Listing Thumbnail

    OASIS Security

     Info
    Oasis Security provides the first enterprise platform purpose-built to secure the complete lifecycle of NHIs. Oasis continuously analyzes your environment to identify, classify and resolve security posture risks related to all non-human identities.

    Overview

    Oasis Security is the leading provider of Non-Human Identity Management. Security of machine-to-machine access via non-human identities, such as service accounts, API keys or secrets, is a huge and unresolved weakness that is constantly exploited by malicious cyber attackers. Non-Human Identities are 50x more than human identities and have broader access to sensitive data exposing a large attack surface with greater risk of confidential data exfiltration. Yet, most organizations leave them unmanaged because they lack the technology to manage them. By enabling control over the lifecycle of Non-Human Identities, Oasis bridges the gap between devops/R&D and security, ensuring our customers elevate their security posture while maintaining highly efficient operations.

    For custom pricing, EULA, or a private contract, please contact sales@oasis.security , for a private offer.

    Highlights

    • Automatically discovers all identities, such as service accounts, IAM Roles, API keys and tokens.
    • Provides contextual holistic visibility into each identity, by automatically discovering who owns it, consumes it, what resources it grants access to and how privileged it is.
    • Automates the complete lifecycle management of non-human identities complementing your existing security stack.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    OASIS Security

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Oasis Starter Pack
    OASIS Non-Human Identity Management Platform
    $50,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Oasis Security
    By Astrix Security
    By BeyondTrust Corporation

    Accolades

     Info
    Top
    10
    In Financial Services

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Non-Human Identity Discovery
    Automatically discovers all non-human identities including service accounts, IAM roles, API keys, and tokens across the environment.
    Identity Context and Visibility
    Provides contextual visibility into each identity by automatically determining ownership, consumption patterns, resource access grants, and privilege levels.
    Security Posture Analysis
    Continuously analyzes environment to identify, classify, and resolve security posture risks related to non-human identities.
    Integration with Security Stack
    Complements and integrates with existing security infrastructure and tools for unified identity management.
    Deployment Architecture
    Agentless, non-proxy API-based solution that deploys in minutes with minimal configuration
    Threat Detection and Remediation
    Automated detection and mitigation of integration threats including over-privileged access, malicious integrations, and supply chain attacks with automated remediation workflows
    Access Control and Policy Enforcement
    Zero-trust policies with automated enforcement guardrails for continuous minimization of third-party exposure across app-to-app connections
    Multi-Cloud Environment Support
    Comprehensive security coverage across SaaS, PaaS, and IaaS environments including Salesforce, Office 365, GitHub, GCP BigQuery, Snowflake, and Workato
    Integration Visibility and Monitoring
    Holistic visibility into all app-to-app connections with metadata-based analysis and continuous monitoring for compliance violations and data leakage risks
    Centralized Identity and Access Visibility
    Provides centralized view of identities, accounts, entitlements, and privileged access across IT estate with threat detection capabilities for compromised identities and privileged access misuse
    Privileged Credential Management
    Manages privileged passwords, accounts, credentials, secrets, and sessions for both human and machine identities with complete control and security enforcement
    Least Privilege Enforcement
    Enforces least privilege access dynamically across Windows, macOS, Unix, and Linux environments while preventing malware, phishing attacks, and controlling application execution
    Cross-Cloud Entitlement Visibility
    Delivers cross-cloud visibility of entitlements, detects account permission anomalies, and ensures access originates only from trusted sources with privilege right-sizing guidance
    Granular Remote Access Control
    Provides granular control, management, and auditing of remote privileged access for employees, vendors, developers, and cloud operations engineers with support for multiple device types and operating systems

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.