Password Sentry Description

Password Sentry (PS), a website password protection enterprise software program, monitors logins to block password sharing. PS uses cutting-edge technology to stop hackers from guessing passwords. Password Sentry does not count as an IP counter app. Password Sentry counts unique logins based on geographical metrics. PS analyzes logins with PS::GeoTracking technology. Each user is geo-profiled. Their IP address is used to determine their exact location: City, Region and Country, Coordinates (Latitude/Longitude), and Coordinates (Latitude/Longitude). The distance between logins for each user is then calculated and mapped. A user will be suspended if a login is mapped beyond the acceptable radius threshold, which is measured in miles and set via Control Panel Preferences. This algorithm makes sure that false positives or false negatives are minimal.

Pricing

Pricing Starts At:
$99.95 one-time payment
Pricing Information:
Pro Version of the app is based on a sliding scale.
Free Version:
Yes
Free Trial:
Yes

Integrations

No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Password Sentry
Year Founded:
1999
Headquarters:
Canada
Website:
www.password-sentry.com
Update This Listing

Media

Password Sentry Screenshot 1
Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Type of Training
Documentation
Customer Support
Phone Support
Online

Password Sentry Features and Options

Privileged Access Management Software

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring