SaaS, Premium Self-Hosted, or FREE OSS Self-Hosted
Enterprise Single Sign On (SSO) SAML SSO enables a secure authentication via an organization’s Identity Provider (IdP), as opposed to users or IT admins managing thousands, of usernames and passwords. With our product SAML Jackson, enterprise users can access your product via one of their secure IdPs (like Okta, Microsoft Azure, AWS, etc), which manages access and security for the entire organization.
Directory Sync Organizations use directories from different providers to manage users and enforce their access to organization resources. By integrating our Directory Sync product into your solution you can activate and deactivate user accounts, create groups, and keep your app in sync with the user directory in real-time. Supports the SCIM 2.0 protocol.
Additionally, we offer Audit Logs to track critical events in your application and a Data Privacy Vault to safeguard sensitive data.
No Surveillance Self-Defense videos yet. You could help us improve this page by suggesting one.
BoxyHQ's answer:
BoxyHQ stands out for its comprehensive suite of security building blocks tailored specifically for developers. With features like SAML/OIDC Single Sign-On (SSO) and Directory Sync with SCIM 2.0, BoxyHQ simplifies identity management and access control for B2B SaaS companies. Its focus on providing a seamless and customizable solution empowers developers to enhance security without compromising user experience. Additionally, BoxyHQ offers Audit Logs to track critical events within the product and a Privacy Vault, an API to protect sensitive data.
BoxyHQ's answer:
BoxyHQ stands out for several reasons:
BoxyHQ's answer:
BoxyHQ's primary audience encompasses:
BoxyHQ's answer:
The inception of BoxyHQ is deeply linked with Deepak's journey as the former CTO of a cybersecurity scaleup. In his role, Deepak wrestled with the challenge of allocating resources to enterprise compliance features that diverged from their core value proposition. Alongside Sama, they witnessed the escalating tide of cyber crimes, compounded by the concerning statistic that around 70% of development teams often bypass essential security measures due to time constraints. Motivated by this shared purpose of bringing security earlier in the developer live cycle, they embarked on a mission to address these challenges head-on. BoxyHQ emerged as a solution designed to automate product security and provide low-code APIs for seamless integration, empowering developers to implement enterprise-compliant security measures effortlessly. Through BoxyHQ, Deepak and the team strive to alleviate the burden on development teams while fortifying organizations against the escalating threats posed by cyber crimes.
BoxyHQ's answer:
We value the confidentiality of our large enterprise clients due to NDA agreements. However, some of our notable customers include Cal.com, Dub, Supademo, Spike, among many others.
BoxyHQ's answer:
BoxyHQ uses the following technologies: - Next.js - PostgreSQL - Docker - Kubernetes
Based on our record, Surveillance Self-Defense seems to be more popular. It has been mentiond 34 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Https://ssd.eff.org/ and https://www.privacyguides.org/en/ which say in summary use open source and encrypted solutions. Also replace your current services with privacy respecting services when you can. Source: 8 months ago
I'd start here: https://ssd.eff.org/ and https://www.pandasecurity.com/en/mediacenter/security/how-to-protect-your-privacy/. Source: 11 months ago
In terms of privacy: start by setting your accounts to private. Change your voicemail password. Add a PIN to your phone and bank when transacting on the phone. Pull your credit and look for suspicious pulls. Use a service to erase your online footprint. Follow the "Surveillance Self Defense" guide the EFF puts out (https://ssd.eff.org/). Source: 12 months ago
One thing that helps is to first conduct an honest threat profile on yourself. Few of us require extreme measures, some of us can get by with several tweaks while making mindful choices going forward. Sometimes, people fall into the rabbit hole of thinking they need to go from 0 to 10 when a 3 or 5 is better for their situation. One situation might warrant your briefly using a 7 setting, then setting your privacy... Source: about 1 year ago
Https://ssd.eff.org/ might be one good place to start. More generally, if you are being attacked by adversaries for journalistic work, the EFF may be able to help or refer you to experts. Source: about 1 year ago
Carafem - Whether you need an abortion, birth control, or just have questions about reproductive healthcare, we're here for you as soon as you need us, whenever you need us, and as many times as you need us.
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
AidAccess to abortion - AidAccess supports women, girls, trans men, nonbinary, and all people with an unwanted pregnancy to access an abortion or miscarriage treatment.
Frontegg - Elegant user management, tailor-made for B2B SaaS
I Need an A - We give people seeking abortions information that's relevant to their needs.
Skyflow - Skyflow’s data privacy vaults deliver security, compliance and governance via a simple API