By 2AB
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated 2AB iLock Security Services Alternatives

2AB iLock Security Services Reviews & Product Details

2AB iLock Security Services Overview

What is 2AB iLock Security Services?

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applications and centrally administer the policy.

2AB iLock Security Services Details
Show LessShow More
Product Description

iLock Security Services includes application level access control services for Java, C/C++ and Web environments. jLock, webLock and c/Lock enable companies to define access security policy for applications and centrally administer the policy.


Seller Details
Seller
2AB

Recent 2AB iLock Security Services Reviews

BA
BILAL A.Small-Business (50 or fewer emp.)
4.5 out of 5
"a practical security provider for your web applications"
library is very simple to use and communication between interfaces is quite understandable.The uses of manages group user and policy are very effec...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

2AB iLock Security Services Media

Answer a few questions to help the 2AB iLock Security Services community
Have you used 2AB iLock Security Services before?
Yes

1 2AB iLock Security Services Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 2AB iLock Security Services Reviews
4.5 out of 5
1 2AB iLock Security Services Reviews
4.5 out of 5
G2 reviews are authentic and verified.
BA
System Engineer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about 2AB iLock Security Services?

library is very simple to use and communication between interfaces is quite understandable.The uses of manages group user and policy are very effective. The uses of manages group user and policy are quite understandable and effective. Review collected by and hosted on G2.com.

What do you dislike about 2AB iLock Security Services?

It could be a little more customizable and allows override, but it's really effective within Java libraries.perhaps a c# support could have been added to this product. Review collected by and hosted on G2.com.

Recommendations to others considering 2AB iLock Security Services:

It would be great to be able to use it in C# based applications as well. Review collected by and hosted on G2.com.

What problems is 2AB iLock Security Services solving and how is that benefiting you?

We have benefited from this product in areas where our applications require role-based authorization, or where area-based control and security is required.We got very efficient performance. Review collected by and hosted on G2.com.

There are not enough reviews of 2AB iLock Security Services for G2 to provide buying insight. Below are some alternatives with more reviews:

1
JumpCloud Logo
JumpCloud
4.5
(3,051)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
2
Microsoft Entra ID Logo
Microsoft Entra ID
4.5
(788)
Entra ID is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
3
BeyondTrust Remote Support Logo
BeyondTrust Remote Support
4.7
(346)
The #1 solution for leading enterprises to accelerate and secure your service desk with centralized, efficient, and secure access for servicing and monitoring any endpoint, anywhere, attended or not.
4
Devolutions Remote Desktop Manager Logo
Devolutions Remote Desktop Manager
4.7
(193)
Remote Desktop Manager lets you centralize all your remote connections and passwords into a unique platform.
5
Ping Identity Logo
Ping Identity
4.4
(106)
Ping Identity (NYSE: PING) offers intelligent identity capabilities such as single sign-on and multi-factor authentication for workforce, customer and partner use cases.'
6
Teleport Logo
Teleport
4.5
(104)
The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure.
7
StrongDM Logo
StrongDM
4.7
(84)
strongDM’s People-First Access platform gives businesses confidence in their access and audit controls at scale. It combines authentication, authorization, networking, and observability to simplify workflows and make it easier for technical staff to access the tools they need without compromising security and compliance requirements.
8
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
9
CloudEagle Logo
CloudEagle
4.7
(71)
CloudEagle is an all-in-one SaaS research, management and procurement platform
10
Akeyless Platform Logo
Akeyless Platform
4.6
(67)
Unified secrets management vault platform is built to secure DevOps secrets and access to production resources, made for hybrid cloud as well as legacy environments
Show More