Compare UserLock vs Teramind vs PerfectCloud

More Information More Information More Information

Crozscore:

73%
what is this?
34%
interest rising

Crozscore:

85%
what is this?
93%
35%
interest rising

Crozscore:

65%
what is this?
100%
29%
interest falling
UserLock screenshot Teramind screenshot view 3 more PerfectCloud screenshot view 4 more

Software Description:

Set and enforce transparent, context-aware controls that define network access conditions for all Windows users.

Real-time monitoring and risk detection immediately alerts you to other suspicious logon activity so you can take action quickly;

Record, centralize and audit all network logon events, across the whole Windows network, for comprehensive reports and detailed insights.

A simple and non-disruptive technology, UserLock leverages an organizations existing investment in Active Directory to extend its security, not replace or overwrite it.

Software Description:

Teramind is a pioneer in User Behavior Monitoring, providing a user-centric approach to IT security. Our solution offers tailored analytics, alerts and bullet-proof forensics to help companies address the fastest growing security risk - the insider threat.

Our insider threat solution allows for:

  • Detecting & Blocking Malicious Activity
  • Live View & History Playback
  • Rule Based Risk Analysis
  • IT Forensics
  • Intelligent Session Mining

Our Employee Monitoring solution provides smart rules and automated alerts and monitors the following activities:

  • Instant Messages
  • Printed Document Tracking
  • Keystroke Logger
  • Website Monitoring
  • Application Monitoring -Email Monitoring
  • File Transfer Tracking

Software Description:

SmartSignin enables organizations to securely manage and control access to cloud applications for employees, customers, and partners across multiple devices. SmartSignin includes: Single Sign-on, Federated Identity Management, Authorization, Authentication, Access control & Audit.
SmartCryptor helps encrypt data and store it on your desktop or cloud storage applications securely. Users can share or revoke access to shared documents with anyone at anytime, using any device. It is also possible to retain complete control over who has the authority to decrypt and access the critical data.

Features:

  • Notifications
  • API
  • Password & Access Management

Features:

  • Dashboard
  • Notifications
  • Multi-User
  • Data Export
  • 2-Factor Authentication
  • Data Import

Features:

  • Batch Permissions & Access
  • File Sharing

Summary:

    No key features associated with this application.

Summary:

  • Insider threat prevention

  • DLP

  • Behavior risk monitoring

Summary:

  • One Click Login: Helps IT administrators tie all the cloud apps into a single directory and allow their customers, employees and partners to login to those applications with a single click, without needing them to repeatedly enter login credentials.

  • Robust Security & Privacy: Makes customers the real owner of their data by allowing them to select their own private key to decrypt data. No one, not even the staff of PerfectCloud can ever access the critical data of our customers.

  • Security With Convenience: No 3rd party can ever decrypt encrypted data as the encryption key lies only with the customer.

  • Supports BYOD: SmartCryptor manages the complete security lifecycle of the data from authentication, authorization, access to auditing.

  • White Labeling fro Service Providers: SmartCryptor can be white-labeled according to brand identity of the service provider.

  • Device & Cloud Agnostic: Employees and partners can see and sign in to all the cloud apps they're authorized to use, on the go, through any mobile device.

Pricing:

  • Credit card required: N/A
  • Single User: Free,
    SMB's: $6/user/month,
    Enterprise: Pricing on request,
    There is a free trial for any of these pricing plans.

FAQs:

    What platforms does this service support?
  • Windows Active Directory Server based networks

  • What is this service generally used for?
  • Securing and protecting users trusted network access

  • Who are the main user groups of this service?
  • IT system admins, IT Managers, IT Security

  • Does this service offer guides, tutorials and or customer support?
  • Yes

  • Does this service offer an API?
  • Yes

FAQs:

    Who are the main user groups of this service?
  • Any employer who wished to monitor and prevent his employees from leaking sensitive data.

FAQs:

    Who are the main user groups of this service?
  • Main users of these services are enterprizes of all sizes, educational institutions, non-profits, government institutions, and retail.

  • What is this service generally used for?
  • SmartSignin admins i used as a cloud-based tool for logins under one secure control and password system.
    SmartCryptor encrypts or decrypts data stored on any device, be it laptops, smartphones, notebooks, or tablets.

  • What platforms does this service support?
  • These services are cloud-based, working on: Linux, Mac, Windows, Mobile Web App.

  • Does this service integrate with any other apps?
  • SmartSignin integrates to almost all business's own apps, with no pre-integration necessary.
    SmartCryptor provides the option to integrate their Identity Stores (AD/LDAP, Google Apps, Salesforce etc)

  • Does this service offer an API?
  • They offer REST API.

  • Does this service offer guides, tutorials and or customer support?
  • Support offered: FAQs, Knowledge Base, Online Support, Phone Support.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Toronto
Employees:
-
Likes:
Followers:

Other:

Who uses UserLock
  • SMEs
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
French, Chinese, English
Regional Restrictions:
No restrictions.

Other:

Who uses Teramind
  • Startups
  • SMEs
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
Russian, Spanish, English, Japanese
Regional Restrictions:
No restrictions.

Other:

Regional Restrictions:
No restrictions.
Back to top