Access Governance

Companies related to Access Governance

Discover B2B companies, suppliers, and manufacturers related to this keyword category

+44 companies found
HUB Security
HUB Security
Computer-and-Network-Security

Advancing data fabric, confidential computing, and cybersecurity solutions and services.

RK Management Consultants, Inc.
RK Management Consultants, Inc.
IT-Services-and-IT-Consulting

As purveyors of top IT talent, we specialize in providing Talent as a Service within the software development arena.

ProLink Identity Management Ltd
ProLink Identity Management Ltd
IT-Services-and-IT-Consulting

The experts for Identity & Access Management

Cyera
Cyera
Computer-and-Network-Security

The first true data security platform is here.

Immuta
Immuta
Software-Development

The Data Security Platform built to unlock value from your data.

Stealthbits now part of Netwrix
Stealthbits now part of Netwrix
Software-Development

Take control over sensitive, regulated and business-critical data, regardless of where it resides.

Normalyze
Normalyze
Computer-and-Network-Security

Solving high-impact problems in cloud and data security

Xpandion (a Pathlock company)
Xpandion (a Pathlock company)
Software-Development

Simplified Risk Management (GRC) for SAP, Oracle EBS, & Microsoft Dynamics

Florbs
Florbs
Software-Development

Protect your files in Google Drive from unauthorized access.

Om
Omada
Software-Development

A Leader In Identity Governance and Administration

Privacera
Privacera
Software-Development

GenAI and data security governance without bottlenecks. Automated privacy, protection, and compliance.

SK
SKyPRO
IT-Services-and-IT-Consulting

Rock-solid solutions to problems related to IAM, governance, risk & compliance from an IT perspective.

Le
Lepide
Computer-and-Network-Security

Protect Sensitive Data from Rogue Users and Compromised User Accounts with the Lepide Data Security Platform

Hub Technologies
Hub Technologies
Computer-and-Network-Security

End-to-end banking platform that combines core banking with integrated compliance tools.

Saviynt
Saviynt
Software-Development

Leading the Future of Identity Security, Governance, and Compliance in the Digital Era.

Saviynt
Saviynt
Software-Development

Leading the Future of Identity Security, Governance, and Compliance in the Digital Era.

SEQURETEK
SEQURETEK
Computer-and-Network-Security

Simplify Security

Knostic
Knostic
Technology-and-Information-and-Internet

IAM for the LLM Age - Enabling enterprises to control and harness institutional knowledge through the power of LLMs

Netwrix Corporation
Netwrix Corporation
Software-Development

Data security starts with identity, #1 attack vector. Fast, cost-effective solutions trusted by 13,500 organizations

SailPoint
SailPoint
Software-Development
SailPoint
SailPoint
Software-Development
Cyber Identity Solutions
Cyber Identity Solutions
Technology-and-Information-and-Internet

Be Security Smart

iC Consult
iC Consult
IT-Services-and-IT-Consulting

The #1 Independent Consultancy, Systems Integrator, and Managed Services Provider for Identity & Access Management.

theom
theom
Computer-and-Network-Security

Data Access Governance and Security

Veza
Veza
Technology-and-Information-and-Internet

The Identity Security Company.

Stack Identity
Stack Identity
Computer-and-Network-Security

Eliminate exploitable access to cloud infrastructure and data. We reveal and prioritize your cloud IAM blindspots.

Security Weaver (a Pathlock company)
Security Weaver (a Pathlock company)
IT-Services-and-IT-Consulting

Partnering with organizations to rapidly deliver unmatched controls for SAP security.

Matters.AI
Matters.AI
Software-Development

We Protect What Matters

ReShield
ReShield
Data-Security-Software-Products

Secure Identities and Access across all Cloud and SaaS apps

ReShield
ReShield
Data-Security-Software-Products

Secure Identities and Access across all Cloud and SaaS apps

Grabowsky BeLux
Grabowsky BeLux
IT-Services-and-IT-Consulting

Securing the value of identity

Simeio
Simeio
Computer-and-Network-Security

We simplify IAM complexities for global organizations to ensure security goals are met, backed with right tech & people!

Kommando
Kommando
IT-Services-and-IT-Consulting

We design, deliver and implement market leading solutions within Identity Security

Identropy Inc. (acquired by Protiviti)
Identropy Inc. (acquired by Protiviti)
Computer-and-Network-Security

Identity Experts

Altron Security
Altron Security
IT-Services-and-IT-Consulting

Leaders in identity and digital security systems

Tools4ever B.V.
Tools4ever B.V.
IT-Services-and-IT-Consulting

No-Nonsense Identity Governance & Administration

Securience
Securience
Information-Technology-and-Services
SafePaaS
SafePaaS
Software-Development

Secure Access, Simplified: Policy-Driven Protection for Your SaaS & Cloud Infrastructure

OpenIAM
OpenIAM
Software-Development

Securing workforce and customer identities through a converged platform that supports Zero Trust initiatives.

vSOCBox
vSOCBox
Computer-and-Network-Security

A Unified Platform for Enterprise Security Solutions.

Adya (acquired by Qualys)
Adya (acquired by Qualys)
Software-Development

Management and Security of Cloud Applications

Cross Identity
Cross Identity
Software-Development

Identity-First Cybersecurity for Current Business Contexts

Xiting
Xiting
IT-Services-and-IT-Consulting

Your Expert for SAP Security

Mobius Consulting South Africa
Mobius Consulting South Africa
IT-Services-and-IT-Consulting

Accelerate your digital journey. KNOW your digital risk landscape. DEVELOP sustainable data risk resilience. SECURE it.