Tectia

Tectia

SSH Communications Security
+
+

Related Products

  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Keeper Security
    1,755 Ratings
    Visit Website
  • MedTrainer
    241 Ratings
    Visit Website
  • Passwork
    85 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • CredentialStream
    161 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    516 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • ThreatLocker
    681 Ratings
    Visit Website

About

Keep your business safe by preventing the malicious use of privileged accounts and credentials – a common path to an organization’s most valuable assets. The CyberArk PAM as a Service solution leverages leading automation technologies to protect your business as it grows. Attackers never stop seeking ways in. Manage privileged access to minimize risk. Prevent credential exposure and keep critical assets from falling into the wrong hands. Maintain compliance with recorded key events and tamper-resistant audits. Privileged Access Manager easily integrates with a host of applications, platforms and automation tools.

About

We are a cybersecurity company dedicated to safeguarding mission-critical data in transit, in use, and at rest for leading organizations around the world. Assess your SSH key estate and related SSH key risks with our self-service tool SSHerlock. SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool and can be used free of charge. Passwordless authentication, operational technology (OT) security, defensive cybersecurity, and more. What are the top trends that will shape cybersecurity in the upcoming year? PrivX is perfect for securing, managing and tracking superuser and power user access in the hybrid cloud - by also eliminating risky privileged passwords from critical infrastructures. UKM Zero Trust manages and automates the lifecycle of millions of encryption keys for risk mitigation and audit success - also by making access keyless. Software-based NQX features matchless performance and security.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams searching for an advanced Network Security solution

Audience

Companies searching for a solution to manage and improve their security operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 5.0 / 5
design 5.0 / 5
support 4.0 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 1999
United States
www.cyberark.com/products/privileged-access-manager/

Company Information

SSH Communications Security
Founded: 1995
Finland
www.ssh.com/products/tectia-ssh/

Alternatives

Alternatives

Tectia

Tectia

SSH Communications Security

Categories

Categories

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Privileged Access Management Features

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Integrations

Acceptto Zero Trust Identity (CIAM)
Axonius
Azure Marketplace
CloudBees
Cloudaware
Devolutions Remote Desktop Manager
Docker
IDmelon Authenticator
Logsign
Malbek
NetThunder
Pega RPA
Phosphorus
Proofpoint Identity Threat Defense
Rublon
SAP Store
SSOReady
Securonix Unified Defense SIEM
Varonis Data Security Platform

Integrations

Acceptto Zero Trust Identity (CIAM)
Axonius
Azure Marketplace
CloudBees
Cloudaware
Devolutions Remote Desktop Manager
Docker
IDmelon Authenticator
Logsign
Malbek
NetThunder
Pega RPA
Phosphorus
Proofpoint Identity Threat Defense
Rublon
SAP Store
SSOReady
Securonix Unified Defense SIEM
Varonis Data Security Platform
Claim CyberArk Privileged Access Manager and update features and information
Claim CyberArk Privileged Access Manager and update features and information
Claim Tectia and update features and information
Claim Tectia and update features and information