Foxpass by Splashtop Features
Data (3)
Data Protection
Enable users to protect their data from potential outside attacks.
Remote Access
Allow users to control access to their information from a central point.
Network Access
This feature was mentioned in 10 Foxpass by Splashtop reviews.
Allow users to implement policies for controlling access to their business's infrastructure.
Network (1)
Security
Secure access to your network for both guests and internal users
Network Management (4)
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Security Analytics
Utilizes behavioral analysis to improve security procedures and documentation.
API/Integrations
Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.
Security (4)
Security Automation
Allows administrative control over automated security tasks.
Application Security
Protects application access and data. Prompts additional authentication for suspicious users.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Data Protection
Protects informatin stored on premises and in the cloud. Prompts additional authentication for suspicious users.
Identity Management (3)
Adaptive Access Control
Provides a risk-based approcach to determining trust within the network.
Identity Scoring
Calculates risk based on user behavior, permissions, and requests.
User Monitoring
Monitors users attempting unauthorized access to databases, applicaitons, and othe network components.
Functionality (17)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins.
BYOD support
Enables users to bring-your-own-device to access company applications.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Hide passwords
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.
Certificate Discovery
Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods.
Expiration Monitoring
Monitors and notifies administrators of certificate expiration dates.
Automated Certificate Operations
Automates certificate deployment, renewals, and revocations.
Policy And Role-Based Access Controls
Offers granular permissions for assigning certificate owners and other roles.
Workflow
Offers built-in workflows to assign ownership and management of certificates.
Protocol Support
Offers industry-standard protocols such as CMP, ACME, and SCEP.
Reporting And Search
Offers template and custom reports and search functionality.
Audit And Enforcement
Enforces certificate policies and provides audit trails of user and certificate activities to detect issues.
Key Storage
Allows keys to be stored on end devices, on the platform, or hardware security modules.
Monitoring (2)
Audit Logging
Provides audit logs for compliance reasons.
Activity Logging
Monitors, records, and logs both real-time and post-event activity.
Administration (8)
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights.
Automated Provisioning
Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications.
Self-Service Access Requests
Automatically allows access if users meet policy requirements.
Policy Enforcement
Allows administrators to set policies for security and governance.
Dependency Mapping
Facilitates the discovery, allocation, and mapping of application dependencies across servers, networks, and cloud environments.
Network Mapping
Allows visual display of networks segmented components and their connected resources.
Reporting (1)
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Enforcement (5)
Identity-Based Policy Management
Accelerates policy change workflows using identity attributes to manage microsegmentation policies.
Workflow Automation
Completely automates end-to-end policy enforcement workflows across hybrid- and multi-cloud environments.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Intelligent Segmentation
Automates segmentation and provides AI-based improvement suggestions.
Workload Protection
Protects computing resources across a network. Prompts additional authentication for suspicious users.
Visibility (3)
Breach Detection
Provides incident alerts for leaks or breaches and provides capabilities to inform administrators of attacks.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Application Discovery
Detect new assets and applications as they enter a cloud environments and networks to add to asset inventory.
Generative AI (2)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.





