Software Alternatives, Accelerators & Startups

Centrify VS Seqrite

Compare Centrify VS Seqrite and see what are their differences

Centrify logo Centrify

Our Enterprise Mobility Management (EMM) solutions help gain control of mobile access security, minimize threats, manage devices & more. Start a FREE Trial!

Seqrite logo Seqrite

Seqrite enterprise security solutions help to detect, protect, respond to cyber attacks with integrated approach of enterprise network security.
  • Centrify Landing page
    Landing page //
    2023-06-21
  • Seqrite Landing page
    Landing page //
    2023-01-03

Centrify videos

Centrify Privilege Service Product Overview

More videos:

  • Review - Centrify Identity Service: B2B Federation Overview
  • Review - Lab 11: Configuring and Testing Group Policies with Centrify in UNIX/Linux Systems

Seqrite videos

seqrite endpoint security 7.4 dasboard review

More videos:

  • Review - Seqrite Endpoint Security
  • Review - Seqrite Endpoint Security

Category Popularity

0-100% (relative to Centrify and Seqrite)
Identity And Access Management
Monitoring Tools
0 0%
100% 100
Identity Provider
100 100%
0% 0
ERP
0 0%
100% 100

User comments

Share your experience with using Centrify and Seqrite. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Centrify and Seqrite

Centrify Reviews

20 Identity Management Solutions You Should Know
Centrify’s constellation of zero-trust products minimize security threats in myriad ways. Adaptive multi-factor authentication is just the beginning. Centrify products also ensure that not even administrators get automatic access to sensitive data. Instead, after requesting the data, all users must explain why they need it and for how long. They’re then connected to it...
Source: builtin.com

Seqrite Reviews

We have no reviews of Seqrite yet.
Be the first one to post

What are some alternatives?

When comparing Centrify and Seqrite, you can also consider the following products

OneLogin - On-demand SSO, directory integration, user provisioning and more

Thycotic - The most full-featured privileged access management (PAM) solution available is easy to use, well adopted and affordable. Start your free 30-day trial here.

TeamPassword - TeamPassword helps you manage and share access to the apps, services, and tools your team needs to keep projects moving.

CrowdStrike Services - Protect your organization by limiting or eliminating exposure and damage from cyber attacks with proactive, incident response and remediation services.

AuthAnvil - AuthAnvil software is an integrated identity and access management tool designed to help IT managers service their networks, infrastructure network, and ensure that devices are safe and secure at all times. Read more about AuthAnvil.

Deception Services - Paladin Deception Services is here to assist you in obtaining the fictitious reference, the little white lie, or the alibi that you need.