BeyondTrust PathfinderBeyondTrust
|
||||||
Related Products
|
||||||
About
BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
|
About
Cisco Identity Intelligence is an AI-powered solution that bridges the gap between authentication and access, providing top-tier security insights without interruptions.
By closing the gaps between authentication and access, Cisco Identity Intelligence solution protects your attack surface before attackers can make their move.
Get a full picture of identity activity and clean up vulnerable accounts, eliminate risky privileges, and block high-risk access attempts.
With seamless deployment, Cisco Identity Intelligence solution powers other Cisco security suites, resulting in deeper functionality that informs the right response to any threat.
Attackers' methods are becoming increasingly more complex, which is why Cisco Identity Intelligence solution is built to protect your organization against identity threats, no matter how sophisticated they are.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Large enterprises and organizations needing a tool to secure privileged access, manage identities and permissions across complex hybrid and cloud environments
|
Audience
Enterprises and companies seeking a solution to detect and respond to identity threats
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationBeyondTrust
Founded: 1985
United States
www.beyondtrust.com/products
|
Company InformationCisco
Founded: 1984
United States
www.cisco.com/site/us/en/solutions/security/identity-intelligence/index.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
|||||
Integrations
Active Directory
Amazon Web Services (AWS)
Auth0
Cisco Duo
Google Cloud Platform
Google Workspace
IDP Bureau
Jira
Microsoft Azure
Microsoft Teams
|
Integrations
Active Directory
Amazon Web Services (AWS)
Auth0
Cisco Duo
Google Cloud Platform
Google Workspace
IDP Bureau
Jira
Microsoft Azure
Microsoft Teams
|
|||||
|
|
|