Contact Details

Foxpass Inc.

Located in United States, California, San Francisco

Founded in 2015

Search

Compare product ratings to similar products Find other products with similar features to suit your business

contact us

Have you used this product before? Find other productswith similar features to suit your business

Write a review

Does this product belong to you

Alternatives to Foxpass

Aruba secure

Aruba secure

No ratings yet!
Device42

Device42

No ratings yet!
Sophos Firewall

Sophos Firewall

No ratings yet!
Cisco Identity service engine

Cisco Identity service engine

No ratings yet!
Barracuda

Barracuda

No ratings yet!
Extreme Network

Extreme Network

No ratings yet!
Forescout

Forescout

No ratings yet!
Fortinet NAC

Fortinet NAC

No ratings yet!
OPSWAT

OPSWAT

No ratings yet!
portnox

portnox

No ratings yet!
View all alternatives

What is Foxpass?

Show Less

Contact Details

Foxpass Inc.

Located in United States, California, San Francisco

Founded in 2015

Top Industries Represented

Data from Grid Report for Network Access Control Software

View grid data

Deployment & Support

Deployment

  • Cloud, Saas, Web-based
  • Desktop-mac
  • Desktop-Windows
  • Desktop-Linux
  • Desktop-Chromebook
  • On Promise Windows
  • On Premise Linux
  • Mobile-Android
  • Mobile-Iphone
  • Mobile-Ipad

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live Recap)

Training

  • In Person
  • Live Online
  • Webinars
  • Documentation
  • Videos

Foxpass Pricing  View vendors pricing

Check out our offers for each of our packages to get best out of the software

Standard

$3
per user/month

    OS Login

    $5
    per user /month

      Engineering

      $7
      per month /user

        Visit us on our website to know more

        Get a custom quote

        Foxpass Features

        Primary Features

        Access Controls/Permissions

        Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.

        Multiple Authentication Methods

        Multiple Authentication Methods is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.

        Policy Management

        Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.

        Remote Access/Control

        Remote access control refers to the ability to monitor and control access to a computer or network (such as a home computer or office network computer) anywhere and anytime.

        User Activity Monitoring

        User activity monitoring are software tools that monitor and track end user behavior on devices, networks, and other company-owned IT resources.

        Compliance Management

        Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.

        Password Management

        Password management is a system that allows users to store and access passwords securely.

        Credential Management

        Credential Management is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).

        Role-Based Permissions

        Using a role-based access control system means that admins can sort employees or contractors into preexisting groups, or roles, which grant access to a defined set of resources.

        Third Party Integrations

        A third-party integration is a connection between two or more apps that is built on an external platform.

        Secondary Features

        • Authentication
        • Api
        • Single Sign On

        Compare with Similar Products

        Aruba secure

        Aruba secure

        Device42

        Device42

        Sophos Firewall

        Sophos Firewall

        Cisco Identity service engine

        Cisco Identity service engine

        Barracuda

        Barracuda

        Extreme Network

        Extreme Network

        Forescout

        Forescout

        Fortinet NAC

        Fortinet NAC

        OPSWAT

        OPSWAT

        portnox

        portnox

        Show Comparisons

        Resources