over 250 GitHub repositories, Ory maintains the world’s leading open-source identity management, authentication and authorization ecosystem and community. Ory Network builds on this knowledge and experience.
Cryptr
cryptr.co
Cryptr is a plug-and-play B2B authentication platform that allows SaaS to manage and deploy all their authentication strategies like Single Sign On, automated user provisioning with Directory Sync, TOTP, magic link and much more with just a few lines of code. - Universal SSO Connector: to connect in 5 minutes SaaS to the SSO systems (SAML, Azure AD, Okta, Ping Identity ...) of their enterprise customers, - Directory Sync: to enable synchronization of user directories between SaaS and their customers with automated provisioning and de-provisioning - Universal Login which includes login/password with stolen password detection, passwordless login with magic-link, social login, TOTP.
Cerby
cerby.com
Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on and lifecycle management capabilities. With Cerby, identity teams can extend access, minimize risk, and lower costs.
Josys
josys.com
Josys is the SaaS & Device Management Platform that simplifies how IT works. Our holistic approach equips IT managers with 360° control over their software and hardware portfolio by making it easier to visualize assets, analyze utilization trends, and automate provisioning processes that will make IT operations run more efficiently. By integrating with hundreds of applications and providing an open API, Josys empowers IT with a single portal for assigning licenses and devices to employees, monitoring user access, and tracking adoption. IT teams can save time by eliminating dependencies on multiple spreadsheets and disparate tools, easily optimize IT costs, and securely govern access to company data.
Lumos
lumos.com
You have grown and so have your risks: Software cost explosion. Excessive admin access. A flood of JIRA tickets. Don’t let managing hundreds of apps and permissions slow down your business. Lumos is the first app governance platform that automates access requests, enforces least privilege, speeds up user access reviews, and eliminates extra SaaS app spending. Gone are the technology silos that left IT, Security, Compliance, and Finance in the dark. With Lumos, you have visibility into app usage, entitlements, and spending - and the power to take action on that data. The impact? Disappearing IT support costs, Just-in-Time Access (JIT) with no audit spreadsheets and VLookups. All this equals guaranteed software savings.
Zluri
zluri.com
Zluri is a nex-gen Identity Governance and Administration platform that enables IT and security teams to discover identities and applications, streamline access management, and automate access reviews—all from a single, intuitive interface. With Zluri, organizations automate compliance readiness for SOX, HIPAA, SOC 2, and more—ensuring the right people have the right access to the right applications at the right time, with minimal time and manual effort.
Zygon
zygon.tech
Automate the control of all the SaaS applications used by your team. From app inventory to upgrading your authentication methods, our automations give you a much needed relief in controlling SaaS sprawl. - Minimize SaaS Surface Attack - Pragmatic Security Awareness - Upgrading Authentication Security (SSO rollout) - Collaborator Onboarding and Offboarding - SOC 2 and ISO Compliance
AccessOwl
accessowl.io
Orchestrate your employees' access to SaaS tools. Automate access requests, approvals and provisioning workflows. Automate on- & offboarding workflows Covering the entire employee lifecycle: AccessOwl ensures that new employees have access to all relevant tools on their starting date. Offboarding an user is as simple as a click of a button and no access is ever forgotten. Aligning HR, IT and line manager — eliminating the need for back-and-forth communication. Simplify approval workflows Your team can easily request new accesses on-demand via self-service — without leaving Slack. Give IT teams and tool owners full control over costs and access rights in an easy and seamless way. Make your auditors happy Get a crystal clear audit trail of who has been given access to which resource, when and why — available at the push of a button. Ensure that everyone has only the most necessary permissions .