ThetaSecure Overview
ThetaSecure is an enterprise-grade Identity & Access Management (IAM) platform designed for organizations that need centralized control over user identities, access policies, and security posture. It provides IT administrators and SOC teams with the tools to manage authentication, enforce security policies, and monitor threats from a unified web console.
What is ThetaSecure?
ThetaSecure enables your organization to:
- Manage identities — Create and manage users, groups, roles, and permissions from a single console
- Control access — Define network policies, manage application access, and enforce device-based restrictions
- Secure authentication — Deploy multi-factor authentication (MFA) with TOTP, SMS, Email, and Push methods
- Monitor security — Track identity health scores, detect anomalies, and analyze privilege creep in real-time
- Sync directories — Integrate with Active Directory, LDAP, and cloud identity providers
- Audit everything — Maintain comprehensive logs for compliance and forensic analysis
Platform Architecture
ThetaSecure is accessed through a web-based admin console at your organization's dedicated URL (e.g., nx.thetasecure.com). The platform is organized into the following core modules:
| Module | Purpose |
|---|---|
| Dashboard | Real-time operations, statistics, security posture, and identity scoring |
| Identity Management | Users, groups, roles, and permission management |
| Device Management | Registered devices and device-based access policies |
| Access Management | Network policies, application access, and RADIUS client management |
| Authentication | Sign-in policies and MFA policy configuration |
| Configuration | System-wide settings and directory sync profiles |
| Audit | Event logs, admin activity tracking, and compliance reports |
| Health | System health monitoring and service status |
Who Should Use This Guide?
This documentation is written for IT Administrators and SOC (Security Operations Center) Teams who are responsible for:
- Deploying and configuring ThetaSecure in their environment
- Managing user lifecycles and access policies
- Monitoring security posture and responding to anomalies
- Ensuring compliance with organizational and regulatory requirements
Quick Navigation
- New to ThetaSecure? Start with System Requirements and Logging In
- Setting up for the first time? Follow the First Steps guide
- Need to monitor your environment? Explore the Dashboard Guide
- Configuring policies? See Identity Management