Teramind is a pioneer in User Behavior Monitoring, providing a user-centric approach to IT security. Our solution offers tailored analytics, alerts and bullet-proof forensics to help companies address the fastest growing security risk - the insider threat.
Our Employee Monitoring solution provides smart rules and automated alerts and monitors the following activities:
Instant Messages
Printed Document Tracking
Keystroke Logger
Website Monitoring
Application Monitoring
Email Monitoring
File Transfer Tracking
Teramind DLP provides additional data loss prevention features that allows companies to:
Protect sensitive data and IP
Define content-based rules
Define file-based rules
Leverage document fingerprinting to protect confidential information
Prevent malicious or negligent data exfiltration and data leaks
Ensure regulatory compliance involving GDPR, HIPAA, PIC DSS etc.
Teramind Mobile App for Android:
Get full visibility on the go with Teramind Dashboard
Summary reports, detailed metrics and live monitoring of individual endpoints
About UNLOQ
UNLOQ is a Passwordless authentication solution that helps companies increase their cybersecurity by moving away from password-based authentication and turning to Multi Factor Authentication.
This allows them to stay protected from threats such as password theft, brute force, man-in-the-middle and server breach.
Features:
* Multiple Authentication Methods
User authentication can be performed through Push notifications, Time- based One Time Password and/ or Email.
* Firewall Restrictions
Authentications, authorisations or encryption key requests can be allowed or denied based on previously
determined IP range or Geo rules.
* Device Deactivation
All communication between users’ devices and UNLOQ servers is encrypted.
* Customised Login
Authentications, authorisations and notifications can be customised to suit specific brand requirements.
Benefits:
* Increased Security
The distributed authentication system provides increases the security of digital properties.
* User Covenience
Secure authentication is performed at the touch of a button, without requiring users to remember any passwords, hence eliminating the risk of lost or stolen credentials.
* Cutting Edge Technology
We use best in class security protocols to ensure complete user privacy, and bring compliance to personal data security regulations closer.
About Stormpath
Stormpath is a complete and easy Identity management API for software teams building web, mobile, and API-driven applications. Powerful, pre-built authentication and user management eliminates the cost and security risks of developing and maintaining Identity in house. With Stormpath, developers can launch applications faster and focus on the core features that make their projects a success.
Stormpath is a cloud-based user data store with a private deployment option. Features include user registration, authentication, authorization, user profiles, single sign-on, multi-tenancy, token authentication, and API key management. Stormpath’s advanced security measures safeguard user data and promote compliance. The service includes robust open source SDKs for popular web and mobile frameworks, including Node.js, AngularJS, Java, PHP, Python, Ruby, .NET, iOS, and Android.
The Stormpath REST API lets developers quickly and easily build a wide variety of user management functions they would otherwise have to code themselves.
What makes Stormpath different?
Sophisticated authorization support, with caching for maximum performance.
Token authentication and revocation with JSON Web Tokens and OAuth2.
Native support for multi-tenant applications, with pre-built partitioning of customer data.
Comprehensive documentation and commitment to customer care—even for free developer accounts.
Built from the start as a developer-centric, developer-friendly solution.
Robust and highly idiomatic SDKs.
Developers love Stormpath for its advanced, developer-centric service, and also because it makes their lives easier: they can implement Stormpath in minutes. The CTO can rest easy knowing user data and workflows are handled the right way, while users get a seamless, secure experience across applications.
Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
Audit & Forensics: Video recording of all user activity, Audio recording (optional), OCR of screen content (optional), Option to record only during violation, Full text search
Behavior Analytics: Insider threat detection, Abusive behavior, Malicious behavior, Dynamic risk scoring, Anomaly detection, Workforce productivity analysis, Active vs idle time analysis,Template based scheduling, Interactive productivity reporting
Data Loss Prevention: Content rules, File rules, Data exfiltration prevention, Use pre-defined data categories, Document and data fingerprinting, Compliance for GDPR, HIPPA, PCI DSS etc.
Pricing
Starting from: $49.00/month
Credit card required: Yes
Developer - Free Forever
Unlimited Users
Complete Authentication & Authorization API
10k API calls/mo
No Credit Card Required
Starter - $49/mo/app
Unlimited Users
100,000 API calls/month
Complete Authentication API
Flexible Groups & Permissions
OAuth Token & API Key Management
Native Multi-Tenancy For SaaS
Custom Email HTML
Lite - $149/mo/app
All Starter Features, plus:
200,000 API calls/month
Hosted Login Screens
Single Sign-On Across Your Apps
Advanced - $449
All Lite Features, plus:
500,000 API calls/month
SAML Integration
AD/LDAP Integration
Enterprise - Custom Pricing
All Advanced Features, plus:
High Availability Infrastructure
Enhanced Security Environment
99.999% Uptime SLA
24x7 Support
Private Infrastructure Available
FAQs
Does this service integrate with any other apps?
Yes.
Project management systems such as: JIRA, Trello, BaseCamp, Redmine etc.
SIEM and threat analytics tools such as: HP ArcSight, Splunk, IBM QRadar, McAfee Enterprise Security Manager, LogRhythm, NetIQ Sentinel etc.
Does this service offer multi-user capability (e.g. teams)?
Yes.
What is this service generally used for?
User activity monitoring
Remote employee monitoring
Insider threat prevention
Data loss prevention
Increase workplace productivity
Compliance and audit
Does this service offer guides, tutorials and or customer support?
Yes.
What platforms does this service support?
Windows 7 & Up
Citrix XenApp®
XenDesk®
Windows Server 2008 & Up
VMware Horizon
Mac OSX
Who are the main user groups of this service?
Any employer who wished to monitor and prevent his employees from leaking sensitive data.
Does this service offer an API?
Yes.
FAQs
No FAQs associated with this application.
FAQs
Who are the main user groups of this service?
Anyone building an application with user management.
What is this service generally used for?
Stormpath is used for pre-built authentication and user management helps developers launch applications faster with features such as Token authentication, Authorization including groups, roles, and fine-grained permissions, Single sign-on & Social login