Active DirectoryMicrosoft
|
PingOne ProtectPing Identity
|
|||||
Related Products
|
||||||
About
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
|
About
Prevent account takeover, new account fraud, and MFA fatigue with PingOne Protect. By evaluating multiple attack vectors, assigning risk scores, and providing insights, PingOne Protect triggers mitigation tools to block attacks and allow legitimate users to authenticate easily. PingOne Protect’s intelligence-based policies combine the results of multiple risk predictors to calculate an overall risk score. The score correlates to policies that determine the type and amount of friction to introduce into the user flow, such as CAPTCHA, password resets, selfie verification, and push notifications. Optimize scores for each predictor, aggregate predictors, add signals from third parties, and create overrides. Predictors include bot detection, IP velocity, user velocity, velocity anomaly, user location anomaly, IP reputation, anonymous network, user risk behavior, user-based risk model, new device detection, suspicious device detection, and custom/third-party predictors.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT teams in organizations around the world seekinga solution to manage their networks
|
Audience
Companies in search of a solution to authenticate users and prevent risks
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
$1 per user per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationMicrosoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/active-directory/
|
Company InformationPing Identity
Founded: 2002
United States
www.pingidentity.com/en/platform/capabilities/threat-protection/pingone-protect.html
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
|
||||||
Integrations
Streamline AI
AD Admin Tool
Axiom Protect
Cipherise
Cyberly
Dub
Fexa
GREYCORTEX Mendel
GeoCivix
ITmanager.net
|
Integrations
Streamline AI
AD Admin Tool
Axiom Protect
Cipherise
Cyberly
Dub
Fexa
GREYCORTEX Mendel
GeoCivix
ITmanager.net
|
|||||
|
|
|