17 years helping South African businesses
choose better software

What Is Push Security?

Push gives your blue team the broadest, most contextual source of telemetry for monitoring all your workforce identities, whether they're in your IdP or not.

Using this telemetry, you can detect and respond to identity attacks that can't be observed using other telemetry sources.

Not got an in-house blue team? You can still use Push to defend your identities. Enable Push’s out-of-the-box security controls so you can automatically block malicious activities in the browser as well as stop end-users introducing new identity vulnerabilities.

Push gives you proactive identity security posture management (ISPM) capabilities AND reactive identity threat detection and response (ITDR) capabilities in a single tool.

Who Uses Push Security?

SecOps teams

Where can Push Security be deployed?

Cloud-based
On-premise

About the vendor

  • Push Security

Push Security support

Countries available

Afghanistan, Albania, Algeria, American Samoa, Andorra and 223 others

Languages

English

Push Security pricing

Starting Price:

US$5.00/month
  • No free trial
  • Yes, has free version

Push Security has a free version and does not offer a free trial. Push Security paid version starts at US$5.00/month.

Pricing plans get a free trial

About the vendor

  • Push Security

Push Security support

Countries available

Afghanistan, Albania, Algeria, American Samoa, Andorra and 223 others

Languages

English

Push Security videos and images

Push Security Software - Detect and block attacker tools like Evilginx (AitM attacks) and EvilNoVNC (BitM phishing).
Push Security Software - Stop corporate password reuse and phishing. Instead of relying on known-bad signatures, Push dynamically inspects user behavior and attributes of the web page.
Push Security Software - Detect session token theft. Push modifies session log events so you can reliably detect attackers using endpoint malware to steal Okta and Microsoft sessions.
Push Security Software - Enforce security policies in the browser. Enable Push’s out-of-the-box controls or create custom controls that enforce your security policies.
Push Security Software - Pull rich identity telemetry into your SIEM / XDR platform. Enhance your threat monitoring coverage with telemetry of employee actions in the browser, identity (mis)configurations and web application states.
View 5 more
Push Security Software - Detect and block attacker tools like Evilginx (AitM attacks) and EvilNoVNC (BitM phishing).
Push Security Software - Stop corporate password reuse and phishing. Instead of relying on known-bad signatures, Push dynamically inspects user behavior and attributes of the web page.
Push Security Software - Detect session token theft. Push modifies session log events so you can reliably detect attackers using endpoint malware to steal Okta and Microsoft sessions.
Push Security Software - Enforce security policies in the browser. Enable Push’s out-of-the-box controls or create custom controls that enforce your security policies.
Push Security Software - Pull rich identity telemetry into your SIEM / XDR platform. Enhance your threat monitoring coverage with telemetry of employee actions in the browser, identity (mis)configurations and web application states.

Features of Push Security

  • Access Controls/Permissions
  • Activity Monitoring
  • Alerts/Notifications
  • Behavioral Analytics
  • Compliance Management
  • Data Security
  • Incident Management
  • Real-Time Monitoring
  • Reporting/Analytics
  • SaaS Operations Management
  • Threat Intelligence
  • Usage Tracking/Analytics
  • Vendor Management
  • Vulnerability Protection
  • Vulnerability Scanning

Push Security Alternatives

Haltdos secure your production environment against critical cyber-attacks—whether your data and apps are on-premises or in the cloud.
Cloudaware is a SPOT CMDB for large scale AWS, Azure & Google cloud consumers with add-on modules for cost & security management. Learn more about CloudAware
Top-rated Zero Trust SASE/SSE for network security and regulatory compliance. Protect your business, anytime, anywhere.
Boost productivity and protect your data with easy user management in both Google Workspace and Microsoft 365.
Eliminate endpoint-related cybersecurity risks in remote and BYOD deployments with ThinScale's Secure Remote Worker.
Sonrai Security delivers enterprise identity and data security for AWS, Azure, Google Cloud, and Oracle.
Connect, optimize & scale your cyber risk management program with Risk Cloud’s® Cyber Risk & Controls Compliance Solution.
Innovative Cybersecurity Platform. Protects your software vulnerabilities!
Trend Micro Cloud One: automated, flexible, all-in-one security on AWS. Try it yourself with a free, 30-day trial.

Reviews of Push Security

Average score

Overall
5.0
Ease of Use
5.0
Customer Service
5.0
Features
4.8
Value for Money
5.0

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001

Find reviews by score

5
100%
Nick
Head of Security & Compliance in UK
Information Technology & Services, 201–500 Employees
Used the Software for: 6-12 months
Reviewer Source

Solves Shadow IT and insecure SaaS usage by employees

5.0 2 years ago

Comments: Until Push, Shadow IT has been an incredibly difficult and time-consuming challenge. Push achieves this through a simple browser extension which protects employees' privacy, deploys easily and offers support to the end user through in-browser prompts.Real-time Slack notifications are sent to the employee and security team when Push detects insecure usage of a SaaS app, i.e., 2FA not applied or bad or compromised passwords being used. This helps us understand where our password manager hasn't been adopted or if the employee is having difficulty using it.The security team now receive real-time Slack notifications when new SaaS services are accessed by employees, allowing us to understand the impact and act immediately where necessary.

Pros:

Solves Shadow IT, maps the SaaS apps that can't be locked to SSO and addresses password hygiene issues (by recognising where a password manager isn't used properly) through a privacy-centric browser extension. Support team is responsive and are rapidly building in new features requested by customers.

Cons:

Push is a new product, though their support team is very responsive and addresses issues quickly.

Jason
CISO in US
Computer Software, 201–500 Employees
Used the Software for: 1-5 months
Reviewer Source

Easy to Deploy/Maintain, Great ROI

5.0 2 years ago

Comments: We PoC'ed several 3rd party application security tools and ended up going with Push Security. Push was extremely easy to deploy and began providing value quickly. We were able to immediately get visibility into the SaaS and 3rd party applications in our environment as well as the strength of passwords being used. The UI/UX was really solid and the team behind the tool has a very user-centric view that resonated with us.The competitors we looked at were mostly focused on 3rd party apps, so the SaaS and password visibility was a huge differentiator for us. This allowed us to remove two dedicated security tools and save money in the end. We also found the data to be more accurate and timely in Push. For example, one competitor products reported 3rd party applications that did not exist and others failed to update the inventory quickly when applications were added or removed.

Pros:

Easy to deploy and maintain, great UI/UX, and strong integration with Slack. Additionally, Push has a very responsive and engaged team behind it.

Cons:

No cons so far - it's been very smooth sailing.

Nancy
Director Information Security in US
Computer Software, 11–50 Employees
Used the Software for: 6-12 months
Reviewer Source

Great SaaS Discovery Product

5.0 2 years ago

Pros:

Push security helped us discover what SaaS was in our environment and how users were using it. The product gave additional security insights beyond just what apps were in play. It was instrumental in addressing compliance non-conformities.

Cons:

I wish there was an export button for the apps in use, for us to do further analysis. I believe its in the works.

Francesco
VP in Indonesia
Information Technology & Services, 51–200 Employees
Used the Software for: 6-12 months
Reviewer Source

our journey with Push Security

5.0 2 years ago

Comments: he made us save so much in terms of budget, I was able to terminate other SaaS application and run all those tasks using only Push Security, The best part is the fact that the people behind the application know the issue on day to day activities we face in info/cyber sec, the felt the same and what are doing is targeting those issues

Pros:

The list of integration and how easy to use is the tool, I needed something quick to deploy, fast to learn how to use and reliable.

Cons:

So far nothing, the support is amazing, able to contact directly one of the [SENSITIVE CONTENT]