Related Products
|
||||||
About
Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. Helps eliminate on-premises vulnerabilities to prevent attacks before they happen. Helps Security Operations teams use their time effectively by understanding the greatest threats. Helps Security Operations by prioritizing information so they focus on real threats, not false signals. Get cloud-powered insights and intelligence in each stage of the attack lifecycle with Microsoft Defender for Identity. Help Security Operations identify configuration vulnerabilities and get recommendations for resolving them with Microsoft Defender for Identity. Identity security posture management assessments are integrated directly with Secure Score for visibility. Prioritize the riskiest users in your organization using a user investigation priority score based on observed risky behavior and number of prior incidents.
|
About
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
|
About
In today’s cloud-first, mobile-first world, dependency on Active Directory is rapidly growing—and so is the attack surface. Expose blind spots. Paralyze attackers. Minimize downtime. Identity-driven cyber resilience for the hybrid enterprise. With the ever-expanding ecosystem of mobile workers, cloud services, and devices, identity is the only remaining control plane for keeping the bad guys out. And identity-centric security relies on the integrity of Active Directory to be effective. Semperis protects the heart of your identity infrastructure so you can go forth boldly into the digital future. For 90% of enterprises, Active Directory is the primary source of trust for identity and access. But it’s also the cyber kill chain’s weakest link – exploited in virtually every modern attack. And since Active Directory extends to the cloud, any tampering of it will cause a ripple effect across the entire identity infrastructure.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
An Identity Security landscape solution for businesses
|
Audience
Companies, enterprises and businesses searching for a solution to manage their cybersecurity, protect your users, and keep their operations secure
|
Audience
Enterprises looking for an Active Directory cybersecurity solution
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5 per user per month
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationMicrosoft
Founded: 1975
United States
www.microsoft.com/en-us/microsoft-365/security/identity-defender
|
Company InformationPing Identity
Founded: 2001
United States
www.pingidentity.com
|
Company InformationSemperis
Founded: 2013
United States
www.semperis.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|
||||
|
|
|
|||||
Categories |
Categories |
Categories |
||||
Authentication Features
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Identity Management Features
Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning
Single Sign On Features
Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management
|
||||||
Integrations
API Fortress
AgilePoint NX
Akitra Andromeda
Beyond Identity
Daylight
Entrust Certificate Hub
Fidelis Halo
Forcepoint Behavioral Analytics
Knak
Kroll Cyber Risk
|
Integrations
API Fortress
AgilePoint NX
Akitra Andromeda
Beyond Identity
Daylight
Entrust Certificate Hub
Fidelis Halo
Forcepoint Behavioral Analytics
Knak
Kroll Cyber Risk
|
Integrations
API Fortress
AgilePoint NX
Akitra Andromeda
Beyond Identity
Daylight
Entrust Certificate Hub
Fidelis Halo
Forcepoint Behavioral Analytics
Knak
Kroll Cyber Risk
|
||||
|
|
|
|