4.5
16 Reviews (All time)
Review weighting

Browse Pathlock Reviews

Pathlock is present in 4 markets with 4 products. Pathlock has 16 reviews with an overall average rating of 4.5.

Identity Governance and Administration

Gartner defines IGA as the enterprise solution to manage digital identity life cycle and govern user access across on-premises and cloud environments. To accomplish this, IGA tools aggregate and correlate disparate identity and access rights data that is distributed throughout the IT landscape to enhance control over human and machine access. GA’s must-have capabilities: - Identity life cycle management - Access request process - Basic analytics and reporting

Pathlock has 1 product in Identity Governance and Administration market

Integrated Risk Management Solutions

Gartner defines Integrated risk management (IRM) as the combined technology, processes and data that serves to fulfill the objective of enabling the simplification, automation and integration of strategic, operational and IT risk management across an organization.

Pathlock has 1 product in Integrated Risk Management Solutions market

Network Firewalls

Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.

Pathlock has 1 product in Network Firewalls market

User Authentication

Gartner defines user authentication as the journey-time process that provides credence in a claim to an identity established for a person for access to digital assets. User authentication is delivered by some combination of (a) an authenticator, (b) signals evaluation and (c) an authentication decision point, which may be from different vendors. User authentication is used to provide credence in an identity claim for a person already known to an organization. The credence must be sufficient to bring account takeover (ATO) risks within the organization’s risk tolerance. User authentication is foundational to and protects the value of other functions with an organization’s identity fabric, namely: runtime authorization, especially segregation of duties (SOD); audit (individual accountability); and identity analytics.

Pathlock has 1 product in User Authentication market