Compare Teramind vs OneLogin vs Stormpath

You May Also Like

Featured products that are similar to the ones you selected below.

View Listing View Listing View Listing

Crozscore

86%
what is this?
interest falling

Crozscore

89%
what is this?
interest falling

Crozscore

80%
what is this?
interest rising
Teramind screenshot view 5 more OneLogin screenshot view 4 more Stormpath screenshot view 2 more

About Teramind

Teramind is a pioneer in User Behavior Monitoring, providing a user-centric approach to IT security. Our solution offers tailored analytics, alerts and bullet-proof forensics to help companies address the fastest growing security risk - the insider threat.

Our insider threat solution allows for:

  • Monitor employees, privileged users, remote users, contractors
  • Detecting & Blocking Malicious Activity
  • Live View & History Playback
  • Rule Based Risk Analysis
  • IT Forensics
  • Intelligent Session Mining

Our Employee Monitoring solution provides smart rules and automated alerts and monitors the following activities:

  • Instant Messages
  • Printed Document Tracking
  • Keystroke Logger
  • Website Monitoring
  • Application Monitoring
  • Email Monitoring
  • File Transfer Tracking

Teramind DLP provides additional data loss prevention features that allows companies to:

  • Protect sensitive data and IP
  • Define content-based rules
  • Define file-based rules
  • Leverage document fingerprinting to protect confidential information
  • Prevent malicious or negligent data exfiltration and data leaks
  • Ensure regulatory compliance involving GDPR, HIPAA, PIC DSS etc.

Teramind Mobile App for Android:

  • Get full visibility on the go with Teramind Dashboard
  • Summary reports, detailed metrics and live monitoring of individual endpoints

About OneLogin

OneLogin is an on-demand solution that allows its users to centralize access control, enforce multi-factor authentication and automate user management for their key web apps.
It eliminates passwords for companies that embrace cloud computing. Users sign in once and get secure, one-click access to all their web-based apps in the cloud and behind the firewall.
It also provides IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory.

About Stormpath

Stormpath is a complete and easy Identity management API for software teams building web, mobile, and API-driven applications. Powerful, pre-built authentication and user management eliminates the cost and security risks of developing and maintaining Identity in house. With Stormpath, developers can launch applications faster and focus on the core features that make their projects a success.

Stormpath is a cloud-based user data store with a private deployment option. Features include user registration, authentication, authorization, user profiles, single sign-on, multi-tenancy, token authentication, and API key management. Stormpath’s advanced security measures safeguard user data and promote compliance. The service includes robust open source SDKs for popular web and mobile frameworks, including Node.js, AngularJS, Java, PHP, Python, Ruby, .NET, iOS, and Android.

The Stormpath REST API lets developers quickly and easily build a wide variety of user management functions they would otherwise have to code themselves.

What makes Stormpath different?

  • Sophisticated authorization support, with caching for maximum performance.
  • Token authentication and revocation with JSON Web Tokens and OAuth2.
  • Native support for multi-tenant applications, with pre-built partitioning of customer data.
  • Comprehensive documentation and commitment to customer care—even for free developer accounts.
  • Built from the start as a developer-centric, developer-friendly solution. Robust and highly idiomatic SDKs.

Developers love Stormpath for its advanced, developer-centric service, and also because it makes their lives easier: they can implement Stormpath in minutes. The CTO can rest easy knowing user data and workflows are handled the right way, while users get a seamless, secure experience across applications.

Features

  • API
  • Batch Permissions & Access
  • Big Data
  • Dashboard
  • Data Export
  • Data Import
  • Data Visualization
  • Employee Database
  • Employee Onboarding
  • External Integrations
  • Multi-User
  • Notifications
  • Password & Access Management
  • Social-Media Integration
  • Site Access Management
  • Database
  • Employee Engagement

Features

  • 2-Factor Authentication
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • Email Integration
  • External Integrations
  • Google Apps Integration
  • Multi-User
  • Notifications
  • Password & Access Management

Features

  • 2-Factor Authentication
  • API
  • Batch Permissions & Access
  • Dashboard
  • Data Export
  • Data Import
  • Email Integration
  • External Integrations
  • Google Apps Integration
  • Multi-User
  • Notifications
  • Password & Access Management

Summary

  • Insider threat prevention

  • Data loss prevention (DLP)

  • Behavior risk monitoring

  • Employee monitoring

  • Remote user monitoring

Summary

  • Reduces IT Costs: Eliminates identity infrastructure costs and complex integration projects for each new app.

  • Increases Productivity
: Provides employees one-click access to all their web-based software.

  • Improves Transparency
: Provides the insight necessary to make sound, real-time decisions about cloud usage.

  • Strengthens Security: OneLogin enables IT to execute identity policy across all users, devices, cloud and on-premises applications.

Summary

  • Faster speed to market for application development and launch.

  • Lowers the cost of application development and maintenance.

  • Allows development teams to focus on core application features.

  • Delivers maximum scalability and reliability.

  • Reduces risk with advanced security measures to safeguard user data.

Pricing

Teramind Starter

$60.00
5 user(s) / month
Included in plan:
  • Policy & Rules: Policy manager, Visual rule editor
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional)
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Monitoring for: Web pages & applications, Instant messaging, Social media, Searches, Remote control, Activity blocking
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind UAM

$125.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)

Teramind DLP

$150.00
5 user(s) / month
Included in plan:
  • Monitoring for: Web pages & applications, Emails, Console commands, File transfers, Networks, Instant messaging, Social media, Keystrokes, Clipboard, Searches, Printing, OCR, Remote control, Activity blocking
  • Policy & Rules: Policy manager, Visual rule editor, Regular expression support, Out-of-the box rule templates
  • Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
  • Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
  • Hosting: Cloud, On-Premise, Private Cloud (AWS, Azure)
  • Data Loss Prevention: Content rules, File rules, Data exfiltration prevention, Use pre-defined data categories, Document and data fingerprinting, Compliance for GDPR, HIPPA, PCI DSS etc.

Pricing

  • Credit card required: N/A
  • SSO: Free, SSO for your employees for up to 3 apps and 5 personal apps.
    Starter: €2/user/month, SSO and multi-factor authentication for all apps.
    Enterprise: €4/user/month, Policy-driven security and end-to-end user management.
    Unlimited: €8/user/month, Total identity management for the complex enterprise.
    There are also free trials available.

Pricing

  • Starting from: $49.00/month
  • Credit card required: Yes
  • Developer - Free Forever

    • Unlimited Users
    • Complete Authentication & Authorization API
    • 10k API calls/mo
    • No Credit Card Required

    Starter - $49/mo/app

    • Unlimited Users
    • 100,000 API calls/month
    • Complete Authentication API
    • Flexible Groups & Permissions
    • OAuth Token & API Key Management
    • Native Multi-Tenancy For SaaS
    • Custom Email HTML

    Lite - $149/mo/app
    All Starter Features, plus:

    • 200,000 API calls/month
    • Hosted Login Screens
    • Single Sign-On Across Your Apps

    Advanced - $449
    All Lite Features, plus:

    • 500,000 API calls/month
    • SAML Integration
    • AD/LDAP Integration

    Enterprise - Custom Pricing
    All Advanced Features, plus:

    • High Availability Infrastructure
    • Enhanced Security Environment
    • 99.999% Uptime SLA
    • 24x7 Support
    • Private Infrastructure Available

FAQs

    Does this service integrate with any other apps?
    • Yes.
    • Project management systems such as: JIRA, Trello, BaseCamp, Redmine etc.
    • SIEM and threat analytics tools such as: HP ArcSight, Splunk, IBM QRadar, McAfee Enterprise Security Manager, LogRhythm, NetIQ Sentinel etc.
  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • What is this service generally used for?
    • User activity monitoring
    • Remote employee monitoring
    • Insider threat prevention
    • Data loss prevention
    • Increase workplace productivity
    • Compliance and audit
  • Does this service offer guides, tutorials and or customer support?
  • Yes.

  • What platforms does this service support?
    • Windows 7 & Up
    • Citrix XenApp®
    • XenDesk®
    • Windows Server 2008 & Up
    • VMware Horizon
    • Mac OSX
  • Who are the main user groups of this service?
  • Any employer who wished to monitor and prevent his employees from leaking sensitive data.

  • Does this service offer an API?
  • Yes.

FAQs

    Who are the main user groups of this service?
  • OneLogin focuses primarily on companies that operate in the cloud and integrates with cloud apps using SAML, WS-Federation, OpenID and web services integration.

  • What is this service generally used for?
  • It is used for apps single sign-on and identity management.

  • What platforms does this service support?
  • Web-based application, working on: Linux, Mac, Windows, Android, iPhone-iPad. Onelogin works by installing a browser extension which effectively pastes the credentials into the app and logs users in.

  • Does this service integrate with any other apps?
  • OneLogin integrates seamlessly with user's existing directory infrastructure and adds extra security using password policies, certificates and one-time passwords.

  • Does this service offer an API?
  • It offers RESTful API, which enables customers and integrators to programmatically manage users in OneLogin.

  • Does this service offer guides, tutorials and or customer support?
  • They provide help center, webinars, documentation.

FAQs

    Who are the main user groups of this service?
  • Anyone building an application with user management.

  • What is this service generally used for?
  • Stormpath is used for pre-built authentication and user management helps developers launch applications faster with features such as Token authentication, Authorization including groups, roles, and fine-grained permissions, Single sign-on & Social login

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Vendor Information

Founded:
2009
Based in:
San Francisco
Employees:
51-200
Likes:
Followers:
15.7k

Vendor Information

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Other

Who uses Teramind
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Languages:
English, Spanish, Japanese, Russian
Regional Restrictions:
No restrictions.

Other

Regional Restrictions:
No restrictions.

Other

Who uses Stormpath
  • Personal
  • Freelance
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Web App
  • Windows
  • Macintosh
Mobile Platforms:
  • iOS
  • Android
Regional Restrictions:
No restrictions.
Back to top