What is Foxpass?
Show LessContact Details
Foxpass Inc.
Located in United States, California, San Francisco
Founded in 2015
- Free trial available
- Free version available
Top Industries Represented
Data from Grid Report for Network Access Control Software
View grid dataDeployment & Support
Deployment
- Cloud, Saas, Web-based
- Desktop-mac
- Desktop-Windows
- Desktop-Linux
- Desktop-Chromebook
- On Promise Windows
- On Premise Linux
- Mobile-Android
- Mobile-Iphone
- Mobile-Ipad
Support
- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- 24/7 (Live Recap)
Training
- In Person
- Live Online
- Webinars
- Documentation
- Videos
Foxpass Pricing View vendors pricing
Check out our offers for each of our packages to get best out of the software
Standard
$3
per user/month
OS Login
$5
per user /month
Engineering
$7
per month /user
Visit us on our website to know more
Get a custom quote
Foxpass Features
Primary Features
Access Controls/Permissions
Access control is a fundamental component of data security that dictates who's allowed to access and use company information and resources.
Multiple Authentication Methods
Multiple Authentication Methods is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
Policy Management
Policy Management refers to the creation, communication, and management of all the policies and procedures implemented by an organization.
Remote Access/Control
Remote access control refers to the ability to monitor and control access to a computer or network (such as a home computer or office network computer) anywhere and anytime.
User Activity Monitoring
User activity monitoring are software tools that monitor and track end user behavior on devices, networks, and other company-owned IT resources.
Compliance Management
Compliance management is the ongoing process of monitoring and assessing systems to ensure they comply with industry and security standards, as well as corporate and regulatory policies and requirements.
Password Management
Password management is a system that allows users to store and access passwords securely.
Credential Management
Credential Management is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
Role-Based Permissions
Using a role-based access control system means that admins can sort employees or contractors into preexisting groups, or roles, which grant access to a defined set of resources.
Third Party Integrations
A third-party integration is a connection between two or more apps that is built on an external platform.
Secondary Features
- Authentication
- Api
- Single Sign On
Compare with Similar Products
Aruba secure
Device42
Sophos Firewall
Cisco Identity service engine
Barracuda
Extreme Network
Forescout
Fortinet NAC
OPSWAT
portnox