Horangi Warden

Cyber security, security appliances & incident response
(1 review)
Learn More

VaultCore

Encryption key management and cybersecurity software
(1 review)
Learn More

Overview

Overview

Overview

Platforms Supported

Platforms Supported

Platforms Supported

Web Based Web Based
Web Based
iPhone App iPhone App
iPhone App
Android App Android App
Android App
Windows App Windows App
Windows App

Support Options

Support Options

Support Options

FAQs FAQs
FAQs
Forum Forum
Forum
Knowledge Base Knowledge Base
Knowledge Base
Online Support Online Support
Online Support
Phone Support Phone Support
Phone Support

Pricing

Pricing

Pricing

Starting From

Starting From

Starting From

US$300,00/month
N/A
Subscription Subscription
Subscription

Reviews

Reviews

Reviews

Overall rating Overall rating
Overall rating
Ease of use Ease of use
Ease of use
Value for money Value for money
Value for money
Customer support Customer support
Customer support

Features

Features

Features

API API
API
Access Control Access Control
Access Control
Archiving & Retention Archiving & Retention
Archiving & Retention
Audit Trail Audit Trail
Audit Trail
Compliance Management Compliance Management
Compliance Management
Credential Management Credential Management
Credential Management
Data Recovery Data Recovery
Data Recovery
Event Logs Event Logs
Event Logs
Graphical Workflow Editor Graphical Workflow Editor
Graphical Workflow Editor
HIPAA Compliance HIPAA Compliance
HIPAA Compliance
Incident Management Incident Management
Incident Management
Monitoring Monitoring
Monitoring
Password Management Password Management
Password Management
Policy Management Policy Management
Policy Management
Real Time Comparisons Real Time Comparisons
Real Time Comparisons
Remote Monitoring Remote Monitoring
Remote Monitoring
Remote Update / Installation Remote Update / Installation
Remote Update / Installation
Reporting & Statistics Reporting & Statistics
Reporting & Statistics
Risk Alerts Risk Alerts
Risk Alerts
Risk Assessment Risk Assessment
Risk Assessment
Sarbanes-Oxley Compliance Sarbanes-Oxley Compliance
Sarbanes-Oxley Compliance
Secure Login Secure Login
Secure Login
Security Auditing Security Auditing
Security Auditing
Single Sign On Single Sign On
Single Sign On
Summary Reports Summary Reports
Summary Reports
Two-Factor Authentication Two-Factor Authentication
Two-Factor Authentication
User Defined Attributes User Defined Attributes
User Defined Attributes
User Management User Management
User Management

Integrations

Integrations

Integrations

Red Hat Process Automation Manager Red Hat Process Automation Manager
Red Hat Process Automation Manager
Splunk Enterprise Splunk Enterprise
Splunk Enterprise