PingOne Protect

PingOne Protect

Ping Identity
+
+

Related Products

  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • ManageEngine ADSelfService Plus
    117 Ratings
    Visit Website
  • Cerberus FTP Server
    159 Ratings
    Visit Website
  • Curtain MonGuard Screen Watermark
    7 Ratings
    Visit Website
  • Frontegg
    374 Ratings
    Visit Website
  • Auth0
    977 Ratings
    Visit Website
  • Curtain LogTrace File Activity Monitoring
    4 Ratings
    Visit Website
  • FusionAuth
    169 Ratings
    Visit Website
  • Thinfinity Workspace
    14 Ratings
    Visit Website
  • Haystack
    240 Ratings
    Visit Website

About

Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.

About

Prevent account takeover, new account fraud, and MFA fatigue with PingOne Protect. By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect triggers mitigation tools to block attacks and allow legitimate users to authenticate easily. PingOne Protect’s intelligence-based policies combine the results of multiple risk predictors to calculate an overall risk score. The score correlates to policies that determine the type and amount of friction to introduce into the user flow, such as CAPTCHA, password resets, selfie verification, and push notifications. Optimize scores for each predictor, aggregate predictors, add signals from third parties, and create overrides. Predictors include bot detection, IP velocity, user velocity, velocity anomaly, user location anomaly, IP reputation, anonymous network, user risk behavior, user-based risk model, new device detection, suspicious device detection, and custom/third-party predictors.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams in organizations around the world seekinga solution to manage their networks

Audience

Companies in search of a solution to authenticate users and prevent risks

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$1 per user per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Microsoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/active-directory/

Company Information

Ping Identity
Founded: 2002
United States
www.pingidentity.com/en/platform/capabilities/threat-protection/pingone-protect.html

Alternatives

Alternatives

Tilt 365

Tilt 365

Tilt
Fit Predictor

Fit Predictor

Secret Sauce

Categories

Categories

Authentication Features

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Integrations

Streamline AI
AD Admin Tool
Axiom Protect
Cipherise
Cyberly
Dub
Fexa
GREYCORTEX Mendel
GeoCivix
ITmanager.net
LobbyTech
LogMeOnce
Microsoft 365
Microsoft Dynamics GP
One Identity
Regroup Mass Notification
Sensolus
SmartProfiler for M365
pganalyze

Integrations

Streamline AI
AD Admin Tool
Axiom Protect
Cipherise
Cyberly
Dub
Fexa
GREYCORTEX Mendel
GeoCivix
ITmanager.net
LobbyTech
LogMeOnce
Microsoft 365
Microsoft Dynamics GP
One Identity
Regroup Mass Notification
Sensolus
SmartProfiler for M365
pganalyze
Claim Active Directory and update features and information
Claim Active Directory and update features and information
Claim PingOne Protect and update features and information
Claim PingOne Protect and update features and information