DELINEA INC.

 DELINEA INC. contact information is shown below
Owner:DELINEA INC.
Owner Address:Suite 300 201 Redwood Shores Parkway Redwood City CA 94065
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byDELINEA INC.

Brand:

CENTRIFY EXPRESS

Description:

Downloadable software for enabling directory services-based integrated solutions that deliver authentication, single sign-on, remote access, file-sharing, and reporting capabilities for cross-platform systems deployed on-premise or in the cloud;

Category: DOWNLOADABLE SOFTWARE ENABLING DIRECTORY
Brand:

CENTRIFY IDENTITY SERVICE

Description:

Downloadable computer software for providing a cloud-based service to secure access to cloud and mobile apps via single sign-on and provisioning;IDENTITY SERVICE;

Category: DOWNLOADABLE COMPUTER SOFTWARE PROVIDING
Brand:

CENTRIFY PRIVILEGE SERVICE

Description:

Downloadable computer software for providing a cloud-based service to access and secure privileged accounts;PRIVILEGE SERVICE;

Category: DOWNLOADABLE COMPUTER SOFTWARE PROVIDING
Brand:

CENTRIFY SERVER SUITE

Description:

Downloadable software for enabling information technology managers of organizations to control and manage identity and authentication, authorization, and auditing of users across a range of different operating systems;SERVER SUITE;

Category: DOWNLOADABLE SOFTWARE ENABLING INFORMATION
Brand:

CENTRIFY SUITE

Description:

Downloadable software for enabling directory services-based auditing, access control and identity management solutions that secure cross-platform environments and help with regulatory compliance;SUITE;

Category: DOWNLOADABLE SOFTWARE ENABLING DIRECTORY
Brand:

DEFINING THE BOUNDARIES OF ACCESS

Description:

Downloadable computer software for enabling and managing secure communications and connections to resources on a computer network; Downloadable computer software for information technology to manage credentials, data, and passwords, database access, and operating system access; Downloadable computer software for remote access management for computer systems and networks; Downloadable computer software for enabling secure connections to a compute resource on a network through the use of a privileged access service authentication service, privilege elevation service, audit and monitoring service, and/or privilege threat analytics service, providing seamless and context-based multi-factor authentication layer of security in the nature of requiring users to provide the combination of username, passwords, PIN, security questions, one-time passcodes, smart card, or biometrics for protecting and securing enterprise assets; Downloadable computer software for enabling directory services-based integrated solutions that deliver authentication, single sign-on, remote access, file-sharing, and reporting capabilities for cross-platform systems deployed on-premise or in the cloud providing a cloud-based service to access and secure privileged accounts; Downloadable computer software for enabling the discovery of systems within a network, checking their ability to integrate with directory services software, downloading required software packages and automatically deploying the packages to the discovered systems, and enabling secure remote access to these systems using directory services credentials; Downloadable computer software for enabling directory services-based auditing, access control and identity management solutions that secure cross-platform environments and help with regulatory compliance; Downloadable computer software for enabling the management of identity policies for different operating systems;Software as a service (SAAS) services featuring computer software for enabling and managing secure communications and connections to resources on a computer network; Software as a service (SAAS) services featuring computer software for information technology to manage credentials, data, and passwords, database access, and operating system access; Software as a service (SAAS) services featuring computer software for remote access management for computer systems and networks; Software as a service (SAAS) services featuring computer software for enabling secure connections to a compute resource on a network through the use of a privileged access service authentication service, privilege elevation service, audit and monitoring service, and/or privilege threat analytics service, providing seamless and context-based multi-factor authentication layer of security in the nature of requiring users to provide the combination of username, passwords, PIN, security questions, one-time passcodes, smart card, or biometrics for protecting and securing enterprise assets; Software as a service (SAAS) services featuring computer software for enabling directory services-based integrated solutions that deliver authentication, single sign-on, remote access, file-sharing, and reporting capabilities for cross-platform systems deployed on-premise or in the cloud providing a cloud-based service to access and secure privileged accounts; Software as a service (SAAS) services featuring computer software for enabling the discovery of systems within a network, checking their ability to integrate with directory services software, downloading required software packages and automatically deploying the packages to the discovered systems, and enabling secure remote access to these systems using directory services credentials; Software as a service (SAAS) services featuring computer software for enabling directory services-based auditing, access control and identity management solutions that secure cross-platform environments and help with regulatory compliance; Software as a service (SAAS) services featuring computer software for enabling the management of identity policies for different operating systems;

Category: DOWNLOADABLE COMPUTER SOFTWARE ENABLING
Brand:

DELINEA

Description:

Downloadable computer software for enabling and managing secure communications and connections to resources on a computer network; Downloadable computer software for information technology to manage credentials, data, and passwords, database access, and operating system access; Downloadable computer software for remote access management for computer systems and networks; Downloadable computer software for enabling secure connections to a compute resource on a network through the use of a privileged access service authentication service, privilege elevation service, audit and monitoring service, and/or privilege threat analytics service, providing seamless and context-based multi-factor authentication layer of security in the nature of requiring users to provide the combination of username, passwords, PIN, security questions, one-time passcodes, smart card, or biometrics for protecting and securing enterprise assets; Downloadable computer software for enabling directory services-based integrated solutions that deliver authentication, single sign-on, remote access, file-sharing, and reporting capabilities for cross-platform systems deployed on-premise or in the cloud providing a cloud-based service to access and secure privileged accounts; Downloadable computer software for enabling the discovery of systems within a network, checking their ability to integrate with directory services software, downloading required software packages and automatically deploying the packages to the discovered systems, and enabling secure remote access to these systems using directory services credentials; Downloadable computer software for enabling directory services-based auditing, access control and identity management solutions that secure cross-platform environments and help with regulatory compliance; Downloadable computer software for enabling the management of identity policies for different operating systems;Software as a service (SAAS) services featuring computer software for enabling and managing secure communications and connections to resources on a computer network; Software as a service (SAAS) services featuring computer software for information technology to manage credentials, data, and passwords, database access, and operating system access; Software as a service (SAAS) services featuring computer software for remote access management for computer systems and networks; Software as a service (SAAS) services featuring computer software for enabling secure connections to a compute resource on a network through the use of a privileged access service authentication service, privilege elevation service, audit and monitoring service, and/or privilege threat analytics service, providing seamless and context-based multi-factor authentication layer of security in the nature of requiring users to provide the combination of username, passwords, PIN, security questions, one-time passcodes, smart card, or biometrics for protecting and securing enterprise assets; Software as a service (SAAS) services featuring computer software for enabling directory services-based integrated solutions that deliver authentication, single sign-on, remote access, file-sharing, and reporting capabilities for cross-platform systems deployed on-premise or in the cloud providing a cloud-based service to access and secure privileged accounts; Software as a service (SAAS) services featuring computer software for enabling the discovery of systems within a network, checking their ability to integrate with directory services software, downloading required software packages and automatically deploying the packages to the discovered systems, and enabling secure remote access to these systems using directory services credentials; Software as a service (SAAS) services featuring computer software for enabling directory services-based auditing, access control and identity management solutions that secure cross-platform environments and help with regulatory compliance; Software as a service (SAAS) services featuring computer software for enabling the management of identity policies for different operating systems;

Category: DOWNLOADABLE COMPUTER SOFTWARE ENABLING
Brand:

NEXT DIMENSION SECURITY

Description:

SECURITY;Software as a service (SAAS) services featuring software for securing communications between computers;

Category: SECURITY
Brand:

THE BREACH STOPS HERE

Description:

Software as a service (SAAS) services featuring software for securing communications between computers;

Category: SOFTWARE AS SERVICE SAAS
Brand:

XPM

Description:

downloadable software, namely, downloadable software for providing authentication infrastructure for directory services, identity and access management, and security policy enforcement;software as a service featuring computer software for providing authentication infrastructure for directory services, identity and access management, and security policy enforcement;

Category: DOWNLOADABLE SOFTWARE
Brand:

ZERO TRUST PRIVILEGE

Description:

Downloadable computer software for enabling secure connections to a compute resource on a network providing privileged access, authentication, privilege elevation, audit and monitoring, and/or privilege threat analytics;Software as a service (SAAS) services featuring software enabling secure connections to a compute resource on a network through the use of a privileged access service, authentication service, privilege elevation service, audit and monitoring service, and/or privilege threat analytics service;

Category: DOWNLOADABLE COMPUTER SOFTWARE ENABLING