Based on number of users
Scroll sideways
Features
Silverfort Essential
Silverfort Pro
Silverfort Unified
Infrastructure
For all users
Identity Visibility & Auditing
Authentication logs across all human users, service accounts & IdPs
✓
Exporting authentication logs to SIEM
Discovery of users, devices, and resources across all IdPs
Identity security posture management (ISPM)
Legacy authentication protocols
Password hygiene
Vulnerable user accounts
Domain configuration issues
Vulnerable resources
Identity Threat Detection & Response (ITDR)
Detection & Alerting
Known attack patterns
ML-based anomaly detection
External risk indicators
Respond to threats with real-time access block
Integration with 3rd party SOAR response and mediation playbooks
Reporting with executive risk assessment reports
Protect any resource with MFA
For a sample of users
For 10% users
AD authentications
Desktop Logon
Azure AD
Okta
PingFederate
ADFS
RADIUS
Use any MFA type
Supporting all leading MFA methods
Supporting all leading MFA providers
Silverfort MFA desktop and mobile app
Phishing and MFA bombing protection​
Cyber insurance compliance
For alll users
Risk-based policies – respond to detected threats with step-up MFA verification
Service account discovery
Inventory of all service accounts
Classifications to different types
Identify service accounts that are also used manually by admins
Discover privileges, interactive logins, broadly used accounts and more
Service account monitoring
For 10% users​
Map all sources and destinations for each service account
Behavioral analysis of each service account’s unique activity patterns
Service account protection
Block or alert when service accounts deviate from intended purpose
Automated access policies, based on the service account normal behavior
Policy automation and APIs, including ServiceNow integration
Export info on all privileged service accounts for PAM onboarding
Apply identity segmentation rules to allow/deny access
Block access of users over insecure protocols
Prevent PAM bypass
Risk-based policies – block access in real time