Best IT Security Software for Microsoft Dynamics 365

Compare the Top IT Security Software that integrates with Microsoft Dynamics 365 as of October 2025

This a list of IT Security software that integrates with Microsoft Dynamics 365. Use the filters on the left to add additional filters for products that have integrations with Microsoft Dynamics 365. View the products that work with Microsoft Dynamics 365 in the table below.

What is IT Security Software for Microsoft Dynamics 365?

IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities. Compare and read user reviews of the best IT Security software for Microsoft Dynamics 365 currently available using the table below. This list is updated regularly.

  • 1
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 2
    GoAnywhere MFT
    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
    Leader badge
    View Software
    Visit Website
  • 3
    10Duke Enterprise
    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution enabling software vendors to easily configure, manage and monetize the licenses they provide to their customers in real-time. 10Duke enables you to gain a single point of license control for desktop, SaaS, and mobile apps, APIs, VMs and devices. It’s cloud-native, supports all license models, integrates with CRM & Ecommerce, has a built-in Customer Identity Management solution, and supports offline scenarios. 10Duke Enterprise is used by SMBs and Fortune 500 customers alike, and is SOC2 compliant. 10Duke Enterprise is used across a wide range of industries by the fastest-growing software vendors that offer desktop, SaaS and mobile apps, devices, APIs and VMs. It's specifically designed for fast-growing software businesses looking to scale up licensing & minimize friction. 10Duke Enterprise is used around the world by leading brands including Trimble, Causeway, Seequent, Maxon and Steinberg
    Starting Price: $199/month
    Partner badge
    View Software
    Visit Website
  • 4
    Microsoft Authenticator
    Go passwordless. Enter your username and confirm your sign-in with your phone. It’s that easy! Passwords can be forgotten, stolen, or compromised. With Authenticator, your phone provides an extra layer of security on top of your PIN or fingerprint. Use Authenticator to sign-in to Outlook, OneDrive, Office, and more. Protect all of your accounts with two-step verification. The app also helps you secure all of your online accounts by using the industry standard time-based OTP (one-time password) codes.
  • 5
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
    Starting Price: $10 per user per month
  • 6
    SolarWinds Server & Application Monitor
    SolarWinds® Server & Application Monitor (SAM) is designed to monitor your applications and their supporting infrastructure, whether running on-premises, in the cloud, or in a hybrid environment. Don’t let slow applications and downtime impact your end users and business services. Pinpoint the root cause of application issues across various layers of the IT stack. Automatically discover your application’s environment and start monitoring, typically in about an hour. No professional services or consultation needed.
  • 7
    Mailock

    Mailock

    Beyond Encryption

    Mailock secure email empowers companies to exchange sensitive information with customers, without risking their data. It combines award-winning encryption technology with multi-factor identity authentication to protect confidential emails from cyber risk and keep customer information protected. Compose a secure email from your desktop, browser, or use rules and keywords to initiate the encryption. Set authentication challenges to verify your recipients’ identity so only the right people gain access. Keep audit trails for every message and track your recipients’ activity with real-time read notifications. Recipients can encrypt their replies for free. Empower your customers with a secure thread to your business. Deliver confidential documents to your customers at high volume with automated secure email delivery.
    Starting Price: $9.30 per user per month
  • 8
    ISOPlanner

    ISOPlanner

    ISOPlanner

    Use your Microsoft 365 account and leverage Sharepoint, Outlook, Teams, Dynamics, Azure, and Power Bl for an integral compliance experience. Leverage Microsoft Power Automate and Power Flow to embed your compliance controls into your processes. Your data never leaves the Microsoft ecosystem. Learn how a software solution helps you to implement an efficient management system that is accepted in your organization. With ISOPlanner all compliance requirements are embedded in the Microsoft products you already use. Simply extend Microsoft 365 with lightweight functionality. Highly effective features will put a smile on your face. You’ll be delighted with the simplicity that clears your head and allows you to get work done. With ISOPlanner in Microsoft 365, you won’t need to use a new separate tool. You and your colleagues can collaborate in one central location, making the process a breeze. Implementing ISO won’t get any faster than this.
    Starting Price: €53 per month
  • 9
    AvePoint

    AvePoint

    AvePoint

    AvePoint is the only full-suite data management solutions provider for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service user base in the Microsoft 365 ecosystem. Over 7 million users worldwide trust AvePoint to migrate, manage, and protect their cloud investments. Our SaaS platform is enterprise-grade with hyper scale, robust security and support. We are available across 12 Azure data centers, our products are in 4 languages, we offer 24/7 support and boast market-leading security credentials such as ISO 27001 and FedRAMP in-process. Our comprehensive and integrated product portfolio provides extra value to organizations leveraging Microsoft that want a consistent experience without the pain of having to manage multiple vendors. Automate governance to scale adoption and IT operations while simplifying oversight and collaboration. Reduce more risk by improving process, content security, and compliance across more collaboration platforms.
  • 10
    Sesame Software

    Sesame Software

    Sesame Software

    Sesame Software specializes in secure, efficient data integration and replication across diverse cloud, hybrid, and on-premise sources. Our patented scalability ensures comprehensive access to critical business data, facilitating a holistic view in the BI tools of your choice. This unified perspective empowers your own robust reporting and analytics, enabling your organization to regain control of your data with confidence. At Sesame Software, we understand what’s at stake when you need to move a massive amount of data between environments quickly—while keeping it protected, maintaining centralized access, and ensuring compliance with regulations. Over the past 23+ years, we’ve helped hundreds of organizations like Proctor & Gamble, Bank of America, and the U.S. government connect, move, store, and protect their data.
  • 11
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 12
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 13
    Own Data

    Own Data

    Own Data

    The Own Data platform makes owning your SaaS data simple. It empowers you to ensure the availability, compliance, and security of mission-critical data and unlocks new ways to use that data to transform your business. SaaS applications make data safer, more secure, and more accessible. However, they have not made it more valuable for you. Your business is more complicated than ever and it turns out managing and getting insights from your data is anything but simple. You are beholden to what your SaaS provider allows you to do with your own data. Understand data exposure risks and proactively strengthen your Salesforce security posture. Protect your data with automated backups, proactive notifications of loss or corruption, and easy-to-use recovery tools. Quickly seed quality data into any sandbox or sub-prod environment for development, training, or testing purposes. Archive obsolete data from production environments to prevent overage costs, improve performance, and ensure compliance.
    Starting Price: $2.90 per month
  • 14
    Dynamics 365 Fraud Protection
    Today's digitally transformed enterprise conducts most of its business online and in real-time. Little human intervention is involved. Although this approach helps reduce costs and improve the customer experience, it also exposes the enterprise to serious threats of fraud from sophisticated users who try to take advantage of the online channel's relative anonymity and accessibility. For example, in e-commerce, some transactions are maliciously created via compromised accounts and stolen payment instruments. Other malicious activities might include account takeover, abuse of free trials, fake product reviews, warranty fraud, refund fraud, reseller fraud, abuse of program discounts. All these activities, and others, can affect the enterprise's profitability and reputation. Unlike during the early years of the internet, today's fraudulent transactions can be orchestrated by well-funded and well-equipped rings of professionals.
  • 15
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 16
    Nightfall

    Nightfall

    Nightfall

    Discover, classify, and protect your sensitive data. Nightfall™ uses machine learning to identify business-critical data, like customer PII, across your SaaS, APIs, and data infrastructure, so you can manage & protect it. Integrate in minutes with cloud services via APIs to monitor data without agents. Machine learning classifies your sensitive data & PII with high accuracy, so nothing gets missed. Setup automated workflows for quarantines, deletions, alerts, and more - saving you time and keeping your business safe. Nightfall integrates directly with all your SaaS, APIs, and data infrastructure. Start building with Nightfall’s APIs for sensitive data classification & protection for free. Via REST API, programmatically get structured results from Nightfall’s deep learning-based detectors for things like credit card numbers, API keys, and more. Integrate with just a few lines of code. Seamlessly add data classification to your applications & workflows using Nightfall's REST API.
  • 17
    Citrix Enterprise Browser

    Citrix Enterprise Browser

    Cloud Software Group

    Keep your data safe from browser-based attacks. When it comes to security, the internet is among your biggest enemies. Which is a problem, since employees need the web to stay productive. That’s what Citrix Enterprise Browser is for. This cloud-hosted browser lets you thoroughly protect your network—without complicating the experience for users. Go ahead—let employees browse away. We’ll isolate that traffic and keep your network protected. Even if someone lands on a compromised site, your devices and data stay safe. Teams have more freedom. You get greater control. Employees want to browse without limits. IT needs to keep web-based attacks at bay. Citrix Enterprise Browser lets you do both. Citrix Enterprise Browser is completely separate from your network. That means browsing is 100% isolated and each session is destroyed after use. So even as you expand employee options for working on-the-go, your corporate resources remain safe.
    Starting Price: $2 per user per month
  • 18
    Gurucul

    Gurucul

    Gurucul

    Data science driven security controls to automate advanced threat detection, remediation and response. Gurucul’s Unified Security and Risk Analytics platform answers the question: Is anomalous behavior risky? This is our competitive advantage and why we’re different than everyone else in this space. We don’t waste your time with alerts on anomalous activity that isn’t risky. We use context to determine whether behavior is risky. Context is critical. Telling you what’s happening is not helpful. Telling you when something bad is happening is the Gurucul difference. That’s information you can act on. We put your data to work. We are the only security analytics company that can consume all your data out-of-the-box. We can ingest data from any source – SIEMs, CRMs, electronic medical records, identity and access management systems, end points – you name it, we ingest it into our enterprise risk engine.
  • 19
    ETI

    ETI

    ETI Software Solutions

    Empowers customers to self-serve with an easy-to-use web portal. Smart, simple customer service views provide real-time data to optimize customer interactions. Predictive analysis and proactive field engagement that transforms the speed and quality of issues resolution. Real-time monitoring and service assurance for CPE management to reduce inefficiencies and cost, improve subscriber experience, and enable next-generation services. Advanced analytics and visualizations to solve business-level challenges, make proactive decisions and better manage operations from workforce management to sales/marketing. Optimize network performance and uptime. Network performance reporting and trending.
  • 20
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • 21
    DataGuard

    DataGuard

    DataGuard

    Achieve your security and compliance goals with DataGuard’s all-in-one platform, designed to simplify compliance with frameworks like ISO 27001, TISAX®, NIS2, SOC 2, GDPR, and the EU Whistleblowing Directive. DataGuard’s iterative risk management enables you to capture all relevant risks, assets and controls to reduce risk exposure from day one. Automated evidence collection and control monitoring ensure ongoing governance to safeguard your organization as it scales. The platform combines AI-powered automation with expert support, reducing manual effort by 40% and fast-tracking certification by 75%. Join 4,000+ companies driving their security and compliance objectives with DataGuard. Disclaimer: TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide Software-as-a-Service and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website
  • 22
    Zywave Cyber OverVue
    Quickly evaluate the cyber risk of an organization. Leverage proprietary cyber loss data to facilitate effective, data-driven decision-making. Create a holistic view of an organization’s cyber risk, combining insights from its historical loss experience. Forecast potential scenarios and how they could impact your client or prospect. Help businesses understand their cyber risk, what areas are vulnerable to attack, and what the impact could be on their organization. Identify how likely an organization is to experience a cyber event and how much the financial impact could be. Find out if a business has the appropriate cyber protection in place and pinpoint gaps in their coverage. High-level insights on how a company’s historical loss experience compares to that of its peer group to help identify areas at risk. Guidance on the appropriate amount of insurance to purchase through limit adequacy and traditional benchmarking analyses that give insights into peer purchasing behavior.
  • 23
    Unifonic

    Unifonic

    Unifonic

    Unifonic is an AI-driven platform that enables personalized omnichannel customer engagement. It offers a range of communication channels, including SMS, WhatsApp, Messenger, push notifications, and voice, allowing businesses to connect with customers through their preferred mediums. The platform supports over 100 native integrations with tools like Salesforce, HubSpot, and Shopify, facilitating seamless workflow automation. Unifonic's Flow Studio provides pre-built templates for common use cases such as abandoned cart reminders, OTPs, and chatbot automation, simplifying the implementation of automated workflows. The platform is designed to enhance marketing efforts, streamline IT and operations with low-code development tools, and improve customer support by offering 24/7 AI-powered assistance. Unifonic has a global reach, with 95% coverage, over 25 billion messages sent, and more than 5,000 customers.
  • 24
    Akitra Andromeda
    ​Akitra Andromeda is a next-generation, AI-enabled compliance automation platform designed to streamline and simplify regulatory adherence for businesses of all sizes. It supports a wide range of compliance frameworks, including SOC 2, ISO 27001, HIPAA, PCI DSS, SOC 1, GDPR, NIST 800-53, and custom frameworks, enabling organizations to achieve continuous compliance efficiently. The platform offers over 240 integrations with major cloud platforms and SaaS services, facilitating seamless incorporation into existing workflows. Akitra's automation capabilities reduce the time and cost associated with manual compliance management by automating monitoring and evidence-gathering processes. The platform provides a comprehensive template library for policies and controls, assisting organizations in establishing a complete compliance program. Continuous monitoring ensures that assets remain secure and compliant around the clock.
  • 25
    Deep Identity

    Deep Identity

    Deep Identity

    Deep Identity enables you to protect your organization with a complete range of Deep Identity integration and data governance products. Built on light-weight flexible and open architecture. Trusted Identity Audit & Compliance Manager (Trusted IACM) is the industry’s most comprehensive solution that provides a ‘layered approach’ to identity governance and administration. Trusted Identity Manager (Trusted IM) is the industry’s most lightweight solution that provides a “layered” approach to identity administration. Privilege Identity Manager (Trusted PIM) is the industry’s most practical and non-intrusive solution to address privilege identity related challenges in any organization. Data Governance Manager (Trusted DGM) provides complete automation for identity, data access governance and lifecycle management with integration across modules and systems. Handle Full time, Contractors profile management, Access review, N Level approval workflow, Self Service, Bulk provisioning etc
  • 26
    Citrix Workspace

    Citrix Workspace

    Cloud Software Group

    Employee experience is everything—get it right with an intelligent workspace. Power a smarter, more flexible way to work. You hired the best. Let them be their best. Redefine what it means to work better with Citrix Workspace. Increase employee productivity and engagement through simpler IT. Simplify the way you manage and secure apps, devices, users, and networks so you can deliver the best employee experience. Transition employees back to the office seamlessly. Realize the full potential of your cloud strategy. Replace traditional VPNs with a zero trust approach.
  • 27
    Fastpath

    Fastpath

    Fastpath

    Fastpath’s cloud-based access orchestration platform allows organizations to manage and automate identity, access governance, and data and configuration changes – efficiently and cost effectively. Our intuitive cloud-based platform seamlessly integrates identity governance and GRC into one sophisticated yet easy-to-use solution. Effortlessly automate, control, and monitor access - from applications down to individual data records to dramatically reduce risk and compliance costs. Fastpath’s platform was designed by auditors who understand the complexity of securing business application access. That’s why we created a solution that reduces the time, cost and complexity associated with audit processes and reporting to prove compliance.
  • 28
    Cyber360

    Cyber360

    CENTRL

    Streamline cybersecurity assessments and transform your practice to serve more clients with a best-in-class cloud platform. Identify, analyze, and mitigate cybersecurity risks with full transparency and control. Comprehensive out-of-the-box yet highly configurable workflows and controls framework provide flexibility while driving efficiencies. Design a repeatable cybersecurity assessment process that maps to your organization needs. Gain visibility if your organization’s risk profile across business units, third parties, regions. Collect and store all assessments, documents, policies, issues in a centralized repository. Proactively manage exceptions through analytics, alerts and collaboration. Start with pre-built and pre-seeded industry assessment templates, or upload your own standard practice questionnaire. Multiple modes for assessments to suit business needs, self assessments, onsite assessments, and more.
  • 29
    Catapult Spyglass
    We are a managed IT security services provider that can help assess and optimize your environment constantly. Our security experts become an extension of your team and take a proactive, continuous approach for optimizing your security environment and keeping your devices and data protected. Using the best-in-class technology, we create a centralized view of your entire security landscape, combined with a dedicated security coach who proactively manages your environment and helps you continuously improve your security and compliance. Catapult helps supplement your existing team with a wide range of security expertise. Spyglass works with your existing security investments while providing opportunities to further decrease your security costs. With Spyglass’s easy-to-use dashboard, administrators can quickly track and manage compliance goals to ensure the appropriate policies and controls are in place.
  • 30
    Clarity Security

    Clarity Security

    Clarity Security

    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove onboarding takes the burden of implementing a solution off of team members reducing the impact on other IT initiatives. Automated evidence collection into a downloadable ledger mitigates the need for wasted time gathering spreadsheets, screenshots, etc. Nested entitlements and Clarity Explorer provide insight into what’s giving users access and why they’re being granted that access. True role-based access control (RBAC) and automated workflows for full alignment with your organizational structure and needs. Unlike "traditional" manual methods, Clarity has everything you need to quickly upgrade your identity governance program and seamlessly adapt it as your organization grows. Fast reviews for certifying user access, entitlements, roles, application access, and more.
  • Previous
  • You're on page 1
  • 2
  • Next