Best IT Management Software for Active Directory - Page 5

Compare the Top IT Management Software that integrates with Active Directory as of October 2024 - Page 5

This a list of IT Management software that integrates with Active Directory. Use the filters on the left to add additional filters for products that have integrations with Active Directory. View the products that work with Active Directory in the table below.

  • 1
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
    Starting Price: Free
  • 2
    NirvaShare

    NirvaShare

    Nirvato Software

    At times, when external identities such as customers, partners, etc who are not part of your organization's identity store do bring up a challenge in sharing and collaborating files securely. This is where NirvaShare can take care of dealing with access, security and compliance while sharing cloud storage files with external users. Besides cloud platform deployments, NirvaShare can also be deployable to your on-premise environment pointing to your existing S3 compatible or other supported file storage systems making it easy to share files with internal and external users. While sharing file or folders, set access rights to your users such as who can download, upload, delete, etc. Easily associate groups and users from your ActiveDirectory or from any other identity providers. NirvaShare is designed to handle large files with size ranging in several tens of gigabytes for upload and download with unbelievably minimal resource consumption.
    Starting Price: $4 per user per month
  • 3
    CyberQP

    CyberQP

    CyberQP

    We provide privileged access management for MSPs, including protecting customer admin accounts and securing the identities of their customers. At CyberQP we believe that MSPs are the only solution to the cyber problem for small and medium businesses. That’s why we take our partnership with the MSP community so seriously. Create accounts and passwords on-demand when technicians need them with leading-edge security and zero-standing privilege. Automate tasks and manage privileged, admin, and service accounts across environments. Protect organizations from internal and external threats by verifying the identities of people who call your help desk in less than 30 seconds. Empower your MSP’s technicians to manage and control who has privileged access for specified periods of time. For MSPs, it can be difficult to discover admin and privileged accounts across their customer base. With our automation, we make it effortless.
    Starting Price: $300 per month
  • 4
    Securden Unified PAM MSP
    To enforce complete access governance, MSPs purchase multiple solutions at a premium. We have combined all the required modules into one unified solution that solves the most crucial challenges faced by managed IT service providers. In addition to deploying robust access controls, MSPs can generate recurring revenue streams by providing privileged access management as a service. Grant JIT-based remote access to third parties and employees. Track and record all activities for complete control. Reduce the attack surface by eliminating external and internal threats. Automate privileged access provisioning to reduce helpdesk load and eliminate unnecessary downtime. Deploy robust privileged access workflows and realize an increase in efficiency instantly.
  • 5
    ITmanager.net

    ITmanager.net

    ITmanager.net

    ITmanager.net is the best all-in-one enterprise server and network administration service. Monitor and manage all your critical IT servers from anywhere. Supported on all desktops, devices and Apple Watch. The ITmanager.net service allows you to manage your Windows Exchange servers from any mobile or desktop device. Among many other features, you can create, disable and remove mailboxes and distribution groups, and add or remove email addresses from mailboxes and distribution groups. You can also view mailbox sizes and change user mailbox, as well as send, receive and warning quotas. You are also able to enable or disable both out-of-office auto-reply and message forwarding and you can view message queues, and remove messages with NDR’s.
    Starting Price: $5 per month
  • 6
    GetInSync

    GetInSync

    GetInSync

    If MSPs aren’t regularly having conversations with their customers about the opportunities for their business and helping their customers grow their revenues, solve business problems, or reduce costs – then they’re faceless suppliers and at risk of being commoditized and replaced with the lowest bidder. That's why we created the GetInSync platform to help MSPs differentiate themselves from the competition by helping their customers solve business problems not fix IT issues. Using our GetInSync framework and SaaS platform, we guide the MSP through 3 simple steps that take them from the server room to the boardroom. First, you learn the GetInSync method, second, we jointly onboard your client, and third, we dial in your fractional chief executive officer processes and skills.
    Starting Price: $795 per month
  • 7
    Indent

    Indent

    Indent

    Good security is necessary, but it doesn't need to be slow or painful, faster access unlocks more revenue. Give on-demand access that’s faster and easier, without frustrating your team. Users request access to apps, managers approve or deny them from Slack, and it's all auditable. End the process of manually cat herding approvals. Every time access is granted, it's a potential security risk. Indent helps teams scale security and least privilege by shifting users to temporary access without slowing down. Automate spreadsheet-based workflows needed for SOC 2, SOX, ISO, and HITRUST with controls and policies baked directly into access request workflows. Only provide access when it's needed instead of issuing permanent access, reducing your license footprint. Indent delivers cost savings without adding friction for end users. When you’re leading a fast-growing company toward success, your team needs to take big risks to deliver big returns.
    Starting Price: $8 per month
  • 8
    Uptrace

    Uptrace

    Uptrace

    Uptrace is an OpenTelemetry-based observability platform that helps you monitor, understand, and optimize complex distributed systems. Monitor your entire application stack on one compact and informative dashboard. You get a quick overview for all your services, hosts, and systems. Distributed tracing allows you to see how a request progresses through different services and components, the timing of each operation, any logs and errors as they occur. Metrics allow you to quickly and efficiently measure, visualize, and monitor various operations using percentiles, heatmaps, and histograms. Recover from incidents faster by receiving a notification when your app is down or a performance anomaly is detected. You can monitor everything using the same query language: spans, logs, errors, and metrics.
    Starting Price: $100 per month
  • 9
    ScalePad ControlMap
    There are thousands of steps between you and your cybersecurity compliance goals. With the right cybersecurity compliance management software, you’ll hit the ground running. Start with customizable, expert-verified templates, and cross-mapping finds the overlap between common standards to get you cruising through compliance tasks. Managing evidence and policies keeps everything at hand. Keep tabs on risks and vendors too, no more spreadsheets and scattered documents, everyone on the team needs to contribute to compliance. In this personalized portal, they can access policies and handle any tasks they need to do.
    Starting Price: $200 per month
  • 10
    PropelAuth

    PropelAuth

    PropelAuth

    Easy integration and straightforward APIs for developers. Built-in user management for customer-facing teams. Data and insights for PMs and executives. PropelAuth was founded on the idea that a great auth product gets out of your way. We provide you with the right tools out of the box, so you can quickly make your users' experiences as secure and smooth as possible. As soon as you start onboarding users, your team will have a laundry list of things they need to do or see. Organizations are a first-class concept in PropelAuth. You can use our UIs to get started quickly or build your own with our APIs. Start with our default roles, or create your own. We even handle updating existing users when you make changes. The easiest way to integrate with identity providers, like Okta and Azure AD. We provide guides for your users to set up and test their configuration. Set custom session durations per organization, enforce MFA, and more. We handle the complexity so you don't have to.
    Starting Price: $150 per month
  • 11
    Cherwell Software

    Cherwell Software

    Cherwell Software

    Cherwell Service Management is the modern choice for IT Service Management (ITSM). Affordable and easy to implement, the Cherwell platform provides IT teams the ability to implement, automate and modernize service and support processes to cater to the needs of a business--but minus the cost and complexity of legacy ITSM soltutions. Users can choose from subscription or perpetual pricing, on-premises or SaaS, Cherwell-hosted or public cloud infrastructure.
  • 12
    Enow

    Enow

    ENow

    Award winning monitoring and reporting software. The simplicity you want, the monitoring and analytics you need. Enow provides real-time monitoring and reporting solutions for your on-premise environment. By measuring server application-specific elements, you have full control and visibility in granular detail. For businesses that operate within a hybrid or fully cloud-enabled environment, Enow offers simple one-look dashboards for monitoring and in-depth reports for analysis. Through synthetic transactions, Enow provides a simplified and efficient way to ensure your end-user experience is consistent and seamless for Exchange on premises (Autodiscover, EWS, MAPI), ADFS, Office 365, and Exchange Online. Our software automatically tests the core functions that matter to your users. Identify issues before they cause outages. Over 700 reports to help you understand usage patterns and better plan for future needs.
  • 13
    Poppulo

    Poppulo

    Poppulo

    Poppulo is the leading communications and workplace experience software company. The Poppulo Harmony platform helps enterprise organizations achieve more by effortlessly connecting their employees, customers, and workplaces through omnichannel employee communications, digital signage, and workplace management. Poppulo’s 6,000+ customer base is representative of the world’s most successful companies, including 47 of the Fortune 100.
  • 14
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.
  • 15
    Specops Deploy

    Specops Deploy

    Specops Software

    Specops Deploy simplifies the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Extending the functionality of Group Policy, the solution lets you target any number of computer objects within Active Directory. Use Specops Deploy to save user state during installation, manage local user settings, or capture operating system images. Specops Deploy removes time-consuming manual tasks and improves IT efficiency through a simplified software deployment process. Whether you are installing applications on multiple devices, or upgrading your computers to a new operating system, it is the key to ensuring your time is well spent. Specops Deploy uses existing technologies such as Active Directory, Group Policy, Windows Deployment Services (WDS), Windows Assessment and Deployment Kit (Windows ADK), and Microsoft Deployment Toolkit (MDT).
  • 16
    Sassafras AllSight

    Sassafras AllSight

    Sassafras Software

    KeySight is our “set-it-and-forget-it” License Management suite. Whether required by a software vendor for concurrent use license management (Sequencher, Ableton), or configured to help you apply usage restrictions on top of another license manager (preventing overage for Bentley), KeySight gives you full control over when and where managed software is allowed to run. For computer labs in an education environment, LabSight provides dynamic insight into hardware and software inventory and usage. Highly automated, with Active Directory integration and product normalization, you can get comprehensive statistics about your entire IT estate with very little set-up time required. Our cloud-based product recognition service takes a vast array of raw program data and compiles it into a detailed product inventory. Our full-featured IT Asset Management and license management suite is now known as Sassafras AllSight.
  • 17
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 18
    SecureLink

    SecureLink

    SecureLink

    SecureLink is the leader in managing vendor privileged access and remote support for both highly regulated enterprise organizations and technology vendors. SecureLink serves more than 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming, and retail rely on SecureLink’s secure, purpose-built platform. SecureLink is headquartered in Austin, Texas. Experience SecureLink's access management platforms for yourself. Fill out this form, and a SecureLink team member will reach out to you to set up a personalized demo so you can see our critical access management solutions in action. The implementation process which includes a dedicated project manager, server configuration, workflow consulting, and administrator training. A customized demo of the Enterprise Access, Customer Connect, Access Intelligence, or Privacy Monitor platform.
  • 19
    BackupAssist

    BackupAssist

    BackupAssist

    BackupAssist keeps you in business when disaster strikes. Survive cyber attacks, ransomware, natural disasters, hardware failures and user accidents with the right backup and a clear path to recovery. We specialize in only business-grade backup and data protection software for Microsoft Windows Server environments and Office 365. Provider of Cyber Resilience and Cyber Security solutions since 2002, to people and organizations in over 165 countries to properly backup and protect Windows Servers and Data. BackupAssist is the leading-edge provider of affordable Windows Server Backup and DR software. Used in over 165 countries, our award-winning software helps businesses avert financial ruin when disaster strikes. Our software allows for the back up of anything from just a few files to whole servers—virtual or physical. It supports all modern backup destinations from local to external disks, network locations, to public and private cloud.
  • 20
    IT Portal

    IT Portal

    IT Portal

    The most flexible platform for KBs, Docs, Passwords, and Configurations running on our cloud or yours... Period! Your clients get online and offline access to their documentation. Also trusted by IT Departments around the world, not just MSPs. The IT Portal is used by over 2500 paying users. This count does not include our instances that are allowed unlimited users. Our cloud offering services regions including the US, CA, UK, EU, and AU. You can also run the portal in your private cloud. As IT Teams grow, they outgrow the cluttered file shares and excel password lists. They need a secure structured platform that allows for the easy access and sharing of information regarding their IT Infrastructure. The IT Portal reduces downtime, creates accountability for documentation, and provides peace of mind for managers and IT professional.
    Starting Price: $25 per user per month
  • 21
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 22
    Compass

    Compass

    Cobalt Iron

    Forget the days of managing data protection events through multiple, disconnected backup products. With Compass, you can set policies, view operations, and track granular performance for all your workloads. Compass is secure by design and the only data backup solution endorsed by Sheltered Harbor for both on-prem and cloud. It's architected to eliminate vulnerabilities in the backup process that expose data to cyberattack. If disaster strikes, your backup is ready to help you recover immediately. Born in the cloud, the Compass Architecture is designed to take full advantage of progressive technologies such as analytics, SaaS, multi-cloud, and virtualization. The Commander is an easy-to-use web dashboard providing a simple and intuitive user experience, while the Analytics Engine delivers the flexibility and insight required for today’s enterprise data protection.
  • 23
    Hypergate Authenticator
    Hypergate Authenticator delivers a seamless and secure Single Sign On solution integrating directly with Active Directory. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution integrating directly with your Active Directory. The solution leverages the industry standard Kerberos to provide the best possible user experience without compromising on security. Enable SSO specifically with Android Enterprise which is otherwise not available. Hypergate is fast, not only when interacting with the User, also when implementing it. Enable your Users with Kerberos authentication by simply pushing Hypergate on their device. If there is an issue with the password of the user, this can be varied and changed by them directly on their device, without contacting IT staff for help (SSPR). No dependence on having to use a computer to reset the password. With Hypergate, you can allow staff to become truly mobile.
  • 24
    CentreStack

    CentreStack

    CentreStack

    CentreStack boosts workforce mobility with cloud file sharing and mobile access, while retaining security permissions and familiar user experiences from file servers. With Active Directory and permissions inherited, no other solution better unites existing IT infrastructure's on premise security with cloud mobility. CentreStack enhances file servers to enable productivity and collaboration for mobile workers who use multiple devices, such as smartphones and media tablets, in addition to PCs. CentreStack can either enhance an existing file server to enable mobile access or it can migrate existing file server data and security permissions to a user defined cloud. In either case, the product is focused on maintaining a familiar file server experience with enhanced usability, security, compliance and data control. Enterprises can opt to maintain existing security and compliance, by keeping their data in on-premise file servers without cloud replication.
  • 25
    StealthRECOVER
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. As part of Stealthbits’ Active Directory solution portfolio, StealthRECOVER enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
  • 26
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity (formerly Idaptive). Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time.
  • 27
    Valimail

    Valimail

    Valimail

    Protect your company from phishing and BEC with industry-leading DMARC technology. Valimail is a pioneering, identity-based, anti-phishing company that has been ensuring the global trustworthiness of digital communications since 2015. Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance. Building trust in your email means cutting off phishing at its root. And you also get the benefits of brand protection, compliance, increased email deliverability, and the ability to leverage cutting-edge email standards like BIMI, AMP, and Schema.org. Automatic detection of outbound sending services. Access to the largest database of named sending services. Detailed views into the authentication status (SPF, DKIM, and DMARC) of all sending domains and services. Automated DKIM key detection and configuration.
  • 28
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest banks, telecommunications and healthcare organizations in the world.
  • 29
    Comodo Certificate Manager
    Advanced Certificate Issuance And Lifecycle Management. Discover and manage all your SSL Digital Certificates automatically. Secure, reliable and centralized management platform. Helps you self-administer, instantly provision and control all SSL/PKI. Expired SSL certificates can cause systems to break, services to go down, and trust in your business to wane. Keeping track of digital certificates and their renewal dates is a big job and it's going to get harder. Need for a mechanism to administer certificates effectively. Flexible and reliable system for digital certificate issuance and lifecycle management. Centralizes and automates management of cryptographic keys and digital certificates. Ensures that certificates do not expire unexpectedly. Secure, tiered cloud-based administration. Microsoft Active Directory integration. Certificate Discovery Tool finds all certificates no matter who issued them. Administrative protection using two-factor authentication and IP address validation.
  • 30
    cloudtamer.io

    cloudtamer.io

    cloudtamer.io

    Control your cloud with the top software for automated cloud governance. Apply cloud rules (like, "deny creation of public objects") just once, and they'll apply automatically on new accounts. Plus, see all your policies right on your org chart. Comprehensive Cloud Boundaries. Self-Service Account Provision. Detailed Org Chart View. Get alerts or cut off spending when you hit your limit. Trim 30% off your total cloud bill. And create spend plans that match your real-life plan, across ALL your cloud providers. Use our compliance checks to auto-align with established standards like NIST and CIS or build your own from scratch. Then, fix issues automatically or on-demand in the dashboard. Start provisioning auto-governed accounts, running compliance checks, and getting financial control in the cloud today. If you aren't impressed, we'll eat our hat. We automate the provisioning of cloud accounts and dramatically reduce your set-up time.