Alternatives to AD Tidy

Compare AD Tidy alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AD Tidy in 2024. Compare features, ratings, user reviews, pricing, and more from AD Tidy competitors and alternatives in order to make an informed decision for your business.

  • 1
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 2
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 3
    Netwrix Password Reset
    Active Directory self-service password reset software that slashes help desk costs and user frustration. Are password-related tickets swamping your IT service desk? Do lockouts and password management headaches keep your teams from getting their work done? Netwrix Password Reset is an Active Directory password reset tool that enables users to securely reset or change their own passwords and unlock their accounts from any web browser, desktop, or mobile device, without calling the help desk. Allow users to securely set a new password, reset a forgotten AD password, and even unlock their AD account after multiple failed logon attempts, driving user productivity while slashing help desk costs. Enable users to conveniently change their passwords and unlock their accounts anywhere, anytime, from their mobile phone, tablet, or computer, or right from the Windows Logon or Unlock Computer screen.
  • 4
    AuthLite

    AuthLite

    AuthLite

    AuthLite secures your Windows enterprise network authentication and stays within your budget. Unlike all competing multi-factor authentication solutions, the unique AuthLite technology teaches your Active Directory how to natively understand two-factor authentication. With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it. AuthLite eliminates the "Pass the Hash" (PtH) attack vector against your administrative accounts by limiting the privileges assigned to a user. Require two-factor logon before granting the domain admins group SID. AuthLite works with your existing RDP servers and software. No changes are needed to RDP client machine software or drivers. Even when you are offline, your account logon is still protected with two-factor authentication. AuthLite uses the strong cryptographic HMAC/SHA1 Challenge/response feature of the YubiKey token to support cached/offline logon.
    Starting Price: $500 per year
  • 5
    AD Query

    AD Query

    SysOp Tools

    Completely free utility for Active Directory. Lookup a user or computer and view converted schema attributes that are normally not readable. A very handy tool for schema data lookup and comparison. No installer, just run the exe. 100% free utility for use in Active Directory domains. Search individual domain users and computer objects. View object Schema & LDAP data in one simple window. View binary Schema data in “human-readable” format. Easy lookup of email aliases, last login date, etc. Export search results to XML file, open with Excel. Small program size, super quick install. AD query software for user accounts is a great time-saving utility for the busy admin! AD Query is a free utility that allows quick and easy auditing of any user or computer object within Active Directory. Unlike the standard Users and Computers MMC, AD Query shows all data populated schema, LDAP and Exchange mail-enabled attributes for the user or computer object.
    Starting Price: Free
  • 6
    Rohos Face Logon
    The program is designed to make the standard Windows logon procedure more convenient and offer greater security. It allows accessing a Windows computer in an easy, fast and secure way by using any Windows-compatible camera. The user’s login is performed automatically once the face has been recognized by the program. Rohos Face Logon provides user identification by biometric verification in an automatic continuous process, based on neural network technology. Automatic login or unlocking the desktop when your face is recognized. Self-training helps to avoid face recognition failure. Use an additional USB flash drive as a key for your computer or notebook. Ability to combine both face recognition and a USB stick for login or use them separately. Multi-user support, you can register the faces of several users for any user account! All registered face patterns are saved and any unsatisfactory ones may be deleted.
    Starting Price: $11.90 one-time payment
  • 7
    LogonBox

    LogonBox

    LogonBox

    Discover the LogonBox Advantage with our innovative solutions for the modern Enterprise. LogonBox is an independent software vendor that develops software to help organizations manage and secure user identities and credentials. LogonBox solutions reduce helpdesk tickets, increase productivity, secure access across heterogeneous enterprises, and protect network resources by extending authentication beyond the password.
  • 8
    Arnica UnifiedLogon

    Arnica UnifiedLogon

    Arnica Software

    Arnica UnifiedLogon is an identity management system, which provides access control, personalization and configuration services, and allows you to implement single-point user log-on for access to multiple applications. It is a powerful tool for efficient control of granular user access to applications, application resources and functionalities, all managed through a web browser. Arnica UnifiedLogon was designed as an extremely scalable system, and is perfectly suited for management of any number of users - from a dozen of local users at a small organization to thousands of users in a large enterprise, to millions of users at a public web site. Arnica UnifiedLogon provides several ways of maintaining and extending user profile data to a virtually unlimited level of complexity.
  • 9
    XyLoc Security Server

    XyLoc Security Server

    Ensure Technologies

    The XyLoc® Security Server (XSS) is a server-based software platform, with a web-based GUI, that centrally manages and monitors XyLoc users and protected workstations throughout the enterprise. XSS allows IT managers to easily implement and administer XyLoc across multiple network segments and user groups, and also enables detailed reporting and compliance auditing. Simplifies the administration, reporting, and management of XyLoc user environments. Monitors and logs all log-on, secure walk-away, and return (e.g., walk-up recognition) activities. Integrates seamlessly with XyLoc Single Sign-On for full SSO management and activity reporting. Enables fast, secure access to information in a multi-user, shared computer environment (e.g., “Kiosk Accounts”). Provides compliance reporting (e.g., HIPAA) with encrypted user audit logs. Scales easily to support tens of thousands of users. Supports Active Directory® (AD) with a Schema Extension, and SQL Server® environments.
  • 10
    Sysadmin

    Sysadmin

    Sysadmin Anywhere

    A free application makes it so much easier to administer Active Directory-based networks by providing a single tool to do whatever you need. Add, edit and delete objects in Active Directory. View software and hardware. Events, processes, and services on computers. Add and delete objects from groups. Reset a user's password. Add photos, restart, and shut down remote computers. Computers performance and patterns for add new users. Monitor CPU, drive, memory, HTTP, ping, process, service, and events. Use it to manage domains, servers, computers, users, and groups.
    Starting Price: Free
  • 11
    Bayometric

    Bayometric

    Bayometric

    Bayometric’s Biometric Single Sign –On software (SSO) is a strong authentication and identity management solution which relieves the burden of password management while providing a more convenient way for users to access their computer or the network. Enterprise Single Sign on allows users to securely connect into the enterprise. It is a cost effective, server based back-end that offers enterprise wide identity management that can be easily deployed and managed by your IT department. Logon to Windows, domain, websites and applications using fingerprints & create a ”password free” environment. Centralized user enrollment, credentials & access rights management. Easy client components installation via AD group policies. The SSO portal provides organizations a well-integrated strong authentication and identity management system that ties easily into their existing infrastructure.
  • 12
    Active Directory Reports (AD Reports)
    Active Directory Reports Lite is the free edition of MaxPowerSoft's Active Diretory Reports (AD Reports). The most intuitive Active Directory reporting product. Within 2 easy clicks you can be off and running reports. AD Reports was built around an intuitive easy to use user interface. Update any existing or create your own custom reports. Include predefined or any Active Directory LDAP attribute and build your own LDAP filter. Accurately reports real time information of your Active Directory Servers. It is the most accurate on the market. In a multi-domain controller environment simply compare our results to any of the competitors. Simply stated, if you have administrator rights on your computer and are able to see the domain, our product just works. No messy database setup, no MSMQ problems, no bloated web server setup. We built everything internal and no we don't use a web server.
    Starting Price: $299 per year
  • 13
    SecureMFA

    SecureMFA

    SecureMFA

    OTP authentication for Microsoft ADFS. It is a module for Microsoft ADFS 2019 or ADFS 2016 servers. It enables ADFS servers to provide multi-factor authentication (MFA) using a Time-Based One-Time Password (TOTP) Algorithm which is based on RFC6238. Using this MFA provider users are required to enter a one time pass-code, which is generated on their phones via authenticator application like Microsoft Authenticator , Google Authenticator, Symantec VIP etc. to complete second factor authentication logon. Self-registration with QR code (using free Microsoft Authentication, Google Authentication, Symantec VIP etc. mobile apps). OTP data storage in MS Active Directory attributes or MS SQL Service. QR secrets encryption with AES 256-bit encryption. Configuration of network locations (IPv4 and IPv6) from which user can scan QR code. Support of ADDS multi-forests trust relationships.
    Starting Price: $178.25 per year
  • 14
    DSRAZOR for Windows

    DSRAZOR for Windows

    Visual Click Software

    Quickly document user and/or group NTFS effective and share permissions. Discover file ownership throughout your shared disk space. Report on users, groups, computers, permissions. Make sure your Active Directory object attributes match your enterprise standard. Find accounts that are locked, disabled, expired or unused for x days. Automate common Active Directory management tasks. Automatically synchronize your Student Information System (SIS) to Active Directory. Create/Import/Update users, groups and computers including bulk management. Effectively manage Active Directory - no scripting required! Delete/Move unused users, groups and computers. Reset passwords in bulk. Perform mass object imports from a CSV file. Modify trustee permissions for desired Folders. Document and manage Office 365 accounts. Allow non-admins to perform Active Directory management functions. Delegate the small stuff, focus on the big stuff.
    Starting Price: $500/year
  • 15
    SysTools Active Directory Management
    Active directory management tool allows to edit, remove, create bulk users in AD. Allows to batch migrate user to new domain active directory. List, preview, and manage active directory user accounts from the computer. Provides an option to rollback active directory changes. Create multiple users in active directory directly from software home screen. Allows to move user account from one OU to another OU (Organizational Unit). Allows to find, delete, change, rename, and create organizational unit in AD. Active Directory Admin Username and Password are required. MS Exchange Server should be available and active on the user machine. Through AD Console, its administrator can perform multiple tasks right from a single panel. It is possible to perform numerous operations such as, create a new user or organizational unit, delete user, modify user attributes, move AD user to another OU, and if required, undo all the changes using rollback options.
    Starting Price: $499
  • 16
    Specops Gpupdate
    Specops Gpupdate is a free tool that enables remote administration of any number of computers. Specops Gpupdate integrates directly with Active Directory users and computers. Simply right-click on any computer or organizational unit, and issue commands such as Gpupdate, Start computer, Windows update, and more! All commands are available with a simple right-click. Select computers to manage through the Active Directory users and computers interface or through searches of Active Directory. You can even select entire organizational units (OUs). If you want to move beyond the graphical user interface, you will enjoy the fact that Specops Gpupdate sits on PowerShell, you can run everything through PowerShell cmdlets. This allows you to unleash the full power of the tool in your own PowerShell scripts. Specops Gpupdate Pro is the full-featured version of the tool. With a Pro license, you can unlock additional commands, such as Ping, Start Remote Desktop, Read Remote Registry, and more!
    Starting Price: Free
  • 17
    ESET Secure Authentication
    ESET Secure Authentication (ESA) adds Two Factor Authentication (2FA) to Microsoft Active Directory domains or local area network, meaning a one-time password (OTP) is generated and provided along with the generally required username and password. Or a push notification is generated and has to be approved on the user's cell phone running Android OS, iOS, or Windows once the user has successfully authenticated using their general access credentials. The mobile application of ESET Secure Authentication makes it easy to generate OTPs or approve push authentication requests to access computers, services protected by 2FA. The mobile application version 2.40+ supports authentication of multiple users, meaning, if you use several user accounts in a domain/network protected with 2FA, the authentication tokens of all your user accounts may be stored in your one mobile application.
  • 18
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 19
    CryptoDefender

    CryptoDefender

    BlockSafe Technologies

    Prevents malware from spying on what you type. The keystrokes are secured between the kernel and the wallet application using military grade encryption. Now, the password you enter to logon or decrypt your secret key is safe. Prevents malware from monitoring the clipboard to spy on, copy and paste the contents of the clipboard. So the destination address to which a crypto transaction is sent to is not modified. Prevents screen-scraping malware from taking screenshots of information surreptitiously. Displays hidden frames or frames originating from a potentially malicious domain. This neutralizes one of the favorite tricks of the hackers to download malware onto your computer. CryptoColor visual verification shows you that CryptoDefender™ is protecting your input by highlighting what you type in a color you select.
    Starting Price: $5.99 per 2 devices per month
  • 20
    AD Report Builder
    Quickly add multiple inclusion/exclusion filters. Import from CSV or paste info from clipboard to find exact matches in AD. Select a start builder and run it instantly by unchecking "EDIT COLUMNS" check-box. The check state behavior of this feature is managed in main settings. Use the grid view to display the active directory report results in a format similar to a spreadsheet. Grid view provides instant "type-in" column filtering and sorting capabilities. Perform direct copy of specific cells, rows or columns. Select OneLevel or Subtree search in scattered multiple OU's. Select your search to target any OU's and/or its child OU's from a list. Click on the bindings menu and easily switch domain with a drop-down selection change. All directory servers and trust parters are automatically loaded. With one click, add attributes from your AD schema that is not already built-in.
    Starting Price: $149 one-time payment
  • 21
    Change Auditor

    Change Auditor

    Quest Software

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats that can go undetected without protections in place. Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and security threat monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.
  • 22
    JiJi Self Service Password Reset
    With JiJi Self Service Password Reset, end-users can securely reset their Active Directory password without the dependent of help desk. This product allows users to Reset Password / Change Password / Unlock Account /Reset Cached Domain Password/ Self Update their information in AD securely. JiJi Self Service Password Reset lowers end-user downtime as all the actions related to their AD accounts can be performed by themselves from their computer even if it is not connected to domain. For eg: Imagine a case were you are on a vacation and you laptop password expired. JiJi Self Service Password Reset helps you to reset your computer's AD cached password and allows you to reset it after authenticating yourself just with the help of internet connection. Excited? contact support@jijtechnologies.com to know more details about reset cached domain password through offline network.
    Starting Price: $1.99/year/user
  • 23
    RdpGuard

    RdpGuard

    RdpGuard

    It monitors the logs on your server and detects failed logon attempts. If the number of failed logon attempts from a single IP address reaches a set limit, the attacker's IP address will be blocked for a specified period of time. Many Windows Server machines are under constant attack. Network scanners and RDP brute-force tools work 24/7. Eventually they may find a password to access your server! Moreover, RDP brute-force attacks abuse server resources (CPU, RAM, Disk Space and Network Bandwidth). Take a look at your server's Security EventLog. How many failed login attempts do you see? The log may note thousands of failed login attempts from a single IP address. This means that someone is trying to find a password to access your server.
  • 24
    FSAR Funeral Home Management
    The FSAR system brings together technologies such as the newest cell phones and tablet devices. Accountability and productivity will not drop when you are out of the office, because you stay connected and can easily follow any of your business activities. No need to synchronize phone lists among directors, because all numbers are centralized on your web-based Funeral Management System. The FSAR system also brings you into the 21st century with its email feature allowing you to send bills, death Notices, product orders, programs of service, and just about any form directly, saving you time as well as postage. FSAR removes the burden of maintaining, securing, and backing up your data. Your data is replicated on multiple servers in different regions of the country and traverses the Internet in encrypted form. Access is controlled by logon Id, so you decide ‘who can do what’.
  • 25
    Alibaba Cloud Bastionhost
    Bastionhost enables you to manage asset O&M permissions in a centralized manner, monitor all O&M operations, and reproduce O&M scenarios in real-time to facilitate identity authentication, access control, and operation audit. You can use Bastionhost to troubleshoot issues, such as difficulties in the management of various assets, unclear responsibilities and authorities, and difficulties in the backtracking of O&M events. Bastionhost provides a centralized portal to access server resources. Bastionhost provides a single sign-on to allow O&M personnel to manage and maintain all server assets, facilitating centralized asset management. Furthermore, Bastionhost supports password-free logon for asset O&M. It manages accounts and passwords in a centralized manner to simplify account management. Bastionhost supports fine-grained user permission assignments to allow different users to perform operations based on the permissions assigned to them.
    Starting Price: $1.65 per month
  • 26
    Leopard Telematics

    Leopard Telematics

    Leopard Systems

    Leopard Telematics is a fleet management software that syncs on-board computer systems to extract, store and deliver valuable real-time information about vehicle performance, delivering an all-in-one vehicle tracking solution. Using a port plug-in device, vehicle information such as GPS data, engine performance, driving behavior, speed and odometer readings and safety requirements (e.g. engaged seat belt) is recorded and sent to a cloud-based application. This app would typically be accessed by a dispatch or control centre team informing them of fleet visibility and reporting capability. Ultimately this centralizes control across a business that heavily relies on vehicle mobility such as a transport and delivery services. Telematics has additional add on’s such as dash cam recording, crash and incident report data, Geo Fencing, NFC technology for driver logon and temperature readings.
  • 27
    Mailbakup

    Mailbakup

    Mailbakup

    Mailbakup™ provides an in-demand set of e-mail backup solutions to save valuable data from web-based email accounts to local drives quickly. This tool offers to take Google apps email backup by specified period data by entering date particulars in the 'from' & 'to' columns. This feature can be empowered by choosing the checkbox available with the 'add time Interval' option. This backup tool offer domain users’ the option to backup email Google Apps for business or education data of all users of that precise domain. User requirements to set admin credentials only. Hotmail Backup wizard backup Hotmail email address. The Hotmail backup software is designed to efficiently backup Hotmail folders & backup each and every mailbox data from the available folders effectively. Additionally, it takes backup of multiple Hotmail accounts to the local computer. This Yahoo Mail Backup utility is integrated with advanced features, one such feature is delete after download alternative.
    Starting Price: $29 one-time payment
  • 28
    ExamDiff

    ExamDiff

    PrestoSoft

    There is no need to specify both file names, just enter a directory name for one of the files to be compared. ExamDiff will try to use an entered filename with a specified directory name. Remembers a user-specified number of last compared first and second files. This allows quick selection of the two files the user wishes to compare. One push re-compare function which attempts to leave the viewer's focus in the same place as before the re-compare. Allows the copying of text from the comparison panes via drag and drop, a hot key, or a right button pop up. Fully customizable file extension filter. The user can choose only .c and .cpp files or any other files he/she chooses to be displayed. Adjustable pane splitter with smooth synchronized scrolling. Allows easy toggling between horizontal and vertical splitter orientation as well as splitter centering and panes hiding.
    Starting Price: $34.99 one-time payment
  • 29
    K9 Koordinator
    Your club members are busy with their personal and professional lives; members are "not good with computers"; your club doesn't have a website, or, you just want to simplify the reservation process. You are tired of last-minute phone calls asking for a time slot at the eye clinic. No more waiting for the cheque to arrive - all fees are paid via PayPal, and are deposited directly into the club's account. All credit cards are accepted, and are authorized immediately, with no need to worry about fees from declined checks or cards. All reservations are time-stamped upon receipt.
  • 30
    Protectimus

    Protectimus

    Protectimus Limited

    Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.
    Starting Price: $33 per month
  • 31
    Goliath Performance Monitor

    Goliath Performance Monitor

    Goliath Technologies

    Goliath Performance Monitor with embedded intelligence and automation enables IT professionals to anticipate, troubleshoot, and document end-user experience issues regardless of where IT workloads or users are located. It focuses on the 3 main areas most likely to cause support tickets to be opened, initiating a logon, the logon process, and in-session performance. Our technology is designed to proactively alert you to end-user experience issues before they happen and if they do give you the data to troubleshoot them quickly. Then, provide you the objective evidence in the form of reports and historical metrics so that proof exists to justify fixed actions to prevent future issues. Goliath Performance Monitor provides broad and deep visibility that allows you to troubleshoot VDI environments with the most comprehensive performance data available. Now, support teams and administrators can quickly identify where in the delivery infrastructure a problem is occurring.
  • 32
    MAK ONE

    MAK ONE

    MAK Technologies

    A powerful and flexible Computer Generated Forces (CGF) platform to fill your synthetic environments with urban, battlefield, maritime, and airspace activity. VR-Engage lets users play the role of a first-person human character; a ground vehicle driver, gunner, or commander; or the pilot of a fixed-wing aircraft or helicopter. Game-like visual quality in a high-performance image generator. Designed by modeling & simulation experts for training and simulation projects. Physically accurate sensors, model the physics of light in any wavelength to represent electro-optical, night-vision, and infrared sensors. Applications that let you model, simulate, visualize, and participate in whole-earth multi-domain simulations. Multi-domain computer-generated forces. Multi-role virtual simulator. Image generator & battlefield visualization. EO, IR, and NVG imaging sensors. Synthetic aperture radar simulation.
  • 33
    Call Saver Pro

    Call Saver Pro

    DynaMetric

    Call Saver® Pro™ enables you to save, sort, and retrieve recordings of your phone calls on your computer. Great for small or home businesses, individual users, or anyone who wants to keep records of their telephone conversations. Save your telephone conversations directly to your desktop or notebook computer. Immediately e-mail or upload conversations at your discretion, eliminate the need for bulky cassette tapes. File your conversations in folders, or directories on your hard drive or any network drive, for instant access in the field, office, or courtroom. Records automatically and manually. Works with virtually any corded phone and PC. Automatically time & date stamps recorded files. Archive recorded files to any network drive or server. Automatically saves recordings as WAV files. Easy online registration (requires Internet connection). Instant playback of the last minute of a call in progress. Compatible with all Windows operating systems.
  • 34
    zope.interface

    zope.interface

    Python Software Foundation

    This package is intended to be independently reusable in any Python project. It is maintained by the Zope Toolkit project. This package provides an implementation of “object interfaces” for Python. Interfaces are a mechanism for labeling objects as conforming to a given API or contract. So, this package can be considered as an implementation of the Design By Contract methodology support in Python. Interfaces are objects that specify (document) the external behavior of objects that “provide” them. An interface specifies behavior through informal documentation in a doc string, attribute definitions, and invariants, which are conditions that must hold for objects that provide the interface. Attribute definitions specify specific attributes. They define the attribute name and provide documentation and constraints of attribute values. Attribute definitions can take a number of forms.
    Starting Price: Free
  • 35
    Forensic Notes

    Forensic Notes

    Forensic Notes

    Forensic Notes is revolutionizing how law enforcement officers and civil investigators document and manage investigations. Every Forensic Note is encrypted, immutable, timestamped and stored in a private blockchain, ensuring the integrity of every note can be verified at any time. Proper documentation is critical to the success of all investigations. Your notes are automatically timestamped. Quick access buttons to add vital information (location & weather). Simplified disclosure with notes easily printed in PDF format. User accounts are managed and protected by Microsoft Active Directory. Multi-Factor Authentication is Mandatory on All Accounts. Every note is encrypted with its own unique 256-bit symmetric encryption key. Start your free trial now to discover how easy it is to create detailed electronic notes. The Forensic Notebook will contain all your notes related to the case, timestamped and Court-Ready.
    Starting Price: $9 per user per month
  • 36
    ManageEngine RecoveryManager Plus
    The enterprise backup and restoration tool. No IT environment is immune to accidental deletions or modifications; on-premises Active Directory (AD), Azure Active Directory, Microsoft Office 365, and Exchange environments are no exception. RecoveryManager Plus can help you overcome any disaster caused by unwanted changes in your IT environment. Back up your AD, Azure Active Directory, Microsoft Office 365, and Exchange environments from a single console and restore any object, site, or mailbox whenever you need it. Back up all changes made to schema classes and attributes, and instantly restore them when needed. Back up all AD objects like users, groups, GPOs, OUs, Exchange attributes, DNS information, computers, and contacts, and restore them either partially or completely. Perform recovery operations without having to restart your DCs, thus ensuring continuous availability of DCs.s.
  • 37
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 38
    PlantLog

    PlantLog

    PlantLog

    Design a complete O&M logging system for your facility that ensures accuracy, pinpoints abnormal conditions and reduces man-hours by as much as 70%. Establish operator routes with assets to be checked during rounds and inspections. Record meter readings, observations, and completed tasks without the need for WiFi or cellular connectivity. Reduce human errors during data collection and ensure data completeness. View recent historical data to trend overall asset conditions. Set up schedules to recur on specific times or dates or set an interval from the last time the activity was performed. Filter your to-do list by which activities are currently due. Reports indicate which scheduled activities are approaching and those that are past due. Specify optimal ranges for meter readings and other asset statues to document normal data versus exceptional data. User notifications when data entered is an exception with optional instructions on corrective actions that should be taken.
    Starting Price: $199 per month
  • 39
    AD Browser

    AD Browser

    LDAPSoft

    AD Browser is a free Active Directory® browser by LDAPSoft. It is simple and easy to use tool designed to provide a read only access to the active directory. With AD Browser you can search for entries, view all available attributes and run SQL-LDAP Statments. AD browser provides both remote and local access to the Active Directory. The browser can be installed on the local machines or Domain Controller (DC). The browser is designed and developed with high level of security standards at our location in Morton Grove, IL, United States so that you can install this worry free on any or multiple DC's. The browser provides only a read-only interface so if you need to modify attributes and values you need our advanced tools like LDAP Admin Tool Standard and Professional Editions.
    Starting Price: $95 one-time payment
  • 40
    Wolfram System Modeler
    Using drag and drop from the large selection of built-in and expandable modeling libraries, you can build industrial-strength, multidomain models of your complete system. Adding the power of the Wolfram Language gives you a fully integrated environment for analyzing, understanding and quickly iterating system designs. Driving insight, innovation and results. Real-world machines and systems are rarely confined to a single physical domain. Models can contain any combination of interconnected components from any number of domains mimicking real-world topology. Exploration is immediate; at the click of a button, you have access to all values from every component in your model. Zoom in to a region of interest and choose from built-in plot styles with a point-and-click interface. Perform your own symbolic and numerical computations by accessing the full model equations and simulation results of your models. Bring the full power of the Wolfram Language to your model analysis.
  • 41
    Minsh

    Minsh

    Minsh

    This is the heart of your private messaging app: post important announcements and notify your entire user base, create public and private groups to chat with a subset of users, or exchange private messages with select members. You can share all types of content: text, videos, images, links, documents, etc. Group communication is also about being where you're supposed to on time. The calendar allows you to publish events, as well as remind attendees and notify them about last minute changes. Members can RSVP, rate and post comments. The member directory shows all the users of your app. You can filter profiles, search for specific people, visit their detailed profile page, and contact them. The app's online file system allows you to upload all your documents and organise them into folders. Your users can immediately consult and download the files you put there for them.
    Starting Price: $49 per month
  • 42
    GroupAhead

    GroupAhead

    GroupAhead

    This is the heart of your private messaging app: post important announcements and notify your entire user base, create public and private groups to chat with a subset of users, or exchange private messages with select members. You can share all types of content: text, videos, images, links, documents, etc. Group communication is also about being where you're supposed to on time. The calendar allows you to publish events, as well as remind attendees and notify them about last minute changes. Members can RSVP, rate and post comments. The member directory shows all the users of your app. You can filter profiles, search for specific people, visit their detailed profile page, and contact them. The app's online file system allows you to upload all your documents and organise them into folders. Your users can immediately consult and download the files you put there for them.
    Starting Price: $37.00/month
  • 43
    Orna

    Orna

    Kerkton Security Technologies

    Computer aided dispatch enables dispatchers to handle multiple incidents and dispatch patrol officers. With a streamlined dispatch system, you can easily and efficiently dispatch calls, provide real-time updates to officers, and receive praise from clients for prompt response times. When dispatchers or patrol officers have comments, they can be added to the call. Comments are time-stamped with the user so there is a permanent record. Natural disasters happen, and sometimes security companies need to work together, so dispatch can add multiple agencies/companies to a single call providing you with the resources you need. Easily add attachments, such as photos, to the call. Photos appear on PDFs of closed calls and can be set up to appear on automated or manual activity reports. Encounter a person or vehicle during your call for service that is in your records (or that you want to add)? Easily link people and/or vehicles to the call.
  • 44
    eCrisper

    eCrisper

    eCrisper

    eCrisper makes it easy to turn a Mac into a secure public access Internet kiosk. It is used by schools, museums, hotels, churches, and libraries to reliably and elegantly give access to web content. When a session is ended by the user or because of inactivity, eCrisper closes all browser windows, deletes cookies, cache, and browser history, and returns to the home page. You can offer free unlimited access, free but limited to a maximum number of minutes, or use accounts from your own central user database (prepaid cards). A session is ended automatically if no activity is detected for a specified duration. The user receives a warning and can prevent the timeout. You can restrict access to specified URLs, for example your organization’s websites. You can easily add languages or modify existing ones. This gives you complete control over the text displayed to the users. Users can switch between languages.
    Starting Price: $79 per user per month
  • 45
    BaikalMine

    BaikalMine

    BaikalMine

    Our cryptocurrency pools are completely open to users. There are no personal accounts and other things. You can always, at any time, see which and when blocks the pool decided, which of the miners received an award from the last block and which. Payments, accruals, profitability – everything is in the public domain. No freezes and “brakes” on our mining pools. All thanks to the powerful server equipment that we use for the comfort and maximum profit of our miners. Pools are available 24 hours a day, 7 days a week. Physical location – Moscow. You will not miss anything important in the work of your rigs, as our pool provides the most detailed statistics that covers all the most important aspects: full statistics on active workers, payments, accruals, profitability and much more.
  • 46
    RDS-Shield

    RDS-Shield

    Marty Soft Conception

    RDS-Shield is a standalone Windows Service managing a lot of server events, and an intuitive Administration interface. No need to install Java, update PHP, download MS C++ libraries or .NET. All is included and so powerful. Just download it, install it, and discover. Forget the complexity of GPO & AD. Simply say: Now, all users of this group are in the Highly secured user environment, but in this same group, this account will be in a Secured user session, while others will work in Kiosk Mode. Easily import Applocker’s rules without opening GPO, allow Homeland Access, define Working Hours, and Control Intrusion attempts. What you say is what you get immediately. Your decisions are applied without reboot needed, without logoff/logon for connected users, and will be applied for your futures accounts or unconnected users. Ready to drive more Security Rules in few simples clicks?
    Starting Price: $299 one-time payment
  • 47
    SPC1+ Navigator

    SPC1+ Navigator

    Advanced Systems & Designs

    With SPC1+ Navigator Software, users employ the Desktop Explorer screen to create and modify Worksets, monitor all data collection processes, manage the database and generate reports. The Workset screen uses predefined profiles based on each operator’s preset log-on preferences. The system automatically creates a date and time stamp, performs data validation and traceability while also identifying problems and suggesting corrective actions. Very similar to our SPC1+ Enterprise software with a few less features. Click on the link below or contact us today for more information. Designed for use with our SmartCable™ Keyboard or GageMux® Keyboard, this very affordable Microsoft Excel Add-on leverages the power of the most popular spreadsheet program and connects it to years of SPC software development.
    Starting Price: $995 one-time payment
  • 48
    Cyqur

    Cyqur

    Binarii Labs

    You control where your passwords and seed phrases are secured via the Cyqur browser extension. Cyqur encrypts, fragments, and distributes your data wherever you want for unprecedented security. Although, it’s always you who owns and controls your data. By adding the proof of record from the blockchain, the security process is complete. Encrypted pieces are stored across multiple cloud providers so data is incomplete and useless if hacked. Multi-cloud data sovereignty, automated seed word protection, blockchain-based proof of record, customizable MFA, a referral program for credits, and direct personal customer support. Store up to 50 text based secrets (e.g., notes, PINs, secret phrases, banking credentials, MFA backup codes). Secrets are uniquely fragmented, encrypted, and stored across three separate cloud locations for enhanced security. Enhanced log-on authentication with customizable MFA options.
    Starting Price: €15 one-time payment
  • 49
    Sedo

    Sedo

    Sedo

    Find the perfect web address, or earn money with domains you already own, on the world's largest domain name marketplace! Companies and startups searching for their ideal web address. Building an online presence for new products. Domain acquisition for brand protection. Investing in valuable domain names. Concise internet domains for marketing and specific campaigns. Turning unused web addresses into money. Using a Broker to market premium domains. Earning money with Domain Parking. Professional trading of internet domains. Launching a new domain extension/Top Level Domain (gTLD.) As a neutral marketplace with 19+ years of experience, we provide services for anything and everything to do with domains: With 2 million customers from more than 150 countries, we are the first address worldwide for everyone wanting to buy domains, sell them themselves, or park them. You can conveniently pay by PayPal, credit card, or bank transfer.
  • 50
    Gurucan

    Gurucan

    Gurucan

    Gurucan is a 7-in-one platform for digital businesses. With Gurucan creators launch online courses, run live sessions and webinars, sell memberships, or even create their own mobile apps. Everything in a simple and easy to use interface. Video protection Gurucan unique content protection technology helps you protect from sharing content and account credentials. Even though it's impossible to disable screen recording, we do protect you from video download plugins and even from tech-savvy users who know how to dive into HTML code. Just use Gurucan unlimited 4K video hosting and you're good! White Label Gurucan is the only platform on the market that allows creating native iOS/Android apps. No coding required! Just fill out the description, select design, upload logo and your own app with your brand is ready for student's home screens in just 30 days. And of course you can connect your domain, brand emails and push notifications.
    Starting Price: $26 per month