The Kernel Subprocessors
Security
The Kernel provides advanced privileged access management solutions to protect networks against data breaches and access rights abuse.
| Name | Category | Purpose | Country | Data Processed |
|---|---|---|---|---|
| 1Password | Security | Easily secure passwords, passkeys, and sensitive information. | - | - |
| Aikido | Security | Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically. | - | - |
| EgoMind | Security | YubiKey Management, Zero Trust Application Access, Privacy Policies and Encryption. | - | - |
| Energy Logserver | Analytics | An effective solution for collecting and analyzing logs regardless of the scale. | - | - |
| Fudo Security | Security | Protect your network against privileged data breaches and prevent access abuse. | - | - |
| Gluu | Identity | On-premise and cloud-based scalable digital identity platform. | - | - |
| IS Decisions | Security | Access Security Solutions for Windows Active Directory & Cloud Environments. | - | - |
| midPoint | Identity | Identity governance and access management for cloud and on-prem environments. | - | - |
| Pointsharp | Security | Certificate management and integrated MFA for desktop and mobile. | - | - |
| Yubico | Security | The perfect combination of hardware security, open standards, and software. | - | - |
| Skysnag | Security | Automate email authentication and attain DMARC enforcement 7x faster. | - | - |
Your data may flow beyond direct subprocessors. Click to expand and see the chain.
Loading data flow...
No changes recorded yet. Changes will appear here after the next scan detects updates.
Summary
11
Total Subprocessors
0
Countries
3
Categories
0%
in
Subprocessors by Country
Subprocessors by Category
Biggest overlap with
Other companies using the most of the same subprocessors
Common in your industry
Top subprocessors used by other Security companies