Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

miniOrange

Show rating breakdown
24 reviews
  • 5 profiles
  • 15 categories
Average star rating
4.5
Serving customers since
2012

Featured Products

Product Avatar Image
miniOrange Identity & Access Management

19 reviews

miniOrange SSO provides Single Sign-on to any type of devices or applications whether they are in the cloud or on-premise.

Product Avatar Image
mO Jira OAuth SSO, Jira OpenID Connect SSO, Jira OIDC SSO

3 reviews

Jira OAuth/OpenID SSO plugin supports Login for Jira Service Management and Data Center. All OAuth/OpenID Providers are supported including Google Apps, GitHub, GitLab, Facebook, Linkedin, ADFS, Okta, Salesforce, Azure AD, AWS Cognito, Slack, Discord, Gluu Server, Meetup, Keycloak & Custom OAuth/OIDC provider. Features Supports login and on-the-fly user creation, just-in-time user provisioning Supports Multiple providers Map user profile and group information from provider Restrict user SSO with domains

Product Avatar Image
Privileged Access Management

1 review

miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, detection, and prevention, ensuring critical systems' integrity. Operating with human expertise, streamlined processes, and advanced technology, miniOrange's PAM provides transparency, revealing insights into privileged account users and their activities. This heightened visibility allows enhanced security control. To bolster defenses, miniOrange's PAM advocates judicious restriction of administrative privileges, limiting access to a select number of users. Additionally, implementing supplementary protection effectively mitigates the risk of data breaches from malicious actors. This product comprises of following features: Privileged Session Management involves monitoring, controlling, and recording all sessions initiated by privileged accounts. It captures session data and valuable insights into user interactions with sensitive information, aiding data breach investigations and ensuring compliance. The software includes alert features for prompt detection and response to cybersecurity incidents. Endpoint Privilege Management (EPM) grants users the required privilege and access to applications, ensuring foolproof security. Unauthorized applications are effortlessly restricted or blocked, guaranteeing a fortified environment. EPM allows organizations to use trusted applications with the lowest possible privilege levels, determining eligibility and defining precise privilege conditions for execution. Privileged Password Management, also known as Password Vaulting, securely stores and manages credentials in a centralized system, such as an enterprise password vault, ensuring sensitive login information remains encrypted. Privileged Session Monitoring and Recording adds an extra layer of oversight, holding users accountable for their actions when accessing privileged accounts. It enables real-time monitoring and recording of privileged user activity, preventing misuse and establishing non-repudiation. Just-in-Time (JIT) Privileged Access grants elevated and granular access to applications or systems on an as-needed basis, instead of continuous, "always-on" access. JIT access follows a formal request and approval process. Privileged Remote Access provides visibility and control over third-party vendor and internal remote access, ensuring important assets are accessible without compromising security.

Product Avatar Image
Cloud Access Security Broker (CASB)

1 review

A CASB or Cloud Access Security Broker is an advanced cloud solution that lets you configure detailed granular access policies and set security control over popular cloud apps such as Google Workspace, Microsoft 365, Atlassian apps, Dropbox, Salesforce, Slack, HubSpot, and a whole lot more. With a CASB in place, your Security Operations Centre (SOC) now has deep visibility into cloud app access controls, can track risky user behavior, check for compliance issues in real time, detect and mitigate potential threat vectors targeted towards your business, and importantly secure your data storage from unauthorized user access. miniOrange CASB was designed keeping in mind custom security requirements and compliance standards that enterprises need to follow at each step to stay ahead of the competition. It securely fits in with your existing cloud infrastructure and helps boost productivity throughout the enterprise

All Products & Services

Profile Filters
Product Avatar Image
miniOrange Identity & Access Management

19 reviews

miniOrange SSO provides Single Sign-on to any type of devices or applications whether they are in the cloud or on-premise.

Product Avatar Image
mO Jira OAuth SSO, Jira OpenID Connect SSO, Jira OIDC SSO

3 reviews

Jira OAuth/OpenID SSO plugin supports Login for Jira Service Management and Data Center. All OAuth/OpenID Providers are supported including Google Apps, GitHub, GitLab, Facebook, Linkedin, ADFS, Okta, Salesforce, Azure AD, AWS Cognito, Slack, Discord, Gluu Server, Meetup, Keycloak & Custom OAuth/OIDC provider. Features Supports login and on-the-fly user creation, just-in-time user provisioning Supports Multiple providers Map user profile and group information from provider Restrict user SSO with domains

Product Avatar Image
Privileged Access Management

1 review

miniOrange offers a robust Privileged Access Management (PAM) solution that shields organizations from cyber threats. It thwarts unauthorized privileged access attempts through vigilant monitoring, detection, and prevention, ensuring critical systems' integrity. Operating with human expertise, streamlined processes, and advanced technology, miniOrange's PAM provides transparency, revealing insights into privileged account users and their activities. This heightened visibility allows enhanced security control. To bolster defenses, miniOrange's PAM advocates judicious restriction of administrative privileges, limiting access to a select number of users. Additionally, implementing supplementary protection effectively mitigates the risk of data breaches from malicious actors. This product comprises of following features: Privileged Session Management involves monitoring, controlling, and recording all sessions initiated by privileged accounts. It captures session data and valuable insights into user interactions with sensitive information, aiding data breach investigations and ensuring compliance. The software includes alert features for prompt detection and response to cybersecurity incidents. Endpoint Privilege Management (EPM) grants users the required privilege and access to applications, ensuring foolproof security. Unauthorized applications are effortlessly restricted or blocked, guaranteeing a fortified environment. EPM allows organizations to use trusted applications with the lowest possible privilege levels, determining eligibility and defining precise privilege conditions for execution. Privileged Password Management, also known as Password Vaulting, securely stores and manages credentials in a centralized system, such as an enterprise password vault, ensuring sensitive login information remains encrypted. Privileged Session Monitoring and Recording adds an extra layer of oversight, holding users accountable for their actions when accessing privileged accounts. It enables real-time monitoring and recording of privileged user activity, preventing misuse and establishing non-repudiation. Just-in-Time (JIT) Privileged Access grants elevated and granular access to applications or systems on an as-needed basis, instead of continuous, "always-on" access. JIT access follows a formal request and approval process. Privileged Remote Access provides visibility and control over third-party vendor and internal remote access, ensuring important assets are accessible without compromising security.

Product Avatar Image
Cloud Access Security Broker (CASB)

1 review

A CASB or Cloud Access Security Broker is an advanced cloud solution that lets you configure detailed granular access policies and set security control over popular cloud apps such as Google Workspace, Microsoft 365, Atlassian apps, Dropbox, Salesforce, Slack, HubSpot, and a whole lot more. With a CASB in place, your Security Operations Centre (SOC) now has deep visibility into cloud app access controls, can track risky user behavior, check for compliance issues in real time, detect and mitigate potential threat vectors targeted towards your business, and importantly secure your data storage from unauthorized user access. miniOrange CASB was designed keeping in mind custom security requirements and compliance standards that enterprises need to follow at each step to stay ahead of the competition. It securely fits in with your existing cloud infrastructure and helps boost productivity throughout the enterprise

Product Avatar Image
mO Secure Share Issue for JIRA (External Share)

0 reviews

Jira Cloud Secure Share lets you share your Jira issues with any user (even outside the Jira license tier). It allows you to create & share access links for your Jira cloud issues. Your end-users will be able to access the shared Jira issues with the links. Jira only supports sharing the issue with users having a Jira account. You can share your whole Jira project using a single link. This app solves, the biggest challenge for organizations using Jira Cloud, where their users want to share their Jira issues with the users who are not having a Jira account.

Profile Name

Star Rating

15
8
1
0
0

miniOrange Reviews

Review Filters
Profile Name
Star Rating
15
8
1
0
0
Shubham J.
SJ
Shubham J.
05/27/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Excellent platform for granting employees access to internal software and platform privileges.

Most helpful part of the software is if any code or software issues arise and only one available employee lacks access to fix them, temporarily grant them access so they can begin resolving the issues, ensuring proper functionality of the software.
Tharindu S.
TS
Tharindu S.
Associate Network & Security Engineer at ConnexIT
03/20/2025
Validated Reviewer
Verified Current User
Review source: Organic

The Best Identity and Access management solution in the world.

The miniOrange provide the different IAM solution like SSO , MFA, User-Life cycle management and Risk based authentication. Those feature are very helpful and useful for protect the data against unauthorized access. another thing compare to other IAM solution miniOrange support to 3 different deployment methods (On-premise , Cloud and hybrid deployment). It very effective and easy to use for finance related company. miniOrange on-premise solution are implementation step very simple. And also MFA (multi factor authentication) support 15 + authentication methods. therefore customer can choose to any authentication method for asset access. miniOrange any time 24*7 customer support. Any on-premise , cloud and home grown application can easy for integration with miniOrange, then SSO feature through user can easy to access and use the application.
SY
Sachin Y.
04/05/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

CASB: For Advanced Security

Cloud Access Security Broker is liked best because of its advanced functions one of them is Enhanced Security CASBs offers a comprehensive approch in securing cloud environment by providing features such as data encryption, access control, threat detection, and compliance enforcement. This multi-layered security helps organization in protection of data and applications on the cloud.

About

Contact

HQ Location:
Pune, India

Social

@miniOrange_it

What is miniOrange?

miniOrange is a cybersecurity company specializing in identity and access management solutions. It offers a range of services including single sign-on (SSO), multi-factor authentication (MFA), passwordless login, and directory services, catering to businesses looking to enhance their security infrastructure. miniOrange provides solutions that help organizations manage user identities efficiently and securely across different platforms and applications. The company aims to streamline authentication processes while maintaining strong security protocols.

Details

Year Founded
2012