Alternatives to AdRestore

Compare AdRestore alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AdRestore in 2024. Compare features, ratings, user reviews, pricing, and more from AdRestore competitors and alternatives in order to make an informed decision for your business.

  • 1
    Cerberus FTP Server

    Cerberus FTP Server

    Redwood Software

    Cerberus FTP Server provides a secure and reliable file transfer solution for the demanding IT professional in any industry. Supporting SFTP and SCP, FTP/S, and HTTP/S, Cerberus is able to authenticate against Active Directory and LDAP, run as a Windows service, has native x64 support, includes a robust set of integrity and security features and offers an easy-to-use manager for controlling user access to files and file operations. - FTP/S, SCP, SFTP, HTTPS - SAML SSO - Active Directory & LDAP - Secure SSL Encryption - Two-Factor Authentication - IP Auto-Banning and Geoblocking - HIPAA Compliant - FIPS 140-2 Validated - Advanced Reporting - Comprehensive Auditing - Web File Transfer Client - Email Notifications - Event Support & Automation - File Retention Policies -Unlimited Connections -Virtual Directories -Users & Groups -Detailed Logs -Full IPv6 Support -FTP with TLS/SSL -SOAP control API -Web Administration -SSH2 SFTP and SCP -Public Key Authentication
    Compare vs. AdRestore View Software
    Visit Website
  • 2
    CPTRAX for Windows

    CPTRAX for Windows

    Visual Click Software

    Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts.
  • 3
    EventSentry

    EventSentry

    NETIKUS.NET ltd

    Hybrid SIEM solution combining real-time (event) log monitoring with comprehensive system health & network monitoring provides users with a complete picture of their servers and endpoints. The included security event log normalization & correlation engine with descriptive email alerts provides additional context and presents cryptic Windows security events in easy to understand reports that offer insight beyond what is available from raw events. EventSentry's NetFlow component visualizes network traffic, can detect malicious activity and offers insight into bandwith usage. Keeping track of Active Directory changes is easy with EventSentry's ADMonitor component that records all changes to AD & Group Policy objects and provides a complete user inventory to help identify obsolete accounts. Various integrations & multi-tenancy available.
    Starting Price: $85.00/one-time
  • 4
    LDAP Administrator
    Work with several servers at once, organize them in groups, and easily copy data between them. LDAP Administrator supports LDAPv2 and LDAPv3 protocols and allows working with OpenLDAP, Netscape/iPlanet, Novell eDirectory, Oracle Internet Directory, Lotus Domino, Microsoft Active Directory, CA Directory, Siemens DirX, and any other LDAP server. Set various LDAP filters to display only the entries that match your criteria. Quickly access frequently viewed branches by setting a custom base DN to start browsing from. Jump to previously viewed objects using navigation history. And much more. Prevent directory data from being accidentally modified or deleted by making your LDAP server profiles read-only in LDAP Administrator.
    Starting Price: $250 one-time payment
  • 5
    LDAP Plus AD Help Desk Professional Tool
    LDAP Plus AD Help Desk Professional Tool is a powerful Active Directory & LDAP administration, reporting and help desk solution. This is a professional tool to manage accounts, assign permissions to users, lock/unlock users accounts and manage other network directory systems. This tool provides both LDAP and Active Directory reports that assist in both compliance (SOX, HIPPA) and management reporting.This tool provides help desk personals and administrators with an interface for single point of administration to manage both Active Directory and LDAP. LDAP Plus AD Help Desk Professional Tool provides a very simple windows like interface to generate both AD and LDAP reports which you can print or export to various formats (Excel, csv and LDIF). It also provides a very simple and easy wizard to schedule reports using windows scheduler or Linux cron.
    Starting Price: $795 one-time payment
  • 6
    Sysadmin

    Sysadmin

    Sysadmin Anywhere

    A free application makes it so much easier to administer Active Directory-based networks by providing a single tool to do whatever you need. Add, edit and delete objects in Active Directory. View software and hardware. Events, processes, and services on computers. Add and delete objects from groups. Reset a user's password. Add photos, restart, and shut down remote computers. Computers performance and patterns for add new users. Monitor CPU, drive, memory, HTTP, ping, process, service, and events. Use it to manage domains, servers, computers, users, and groups.
    Starting Price: Free
  • 7
    Cygna Auditor

    Cygna Auditor

    Cygna Labs

    Audit and roll back AD changes, enforce entitlements, and improve compliance reporting. Request a demo. Pinpoint changes and instantly roll back unwanted changes to Active Directory to recover from errors with minimal effort. Audit, alert and report on Windows file system and NetApp access faster and with greater detail than native auditing. Get real-time auditing, analysis, and alerts for Microsoft Exchange, and report on changes made to SQL Server. Cygna Auditor provides centralized real-time change auditing for Active Directory, file systems, Exchange, SQL and NetApp; offers the ability to restore Active Directory objects or attributes; and helps to establish and enforce entitlements across the Windows infrastructure. Through simpler administration, IT organizations can mitigate the risks of unwanted changes and better understand user activity to meet compliance requirements.
  • 8
    ManageEngine RecoveryManager Plus
    The enterprise backup and restoration tool. No IT environment is immune to accidental deletions or modifications; on-premises Active Directory (AD), Azure Active Directory, Microsoft Office 365, and Exchange environments are no exception. RecoveryManager Plus can help you overcome any disaster caused by unwanted changes in your IT environment. Back up your AD, Azure Active Directory, Microsoft Office 365, and Exchange environments from a single console and restore any object, site, or mailbox whenever you need it. Back up all changes made to schema classes and attributes, and instantly restore them when needed. Back up all AD objects like users, groups, GPOs, OUs, Exchange attributes, DNS information, computers, and contacts, and restore them either partially or completely. Perform recovery operations without having to restart your DCs, thus ensuring continuous availability of DCs.s.
  • 9
    LDAP Admin Tool
    The Professional Edition of LDAP Admin Tool contains more features like predefined customizable searches for both LDAP (common ldap objects one click searches) & Active Directory (over 200 common one click searches). This is the edition of LDAP Admin Tool you’ll want to use if you use your machine mainly in a professional setting. For example, most business users and administrators will need this edition to quickly search directory tree using one click searches and schedule export tasks. While assigning members to groups it is often necessary to know nested assignments. With our software's you can view the updated nested members of groups while assigning members to groups. SQLLDAP is easy sql like syntax to query and update LDAP. With our software's you are now able to build and edit query visually with a drag and drop function using keywords and attributes.
    Starting Price: $95 per year
  • 10
    AD Query

    AD Query

    SysOp Tools

    Completely free utility for Active Directory. Lookup a user or computer and view converted schema attributes that are normally not readable. A very handy tool for schema data lookup and comparison. No installer, just run the exe. 100% free utility for use in Active Directory domains. Search individual domain users and computer objects. View object Schema & LDAP data in one simple window. View binary Schema data in “human-readable” format. Easy lookup of email aliases, last login date, etc. Export search results to XML file, open with Excel. Small program size, super quick install. AD query software for user accounts is a great time-saving utility for the busy admin! AD Query is a free utility that allows quick and easy auditing of any user or computer object within Active Directory. Unlike the standard Users and Computers MMC, AD Query shows all data populated schema, LDAP and Exchange mail-enabled attributes for the user or computer object.
    Starting Price: Free
  • 11
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® Directory-as-a-Service® is Active Directory® and LDAP reimagined. JumpCloud securely manages and connects your users to their systems, applications, files, and networks. JumpCloud manages users and their systems – whether Mac, Linux, or Windows – and provides access to cloud and on-prem resources such as Office 365™, G Suite, AWS™ cloud servers, Salesforce™, and Jira® among thousands of others. The same login also connects users to networks and file shares via RADIUS and Samba, respectively, securing your organization’s WiFi and file server access. Leveraging cloud-based directory services, IT organizations can choose the best IT resources for the business enabling users to be as productive as possible.
  • 12
    AD Admin Tool
    AD Admin Tool is a simple and easy to use tool which allows you to browse, edit, query and export from active directory. With this tool you can view and edit active directory data including binary and images, export and import data to/from most popular file formats, edit attributes using many built-in editors, manage active directory users and their privileges, mass update entries using SQL-like syntax and use a multitude of other admin functions designed for making your work with active directory comfortable and efficient. With AD Admin Tool you can quickly and easily create and edit entries. LDAP connection profiles give you the opportunity to connect to the active directory server in one touch and only work with the selected active directory connection. With this tool you can connect to the active directory locally, remotely or using SSL.
    Starting Price: $395 one-time payment
  • 13
    i-PRO Video Insight

    i-PRO Video Insight

    Panasonic i-PRO Sensing Solutions

    Video Insight is a powerful yet easy-to-use enterprise Video Management platform with new plug-in architecture which provides enhanced scalability and improved feature sets. This powerful and versatile VMS solution fully integrates our MonitorCast Access Control platform to deliver uncompromised system management and control with unlimited scalability. VI7 has no license fees when used with i-PRO Extreme cameras, making it the most cost-effective enterprise level VMS platform available. VI delivers a wide range of robust features for the enterprise, including Health Monitor, automated failover, unlimited clients and users, and active directory/LDAP integration. VI’s 64-bit processing supports an industry-leading number of cameras per server, unlimited scalability, client workstations, users with simple integration to legacy systems, centralized administration of the system, and more.
  • 14
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 15
    Cayosoft Guardian
    Your Active Directory (AD) or Azure Active Directory (Azure AD) contain vital user identities that are crucial to ensuring your business operates without interruption. Whether from malicious actions, like cyberattacks and malware, or mistakes, like accidental deletions and misconfigurations, corruption of your Active Directory can stop your business in its tracks and cause costly outages that can last hours, days, or even weeks. Cayosoft Guardian was designed to reduce the complexity of hybrid Active Directory security, by combining threat detection, monitoring, and recovery into one comprehensive solution. Cayosoft Guardian continuously monitors directories and services, allowing you to isolate suspect changes and immediately recover unwanted changes made to both objects and settings. This is done across on-premises AD, hybrid AD, Azure AD, Office 365, Microsoft Teams, and Exchange Online, all from Cayosoft Guardian’s single, unified console.
  • 16
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 17
    SecureIdentity IAM
    SecureIdentity IAM provides enforcement of access decisions around applications and data repositories. By reading information from the Universal Directory it can make dynamic choices as to what programs a user is allowed to run and what file servers or cloud storage areas they are allowed to access. This is enforced by a client on the endpoints that intercepts requests for access to applications or data areas and vetting them against the configured policy. If the action is allowed, the user experience continues as normal with no overhead. If the action is forbidden then access to the appropriate executable or DLL files is dynamically blocked regardless of how it is invoked. Logs of all events are sent back to the platform’s event database to provide a forensic trail of activity.
  • 18
    Doccept

    Doccept

    Kensium Solutions

    Doccept is a multi-user Document Management System (DMS) that allows businesses to securely organize content. A Document Management System (DMS) is essential for organizations that aspire to “Go Paperless". It can be overwhelming for today’s businesses to effectively manage the legacy of documents stored in different places. Electronic Document Management is a requirement for a variety of industries including Biotech & Pharmaceuticals, Media, Telecom, Manufacturing, Banking, and Tax/Accounting. When large amounts of client data or transaction histories need to be retained over long periods of time, Doccept can help. The concept comes with a detailed API guide, giving you the ability to integrate with any third-party application seamlessly. The concept supports integration with LDAP (Lightweight Directory Access Protocol) and Active Directory to map User authentication without creating a separate account.
  • 19
    Robocopy

    Robocopy

    Windows Command Line

    Robocopy is a command-line utility for copying files. This command is available in Vista and Windows 7 by default. For Windows XP and Server 2003, this tool can be downloaded as part of Server 2003 Windows Resource Kit tools.
  • 20
    Active Directory Reports (AD Reports)
    Active Directory Reports Lite is the free edition of MaxPowerSoft's Active Diretory Reports (AD Reports). The most intuitive Active Directory reporting product. Within 2 easy clicks you can be off and running reports. AD Reports was built around an intuitive easy to use user interface. Update any existing or create your own custom reports. Include predefined or any Active Directory LDAP attribute and build your own LDAP filter. Accurately reports real time information of your Active Directory Servers. It is the most accurate on the market. In a multi-domain controller environment simply compare our results to any of the competitors. Simply stated, if you have administrator rights on your computer and are able to see the domain, our product just works. No messy database setup, no MSMQ problems, no bloated web server setup. We built everything internal and no we don't use a web server.
    Starting Price: $299 per year
  • 21
    Hyena

    Hyena

    SystemTools Software

    Used by tens of thousands of system administrators worldwide for twenty-five (25) years, Hyena is known throughout the industry as one of the top Windows and Active Directory management utilities available...at any price! It is designed to both simplify and centralize nearly all of the day-to-day management tasks, while providing new capabilities for system administration. This functionality is provided in a single, centralized, easy to use product. Whether your organization is using Windows 2003, Windows 2019 or anything and everything in between, you can manage everything with one tool. Hyena, our comprehensive and award-winning Active Directory and Windows system management software, now includes multiple ways to mass-update Active Directory information : Use the new Active Task feature for mass updating and importing of Active Directory information, or use the Active Editor, an interactive Active Directory editor that lets you freely move around and modify directory information.
    Starting Price: $329
  • 22
    BACKUP EAGLE

    BACKUP EAGLE

    Schmitz RZ Consult GmbH

    BACKUP EAGLE Backup Monitoring, Reporting, Audit & Compliance for IBM Spectrum Protect, IBM Spectrum Protect Plus, DellEMC NetWorker, Veeam, Rubrik, SEP sesam, IBM BRMS, RMAN, CommVault and more. Everything that can be automatically created for your backup environment is provided directly by BACKUP EAGLE®. Reliable detection of missing backups and application servers without any backup. Various analyses about backups and restores, backup clients, backup servers and backup devices. Different authorizations can be mapped in BACKUP EAGLE® for users defined in AD / LDAP. BACKUP EAGLE® enables the comparison between the application servers in the CMDB and the actually backed up servers.
  • 23
    Veyon

    Veyon

    Veyon Community

    Veyon provides a user interface that has been optimized for easy use and fast access to all important features. With Veyon you always have full control over your classroom. You can see all computer screens in an icon view and access individual computers with just one click. Taking screenshots of computers is a one-click operation as well. Draw attention to your lesson by locking all computers and blocking input devices with the help of just one button. The demo feature allows you to share your (or a student's) screens with all students. This way everyone can watch the screen contents of the presenting person in real time. There are two demo modes available: In fullscreen mode, all input devices are locked during the presentation. In window mode, users can simultaneously adapt the demonstrated workflow. Veyon can use the information already stored on your LDAP or ActiveDirectory server.
  • 24
    PowerTerm WebConnect HostView
    In today's economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm® WebConnect HostView web-to-host emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Centrally manage configuration and software updates - save on time and administrative resources. Increase productivity; enable anytime, anywhere access to business-critical applications using a standard web browser, regardless of the user's physical location. Reduce costs associated with individual licensing, maintenance, support and updates. SSL, SSH, SFTP, Active Directory and LDAP integration, Single Sign-On, authentication (including Kerberos), RADIUS, RSA® SecurID® and SecurEnvoy® SecureAccess and SecurICE two-factor authentication support, and more.
  • 25
    UrBackup

    UrBackup

    UrBackup

    UrBackup is an easy to set up Open Source client/server backup system, that through a combination of image and file backups accomplishes both data safety and a fast restoration time. File and image backups are made while the system is running without interrupting current processes. UrBackup also continuously watches folders you want to be backed up in order to quickly find differences from previous backups. Because of that, incremental file backups are really fast. Your files can be restored through the web interface, via the client or Windows Explorer while the backups of drive volumes can be restored with a bootable CD or USB-Stick (bare-metal restore). Currently, there are over 21,000 running UrBackup server instances (with auto-update enabled) with some instances having hundreds of active clients. A web interface makes setting up your own backup server really easy. The custom client makes fast file and image backups possible.
    Starting Price: Free
  • 26
    DSRAZOR for Windows

    DSRAZOR for Windows

    Visual Click Software

    Quickly document user and/or group NTFS effective and share permissions. Discover file ownership throughout your shared disk space. Report on users, groups, computers, permissions. Make sure your Active Directory object attributes match your enterprise standard. Find accounts that are locked, disabled, expired or unused for x days. Automate common Active Directory management tasks. Automatically synchronize your Student Information System (SIS) to Active Directory. Create/Import/Update users, groups and computers including bulk management. Effectively manage Active Directory - no scripting required! Delete/Move unused users, groups and computers. Reset passwords in bulk. Perform mass object imports from a CSV file. Modify trustee permissions for desired Folders. Document and manage Office 365 accounts. Allow non-admins to perform Active Directory management functions. Delegate the small stuff, focus on the big stuff.
    Starting Price: $500/year
  • 27
    OsMonitor

    OsMonitor

    Wangya Computer

    OsMonitor is a powerful employee monitoring software designed for companies. It adopts client-server mode with one server monitoring all employee computers through local area network or Internet. OsMonitor employee monitoring software records and tracks computer activities such as IM conversation and visited websites. You can see if your employees are working or not on the boss’s computer. OsMonitor also blocks undesirable actions such as specific websites, games, external drives and USB disk. All monitoring data from employee computers is stored in the server database. OsMonitor server will generate professional high-quality management reports on how your employees are using their computers. All the monitoring data are stored in the OsMonitor server computer. The data will not be lost even if the employees deleted the history on their own computers. Bandwidth usage/Networking download and upload speed in real-time.
  • 28
    Zentyal

    Zentyal

    Zentyal

    Join Windows® clients to the domain and manage them transparently. No disruption to your users, no user or device CALs. Comes with industry-standard SMTP and POP3/IMAP mail server built upon the most established technologies and protocols. Guarantees reliable and secure Internet access and helps to manage all the basic network infrastructure services. Receive software updates until the EOL-date of each version and get support when needed. Zentyal offers an easy to use Windows Server® alternative. It comes with native compatibility with Microsoft Active Directory® allowing you to join Windows® clients to the domain and manage them easily, causing no disruption to your users. Zentyal includes the industry-standard SMTP and POP3/IMAP mail servers built upon the most established technologies and protocols. Gives you the opportunity to deploy Zentyal as a mail server, domain & directory server with mail or all-in one server.
    Starting Price: €195 per server
  • 29
    Atlassian Crowd
    Single sign-on and user identity that's easy to use. Manage users from multiple directories - Active Directory, LDAP, OpenLDAP or Microsoft Azure AD - and control application authentication permissions in one single location. Make life easy for your users by giving them one username and password to log in to all the applications they need access to. Seamlessly integrate all your Atlassian products - like Jira, Confluence, and Bitbucket- to give your users one simple single sign-on (SSO) experience. Map any combination of directories to a single application – perfect for managing users not in your main directory - and manage authentication permissions in the same place. Get started with connectors for AD, LDAP, Microsoft Azure AD, Novell eDirectory, and more. You can even create your own custom connector. Can't make group changes in your directory? Keep your users in LDAP and define their authentication permissions in Crowd.
    Starting Price: $10 one-time fee
  • 30
    StealthRECOVER
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. As part of Stealthbits’ Active Directory solution portfolio, StealthRECOVER enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
  • 31
    Suneido

    Suneido

    Suneido Software

    Suneido™ is a complete, integrated application platform – a system for developing and deploying applications without the frustrations of integrating multiple different products. Suneido incorporates an object-oriented programming language, client-server relational database software, and application frameworks and components. It includes the integrated development environment (IDE) used to create applications as well as the client and server required to run applications across networks. Suneido is Open Source – it is provided free, with complete source code. Our mission is to provide a simple, open, lightweight, industrial strength alternative to large, complex, expensive, closed application technologies such as Visual Basic, Access, FoxPro, Delphi, Oracle, and SQL Server.
  • 32
    Corner Bowl Event Log Manager

    Corner Bowl Event Log Manager

    Corner Bowl Software Corporation

    An enterprise class Centralized Windows Event Log Management Software Tool. A Centralized Log Consolidator. A Real-Time Windows Event Log, Syslog and Application Log Monitor Software Tool. A Log Analyzer Tool. A Windows Syslog Server. An Azure Active Directory Auditing Software Tool. Compliance Reporting Software for JSIG, NIST, CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance with 80+ pre-built reports. An enhanced Windows Event Log Viewer with advanced search and filter capabilities. Supports Windows Event Logs, Syslogs, text based Application Logs on Windows and Linux, and cloud based Azure Active Directory Audit Logs. Once harvested, log entries are saved to either a local or offsite log repository. Event Log Manager provides you with 5 different methods to centralize your log entries including MySQL, Microsoft SQL Server, elasiticsearch and CosmosDB.
  • 33
    StealthINTERCEPT
    Audit and block any ad changes, authentications, or requests. Monitor and prevent unwanted and unauthorized activities in real-time for Active Directory security and compliance. For years, organizations have struggled to obtain contextual, actionable intelligence from their critical Microsoft infrastructure to address security, compliance, and operational requirements. Even after filling SIEM and other log aggregation technologies with every event possible, critical details get lost in the noise or are missing altogether. As attackers continue to leverage more sophisticated methods to elude detection, the need for a better way to detect and control changes and activities that violate policy is vital to security and compliance. Without any reliance on native logging, StealthINTERCEPT is able to detect and optionally prevent any change, authentication, or request against Active Directory in real-time and with surgical accuracy.
  • 34
    ADREPLSTATUS

    ADREPLSTATUS

    Microsoft

    The Active Directory Replication Status Tool (ADREPLSTATUS) analyzes the replication status for domain controllers in an Active Directory domain or forest. ADREPLSTATUS displays data in a format that is similar to REPADMIN /SHOWREPL * /CSV imported into Excel but with significant enhancements. Expose Active Directory replication errors occurring in a domain or forest. Prioritize errors that need to be resolved in order to avoid the creation of lingering objects in Active Directory forests. Help administrators and support professionals resolve replication errors by linking to Active Directory replication troubleshooting content on Microsoft TechNet. Allow replication data to be exported to source or destination domain administrators or support professionals for offline analysis. Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithms.
    Starting Price: Free
  • 35
    FuzzDB

    FuzzDB

    FuzzDB

    FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses. FuzzDB contains comprehensive lists of attack payload primitives for fault injection testing. These patterns, categorized by the attack and where appropriate platform type, are known to cause issues like OS command injection, directory listings, directory traversals, source exposure, file upload bypass, authentication bypass, XSS, HTTP header crlf injections, SQL injection, NoSQL injection, and more. For example, FuzzDB catalogs 56 patterns that can potentially be interpreted as a null byte and contains lists of commonly used methods and name-value pairs that trigger debug modes.
    Starting Price: Free
  • 36
    Simply Sync Password

    Simply Sync Password

    GoodWorks Communications

    Simply Sync Password allows organizations to synchronize their passwords and active directory properties from their local Active Directory site to an external Active Directory sites or other external systems. Simply Sync Password is a great alternative for organizations that do not want the added complexity and cost that comes with establishing a trust relationship between Active Directory sites or deploying an AD FS infrastructure. AD FS is great for large organizations, but in many cases it just doesn’t make sense for small and medium-size organizations. The role of the Password Capture Agent is to intercept password changes as they occur on the domain controllers. Since you don’t know which domain controller a user is going to use to reset their password, the Password Capture Agent must be installed on all domain controllers. The Password Capture Agent does not interfere with the password change process, it simply intercepts the change request as it happens.
    Starting Price: $20 per user per month
  • 37
    SysTools Active Directory Management
    Active directory management tool allows to edit, remove, create bulk users in AD. Allows to batch migrate user to new domain active directory. List, preview, and manage active directory user accounts from the computer. Provides an option to rollback active directory changes. Create multiple users in active directory directly from software home screen. Allows to move user account from one OU to another OU (Organizational Unit). Allows to find, delete, change, rename, and create organizational unit in AD. Active Directory Admin Username and Password are required. MS Exchange Server should be available and active on the user machine. Through AD Console, its administrator can perform multiple tasks right from a single panel. It is possible to perform numerous operations such as, create a new user or organizational unit, delete user, modify user attributes, move AD user to another OU, and if required, undo all the changes using rollback options.
    Starting Price: $499
  • 38
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 39
    WISE-FTP

    WISE-FTP

    WISE-FTP

    Thanks to WISE-FTP you are able to connect to any FTP server. WISE-FTP supports all protocols, for example, FTP, SFTP, FTPS, or FTPES. Secure authentication and file transfer are held at the maximum security level, through the SSH File Transfer Protocol (SETP) or the FTPS protocol. Manage your FTP servers with useful features, including deleting, renaming, copying, or setting the properties of files and directories, and much more. Never forget to upload and download files to FTP servers, the task planner of WISE-FTP allows automated file transfers following your specified schedules. To save you valuable time, WISE-FTP offers many features, including simultaneous transmission, web-optimized uploads, a macro recorder, or saved transfer tasks. Synchronize files and directories, including their sub-directories, between your local system and FTP servers automatically. That way, you will always have the latest changes online.
    Starting Price: Free
  • 40
    Wing FTP Server
    Wing FTP Server is an easy-to-use, powerful, and free FTP server software for Windows, Linux, Mac OS, and Solaris. It supports multiple file transfer protocols, including FTP, FTPS, HTTP, HTTPS, and SFTP, giving your clients flexibility in how they connect to the server. And it provides admins with a web-based interface to administrate the server from anywhere. You can also monitor server performance and online sessions and even receive email notifications about various events taking place on the server. Just with a web browser, you can administrate the server anytime, anywhere. Use the event manager to execute Lua script, send an email notification or run 3rd party program. Wing FTP can be clustered by Wing Gateway to deploy a simple load balancing solution. All the FTP transactions will be captured into a database, you can analyze it and generate reports in real-time. Allows you to map virtual directories to physical directories.
    Starting Price: $199 one time payment
  • 41
    Bopup Communication Server
    Bopup Communication Server is an in-house enterprise messaging server built to provide efficient and private communication over networks of any size. The server meets most of the critical business needs, such as centralized management, the Active Directory (LDAP) support, message and file transfer logging. It can be easily deployed over the business infrastructure to unite the entire company's offices and other locations into one internal IM workspace with control over messaging groups, user permissions to view others and send messages and documents, message and transfer archives with printing support. Since the server stores and delivers offline messages and files, users never lose information they are supposed to receive. Messaging is encrypted with strong algorithms so personal and group conversations are safe and secure even if data is sent via the Internet.
    Starting Price: $199
  • 42
    Bopup Messenger
    Bopup Messenger is a secure instant messenger for business designed to communicate over LAN and enterprise-size networks. This clear, easy to use and light-weight IM client offers a set of corporate features and answers most of the business needs you may have. With this corporate messenger, you can easily connect users from all other offices and locations into one IM workspace and exchange files, urgent messages with links, font and color formatting and emoticons, receive assigned files and directories from the IM server, have group chats. Personal contact lists are accessible to employees from any workplace so users see who is online and available to communicate among their contacts.
    Starting Price: $9.00/one-time
  • 43
    AD Browser

    AD Browser

    LDAPSoft

    AD Browser is a free Active Directory® browser by LDAPSoft. It is simple and easy to use tool designed to provide a read only access to the active directory. With AD Browser you can search for entries, view all available attributes and run SQL-LDAP Statments. AD browser provides both remote and local access to the Active Directory. The browser can be installed on the local machines or Domain Controller (DC). The browser is designed and developed with high level of security standards at our location in Morton Grove, IL, United States so that you can install this worry free on any or multiple DC's. The browser provides only a read-only interface so if you need to modify attributes and values you need our advanced tools like LDAP Admin Tool Standard and Professional Editions.
    Starting Price: $95 one-time payment
  • 44
    Ostorlab

    Ostorlab

    Ostorlab

    Uncover your organization's vulnerabilities with ease using Ostorlab. It goes beyond subdomain enumeration, accessing mobile stores, public registries, crawling targets, and analytics to provide a comprehensive view of your external posture. With a few clicks, gain valuable insights to strengthen security and protect against potential threats. From insecure injection and outdated dependencies to hardcoded secrets and weak cryptography, Ostorlab automates security assessments and identifies privacy issues. Ostorlab empowers security and developer teams to analyze and remediate vulnerabilities efficiently. Experience hands-off security with Ostorlab's continuous scanning feature. Automatically trigger scans on new releases, saving you time and effort while ensuring continuous protection. Access intercepted traffic, file system, function invocation, and decompiled source code with ease using Ostorlab. See what attackers see and save hours of manual tooling and grouping of outputs.
    Starting Price: $365 per month
  • 45
    Almyta Control System
    Almyta Systems has conducted business since March 2003. The main product of our company is an MRP II package called Almyta Control System (or just ACS). ACS is a Windows-based networkable client/server application. Each standard package includes the following modules, inventory control, purchasing, warehouse appointments, asset maintenance work orders, assembly orders, bill of materials, asset management, shipping, inventory sales. ACS is a barcode capable application, it reads scanned barcodes, it prints bar-coded labels and forms. Almyta Systems is offering a multitude of interfaces for hardware and software such as handheld devices, QuickBooks, Internet, PLCs. Almyta Systems provides custom programming for Windows and the Internet at competitive rates. All ACS configurations include product lifetime updates and one year of unlimited support. We will work with you on your custom software specifications. All estimates are firm and free.
    Starting Price: $49 per month
  • 46
    Protectimus

    Protectimus

    Protectimus Limited

    Protectimus SAAS two-factor authentication service is already set up in the cloud and available 24/7, just register and begin the integration via API or using a ready-made integration plugin. The Protectimus On-Premise MFA platform can be deployed on the premises of your organization or in a private cloud. Radius, Citrix NetScaler and XenApp VMWare, Active Directory, LDAP, Windows Logon, and RDP, OWA, ADFS, RoundCube, Dynamic Passwords, API, SDK, customized individual development. Dynamic Strong Password Authentication integrates directly with Microsoft Active Directory (or any other user directory) to add a six-digit password onto users’ static passwords. Today, data violation happens regularly. If you want to assure your data is thoroughly protected, strong authentication methods are vital. We are likely to display personal info without any outside intervention. But when it comes to business, we would not limit user authentication and identification to a single password.
    Starting Price: $33 per month
  • 47
    Network Glue
    All-in-one automated discovery, documentation, password rotation, and diagramming solution. Leave the site walks to us. The Network Glue collector detects all devices on your clients’ networks regardless of vendor. It even discovers Active Directory environments including the AD role of each workstation and server, and automatically brings in AD users from on-premises or hybrid environments. Say goodbye to hidden devices and incomplete user information. All network devices, as well as cloud, hybrid, and on-premises user information from Azure AD and Active Directory, are automatically documented and updated in IT Glue. This includes virtual components of networks for Hyper-V and VMware. We can’t all be artists. Let Network Glue generate comprehensive network diagrams for you. Unique icons help to quickly interpret network diagrams, and are fully integrated with IT Glue so contextual information is pulled up when a device icon is clicked.
    Starting Price: $29 per month
  • 48
    JaBack

    JaBack

    Hitek Software

    Simple User Interface helps you transfer files interactively, but the Goal is to get you to create backup tasks that can be scheduled to automatically or to run manually. Automate Backups of your important data, files and folders. The backup set is created in standard ZIP format. This allows flexibility in restoring the data using any zip software to unzip the backup set. Transfer your backup set to a remote location via FTP or Email it to your mail server. Scheduler software is very easy to use, yet has very powerful scheduling, tasking and automation capabilities. Email Notification of task failure based on task exit code. Local directory monitor allows you to backup data when a file/folder change is detected. Zip files and directories using wildcards on schedule. Can append date/time to filename for archive purposes. Copy files and directories using wildcards on schedule. Can append date/time to filename for archive purposes. Use it for data backup and file backup.
    Starting Price: $329.95 one-time payment
  • 49
    PC Shredder

    PC Shredder

    PC Shredder

    PC Shredder is one free data removal and file shredder software, that can permanently delete files, and folders and make them irrecoverable, completely shredding the files you specify, makes it impossible for anyone to restore deleted information. Prevent your business data, important documents, and personal information from being recovered. PC Shredder is freeware. It is free for both personal and commercial use. PC Shredder works on Windows NT, Windows 2000, Windows XP, Windows 2003 Server, and Windows Vista. There is no minimum hardware requirement for PC Shredder to run properly. PC Shredder can save hard disk space and improve your computer's performance. PC Shredder uses 5 built-in delete file algorithms for overwriting file content to leave no chance to recover them. PC Shredder allows you to easily wipe free space to ensure that previously 'deleted' files cannot be recovered. Use PC Shredder to keep your PC secure and faithful.
    Starting Price: Free
  • 50
    Curtain LogTrace

    Curtain LogTrace

    Coworkshop Solutions

    Curtain LogTrace is an enterprise file activity monitoring solution. It tracks user actions: create, copy, move, delete, rename, print, open, close, save. Includes source/destination paths and disk type. Perfect for monitoring user file activities. Key features: - File log (create & delete file) - File log (copy & move file) - File log (print & rename file) - App log (save, open & close file) - Support MySQL & MS SQL - Watermark for printout - Central administration - Integration with Active Directory - Uninstall password for client - Password management - Admin delegation - Self protection for the software Curtain LogTrace is shareware. You can download and use the software for free on a trial basis or commercial use. If you want to log more file events (e.g. print, rename, save, open and close) and some advanced features, you need to activate the software to paid version.
    Starting Price: Free with limited functions