Best IT Security Software for Active Directory - Page 10

Compare the Top IT Security Software that integrates with Active Directory as of November 2025 - Page 10

This a list of IT Security software that integrates with Active Directory. Use the filters on the left to add additional filters for products that have integrations with Active Directory. View the products that work with Active Directory in the table below.

  • 1
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • 2
    CyberTrap

    CyberTrap

    CyberTrap

    Enable the immediate detection of attacks with CyberTrap’s deception technology. Our threat detection solutions deliver immediate detection of attacks, luring, deceiving, and entrapping hackers. Traditional cybersecurity solutions are unable to prevent Advanced Persistent Threats (APTs) and targeted attacks, allowing cyber criminals to exploit vulnerabilities and gain access to organizations’ data, applications, and systems without being detected. In contrast, CyberTrap helps organizations outsmart cyber attackers with advanced threat intelligence and our proprietary deception technology. Identify snoopers before they reach production. As soon as someone interacts with our strategically placed lures, it generates a true positive result, instantly flagging potential threats. This proactive approach ensures that suspicious activities are recognized and addressed in real time. Divert intruders away from authentic assets.
  • 3
    nFront Password Filter
    nFront Password Filter is a robust password policy enforcement tool for Windows Active Directory, designed to prevent the use of weak, easily hacked passwords. It allows administrators to create and enforce up to 10 different granular password policies within a single Windows domain, each applicable to specific security groups or organizational units. Key features include the ability to set minimum and maximum limits on specific character types, dictionary blacklisting, checking against breached passwords (it can check against 847 million breached passwords in 60 milliseconds), etc. The software also supports length-based password aging, incentivizing users to create longer, more secure passwords by allowing extended validity periods for longer passwords. Additionally, nFront Password Filter can check proposed passwords against a database of compromised passwords, enhancing security by preventing the reuse of breached credentials.
  • 4
    Identity Confluence

    Identity Confluence

    Tech Prescient

    Identity Confluence is an intelligent Identity Governance and Administration (IGA) platform designed to help IT and security teams manage access, automate identity lifecycles, and maintain continuous compliance across cloud and hybrid environments. Built for modern enterprises, Identity Confluence unifies identity lifecycle management, access control, and governance into a single, scalable platform. Automate Joiner-Mover-Leaver (JML) processes, enforce policy-based access controls (RBAC, ABAC, PBAC), and conduct real-time user access reviews—all from one intuitive interface. Key Features: Lifecycle Automation: Trigger real-time provisioning and deprovisioning across HR, IT, and business systems. Access Controls: Implement dynamic, fine-grained access policies using roles, attributes, and policies. App & Directory Integrations: Out-of-the-box connectors for AD, Azure AD, Okta, Workday, SAP, and more. Access Reviews: Automate certifications, enforce Segregation of Duties
  • 5
    Oomnitza

    Oomnitza

    Oomnitza

    Oomnitza offers a versatile Enterprise Technology Management solution for asset lifecycle management and IT process automation. Our agentless, SaaS platform transforms multi-source data from your existing IT, security and business systems into a comprehensive, accurate and actionable asset inventory for better technology data hygiene and audit readiness. We enable organizations to confidently automate their technology workflows using standardized applications and low-code workflows to reduce manual tasks, service tickets, security risks and redundant technology spend.
  • 6
    Veracode

    Veracode

    Veracode

    Veracode offers a holistic, scalable way to manage security risk across your entire application portfolio. We are the only solution that can provide visibility into application status across all testing types, including SAST, DAST, SCA, and manual penetration testing, in one centralized view.
  • 7
    AppSmart Identity
    Securely connect everyone to everything. Connecting with people, applications and devices is a key requirement of digital transformation. AppSmart Identity provides identity and access management for every user across all applications to all interconnected systems to securely access and manage your cloud migration services and all other services from a single place. Users don’t want to remember multiple passwords. With single sign-on, uses can access business systems with one account ensuring a seamless user experience for all their cloud migration services and cloud managed services. With multi-factor and strong authentication users can make sure that the identities that access business systems are fully verified. Policy-based MFA prevents unauthorized users from accessing corporate data with passwords alone. One place for all your cloud managed services eg. manage all your users, groups and devices.
  • 8
    XPLG PortX
    Now it takes only minutes to Collect, Parse & Forward Log Data using automated log parser & collection, powered by AI/ML pattern detection. Introducing PortX by XPLG, the leading, optimized log data management and forwarding solutions for log data streams. PortX Reduces 90% of scripting and manual work. Optimizing costs, Reduces RegExp, Grok work, and ongoing maintenance. High performance, Load balanced, Persistent & Secure. PortX Simplifies high-performance data stream management and Reduces resource data consumption. Route/Forward Log Data Streams to any Service. Filter Valuable Events, Archive The Rest. Forwarding log streams to any logging service: ELK, SIEM, and more. Reducing data volumes using smart-managed filters. Customize all Data with Visual Log parser and Log Viewer. Control every data source with UI, permissions, log events filters, and log fields customization.