Top 15 Varonis Alternative and Similar Softwares | May 2024

Varonis (NASDAQ:VRNS) is the foremost innovator and solution provider of comprehensive, actionable data governance software solutions, providing a Metadata Framework™ that enables customers with unstructured and semi-structured data residing on their Files Systems, SharePoint Sites, Exchange servers and NAS devices to audit data access activity, fix and maintain access controls, identify sensitive data, find data owners, and involve them in access review and authorization processes. Our installations span leading firms in financial services, government, healthcare, energy, media, education, manufacturing and technology worldwide. Based on patented technology, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times. ...

1. Avatier

Avatier Avatier's suite of products address Identity and Access Management challenges by providing a complete identity access and asset risk management solution. It solves Provisioning, Governance, Risk and Password Management issues with a unique intuitive approach. The IT Store allows users to "shop" for access and assets similar to shopping online.......

2. Shell Control Box

Shell Control Box Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable movie-like audit trails, and prevents malicious actions. SCB is a quickly deployable enterprise device, completely independent from clients and servers - integrating seamlessly into existing networks.......

3. LemonLDAP::NG

LemonLDAP::NG LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......

4. 10Duke Indentity Provider

10Duke Indentity Provider 10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.Popular online services such as Google ID or Facebook Login have changed expectations regarding the ease with which a user expects to be able to access your......

5. Bitium

Bitium Bitium is a provider of cloud-based identity and access management solutions, including single sign-on, password management, and analytics for small, medium and enterprise businesses. Founded in 2012, the company aims to give growing companies the ability to manage access to all of their web-based applications -- including Google Apps and......

6. Android IMSI-Catcher Detector

Android IMSI-Catcher Detector AIMSICD is an Android app to detect IMSI-Catchers. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service providers. As such they are considered a Man-In-The-Middle (MITM) attack. This surveillance technology is also known as "StingRay", "Cellular Interception" and alike.......

7. GSMmap

GSMmap The GSM Security Map at gsmmap.org compares the protection capabilities of mobile networks. This app collects data and adds it to GSM Map.This application currently only works on Android 4.1.2 Samsung S2 and S3 devices and requires root priviliges during the mobile network data capture.Note: Custom Android systems like Cyanogenmod......

8. KEEP PROTECT

KEEP PROTECT KEEP PROTECT is an automated vulnerabilities and security breaches detection platform for websites and web apps (XSS, SQL injection,etc).......

9. victims

victims The victims project provides a canonical database of known-vulnerable JAR files, along with tools to compare this database to Java applications in development, release and production environments.......

10. LifeLock

LifeLock With a click of your camera, organize your wallet on your smartphone • Store ID, payment & other cards• Lost wallet? No problem. We’ll help cancel or replace credit & debit cards*• One-time single bureau credit score for $0.99• Easy access with Touch IDPaid LifeLock members can access identity protection......

11. CudaSign

CudaSign Accelerate your business with the safest and easiest electronic signature solution.End the Paper ChaseDitch the printer, scanner and fax. CudaSign cuts document turnaround time by as much as 90%. Get legally binding signatures from your customers, partners and employees in seconds using any device. You will save countless hours chasing......

12. PatrolServer

PatrolServer Welcome to PatrolServer. We scan your server real-time for outdated software and exploits. All delivered by mail and an easy to use dashboard.......

13. Aerohive ID Manager

Aerohive ID Manager ID Manager Cloud-Enabled Self-Service Access ManagementAerohive's ID Manager is the first enterprise access management system to leverage the cloud to simplify and automate the deployment and onboarding of guest and employee personal devices to the enterprise network.ID ManagerAerohive simplifies onboarding by combining industry-leading authentication integration with the Aerohive Cloud Services......

14. L0phtCrack

L0phtCrack L0phtCrack is a password auditing and recovery application (now called L0phtCrack 6) originally produced by Mudge from L0pht Heavy Industries. It is used to test password strength and sometimes to recover lost Microsoft Windows passwords, by using dictionary, brute-force, hybrid attacks, and rainbow tables. It was one of the crackers'......

15. Onion ID

Onion ID Onion ID is a privilege-management solution that uses machine learning and active behavior analysis to detect suspicious account activity and prevent unauthorized access in real time. Our customers never have to worry if an employee's account is misused, or compromised by a hacker trying to access proprietary information. Access Management......