This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
OpenAthens Reviews (0)
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
There are not enough reviews of OpenAthens for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Cynomi vCISO Platform
4.9
(22)
Cynomi’s vCISO platform empowers MSSPs, MSPs and consultancies to offer structured cybersecurity services to SMEs at scale and provide them with proactive cyber resilience.
Combining proprietary AI algorithms with CISO-level knowledge, Cynomi’s platform streamlines the vCISO's work while automating manual time-consuming tasks.
Cynomi helps partners overcome the cybersecurity skill gap and scale their business, allowing them to offer new services and increase revenues while reducing operational costs.
2
Rapid7 Security Services
3.5
(12)
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations.
3
2nd Watch
4.5
(8)
2nd Watch is an APN Premier Consulting Partner providing managed cloud to enterprises. The company's subject matter experts, software-enabled services and cutting-edge solutions provide companies with tested, proven, and trusted solutions, allowing them to fully leverage the power of the public cloud.
4
NCC Group
4.3
(4)
Through an unrivalled suite of services, we provide organizations with peace of mind that that their most important assets are protected, available and operating as they should be at all times.
5
Thales
4.3
(3)
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored.
6
Little Snitch
5.0
(2)
As soon as you’re connected to the Internet, applications can potentially send whatever they want to wherever they want. Most often they do this to your benefit. But sometimes, like in case of tracking software, trojans or other malware, they don’t. But you don’t notice anything, because all of this happens invisibly under the hood. Little Snitch makes these Internet connections visible and puts you back in control!
7
Mayer Security Services
4.8
(2)
Mayer Security Services is a veteran-owned security firm specializing in high-risk, high-liability environments across Texas. We provide licensed armed officers, emergency room security, industrial site protection, workplace-violence prevention, executive protection, and private investigations. Our teams are trained to operate in hospitals, clinics, construction sites, production plants, and corporate campuses where stability, professionalism, and rapid response are critical. As an IAHSS and ASIS member company, we combine disciplined military standards with modern security technology to deliver dependable protection for people, property, and operations.
8
Azure Dedicated HSM
3.5
(2)
Azure Dedicated HSM (Hardware Security Module is a cloud-based service that provides organizations with exclusive access to FIPS 140-2 Level 3-validated HSM devices, ensuring secure and compliant cryptographic key management. By deploying Thales Luna 7 HSM model A790 appliances directly into a customer's virtual network, Azure Dedicated HSM offers full administrative and cryptographic control, enabling seamless migration of on-premises HSM-protected applications to the Azure cloud environment.
Key Features and Functionality:
- Exclusive Control: Customers maintain sole administrative and cryptographic control over their HSMs, with Microsoft having no access to the keys stored within.
- High Security Standards: The service utilizes FIPS 140-2 Level 3 and eIDAS Common Criteria EAL4+ validated devices, meeting stringent security and compliance requirements.
- Seamless Migration: Compatible with numerous applications, Azure Dedicated HSM facilitates the migration of legacy or custom on-premises applications to Azure with minimal changes, enhancing performance and reducing latency.
- High Performance: The Thales Luna 7 HSM model A790 delivers up to 10,000 RSA-2048 operations per second, supporting up to ten partitions for diverse application instances.
Primary Value and Problem Solved:
Azure Dedicated HSM addresses the critical need for secure, compliant, and high-performance cryptographic key management in the cloud. It provides organizations with dedicated, single-tenant HSM devices that meet rigorous security standards, ensuring data protection and regulatory compliance. By offering full control over cryptographic operations and facilitating the migration of existing HSM-dependent applications to Azure, the service enables businesses to leverage cloud scalability without compromising on security or performance.
9
AllClear ID
5.0
(1)
To make smart decisions, move quickly, and minimize damage, your organization will need more than a response plan. We provide expert analysis, planning, and incident simulations, as well as reserved resources to prepare your organization for a successful response.
10
SharePass
5.0
(1)
SharePass is a dedicated solution for confidential data sharing. Our mission is to make your online presence more secure and confidential.
Come and try using our solution, it's free and can only improve your online security and privacy.
Pricing Options
Pricing provided by OpenAthens.
OpenAthens Connect: For Libraries
Contact Us
Per Year
OpenAthens Compass: For libraries
Contact Us
Per Year
OpenAthens Keystone: For Publishers
Contact Us
Per Year



